ap Computer Science exam questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

​​How​​ many​​ bits ​​are ​​used​​ in​​ the​​address​​ of​​ an ​​IPv4 ​​packet? (A) 4 (B) 16 (C) 32 (D) 128

32

Which two of the following statements are true about routing on the Internet? Select two answers. (A) Your router receives all the traffic of the Internet and delivers to your computer only the messages intended for you. (B) A packet travelling between two computers on the Internet may be rerouted many times along the way. (C) A packet contains addressing information to allow routers to decide how best to forward along that packet towards its destination. (D) Information travelling between two computers over the Internet will always take the same path.

A packet travelling between two computers on the Internet may be rerouted many times along the way AND A packet contains addressing information to allow routers to decide how best to forward along that packet towards its destination

A crime investigator is accessing an online database of crimes within a certain radius of the city center. The database contains the following information: Date of crime Name of offender Neighborhood of crime The investigator is looking for other crimes that occurred in a certain area on a certain date. Which of the following algorithms can be used to find all crimes that occurred in a certain neighborhood on a certain day? I. Make a new list by filtering the data so only the crimes from a certain neighborhood are on the list. Perform multiple binary searches to find all crimes that occurred in that neighborhood on a certain day, adding each new occurrence to a final list. II. Make a new list by filtering the data so only the crimes from a certain neighborhood are on the list. Perform multiple linear searches to find all crimes that occurred on the given day, adding each new occurrence to a final list. (A) Both algorithms work correctly (B) Algorithm I always works correctly, but Algorithm II only works correctly when the date data is sorted. (C) Algorithm II always work correctly, but Algorithm I only works correctly when the date data is sorted. (D) Neither algorithm will correctly find all crimes.

Algorithm II always work correctly, but Algorithm I only works correctly when the date data is sorted.

​​Which​ ​of​ ​the​ ​following​ ​is​ ​true​ ​of​ ​algorithms? Select​ ​​two​​ ​answers. (A) Algorithms​ ​are​ ​composed​ ​of​ ​commands​ ​which​ ​implement​ ​sequencing,​ ​iteration,​ ​and selection​ ​by​ ​which​ ​a​ ​task​ ​can​ ​be​ ​completed​ ​on​ ​a​ ​computer. (B) When​ ​implementing​ ​a​ ​solution​ ​to​ ​a​ ​problem​ ​there​ ​is​ ​only​ ​one​ ​algorithm​ ​which​ ​will typically​ ​complete​ ​the​ ​task. (C) Algorithms​ ​are​ ​very​ ​specific​ ​to​ ​the​ ​language​ ​in​ ​which​ ​they​ ​are​ ​implemented. (D) Clarity​ ​and​ ​readability​ ​are​ ​important​ ​considerations​ ​when​ ​expressing​ ​an​ ​algorithm​ ​in​ ​a language

Algorithms​ ​are​ ​composed​ ​of​ ​commands​ ​which​ ​implement​ ​sequencing,​ ​iteration,​ ​and selection​ ​by​ ​which​ ​a​ ​task​ ​can​ ​be​ ​completed​ ​on​ ​a​ ​computer AND clarity​ ​and​ ​readability​ ​are​ ​important​ ​considerations​ ​when​ ​expressing​ ​an​ ​algorithm​ ​in​ ​a language

​​Consider​ ​the​ ​following​ ​numbers. Binary​ ​1101 Decimal​ ​14 Hexadecimal​ ​F ​ ​​ ​​ ​​ ​​ ​​ ​​ Which​ ​of​ ​the​ ​following​ ​lists​ ​them​ ​from​ ​least​ ​to​ ​greatest? (A) Decimal​ ​14,​ ​Binary​ ​1101,​ ​Hexadecimal​ ​F (B) Hexadecimal​ ​F,​ ​Decimal​ ​14,​ ​Binary​ ​1101 (C) Binary​ ​1101,​ ​Decimal​ ​14,​ ​Hexadecimal​ ​F (D) Decimal​ ​14,​ ​Hexadecimal​ ​F,​ ​Binary​ ​1101

