ap comp sci principles midterm review

¡Supera tus tareas y exámenes ahora con Quizwiz!

In the following code segment, assume that the variable n has been initialized with an integer value. image: https://assets.learnosity.com/organisations/537/VR153133.g06.png Which of the following is NOT a possible value displayed by the program? - "artichoke" - "broccoli" - "carrot" - "daikon"

"carrot"

A programmer wants to determine whether a score is within 10 points of a given target. For example, if the target is 50, then the scores 40, 44, 50, 58, and 60 are all within 10 points of the target, while 38 and 61 are not. Which of the following Boolean expressions will evaluate to true if and only if score is within 10 points of target ? (score ≤ target + 10) AND (target + 10 ≤ score) (target + 10 ≤ score) AND (score ≤ target - 10) (score ≤ target - 10) AND (score ≤ target + 10) (target - 10 ≤ score) AND (score ≤ target + 10)

(target - 10 ≤ score) AND (score ≤ target + 10)

Assume that the Boolean variable x is assigned the value true and the Boolean variable y is assigned the value false. Which of the following will display the value true ? Select two answers. - IF x DISPLAY x OR y - IF x OR y DISPLAY x - IF x OR y DISPLAY x AND y - IF x AND y DISPLAY x OR y

- IF x DISPLAY x OR y - IF x OR y DISPLAY x

convert Decimal to Binary: 75

1001011

convert Decimal to Binary: 22

10110

convert Binary to Decimal: 1101

13

The player controls in a particular video game are represented by numbers. The controls and their corresponding binary values are shown in the following table. ControlBinary Value ← 01000 ↑ 01001 → 01011 ↓ 01111 Jump 11000 Run 11001 Pause 11011 Reset 11111 The numeric values for the controls can also be represented in decimal (base 10). Question What is the decimal value for the jump control? 3 12 24 48

24

A text-editing application uses binary sequences to represent each of 200 different characters. What is the minimum number of bits needed to assign a unique bit sequence to each of the possible characters? 4 6 7 8

8

A library of e-books contains metadata for each book. The metadata are intended to help a search feature find books that users are interested in. Which of the following is LEAST likely to be contained in the metadata of each e-book? - An archive containing previous versions of the e-book - The author and title of the e-book - The date the e-book was first published - The genre of the e-book (e.g., comedy, fantasy, romance, etc.)

An archive containing previous versions of the e-book

The figure below shows two possible network configurations for devices P through V. A line between two devices indicates a connection. Devices can communicate only through the connections shown. image: https://assets.learnosity.com/organisations/537/VR008765.g07.png Question: In which of the configurations is it possible to have redundant routing between devices Q and V? - Configuration I only - Configuration II only - Both configuration I and configuration II - Neither configuration I nor configuration II

Both configuration I and configuration II

A user wants to save a data file on an online storage site. The user wants to reduce the size of the file, if possible, and wants to be able to completely restore the file to its original version. Which of the following actions best supports the user's needs? - Compressing the file using a lossless compression algorithm before uploading it - Compressing the file using a lossy compression algorithm before uploading it - Compressing the file using both lossy and lossless compression algorithms before uploading it - Uploading the original file without using any compression algorithm

Compressing the file using a lossless compression algorithm before uploading it

Which of the following statements correctly explain how the Internet is able to facilitate communication at a large scale? I. A central monitoring computer is used to track and maintain the connections of the Internet. II. Data is routed between points in multiple ways so that if a connection fails, the data can be rerouted around the inoperative connections. III. Protocols for packets and routing are used so that computers from different manufacturers can communicate in a standard way. - I and II only - I and III only - II and III only - I, II, and III

II and III only

Which of the following is a characteristic of the fault-tolerant nature of routing on the Internet? - The ability to use a hierarchical naming system to avoid naming conflicts - The ability to provide data transmission even when some connections have failed - The ability to resolve errors in domain name system (DNS) lookups - The ability to use multiple protocols such as hypertext transfer protocol (HTTP), Internet protocol (IP), and simple mail transfer protocol (SMTP) to transfer data

The ability to provide data transmission even when some connections have failed

Which of the following is a true statement about data compression? - Data compression is only useful for files being transmitted over the Internet. - Regardless of the compression technique used, once a data file is compressed, it cannot be restored to its original state. - Sending a compressed version of a file ensures that the contents of the file cannot be intercepted by an unauthorized user. - There are trade-offs involved in choosing a compression technique for storing and transmitting data.

There are trade-offs involved in choosing a compression technique for storing and transmitting data.

The figure below shows two possible network configurations for devices P through V. A line between two devices indicates a connection. Devices can communicate only through the connections shown. image: https://assets.learnosity.com/organisations/537/VR008765.g07.png Question: In configuration I, what is the minimum number of connections that must be broken or removed before device T can no longer communicate with device U? - One - Two - Three - Four

Two

According to the domain name system (DNS), which of the following is a subdomain of the domain example.com? - about.example.com - example.co.uk - example.com.org - example.org

about.example.com

Internet protocol version 4 (IPv4) represents each IP address as a 32-bit binary number. Internet protocol version 6 (IPv6) represents each IP address as a 128-bit binary number. Which of the following best describes the result of using 128-bit addresses instead of 32-bit addresses? - 4 times as many addresses are available. - 96 times as many addresses are available. - 2^4 times as many addresses are available. - 2^96 times as many addresses are available.

2^96 times as many addresses are available.

