100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

TESTBANK FOR Secure Data Structures and Algorithms with C++ Walls and Mirrors, 8th edition Carrano

Rating
-
Sold
-
Pages
141
Grade
A+
Uploaded on
14-09-2025
Written in
2025/2026

TESTBANK FOR Secure Data Structures and Algorithms with C++ Walls and Mirrors, 8th edition Carrano

Institution
Course

















Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
September 14, 2025
Number of pages
141
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

, TESTBANK FOR Secure Data Structures and
Algorithms with C++ Walls and Mirrors, 8th edition
Carrano
Notes
1- The file is chapter after chapter.
2- We have shown you few pages sample.
3- The file contains all Appendix and Excel sheet
if it exists.
4- We have all what you need, we make update
at every time. There are many new editions
waiting you.
5- If you think you purchased the wrong file You
can contact us at every time, we can replace it
with true one.
Our email:


, Chapter 1 Questions


Multiple Choice Questions
1. The specifications of an ADT’s operations indicate ______.
a. what the operations do
b. how to implement the operations
c. how to store the data in the ADT
d. how to carry out the operations
Answer: a.
2. Data structures are part of an ADT’s ______.
a. definition
b. implementation
c. specifications
d. usage
Answer: b.

3. A(n) ______ allows two modules to communicate with each other.
a. data structure
b. axiom
c. interface
d. client
Answer: c.

4. An ADT’s ______ govern(s) what its operations are and what they do.
a. specifications
b. implementation
c. documentation
d. data structure
Answer: a.

5. When each module performs one well-defined task, we say that it is ___.
a. loosely coupled
b. highly coupled
c. cohesive
d. not easily reused
Answer: c.

6. When should an operation contract be written?
a. during analysis
b. after coding
c. at the same time as user documentation
d. when taking initial notes from client
Answer: a.

7. What information is included in the operation contract?
a. the method’s interface
b. data flow among the modules
c. assumptions about input
d. all of these
Answer: d.

8. What kind of interface contains a method if and only that method is essential to that class’s responsibilities?
a. complete
b. minimal
c. expanded
d. compact
Answer: b.



© 2025 Pearson Education, Inc., Hoboken, NJ. All rights reserved.

, Chapter 1 Questions


9. Object-oriented programming views a program as ______.
a. a sequence of actions
b. a collection of classes
c. a group of methods
d. an interaction among objects
Answer: d.

10. An ADT’s operations are known as its ______.
a. axioms
b. member functions
c. variables
d. interfaces
Answer: b.

11. Encapsulation combines an ADT’s data with its operations to form a(n) ______.
a. exception
b. method
c. object
d. variable
Answer: c.

12. A(n) ______ is an instance of a class.
a. method
b. data field
c. interface
d. object
Answer: d.

13. A(n) ______ is a class that inherits the members of another class.
a. base class
b. superclass
c. abstract class
d. subclass
Answer: d.

14. Understanding what the problem is and what the requirements of a solution are is called
a. Object Oriented Analysis
b. Object Oriented Design
c. Object Oriented Solution
d. Algorithmic Oriented Design
Answer: a.

15. Objects collaborate when they
a. are cohesive
b. are used by a programming team
c. send each other messages
d. model a real life situation
Answer: c.

16. Which of the following could not be a module?
a. a standalone function
b. a data member
c. a class method
d. a class itself
Answer: b.



© 2025 Pearson Education, Inc., Hoboken, NJ. All rights reserved.

, Chapter 1 Questions

True/False Questions

1. According to the principle of information hiding, a module should be completely isolated from other
modules.
Answer: False.

2. Data structures are part of an ADT’s implementation.
Answer: True.

3. An abstract data type is another name for a data structure.
Answer: False.

4. An interface for a class that allows programmers to accomplish any reasonable task is called a complete
interface.
Answer: True

5. It is possible to use one ADT to implement another ADT.
Answer: True

6. An application can use the operations of an ADT without knowing how the ADT is implemented.
Answer: True.

7. By default, all members in a class are public.
Answer: False.

8. A highly cohesive module is less robust.
Answer: False

9. Highly coupled modules should be avoided.
Answer: True

10. Any instance of a subclass can be used in a program anywhere that an instance of the superclass can be
used.
Answer: True.




© 2025 Pearson Education, Inc., Hoboken, NJ. All rights reserved.

, Chapter 1 Questions

Short Answer Questions

1. What are some of the benefits of modularity?
Answer: A modular problem is easier to write, read, and modify. Modularity also isolates errors and
eliminates redundancies.

2. What is functional abstraction?
Answer: Functional abstraction is a design principle that separates the purpose and use of a module from its
implementation.

3. What is information hiding?
Answer: Information hiding is a process that hides certain implementation details within a module and
makes them inaccessible from outside the module.


4. What are the three types of operations on a data collection?
Answer: The three types of operations on data are:
a. Add data to a data collection.
b. Remove data from a data collection.
c. Ask questions about the data in a data collection.