Binary​ ​1101,​ ​Decimal​ ​14,​ ​Hexadecimal​ ​F

Which​ ​of​ ​the​ ​following​ ​statements​ ​is​ ​NOT​ ​correct​ ​regarding​ ​abstraction​ ​as​ ​applied​ ​to​ ​computer science: (A) Higher​ ​level​ ​languages​ ​utilize​ ​abstraction​ ​to​ ​hide​ ​details​ ​of​ ​the​ ​CPU​ ​instructions​ ​from​ ​the programmer. (B) A​ ​computer​ ​chip​ ​is​ ​often​ ​an​ ​abstraction​ ​of​ ​many​ ​lower​ ​level​ ​logic​ ​gates​ ​and​ ​memory​ ​combined to​ ​perform​ ​a​ ​specific​ ​function. (C) Binary​ ​sequences​ ​are​ ​abstractions​ ​which​ ​are​ ​used​ ​to​ ​represent​ ​colors​ ​in​ ​an​ ​image. (D) Smaller​ ​programs​ ​and​ ​apps​ ​can​ ​be​ ​combined​ ​into​ ​large​ ​programs​ ​to​ ​create​ ​higher​ ​level abstractions.

Binary​ ​sequences​ ​are​ ​abstractions​ ​which​ ​are​ ​used​ ​to​ ​represent​ ​colors​ ​in​ ​an​ ​image

You write an algorithm in your program to that calculates and prints the total miles traveled during a road trip. When you test your algorithm, it does not print the correct value. Which of the following would NOT be a productive way to debug the code? (A) Go through each line of your algorithm and make sure each one is logical and makes sense. (B) Print the value of miles after each calculation (C) Ask a colleague to look at your algorithm to see if they can debug the code. (D) Delete the entire algorithm and start over

Delete the entire algorithm and start over

You​ ​decide​ ​you​ ​are​ ​going​ ​to​ ​take​ ​your​ ​internet​ ​privacy​ ​seriously.​ ​​ ​Which​ ​of​ ​the​ ​following​ ​action​ ​poses the​ ​greatest​ ​risk​ ​to​ ​your​ ​internet​ ​privacy? (A) Sharing​ ​your​ ​email​ ​address​ ​with​ ​those​ ​who​ ​request​ ​it. (B) Connecting​ ​to​ ​secured​ ​networks​ ​using​ ​the​ ​provided​ ​network​ ​name​ ​and​ ​password​ ​when​ ​visiting hotels. (C) Encrypting​ ​your​ ​files​ ​and​ ​sharing​ ​your​ ​private​ ​key​ ​to​ ​ensure​ ​others​ ​who​ ​you​ ​choose​ ​to​ ​share​ ​files with​ ​can​ ​read​ ​them. (D) Using​ ​cloud​ ​storage​ ​to​ ​ensure​ ​access​ ​to​ ​your​ ​files​ ​from​ ​all​ ​your​ ​devices.

Encrypting​ ​your​ ​files​ ​and​ ​sharing​ ​your​ ​private​ ​key​ ​to​ ​ensure​ ​others​ ​who​ ​you​ ​choose​ ​to​ ​share​ ​files with​ ​can​ ​read​ ​them

Digital​ ​data​ ​can​ ​be​ ​compressed​ ​in​ ​order​ ​to​ ​reduce​ ​file​ ​size,​ ​and​ ​speed​ ​of​ ​transmission​ ​through​ ​a network.​ ​While​ ​some​ ​compression​ ​techniques​ ​are​ ​lossy,​ ​others​ ​preserve​ ​the​ ​original​ ​data​ ​in​ ​the compressed​ ​form.​ ​Compression​ ​techniques​ ​(lossy​ ​or​ ​lossless)​ ​can​ ​do​ ​the​ ​following,​ ​EXCEPT: (A) Combine​ ​multiple​ ​files​ ​to​ ​create​ ​a​ ​single,​ ​compressed​ ​file​ ​that​ ​can​ ​be​ ​restored​ ​to​ ​its​ ​original​ ​form (B) Compress​ ​a​ ​high​ ​resolution​ ​photo​ ​to​ ​a​ ​low​ ​resolution​ ​format​ ​such​ ​as​ ​.jpg (C) Extract​ ​a​ ​compressed​ ​zip​ ​file​ ​to​ ​its​ ​original​ ​size (D) Enlarge​ ​a​ ​file​ ​in​ ​order​ ​to​ ​increase​ ​the​ ​resolution​ ​in​ ​the​ ​original,​ ​thereby​ ​increasing​ ​the​ ​file​ ​size

Enlarge​ ​a​ ​file​ ​in​ ​order​ ​to​ ​increase​ ​the​ ​resolution​ ​in​ ​the​ ​original,​ ​thereby​ ​increasing​ ​the​ ​file​ ​size

When​ ​building​ ​internet​ ​networks​ ​it​ ​is​ ​important​ ​to​ ​consider​ ​redundancy.​ ​Which​ ​of​ ​the​ ​following​ ​is​ ​an example​ ​of​ ​redundancy? (A) Optimizing​ ​the​ ​system​ ​so​ ​that​ ​a​ ​single​ ​request​ ​has​ ​the​ ​shortest​ ​time​ ​between​ ​request​ ​and​ ​receipt (B) Optimizing​ ​the​ ​system​ ​so​ ​that​ ​as​ ​much​ ​data​ ​as​ ​possible​ ​can​ ​be​ ​transferred​ ​in​ ​a​ ​given​ ​amount​ ​of time (C) The​ ​hierarchical​ ​nature​ ​of​ ​the​ ​internet​ ​allows​ ​for​ ​massive​ ​growth (D) Ensuring​ ​that​ ​if​ ​any​ ​single​ ​node​ ​in​ ​the​ ​network​ ​were​ ​to​ ​stop​ ​working,​ ​packets​ ​can​ ​still​ ​be delivered

Ensuring​ ​that​ ​if​ ​any​ ​single​ ​node​ ​in​ ​the​ ​network​ ​were​ ​to​ ​stop​ ​working,​ ​packets​ ​can​ ​still​ ​be delivered

Which​ ​of​ ​the​ ​following​ ​statement​ ​about​ ​algorithmic​ ​efficiency​ ​is​ ​correct? (A) Any​ ​algorithm​ ​that​ ​correctly​ ​solves​ ​a​ ​problem​ ​will​ ​have​ ​the​ ​same​ ​efficiency​ ​as​ ​any​ ​other algorithm​ ​that​ ​correctly​ ​solves​ ​that​ ​same​ ​problem. (B) If​ ​an​ ​algorithm​ ​is​ ​considered​ ​efficient,​ ​it​ ​will​ ​always​ ​be​ ​rather​ ​simple​ ​and​ ​contain​ ​little​ ​code. (C) When​ ​determining​ ​the​ ​overall​ ​efficiency​ ​of​ ​an​ ​algorithm,​ ​time​ ​is​ ​the​ ​only​ ​factor​ ​considered. (D) Formal​ ​reasoning​ ​can​ ​be​ ​used​ ​to​ ​determine​ ​the​ ​efficiency​ ​of​ ​an​ ​algorithm

Formal​ ​reasoning​ ​can​ ​be​ ​used​ ​to​ ​determine​ ​the​ ​efficiency​ ​of​ ​an​ ​algorithm

The various protocols used on the internet operate in layers in which the protocol at each layer rely on the protocols at the lower layers to do their jobs, and higher layers (higher level of abstraction) are built on top of the lower layers (lower level of abstraction). From the list provided choose the two (2) answers that correctly describe the relative levels of abstraction of the internet protocols. For example: if protocol A relies on protocol B, it means that A is a higher level of abstraction than B. Select two answers. (A) TCP/IP is a higher level of abstraction than HTTP (B) HTTP is a higher level of abstraction than TCP/IP (C) DNS is a higher level of abstraction than TCP/IP (D) TCP/IP is a higher level of abstraction than DNS

HTTP is a higher level of abstraction than TCP/IP AND DNS is a higher level of abstraction than TCP/IP

Which​ ​one​ ​of​ ​the​ ​following​ ​is​ ​NOT​ ​a​ ​benefit​ ​of​ ​the​ ​HTTPS​ ​protocol? (A) HTTPS​ ​ensures​ ​that​ ​only​ ​the​ ​client​ ​and​ ​the​ ​server​ ​can​ ​view​ ​the​ ​packets​ ​sent​ ​during​ ​their communication​ ​and​ ​they​ ​cannot​ ​be​ ​intercepted​ ​by​ ​a​ ​third​ ​party. (B) HTTPS​ ​verifies​ ​the​ ​identity​ ​of​ ​the​ ​server​ ​through​ ​a​ ​Certificate​ ​Exchange. (C) HTTPS​ ​encrypts​ ​the​ ​data​ ​before​ ​it​ ​is​ ​broken​ ​into​ ​packets​ ​to​ ​ensure​ ​its​ ​privacy. (D) HTTPS​ ​provides​ ​reasonable​ ​assurance​ ​by​ ​which​ ​the​ ​user​ ​can​ ​assume​ ​minimal​ ​cybersecurity​ ​risk of​ ​transactions​ ​carried​ ​out​ ​on​ ​that​ ​site

HTTPS ensures that only the client and the server can view the packets sent during their communication and they cannot be intercepted by a third party.

Imagine you are playing an online game with your friends. You are at a crucial stage in the basketball game and need just one more free throw to win the game. You see the entire complex scene display quickly. You aim at the hoop to shoot your free throw. You click the shoot button but there is a momentary freeze on your screen only to discover that you have lost the game. What is demonstrated by this situation? (A) High bandwidth, high latency (B) Low bandwidth, high latency (C) High bandwidth, low latency (D) Low bandwidth, low latency

High bandwidth, high latency

What are some of the advantages of using models and simulations to mimic a real-world process or system under study? I. Models and simulations mimic real-world events without the cost or danger of real world prototypes or testing. II. The results of models and simulations may generate new knowledge and new hypotheses related to the phenomena being modeled. III. We cannot change the model or simulation as rapidly as we can change the real-world process or system under study, therefore, it allows us to minimize iterations in a model or simulation. (A) I only (B) II only (C) I and II only (D) I, II and III

I and II only

You were hired as a manager of a set of new programmers because of your experience in generating quality code. One of your new programmers brings a solution which looks nothing like what you would generate for the same problem. Which of the following might be a good next step? I. Analyze the solution for correctness and readability. II. Realize that there are multiple ways to solve most problems and work to understand this employee's solution. III. If the program includes sequence, selection, and iterative statements, assume the solution is correct and congratulate her for her outstanding contribution. (A) I only (B) I and II only (C) II and III only (D) I, II and III

I and II only

The Domain Name System (DNS) is designed to I. Allow for nested domain naming (e.g., digitalportfolio.collegeboard.org ) II. Allow for centralized access and administration III. Use cache and redundant servers for quick matching of IP addresses to domain names IV. Use a static database for matching IP address to domain names (A) I only (B) II only (C) I and III only (D) II and IV only

I and III only

An architecture company is planning to build a tower in California but they are worried about earthquakes. They decide to use a computer simulation in order to test the safety of different designs when an earthquake occurs. Which of the following are reasons to use a simulation in this context? I. Using the simulation software can save the company money because it allows them to test building materials for safety without purchasing physical materials. II. Using the simulation software will perfectly predict what will happen in the event of an earthquake. III. Using the simulation software can help ensure the safety of the building during an earthquake without endangering people. (A) I only (B) III only (C) I and III only (D) I, II and III

I only

Which of the following can be represented by a sequence of 3 bits? I. The seven days of the week II. Between zero and eight pints of ice cream III. The nine innings in a standard baseball game (A) I only (B) I and II (C) I,​ ​II​ ​and​ ​III (D) None​ ​of​ ​the​ ​Above

I only

You​ ​are​ ​given​ ​a​ ​32-bit​ ​word​ ​which​ ​was​ ​copied​ ​from​ ​computer​ ​RAM​ ​and​ ​are​ ​asked​ ​to​ ​determine​ ​what was​ ​represented​ ​by​ ​the​ ​word.​ ​​ ​Which​ ​of​ ​the​ ​following​ ​represents​ ​the​ ​most​ ​complete​ ​response? I. The​ ​32-bit​ ​word​ ​could​ ​be​ ​integer​ ​data​ ​as​ ​binary​ ​is​ ​how​ ​data​ ​is​ ​always​ ​represented​ ​in RAM. II. The​ ​32-bit​ ​word​ ​could​ ​be​ ​an​ ​instruction​ ​for​ ​the​ ​CPU​ ​as​ ​hardware​ ​processes​ ​binary​ ​words. III. We​ ​cannot​ ​be​ ​certain​ ​as​ ​to​ ​what​ ​the​ ​word​ ​represented​ ​without​ ​more​ ​information. (A) I​ ​only (B) II​ ​only (C) I​ ​and​ ​II (D) I,​ ​II​ ​and​ ​III

I,​ ​II​ ​and​ ​III

Since it is well known that you took AP CS Principles, your family decides to discuss the internet with you at a holiday party. I. Aunt Minnie says, "The Internet is wholly interesting because it is all about the documents and information in the documents enabling us to become smarter as a society". II. Uncle Jack says, "I love that the Internet connects all the devices such that data can be shared at the speed of light." III. Cousin Josiah comments, "Open standards have been instrumental in the growth of the Internet as multiple networks can be connected without concern so long as they implement established standards." Which of the above statements are correct? (A) II only (B) III only (C) I and II only (D) II and III only

III only

A​ ​student​ ​is​ ​taking​ ​a​ ​survey​ ​of​ ​her​ ​class​ ​in​ ​order​ ​to​ ​determine​ ​their​ ​average​ ​hours​ ​of​ ​sleep​ ​per​ ​night. She​ ​is​ ​tracking​ ​the​ ​number​ ​of​ ​students​ ​in​ ​her​ ​class​ ​that​ ​have​ ​replied.​ ​She​ ​sees​ ​that​ ​the​ ​number​ ​of​ ​students who​ ​have​ ​replied​ ​is​ ​represented​ ​by​ ​the​ ​digits​ ​"12"​ ​but​ ​she​ ​does​ ​not​ ​remember​ ​what​ ​base​ ​she​ ​used.​ ​Which of​ ​the​ ​following​ ​are​ ​possible​ ​bases​ ​that​ ​the​ ​number​ ​12​ ​could​ ​be​ ​in? I. Binary​ ​(base​ ​2) II. Decimal​ ​(base​ ​10) III. Hexadecimal​ ​(base​ ​16) (A) I​ ​and​ ​II (B) I​ ​and​ ​III (C) II​ ​and​ ​III (D) I,​ ​II,​ ​and​ ​III

II​ ​and​ ​III

Several​ ​of​ ​your​ ​peers​ ​have​ ​conflicting​ ​viewpoints​ ​concerning​ ​what​ ​is,​ ​and​ ​is​ ​not,​ ​a​ ​creative​ ​artifact. Which​ ​of​ ​the​ ​statements​ ​listed​ ​below​ ​will​ ​you​ ​use​ ​to​ ​settle​ ​the​ ​conflict​ ​among​ ​your​ ​peers? ​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​I.​​​​​​​​​​​​ For ​​something ​​to ​​be​​considered ​​a ​​creative​​ artifact, ​​it​​must​​ include ​​only ​​original ​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​material ​​generated​​ by ​​the​​creator​​ of​​ the​​ artifact. ​​​​​​​​​​​​​​​​II.​​​​​​​​ Creative​​ artifacts​​ can​​ be​​produced​​ by​​ combining ​​existing​​ artifacts ​​in ​​a ​​new​​ and ​​​​​​​​​​​​​​​​​​​ ​​​​​​​​ ​​​​​novel​ ​way. ​III.​ ​Computing​ ​can​ ​facilitate​ ​the​ ​creation​ ​and​ ​modification​ ​of​ ​computational artifacts. (A) ​I​ ​only (B) II​ ​only (C) II​ ​and​ ​III (D) ​I​ ​and​ ​II