Consider the following program, which uses the variables start, end, and current. image: https://assets.learnosity.com/organisations/537/2bc9eaf0-2a91-4f6f-9eb1-78f38c7eeddc.jpg What is displayed as a result of executing the program? 1 3 3 3 3 4 4 4

3 4

The diagram below shows a circuit composed of three logic gates. Each gate takes two inputs and produces a single output. image: https://assets.learnosity.com/organisations/537/VR021391.g04.png For which of the following input values will the circuit have an output of true ? A = true, B = true, C = true, D = false A = true, B = false, C = false, D = true A = false, B = true, C = true, D = true A = false, B = false, C = true, D = true

A = false, B = true, C = true, D = true

A list of binary values (0 or 1) is used to represent a black-and-white image. Which of the following is LEAST likely to be stored as metadata associated with the image? - Copyright information for the image - The date and time the image was created - The dimensions (number of rows and columns of pixels) of the image - A duplicate copy of the data

A duplicate copy of the data

Internet protocol version 6 (IPv6) has been introduced to replace the previous version (IPv4). Which of the following best describes a benefit of IPv6 over IPv4? - IPv6 addresses are shorter than IPv4 addresses, which allows for faster routing of packets. - IPv6 allows for a greater number of addresses than IPv4, which allows more devices to be connected to the Internet. - IPv6 eliminates the use of hierarchy in addressing, making addresses easier to use. - IPv6 allows users to bypass older security protocols so that data can be sent peer-to-peer without the use of routers.

IPv6 allows for a greater number of addresses than IPv4, which allows more devices to be connected to the Internet.

Which of the following statements about the Internet is true? - The Internet is a computer network that uses proprietary communication protocols. - The Internet is designed to scale to support an increasing number of users - The Internet requires all communications to use encryption protocols. - The Internet uses a centralized system to determine how packets are routed.

The Internet is designed to scale to support an increasing number of users

A color in a computing application is represented by an RGB triplet that describes the amount of red, green, and blue, respectively, used to create the desired color. A selection of colors and their corresponding RGB triplets are shown in the following table. Each value is represented in decimal (base 10). Color Name RGB Triplet indigo (75, 0, 130) ivory (255, 255, 240) light pink (255, 182, 193)​ light yellow (255, 255, 224) magenta (255, 0, 255) neutral gray (127, 127, 112) pale yellow (255, 255, 160) vivid yellow (255, 255, 14) Question: What is the binary RGB triplet for the color indigo? - (00100101, 00000000, 10000010) - (00100101, 00000000, 01000001) - (01001011, 00000000, 10000010) - (01001011, 00000000, 01000001)

(01001011, 00000000, 10000010)

A color in a computing application is represented by an RGB triplet that describes the amount of red, green, and blue, respectively, used to create the desired color. A selection of colors and their corresponding RGB triplets are shown in the following table. Each value is represented in decimal (base 10). Color Name RGB Triplet indigo (75, 0, 130) ivory (255, 255, 240) light pink (255, 182, 193)​ light yellow (255, 255, 224) magenta (255, 0, 255) neutral gray (127, 127, 112) pale yellow (255, 255, 160) vivid yellow (255, 255, 14) Question: What is the binary RGB triplet for the color indigo? - (00100101, 00000000, 10000010) - (00100101, 00000000, 01000001) - (01001011, 00000000, 10000010) - (01001011, 00000000, 01000001)

(01001011, 00000000, 10000010)

To be eligible for a particular ride at an amusement park, a person must be at least 12 years old and must be between 50 and 80 inches tall, inclusive. Let age represent a person's age, in years, and let height represent the person's height, in inches. Which of the following expressions evaluates to true if and only if the person is eligible for the ride? (age ≥ 12) AND ((height ≥ 50) AND (height ≤ 80)) (age ≥ 12) AND ((height ≤ 50) AND (height ≥ 80)) (age ≥ 12) AND ((height ≤ 50) OR (height ≥ 80)) (age ≥ 12) OR ((height ≥ 50) AND (height ≤ 80))

(age ≥ 12) AND ((height ≥ 50) AND (height ≤ 80))

To be eligible for a particular ride at an amusement park, a person must be at least 12 years old and must be between 50 and 80 inches tall, inclusive. Let age represent a person's age, in years, and let height represent the person's height, in inches. Which of the following expressions evaluates to true if and only if the person is eligible for the ride? - (age ≥ 12) AND ((height ≥ 50) AND (height ≤ 80)) - (age ≥ 12) AND ((height ≤ 50) AND (height ≥ 80)) - (age ≥ 12) AND ((height ≤ 50) OR (height ≥ 80)) - (age ≥ 12) OR ((height ≥ 50) AND (height ≤ 80))

(age ≥ 12) AND ((height ≥ 50) AND (height ≤ 80))

A bookstore has a database containing information about each book for sale in the store. A sample portion of the database is shown below. Author Title SellingPrice Genre QuantityAvailable J. M. Barrie Peter and Wendy $6.99 Fantasy 3 L. Frank Baum The Wonderful Wizard of Oz $7.99 Fantasy 2 Arthur Conan Doyle The Hound of the Baskervilles $7.49 Mystery 4 Mary Shelley Frankenstein $7.99 Horror 4 Jules Verne Twenty Thousand Leagues Under the Sea $6.99 Science Fiction 3 H. G. Wells The War of the Worlds $4.99 Science Fiction 3 A store employee wants to calculate the total amount of money the store will receive if they sell all of the available science fiction books. Which columns in the database can be ignored and still allow the employee to perform this calculation? Select two answers. - Author - Title - Genre - Quantity Available

- Author - Title

A group of students take hundreds of digital photos for a science project about weather patterns. Each photo file contains data representing the level of red, green, and blue for each pixel in the photo. The file also contains metadata that describes the date, time, and geographic location where the photo was taken. For which of the following goals would analyzing the metadata be more appropriate than analyzing the data? Select two answers. - Determining the chronological order of the photos - Determining the number of clouds in a particular photo - Determining whether a photo is suitable for printing in black-and-white - Determining whether two photos were taken at the same location on different days

- Determining the chronological order of the photos - Determining whether two photos were taken at the same location on different days

The figure below represents a network of physically linked devices, labeled A through F. A line between two devices indicates a connection. Devices can communicate only through the connections shown. image: https://assets.learnosity.com/organisations/537/VR166545.g05.png Which of the following statements are true about the ability for devices A and C to communicate? Select two answers. - If devices B and D were to fail, then information sent from device A could not reach device C. - If devices B and F were to fail, then information sent from device A could not reach device C. - If devices D and F were to fail, then information sent from device A could not reach device C. - If devices E and F were to fail, then information sent from device A could not reach device C.