5. What is data abstraction?
Answer: Data abstraction is a design principle that separates the operations performed on a collection of
data from the implementation of the operations.


6. Define the client of a class?
Answer: The client of a class is a program or module that uses the class.


7. What does inheritance allow the system designer to do?
Answer: Inheritance allows the programmer to reuse classes previously defined for a related purpose. It
extends the implementation or makes slight modifications

8. What are the three principles of object oriented programming?
Answers: Encapsulation, inheritance, and polymorphism

9. What are the advantages of a highly cohesive module?
Answer: A highly cohesive module will be well named, promoting self-documenting and easily understood
code. It can be easy to reuse in other projects. It is easier to maintain. It will be more robust, less likely to
be affected by change.




© 2025 Pearson Education, Inc., Hoboken, NJ. All rights reserved.

, Chapter 2 Questions


Multiple Choice Questions

1. What must be known about the ADT Bag in order to use it in a program?
a. how entries in the bag are represented
b. how bag operations are implemented
c. how many entries can be stored in the bag
d. the interface of the bag
Answer: d.

2. According the CRC specifications for a Bag, which of the following behaviors would not be one of the
responsibilities of the class Bag?
a. See if the bag is empty
b. See if the bag is full
c. Look at all the objects in the bag
d. Count the number of times a certain object occurs in the bag
Answer: b.


3. A client program depends solely on the ______ of the ADT.
a. data members
b. structure
c. implementation
d. behavior
Answer: d.

4. What should a programmer do before implementing a recently designed class?
a. write code that uses the class
b. check comments that document specifications
c. adjust the design when problems are discovered
d. all of these
Answer: d


5. A(n) ______ is a C++ construct that enables a programmer to define a new data type.
a. class
b. method
c. data field
d. object
Answer: a.

6. A C++ class contains data members and ______.
a. clients
b. interfaces
c. member functions
d. data structures
Answer: c.


7. For the method remove(anEntry) of the ADT Bag, what would be the output of the method?
a. anEntry
b. nothing
c. true or false
d. the previous position of anEntry in the bag
Answer: c



© 2025 Pearson Education, Inc., Hoboken, NJ. All rights reserved.

, Chapter 2 Questions

8. What is the task of the toVector() method of the ADT Bag?
a. copy the entries of the bag into a vector
b. vector the entries to the printer
c. test to see if there is a vector to the bag
d. remove all objects from the bag
Answer: a




© 2025 Pearson Education, Inc., Hoboken, NJ. All rights reserved.

, Chapter 2 Questions


Short Answer Questions


1. What is an abstract data type (ADT)?
Answer: An ADT is a collection of data together with a set of operations on that data.

2. What is a data structure?
Answer: A data structure is a construct that is defined within a programming language to store a collection
of data.

3. What does an operation contract do?
Answer: An operation contract documents how a method can be used and what limitations it has. It
specifies the module’s purpose, assumptions, input, and output.

4. What is a bag?
Answer: A bag is a container of a finite number of objects having the same data type and in no particular
order. It can contain duplicate items.




© 2025 Pearson Education, Inc., Hoboken, NJ. All rights reserved.

, Chapter 3 Questions

Multiple Choice

1. Which of the following provides a way to enforce the wall of an ADT?
a. Implement the ADT as a C++ class
b. Always use public fields
c. Never use private records together methods
d. Link records together
Answer: A

2. Each method for the array based implementation of the ADT bag will require access to the array
of entries and what else?
a. The number of fields
b. The current number of entries in the bag
c. The ID of the previous bag entry
d. The ID of the next bag entry
Answer B

3. The default constructor for an array implementation of the ADT Bag should do what?
a. Load the bag with blanks and zeros
b. Set itemCount to DEFAULT_CAPACITY
c. Initialize the current number of items
d. Load the new entry with blanks and zeros
Answer: C

4. Why should we prevent a client’s direct access to a data structure?
a. To protect the job security of the systems analyst
b. It is a federal law
c. Most computer languages do not allow it
d. The client could possibly damage the ADT’s data
Answer: D

5. Which of the following methods would definitely be considered part of a core group?
a. add
b. findNext
c. clear
d. search
Answer: A

6. An add method that encounters a full array should either signal it’s client or
a. Crash the program
b. Allocate a larger array
c. Loop back to the beginning of the array for another pass through the array
d. Merely increment the loop counter into the next area of memory
Amswer: B

7. Rather than returning a value, a method can signal its client by
a. Crashing the program
b. Beeping
c. Throwing an exception
d. Ignoring the requested record
Answer: C

© 2025 Pearson Education, Inc., Hoboken, NJ. All rights reserved.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
storetestbanks ball state university
Follow You need to be logged in order to follow users or courses
Sold
138
Member since
1 year
Number of followers
1
Documents
1589
Last sold
1 day ago

4.7

22 reviews

5
18
4
2
3
2
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions