Science OBJECTIVE ASSESSMENT ACTUAL EXAM
STUDY GUIDE 2025/2026 COMPLETE QUESTIONS
BANK AND CORRECT DETAILED ANSWERS WITH
RATIONALES || 100% GUARANTEED PASS
<BRAND NEW VERSION>
1. Array - ANSWER ✓ a collection of items stored at contiguous memory
locations; each item can be accessed using an index
2. Binary Search - ANSWER ✓ a search algorithm that finds the position of a
target value within a sorted array by repeatedly dividing the search interval
in half
3. Bubble Sort - ANSWER ✓ a simple sorting algorithm that repeatedly steps
through a list, compares adjacent elements, and swaps them if they are in the
wrong order
4. Concrete Step - ANSWER ✓ a detailed action in an algorithm that specifies
exactly how to perform a task
5. Count-controlled loop - ANSWER ✓ a loop that repeats a specific number
of times; controlled by a counter variable (e.g., "for" loop)
6. Desk checking - ANSWER ✓ a manual method of reviewing the logic of a
program or algorithm using a pencil and paper instead of a computer
7. Event-controlled loop - ANSWER ✓ a loop that continues to execute until a
specific condition or event occurs, such as user input or a sensor reading
,8. Heterogeneous - ANSWER ✓ a term describing a collection of items that are
of different types
9. Homogenous - ANSWER ✓ a term describing a collection of items that are
all of the same type
10.Index - ANSWER ✓ a numerical representation of an element's position
within an array or list
11.How are items added to and removed from a stack?
A. All items can be added to or removed from any location.
B. All items can be accessed or changed but not easily inserted or
removed.
C. The item removed is the one that has been in the shortest time.
D. The first item to be added becomes the first item removed. -
ANSWER ✓ C. The item removed is the one that has been in the
shortest time.
12.The collection of customers for a small business is stored in such a way that
a customer can be easily accessed, deleted, or added.
What is the data structure called for in this programming situation?
A. Queue
B. Record
C. Stack
D. List - ANSWER ✓ D. List
13.Which coding construct allows a choice between performing an action and
skipping it?
A. Input/output
B. Assignment
C. Selection
D. Iteration - ANSWER ✓ C. Selection
14.Which term describes the algorithm used in this scenario? - ANSWER ✓
Linear
,15.Consider the following code.
IF (myNum > 0)
Print "Here"
ELSE
Print "There"
16.What does the code do? - ANSWER ✓ It prints "There" if the value of
myNum is less than or equal to 0 and "Here" otherwise.
17.Sample code is shown.
Set counter to 0
Set product to 1
while (counter < 15)
Read num
Set product to product * num
Set counter to counter + 1
Print product
18.What does the code do? - ANSWER ✓ The user inputs 15 values, and the
product of those values is printed.
19.Which pseudocode example is one way to convert the integer a to a floating
point number? - ANSWER ✓ myFloat x = a / 1.0
20.Which term refers to the state of a process when it is being created? -
ANSWER ✓ New
21.What is the name of the CPU scheduling method in which a running process
is not interrupted and is allowed to finish before another process starts? -
ANSWER ✓ Nonpreemptive
22.A programming company has been hired to write code that will send secure
messages from one device to another. The company policy is to follow the
software development lifecycle (SDLC) model for production. Which step
will the team expect to go through during the course of this process? -
ANSWER ✓ Test the program. Rationale: The SDLC model has seven
structured steps: understand the problem, plan the logic, code the program,
, use software to translate the program into machine language, test the
program, put the program into production, and maintain the program.
23.A programmer has been asked to lead a project that uses artificial
intelligence to search for patterns in Wi-Fi signals to improve efficiency and
range. The programmer will use the software development lifecycle (SDLC)
as a model for design and implementation. Which step is the programmer in
when outlining the steps that the program will go through? - ANSWER ✓
Plan the logic. Rationale: 2nd step of the SDLC, in this step, the programmer
develops all necessary algorithms often using either flowcharts or
pseudocode.
24.A computer scientist is writing a computer application that will manage
financial records for small businesses. The computer scientist is following
the software development lifecycle (SDLC) model and just completed the
step, "understand the problem." Which step is next in the SDLC? -
ANSWER ✓ Plan the logic.
25.What does a technology company need to commit to if adopting the
Association of Computing Machinery (ACM) Code of Ethics? - ANSWER
✓ Perform work only in areas of competence.
26.Which situation represents a violation of the Codes of Ethics for both the
Association of Computing Machinery (ACM) and the Institute of Electrical
and Electronics Engineers (IEEE)? - ANSWER ✓ One of the division heads
assigns work to employees that is outside of their area of competence.
27.What is one situation that illustrates extortion? - ANSWER ✓ A person
hacks into a university's servers, locks them down, and will only unlock
them for a large ransom.
28.Field - ANSWER ✓ Variable inside a class (state/data)
29.Inheritance - ANSWER ✓ One class derives behavior/state from another
30.Methods - ANSWER ✓ Functions inside a class
31.Argument - ANSWER ✓ Actual value passed into a method