- If devices B and D were to fail, then information sent from device A could not reach device C. - If devices D and F were to fail, then information sent from device A could not reach device C.

In the following procedure, the parameter age represents a person's age. The procedure is intended to return the name of the age group associated with age. People who are under 18 are considered minors, people who are 65 and older are considered senior citizens, and all other people are considered adults. The procedure does not work as intended. Line 1: PROCEDURE ageGroup(age) Line 2: { Line 3: result ← "adult" Line 4: IF(age ≥ 65) Line 5: { Line 6: result ← "senior citizen" Line 7: } Line 8: RETURN(result) Line 9: Line 10: result ← "adult" Line 11: IF(age < 18) Line 12: { Line 13: result ← "minor" Line 14: } Line 15: RETURN(result) Line 16: } Removing which two lines of code will cause the procedure to work as intended?Select two answers. - Line 3 - Line 8 - Line 10 - Line 15

- Line 8 - Line 10

A student is creating a Web site that is intended to display information about a city based on a city name that a user enters in a text field. Which of the following are likely to be challenges associated with processing city names that users might provide as input? Select two answers. - Users might attempt to use the Web site to search for multiple cities. - Users might enter abbreviations for the names of cities. - Users might misspell the name of the city. - Users might be slow at typing a city name in the text field.

- Users might enter abbreviations for the names of cities. - Users might misspell the name of the city.

In a certain video game, the variable maxPS represents the maximum possible score a player can earn. The maximum possible score depends on the time it takes the player to complete the game. The value of maxPS should be 30 if time is greater than 120 and 50 otherwise. Which of the following code segments correctly sets the value of maxPS based on the value of time ? Select two answers. - maxPS←50 IF time > 120 maxPS←30 - IF time > 120 maxPS←30 maxPS←50 - IF time > 120 maxPS←50 ELSE maxPS←30 - IF time > 120 maxPS←30 ELSE maxPS←50

- maxPS←50 IF time > 120 maxPS←30 - IF time > 120 maxPS←30 ELSE maxPS←50

Consider the following code segment. image: https://assets.learnosity.com/organisations/537/VR167821.g01.png If the value of x is 3 and the value of y is 5, what is displayed as a result of executing the code segment? -2 2 8 Nothing will be displayed.

-2

convert Decimal to Binary: 135

10000111

Consider the following code segment. image: https://assets.learnosity.com/organisations/537/VR165938.g01.png What is the value of sum after the code segment is executed? 12 14 16 18

16

An online store uses 6-bit binary sequences to identify each unique item for sale. The store plans to increase the number of items it sells and is considering using 7-bit binary sequences. Which of the following best describes the result of using 7-bit sequences instead of 6-bit sequences? - 2 more items can be uniquely identified. - 10 more items can be uniquely identified. - 2 times as many items can be uniquely identified. - 10 times as many items can be uniquely identified.

2 times as many items can be uniquely identified.

The player controls in a particular video game are represented by numbers. The controls and their corresponding binary values are shown in the following table. ControlBinary Value ← 01000 ↑ 01001 → 01011 ↓ 01111 Jump 11000 Run 11001 Pause 11011 Reset 11111 The numeric values for the controls can also be represented in decimal (base 10). Question: What is the decimal value for the jump control? 3 12 24 48

24

The figure below represents a network of physically linked computers labeled A through G. A line between two computers indicates that the computers can communicate directly with each other. Any information sent between two computers that are not directly connected must go through at least one other computer. For example, information can be sent directly between computers A and B, but information sent between computers A and C must go through other computers. image: https://assets.learnosity.com/organisations/537/media.academicmerit.com/b2b92b3f6ccb51da5de938f94d7b7480/original.png Question: What is the minimum number of connections that must be broken or removed in the network before computer E can no longer communicate with computer F? 1 2 3 4

3

A game is played by moving a game piece left or right along a horizontal game board. The board consists of spaces of various colors, as shown. The circle represents the initial location of the game piece. YellowBlackGreenGreenRedYellowBlackBlackYellowBlack ● The following algorithm indicates how the game is played. The game continues until the game is either won by landing on the red space or lost when the piece moves off either end of the board. Step 1: Place a game piece on a space that is not red and set a counter to 0. Step 2: If the game piece is on a yellow space, move the game piece 3 positions to the left and go to step 3. Otherwise, if the game piece is on a black space, move the game piece 1 position to the left and go to step 3. Otherwise, if the game piece is on a green space, move the game piece 2 positions to the right and go to step 3. Step 3: Increase the value of the counter by 1. Step 4: If game piece is on the red space or moved off the end of the game board, the game is complete. Otherwise, go back to step 2. If a game is begun by placing the game piece on the rightmost black space for step 1, what will be the value of the counter at the end of the game? 2 3 4 5

4

convert Binary to Decimal: 110011010

410

convert Binary to Decimal: 101101

45

An office uses an application to assign work to its staff members. The application uses a binary sequence to represent each of 100 staff members. What is the minimum number of bits needed to assign a unique bit sequence to each staff member? 5 6 7 8

7

A certain computer has two identical processors that are able to run in parallel. Each processor can run only one process at a time, and each process must be executed on a single processor. The following table indicates the amount of time it takes to execute each of three processes on a single processor. Assume that none of the processes are dependent on any of the other processes. ProcessExecution Time onEither Processor X 60 seconds Y 30 seconds Z 50 seconds Which of the following best approximates the minimum possible time to execute all three processes when the two processors are run in parallel? 60 seconds 70 seconds 80 seconds 90 seconds

80 seconds

A person wants to transmit an audio file from a device to a second device. Which of the following scenarios best demonstrates the use of lossless compression of the original file? - A device compresses the audio file before transmitting it to a second device. The second device restores the compressed file to its original version before playing it. - A device compresses the audio file by removing details that are not easily perceived by the human ear. The compressed file is transmitted to a second device, which plays it. - A device transmits the original audio file to a second device. The second device removes metadata from the file before playing it. - A device transmits the original audio file to a second device. The second device plays the transmitted file as is.

