Which of the following characterizes how an enabled security program might react to a new
program installation on a computer system?
1. It might alert you to space requirement excesses.
2. It might automatically set a restore point for the computer system.
3. It might protect the new installation from getting viruses.
4. It might report an error or tell you that the file is corrupted. correct answers 4. It might report
an error or tell you that the file is corrupted.
It is important to extract the Eclipse executable file from the .zip file in the Programs folder of
your C:\ drive.
1. True
2. False correct answers 1. True
If you do not have the latest Java SDK in place when you download the Eclipse IDE, you will
have to download the program again.
1. True
2. False correct answers 1. True
Rupesh wants to try programming with Eclipse. What is the first step he should take to make that
happen?
1. download the current Java Development Kit
2. download the Eclipse IDE
,3. disable his security program
4. create a restore point correct answers 4. create a restore point
Hadley made a plan that after downloading the Eclipse IDE, she would disable her security
program, extract and install Eclipse, and then update her Java SDK. Which steps will ensure that
she will correctly install the new program?
1. Update her Java SDK, then extract the Eclipse IDE.
2. Disable her security program and update her Java SDK before downloading Eclipse.
3. Re-enable her security program before updating the Java SDK.
4. Extract and install Eclipse before disabling her security program. correct answers 2. Disable
her security program and update her Java SDK before downloading Eclipse.
Which of the following is a key difference between a Windows 7 restore point and one you set
yourself?
1. Windows 7 restore points are set automatically.
2. Windows 7 restore points take far longer to initiate a restore point, while it's faster when you
do it yourself.
3. Windows 7 restore points are not all-inclusive, while those you set manually are.
4. Windows 7 restore points are reliable so you won't have to deal with a corrupted system
configuration. correct answers 3. Windows 7 restore points are not all-inclusive, while those you
set manually are.
Which of these titles will work in Java syntax?
1. Helloworld
2. hello world
3. HelloWorld
,4. helloworld correct answers 3. HelloWorld
Which of these conclusions supports the fact that Eclipse is categorized as an IDE?
1. The user must have a high level of expertise before quality results can be obtained.
2. The user must specify the programming language he or she wants to use.
3. The user cannot use cheat sheets because it is frowned upon.
4. The user must get used to a proprietary and unique menu system. correct answers 2. The user
must specify the programming language he or she wants to use.
A submenu in a text editor is indicated by a ______________. correct answers triangle
Your Java class should be given the same name as your Java________. correct answers program
DOWNLOAD, INSTALL, EXPLORE INTELLIJ IDEA correct answers
a centralized version control system that a programmer or team of programmers can access to
ensure that they are referencing or including the latest version of programming code correct
answers Concurrent Versions System
a version-control system that a programmer can choose to use to monitor and access various
versions of programming code correct answers git
the federal law that requires accounting security features be applied correct answers Sarbanes-
Oxley
rambling program code that performs the required action but in an unorganized and inefficient
manner correct answers spaghetti code
, application of commonly used or agreed upon methods of presentation or use to permit
efficiency correct answers standardization
the sub-domain/domain name and the top-level domain name (.com, .edu, .gov, .net) that we use
to locate Web sites correct answers Uniform Resource Locator
What is Sarbanes-Oxley?
1. the federal law that requires the use of proprietary software
2. the federal law that requires ISPs divulge Web information
3. the federal law that requires accounting security features be applied
4. the federal law that requires the enforcement of anti-trust measures correct answers 3. the
federal law that requires accounting security features be applied
What kind of code performs the required action but in an unorganized and inefficient manner?
1. lasagna code
2. spaghetti code
3. ravioli code
4. pasta code correct answers 2. spaghetti code
What is important for a programmer to have when making modifications to code?
1. access to free and simple programming IDEs
2. documentation of all changes that are made
3. plain text editors for entering in new code
4. permission from an IDE to change the code correct answers 2. documentation of all changes
that are made