A device compresses the audio file before transmitting it to a second device. The second device restores the compressed file to its original version before playing it.

A person wants to transmit an audio file from a device to a second device. Which of the following scenarios best demonstrates the use of lossless compression of the original file? - A device compresses the audio file before transmitting it to a second device. The second device restores the compressed file to its original version before playing it. - A device compresses the audio file by removing details that are not easily perceived by the human ear. The compressed file is transmitted to a second device, which plays it. - A device transmits the original audio file to a second device. The second device removes metadata from the file before playing it. - A device transmits the original audio file to a second device. The second device plays the transmitted file as is.

A device compresses the audio file before transmitting it to a second device. The second device restores the compressed file to its original version before playing it.

Which of the following is an advantage of a lossless compression algorithm over a lossy compression algorithm? - A lossless compression algorithm can guarantee that compressed information is kept secure, while a lossy compression algorithm cannot. - A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot. - A lossless compression algorithm typically allows for faster transmission speeds than does a lossy compression algorithm. - A lossless compression algorithm typically provides a greater reduction in the number of bits stored or transmitted than does a lossy compression algorithm.

A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot.

Which of the following best describes a challenge involved in using a parallel computing solution? - A parallel computing solution may not be appropriate for an algorithm in which each step requires the output from the preceding step. - A parallel computing solution may not be appropriate for an algorithm in which the same formula is applied to many numeric data elements. - A parallel computing solution may not be appropriate for an algorithm that can be easily broken down into small independent tasks. - A parallel computing solution may not be appropriate for an algorithm that searches for occurrences of a key word in a large number of documents.

A parallel computing solution may not be appropriate for an algorithm in which each step requires the output from the preceding step.

The diagram below shows a circuit composed of three logic gates. Each gate takes two inputs and produces a single output. image: https://assets.learnosity.com/organisations/537/1b5ba614-f475-4c51-bfd1-3867ed4fbe4c.JPG For which of the following input values will the circuit have an output of ? - A=TRUE B=FALSE C=FALSE D=FALSE - A=TRUE B=TRUE C=FALSE D=FALSE - A=FALSE B=FALSE C=TRUE D=TRUE - A=FALSE B=FALSE C=FALSE D=TRUE

A=TRUE B=FALSE C=FALSE D=FALSE

Which of the following best explains what happens when a new device is connected to the Internet? - A device driver is assigned to the device. - An Internet Protocol (IP) address is assigned to the device. - A packet number is assigned to the device. - A Web site is assigned to the device.

An Internet Protocol (IP) address is assigned to the device.

A certain programming language uses 4-bit binary sequences to represent nonnegative integers. For example, the binary sequence 0101 represents the corresponding decimal value 5. Using this programming language, a programmer attempts to add the decimal values 14 and 15 and assign the sum to the variable total. Which of the following best describes the result of this operation? - The correct sum of 29 will be assigned to the variable total. - An overflow error will occur because 4 bits is not large enough to represent either of the values 14 or 15. - An overflow error will occur because 4 bits is not large enough to represent 29, the sum of 14 and 15. - A round-off error will occur because the decimal values 14 and 15 are represented as approximations due to the fixed number of bits used to represent numbers.

An overflow error will occur because 4 bits is not large enough to represent 29, the sum of 14 and 15.

Which of the following best explains how IP addresses are assigned? - As a new device is connected to the Internet, it is assigned an IP address to enable communication on the network. - IP addresses are assigned only to servers that host Web sites; user devices do not require an IP address. - New devices are connected to the Internet without an IP address, but are eventually assigned an IP address once they can be verified by a certificate authority. - New devices are connected to the Internet without an IP address; IP addresses are assigned only for encrypted communications.

As a new device is connected to the Internet, it is assigned an IP address to enable communication on the network.

Which of the following best explains how fault tolerance in a network is achieved? - By providing high-bandwidth connections between devices, enabling data packets to be transmitted as quickly as possible - By providing multiple paths between devices, enabling routing to occur even in the presence of a failed component - By providing open network protocols, ensuring that all devices on the network are interacting in a standard way - By providing software to monitor all network traffic, ensuring that data packets are sent and received in the proper order

By providing multiple paths between devices, enabling routing to occur even in the presence of a failed component

Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string more than once and replaces each instance of that pair with a corresponding character that does not appear in the string. The algorithm saves a list containing the mapping of character pairs to their corresponding replacement characters. For example, the string "THIS_IS_THE_BEST_WISH" can be encoded as "%#_#%E_BEST_W#H" by replacing all instances of "TH" with "%" and replacing all instances of "IS" with "#". Which of the following statements about byte pair encoding is true? - Byte pair encoding is an example of a lossy transformation because it discards some of the data in the original string. - Byte pair encoding is an example of a lossy transformation because some pairs of characters are replaced by a single character. - Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version. - Byte pair encoding is an example of a lossless transformation because it can be used to transmit messages securely.

Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.

Directions: The question or incomplete statement below is followed by four suggested answers or completions. Select the one that is best in each case. Digital images are often represented by the red, green, and blue values (an RGB triplet) of each individual pixel in the image. A photographer is manipulating a digital image and overwriting the original image. Which of the following describes a lossless transformation of the digital image? - Compressing the image in a way that may lose information but will suffer only a small loss of image quality. - Creating the gray scale of an image by averaging the amounts of red, green, and blue in each pixel and assigning this new value to the corresponding pixel in the new image. The new value of each pixel represents a shade of gray, ranging from white to black. - Creating the negative of an image by creating a new RGB triplet for each pixel in which each value is calculated by subtracting the original value from 255. The negative of an image is reversed from the original; light areas appear dark, and colors are reversed. - Modifying part of the image by taking the pixels in one part of the picture and copying them to the pixels in another part of the picture.

Creating the negative of an image by creating a new RGB triplet for each pixel in which each value is calculated by subtracting the original value from 255. The negative of an image is reversed from the original; light areas appear dark, and colors are reversed.

Which of the following best explains how data is transmitted on the Internet? - Data is broken into packets, which are all sent to the recipient in a specified order along the same path. - Data is broken into packets, which can be sent along different paths. - All data is transmitted in a single packet through a direct connection between the sender and the recipient. - Multiple data files are bundled together in a packet and transmitted together.

Data is broken into packets, which can be sent along different paths.

A digital photo file contains data representing the level of red, green, and blue for each pixel in the photo. The file also contains metadata that describes the date and geographic location where the photo was taken. For which of the following goals would analyzing the metadata be more appropriate than analyzing the data? - Determining the likelihood that the photo is a picture of the sky - Determining the likelihood that the photo was taken at a particular public event - Determining the number of people that appear in the photo - Determining the usability of the photo for projection onto a particular color background

Determining the likelihood that the photo was taken at a particular public event

Directions: The question or incomplete statement below is followed by four suggested answers or completions. Select the one that is best in each case. Which of the following best describes the role of the Internet Engineering Task Force (IETF) ? - Developing standards and protocols for Internet communication - Preventing copyrighted materials from being illegally distributed online - Preventing malicious software from being distributed online - Verifying the ownership of encrypted keys used in secured messages

Developing standards and protocols for Internet communication

A team of researchers wants to create a program to analyze the amount of pollution reported in roughly 3,000 counties across the United States. The program is intended to combine county data sets and then process the data. Which of the following is most likely to be a challenge in creating the program? - A computer program cannot combine data from different files. - Different counties may organize data in different ways. - The number of counties is too large for the program to process. - The total number of rows of data is too large for the program to process.

Different counties may organize data in different ways.

Biologists often attach tracking collars to wild animals. For each animal, the following geolocation data is collected at frequent intervals. - The time - The date - The location of the animal Which of the following questions about a particular animal could NOT be answered using only the data collected from the tracking collars? - Approximately how many miles did the animal travel in one week? - Does the animal travel in groups with other tracked animals? - Do the movement patterns of the animal vary according to the weather? - In what geographic locations does the animal typically travel?

Do the movement patterns of the animal vary according to the weather?

Which of the following best explains how data is typically assembled in packets for transmission over the Internet? - Each packet contains data to be transmitted, along with metadata containing information used for routing the data. - Each packet contains an encrypted version of the data to be transmitted, along with metadata containing the key needed to decrypt the data. - Each packet contains only the metadata used to establish a direct connection so that the data can be transmitted. - Each packet contains multiple data files bundled together, along with metadata describing how to categorize each data file.

Each packet contains data to be transmitted, along with metadata containing information used for routing the data.

Directions: The question or incomplete statement below is followed by four suggested answers or completions. Select the one that is best in each case. Which of the following is a true statement about Internet communication? - Devices from different manufacturers are required to run the same operating system to communicate over the Internet. - Every device connected to the Internet is assigned a digital certificate by a certificate authority. - Every device connected to the Internet is assigned an Internet protocol (IP) address. - Every device connected to the Internet requires a high-bandwidth connection to enable redundant routing to each device.

Every device connected to the Internet is assigned an Internet protocol (IP) address.

Which of the following is a true statement about Internet communication? - Devices from different manufacturers are required to run the same operating system to communicate over the Internet. - Every device connected to the Internet is assigned a digital certificate by a certificate authority. - Every device connected to the Internet is assigned an Internet protocol (IP) address. - Every device connected to the Internet requires a high-bandwidth connection to enable redundant routing to each device.

Every device connected to the Internet is assigned an Internet protocol (IP) address.

A student's overall course grade in a certain class is based on the student's scores on individual assignments. The course grade is calculated by dropping the student's lowest individual assignment score and averaging the remaining scores. For example, if a particular student has individual assignment scores of 85, 75, 90, and 95, the lowest score (75) is dropped. The calculated course grade is (85+90+95)/3=90 An administrator at the school has data about hundreds of students in a particular course. While the administrator does not know the values of each student's individual assignment scores, the administrator does have the following information for each student. - The student name - A unique student ID number - The number of assignments for the course - The average assignment score before the lowest score was dropped - The course grade after the lowest score was dropped Which of the following CANNOT be determined from this data alone? - For a given student, the value of the highest assignment score - For a given student, the value of the lowest assignment score - For a given student, the change in course grade as a result of dropping the lowest score - The proportion of students who improved their course grade as a result of dropping the lowest score

For a given student, the value of the highest assignment score

The figure below represents a network of physically linked devices labeled A through I. A line between two devices indicates that the devices can communicate directly with each other. Any information sent between two devices that are not directly connected must go through at least one other device. For example, in the network represented below, information can be sent directly between A and B, but information sent between devices A and G must go through other devices. image: https://assets.learnosity.com/organisations/537/VR108072.g09.png Question: What is the minimum number of connections that must be broken or removed before device B can no longer communicate with device C? - Three - Four - Five - Six

Four

A video game character can face toward one of four directions: north, south, east, and west. Each direction is stored in memory as a sequence of four bits. A new version of the game is created in which the character can face toward one of eight directions, adding northwest, northeast, southwest, and southeast to the original four possibilities. Which of the following statements is true about how the eight directions must be stored in memory? - Four bits are not enough to store the eight directions. Five bits are needed for the new version of the game. - Four bits are not enough to store the eight directions. Eight bits are needed for the new version of the game. - Four bits are not enough to store the eight directions. Sixteen bits are needed for the new version of the game. - Four bits are enough to store the eight directions.

Four bits are enough to store the eight directions.

A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best explains the result of this configuration as compared to a configuration in which the router does not limit the bandwidth? - The amount of time it takes guest users to send and receive large files is likely to decrease. - The number of packets required for guest users to send and receive data is likely to decrease. - Guest users will be prevented from having fault-tolerant routing on the Internet. - Guest users will be restricted in the maximum amount of data that they can send and receive per second.

Guest users will be restricted in the maximum amount of data that they can send and receive per second.

A large data set contains information about all students majoring in computer science in colleges across the United States. The data set contains the following information about each student. - The student's gender - The state in which the student attends college - The student's grade point average on a 4.0 scale Which of the following questions could be answered by analyzing only information in the data set? - Do students majoring in computer science tend to have higher grade point averages than students majoring in other subjects? - How many states have a higher percentage of female computer science majors than male computer science majors attending college in that state? - What percent of students attending college in a certain state are majoring in computer science? - Which college has the highest number of students majoring in computer science?

How many states have a higher percentage of female computer science majors than male computer science majors attending college in that state?

A smartphone stores the following data for each photo that is taken using the phone. - The file name of the photo - The date and time the photo was taken - The geographic location where the photo was taken Assume that all of the photos that have been taken on the phone are accessible. Which of the following can be determined using the photo data described above? I. The number of photos that were taken at a particular geographic location II. The number of photos that were taken in the last year III. The name of the person who took the most recent photo - III only - I and II only - I and III only - I, II, and III

I and II only

Assume that the variables alpha and beta each are initialized with a numeric value. Which of the following code segments can be used to interchange the values of alpha and beta using the temporary variable temp? I. temp ← alpha alpha ← beta beta ← temp II. temp ← alpha beta ← alpha alpha ← temp III. temp ← beta beta ← alpha alpha ← temp - I and II only - I and III only - II and III only - I, II, and III

I and III only

Grades in a computer science course are based on total points earned on a midterm exam and a final exam. The teacher provides a way for students to improve their course grades if they receive high scores on the final exam: if a student's final exam score is greater than the student's midterm exam score, the final exam score replaces the midterm exam score in the calculation of total points. The table below shows two students' scores on the midterm and final exams and the calculated total points each student earns. table: https://assets.learnosity.com/organisations/537/b44f978a-3bb5-4f41-bc89-b90b45dda14b.jpg - Khalil does better on the midterm exam than on the final exam, so his original midterm and final exam scores are added to compute his total points. - Josefina does better on the final exam than on the midterm exam, so her final exam score replaces her midterm exam score in the total points calculation. The teacher has data representing the scores of thousands of students. For each student, the data contain the student name, the midterm exam score, the final exam score, and the result of the total points calculation. Which of the following could be determined from the data? I. The average total points earned per student II. The average increase in total points per student as a result of the score replacement policy III. The proportion of students who improved their total points as a result of the score replacement policy - III only - I and II only - I and III only - I, II, and III

I, II, and III

A programmer is developing a word game. The programmer wants to create an algorithm that will take a list of words and return a list containing the first letter of all words that are palindromes (words that read the same backward or forward). The returned list should be in alphabetical order. For example, if the list contains the words ["banana", "kayak", "mom", "apple", "level"], the returned list would contain ["k", "l", "m"] (because "kayak", level", and "mom" are palindromes). The programmer knows that the following steps are necessary for the algorithm but is not sure in which order they should be executed. image: https://assets.learnosity.com/organisations/537/4770869e-28c9-4607-9e73-5388b8753854.jpg Executing which of the following sequences of steps will enable the algorithm to work as intended? I. First shorten, then keep palindromes, then sort II. First keep palindromes, then shorten, then sort III. First sort, then keep palindromes, then shorten - I only - II only - I and III - II and III

II and III

A computer program uses 4 bits to represent nonnegative integers. Which of the following statements describe a possible result when the program uses this number representation? I. The operation 4+8 will result in an overflow error. II. The operation 7+10 will result in an overflow error. III. The operation 12+3 will result in an overflow error. - I only - II only - II and III only - I, II, and III

II only

The figure below represents a network of physically linked computers labeled A through G. A line between two computers indicates that the computers can communicate directly with each other. Any information sent between two computers that are not directly connected must go through at least one other computer. For example, information can be sent directly between computers A and B, but information sent between computers A and C must go through other computers. image: https://assets.learnosity.com/organisations/537/media.academicmerit.com/b2b92b3f6ccb51da5de938f94d7b7480/original.png Question: Which of the following statements about security in the network is true? I. Computers A and D need to communicate with at least two additional computers in the network in order to communicate with each other. II. Computers B and C can communicate with each other without additional computers being aware of the communication. - I only - II only - I and II - Neither I nor II

II only

The figure below represents a network of physically linked devices labeled A through I. A line between two devices indicates that the devices can communicate directly with each other. Any information sent between two devices that are not directly connected must go through at least one other device. For example, in the network represented below, information can be sent directly between A and B, but information sent between devices A and G must go through other devices. image: https://assets.learnosity.com/organisations/537/VR108072.g09.png Question: Which of the following statements is true about the network? - Information sent from device A to device D can use at most two unique paths. - Information sent from device A to device I will pass through at most four other devices. - If devices B and F fail, then device A will not be able to communicate with device G. - If devices C and F fail, then device D will not be able to communicate with device H.

If devices B and F fail, then device A will not be able to communicate with device G.

A color in a computing application is represented by an RGB triplet that describes the amount of red, green, and blue, respectively, used to create the desired color. A selection of colors and their corresponding RGB triplets are shown in the following table. Each value is represented in decimal (base 10). Color Name RGB Triplet indigo (75, 0, 130) ivory (255, 255, 240) light pink (255, 182, 193)​ light yellow (255, 255, 224) magenta (255, 0, 255) neutral gray (127, 127, 112) pale yellow (255, 255, 160) vivid yellow (255, 255, 14) Question: According to information in the table, what color is represented by the binary RGB triplet (11111111, 11111111, 11110000) ? - Ivory - Light yellow - Neutral gray - Vivid yellow

Ivory

A color in a computing application is represented by an RGB triplet that describes the amount of red, green, and blue, respectively, used to create the desired color. A selection of colors and their corresponding RGB triplets are shown in the following table. Each value is represented in decimal (base 10). Color Name RGB Triplet indigo (75, 0, 130) ivory (255, 255, 240) light pink (255, 182, 193)​ light yellow (255, 255, 224) magenta (255, 0, 255) neutral gray (127, 127, 112) pale yellow (255, 255, 160) vivid yellow (255, 255, 14) Question: According to information in the table, what color is represented by the binary RGB triplet (11111111, 11111111, 11110000) ? - Ivory - Light yellow - Neutral gray - Vivid yellow

Ivory

A NAND gate is a type of logic gate that produces an output of false only when both of its two inputs are true. Otherwise, the gate produces an output of true. Which of the following Boolean expressions correctly models a NAND gate with inputs P and Q? - (NOT P) AND (NOT Q) - (NOT P) AND Q - NOT (P AND Q) - NOT (P OR Q)

NOT (P AND Q)

Participants in a survey were asked how many hours per day they spend reading, how many hours per day they spend using a smartphone, and whether or not they would be interested in a smartphone application that lets users share book reviews. The data from the survey are represented in the graph below. Each X represents a survey participant who said he or she was interested in the application, and each O represents a participant who said he or she was not interested. graph: https://assets.learnosity.com/organisations/537/11cc3ef3-8828-412f-95cc-718ef037bef9.jpg Which of the following hypotheses is most consistent with the data in the graph? - Participants who read more were generally more likely to say they are interested in the application. - Participants who read more were generally less likely to say they are interested in the application. - Participants who use a smartphone more were generally more likely to say they read more. - Participants who use a smartphone more were generally less likely to say they read more.

Participants who read more were generally more likely to say they are interested in the application.

A computer has two processors that are able to run in parallel. The table below indicates the amount of time it takes either processor to execute four different processes. Assume that none of the processes is dependent on any of the other processes. Process Execution Time W 20 seconds X 30 seconds Y 45 seconds Z 50 seconds A program is used to assign processes to each of the processors. Which of the following describes how the program should assign the four processes to optimize execution time? - Processes W and X should be assigned to one processor, and processes Y and Z should be assigned to the other processor. - Processes W and Y should be assigned to one processor, and processes X and Z should be assigned to the other processor. - Processes W and Z should be assigned to one processor, and processes X and Y should be assigned to the other processor. - Process Z should be assigned to one processor, and processes W, X, and Y should be assigned to the other processor.

Processes W and Z should be assigned to one processor, and processes X and Y should be assigned to the other processor.

Which of the following best describes a direct benefit in using redundant routing on the Internet? - Redundancy enables messages to be transmitted with as few packets as possible. - Redundancy enables network devices to communicate with as few network connections as possible. - Redundancy often allows messages to be sent on the network even if some network devices or connections have failed. - Redundancy prevents network communications from being intercepted by unauthorized individuals.

Redundancy often allows messages to be sent on the network even if some network devices or connections have failed.

A certain computer has two identical processors that are able to run in parallel. The following table indicates the amount of time it takes to execute each of four processes on a single processor. Assume that none of the processes is dependent on any of the other processes. ProcessExecution Time onEither Processor P 30 seconds Q 10 seconds R 20 seconds S 15 seconds Which of the following parallel computing solutions would minimize the amount of time it takes to execute all four processes? - Running processes P and Q on one processor and processes R and S on the other processor - Running processes P and R on one processor and processes Q and S on the other processor - Running processes P and S on one processor and processes Q and R on the other processor - Running process P on one processor and processes Q, R, and S on the other processor

Running processes P and Q on one processor and processes R and S on the other processor

A researcher is analyzing data about students in a school district to determine whether there is a relationship between grade point average and number of absences. The researcher plans on compiling data from several sources to create a record for each student. The researcher has access to a database with the following information about each student. - Last name - First name - Grade level (9, 10, 11, or 12) - Grade point average (on a 0.0 to 4.0 scale) The researcher also has access to another database with the following information about each student. - First name - Last name - Number of absences from school - Number of late arrivals to school Upon compiling the data, the researcher identifies a problem due to the fact that neither data source uses a unique ID number for each student. Which of the following best describes the problem caused by the lack of unique ID numbers? - Students who have the same name may be confused with each other. - Students who have the same grade point average may be confused with each other. - Students who have the same grade level may be confused with each other. - Students who have the same number of absences may be confused with each other.

Students who have the same name may be confused with each other.

Which of the following best explains the relationship between the Internet and the World Wide Web? - Both the Internet and the World Wide Web refer to the same interconnected network of devices. - The Internet is an interconnected network of data servers, and the World Wide Web is a network of user devices that communicates with the data servers. - The Internet is a local network of interconnected devices, and the World Wide Web is a global network that connects the local networks with each other. - The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that is accessed via the Internet.

The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that is accessed via the Internet.

Which of the following best describes the ability of parallel computing solutions to improve efficiency? - Any problem that can be solved sequentially can be solved using a parallel solution in approximately half the time. - Any solution can be broken down into smaller and smaller parallel portions, making the improvement in efficiency theoretically limitless as long as there are enough processors available. - The efficiency of parallel computing solutions is rarely improved over the efficiency of sequential computing solutions. - The efficiency of a solution that can be broken down into parallel portions is still limited by a sequential portion.

The efficiency of a solution that can be broken down into parallel portions is still limited by a sequential portion.

Which of the following best explains how messages are typically transmitted over the Internet? - The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient's device. - The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device. - The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient's device. - The message is transmitted as a single file and received in whole by the recipient's device.

The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device.

A cable television company stores information about movie purchases made by subscribers. Each day, the following information is summarized and stored in a publicly available database. - The day and date each movie was purchased - The title of each movie purchased - The cities where subscribers purchased each movie - The number of times each movie was purchased by subscribers in a given city A sample portion of the database is shown below. The database is sorted by date and movie title. image: https://assets.learnosity.com/organisations/537/media.academicmerit.com/0955e1ee78db651823584b2870871bbe/original.png Which of the following CANNOT be determined using only the information in the database? - The date when a certain movie was purchased the greatest number of times - The number of movies purchased by an individual subscriber for a particular month - The total number of cities in which a certain movie was purchased - The total number of movies purchased in a certain city during a particular month

The number of movies purchased by an individual subscriber for a particular month

In a certain computer program, two positive integers are added together, resulting in an overflow error. Which of the following best explains why the error occurs? - The program attempted to perform an operation that is considered an undecidable problem. - The precision of the result is limited due to the constraints of using a floating-point representation. - The program can only use a fixed number of bits to represent integers; the computed sum is greater than the maximum representable value. - The program cannot represent integers; the integers are converted into decimal approximations, leading to rounding errors.

The program can only use a fixed number of bits to represent integers; the computed sum is greater than the maximum representable value.

A library system contains information for each book that was borrowed. Each time a person borrows or returns a book from the library, the following information is recorded in a database. - Name and the unique ID number of the person who was borrowing the book - Author, title, and the unique ID number of the book that was borrowed - Date that the book was borrowed - Date that the book was due to be returned - Date that the book was returned (or 0 if the book has not been returned yet) Which of the following CANNOT be determined from the information collected by the system? - The total number of books borrowed in a given year - The total number of books that were never borrowed in a given year - The total number of books that were returned past their due date in a given year - The total number of people who borrowed at least one book in a given year

The total number of books that were never borrowed in a given year

A certain social media Web site allows users to post messages and to comment on other messages that have been posted. When a user posts a message, the message itself is considered data. In addition to the data, the site stores the following metadata. - The time the message was posted - The name of the user who posted the message - The names of any users who comment on the message and the times the comments were made For which of the following goals would it be more useful to analyze the data instead of the metadata? - To determine the users who post messages most frequently - To determine the time of day that the site is most active - To determine the topics that many users are posting about - To determine which posts from a particular user have received the greatest number of comments

To determine the topics that many users are posting about

The figure below shows two possible network configurations for devices P through V. A line between two devices indicates a connection. Devices can communicate only through the connections shown. image: https://assets.learnosity.com/organisations/537/VR008765.g07.png Question: In configuration I, what is the minimum number of connections that must be broken or removed before device T can no longer communicate with device U? - One - Two - Three - Four

Two

A media librarian at a movie studio is planning to save digital video files for archival purposes. The movie studio would like to be able to access full-quality videos if they are needed for future projects. Which of the following actions is LEAST likely to support the studio's goal? - Using video file formats that conform to published standards and are supported across many different devices - Using lossy compression software to reduce the size requirements of the data being stored - Using storage media that can be expanded for additional data capacity - Using a system that incorporates redundancy to handle disk failure

Using lossy compression software to reduce the size requirements of the data being stored

Directions: The question or incomplete statement below is followed by four suggested answers or completions. Select the one that is best in each case. A media librarian at a movie studio is planning to save digital video files for archival purposes. The movie studio would like to be able to access full-quality videos if they are needed for future projects. Which of the following actions is LEAST likely to support the studio's goal? - Using video file formats that conform to published standards and are supported across many different devices - Using lossy compression software to reduce the size requirements of the data being stored - Using storage media that can be expanded for additional data capacity - Using a system that incorporates redundancy to handle disk failure

Using lossy compression software to reduce the size requirements of the data being stored

ASCII is a character-encoding scheme that uses a numeric value to represent each character. For example, the uppercase letter "G" is represented by the decimal (base 10) value 71. A partial list of characters and their corresponding ASCII values are shown in the table below. image: https://assets.learnosity.com/organisations/537/media.academicmerit.com/757be7a70d063a1ba85bf17df8f9bf9e/original.png ASCII characters can also be represented by hexadecimal numbers. According to ASCII character encoding, which of the following letters is represented by the hexadecimal (base 16) number 56? - A - L - V - Y

V

The following figures represent different ways of configuring a network of physically linked computers labeled P, Q, R, and S. A line between two computers indicates that the computers can communicate directly with each other. In which configuration is it NOT possible to have redundant routing between computers P and S? - https://assets.learnosity.com/organisations/537/2e4198d8-f2ce-45d2-ae94-e0c208a14f61.jpg - https://assets.learnosity.com/organisations/537/8c1fce67-65d4-4c32-a019-6697d38e81ae.jpg - https://assets.learnosity.com/organisations/537/19f05636-abdf-40a9-9e89-ca00607a821a.jpg - https://assets.learnosity.com/organisations/537/ae6cbb61-5da3-49b6-ba9b-db4c452c3a47.jpg

https://assets.learnosity.com/organisations/537/8c1fce67-65d4-4c32-a019-6697d38e81ae.jpg

In the following program, assume that the variable n has been initialized with an integer value. image: https://assets.learnosity.com/organisations/507/4c29f5ae-d03a-43b9-9d47-bb5d14027cfb.png Which of the following is NOT a possible value displayed by the program? - too high - in range - too low - out of range

out of range

The code segment below is intended to swap the values of the variables first and second using a temporary variable, temp. image: https://assets.learnosity.com/organisations/537/4c2e7b0b-f9f1-4754-8cdb-cfd8404f6888.jpg Which of the following can be used to replace so that the code segment works as intended? - second ← first - second ← temp - temp ← first - temp ← second

second ← temp

The player controls in a particular video game are represented by numbers. The controls and their corresponding binary values are shown in the following table. ControlBinary Value ← 01000 ↑ 01001 → 01011 ↓ 01111 Jump 11000 Run 11001 Pause 11011 Reset 11111 The numeric values for the controls can also be represented in decimal (base 10). Question What control is represented by the decimal value 15 ? ← ↑ → ↓

The player controls in a particular video game are represented by numbers. The controls and their corresponding binary values are shown in the following table. ControlBinary Value ← 01000 ↑ 01001 → 01011 ↓ 01111 Jump 11000 Run 11001 Pause 11011 Reset 11111 The numeric values for the controls can also be represented in decimal (base 10). Question: What control is represented by the decimal value 15? ← ↑ → ↓


Conjuntos de estudio relacionados

PrepU Trans Assignment 14 Asepsis

View Set

Insurance - Chapter 2: Policy Provisions and Contract Law

View Set

History of Pre-Modern Medicine Midterm Review

View Set

Pediatric Success: Cardiovascular Questions

View Set