II​ ​and​ ​III

Which​ ​of​ ​the​ ​following​ ​statements​ ​about​ ​data​ ​analysis​ ​and​ ​processing​ ​are​ ​considered​ ​most​ ​true​ ​given modern​ ​computing​ ​technology? Select​ ​​two​ ​​answers. (A) Data​ ​scientists​ ​typically​ ​do​ ​not​ ​combine​ ​multiple​ ​data​ ​sources​ ​as​ ​more​ ​can​ ​be​ ​learned​ ​when​ ​each data​ ​source​ ​is​ ​analyzed​ ​independently. (B) Metadata​ ​is​ ​not​ ​included​ ​in​ ​modern​ ​data​ ​analysis​ ​as​ ​there​ ​is​ ​not​ ​useful​ ​information​ ​in​ ​metadata. (C) Information​ ​cleansing​ ​and​ ​classification​ ​are​ ​often​ ​employed​ ​in​ ​the​ ​processing​ ​of​ ​data​ ​by​ ​which patterns​ ​can​ ​emerge. (D) Storage,​ ​processing,​ ​or​ ​curation​ ​often​ ​present​ ​significant​ ​challenge​ ​when​ ​processing​ ​large datasets

Information​ ​cleansing​ ​and​ ​classification​ ​are​ ​often​ ​employed​ ​in​ ​the​ ​processing​ ​of​ ​data​ ​by​ ​which patterns​ ​can​ ​emerge AND Storage,​ ​processing,​ ​or​ ​curation​ ​often​ ​present​ ​significant​ ​challenge​ ​when​ ​processing​ ​large datasets

Which​ ​of​ ​the​ ​following​ ​is​ ​NOT​ ​true​ ​regarding​ ​metadata? (A) In​ ​photos,​ ​metadata​ ​is​ ​hidden​ ​within​ ​the​ ​image​ ​and​ ​is​ ​stripped​ ​out​ ​using​ ​pixel​ ​processing methods. (B) Metadata​ ​can​ ​be​ ​useful​ ​in​ ​producing​ ​new​ ​insights​ ​and​ ​knowledge​ ​when​ ​processed​ ​with​ ​the​ ​data itself. (C) Metadata​ ​is​ ​information​ ​about​ ​data. (D) Most​ ​objects​ ​contain​ ​metadata​ ​including​ ​images,​ ​audio,​ ​and​ ​video​ ​files

In​ ​photos,​ ​metadata​ ​is​ ​hidden​ ​within​ ​the​ ​image​ ​and​ ​is​ ​stripped​ ​out​ ​using​ ​pixel​ ​processing methods

​If​ ​the​ ​post​ ​office​ ​delivered​ ​mail​ ​just​ ​as​ ​routers​ ​deliver​ ​messages​ ​on​ ​the​ ​Internet,​ ​which​ ​of​ ​the following​ ​statements​ ​would​ ​be​ ​true?​ ​Select​ ​​two​​ ​answers. A. One​ ​mailman​ ​would​ ​be​ ​responsible​ ​for​ ​delivering​ ​a​ ​letter​ ​from​ ​sender​ ​to​ ​receiver. B. Your​ ​mail​ ​could​ ​not​ ​be​ ​delivered​ ​if​ ​a​ ​road​ ​your​ ​mailman​ ​was​ ​planning​ ​to​ ​take​ ​were​ ​under construction. C. Letters​ ​would​ ​be​ ​written​ ​on​ ​the​ ​outside​ ​of​ ​envelopes​ ​for​ ​all​ ​to​ ​read​ ​instead​ ​of​ ​letters​ ​put inside​ ​envelopes. D. The​ ​mailman​ ​would​ ​sometimes​ ​take​ ​a​ ​different​ ​path​ ​to​ ​deliver​ ​each​ ​letter​ ​to​ ​your​ ​home

Letters​ ​would​ ​be​ ​written​ ​on​ ​the​ ​outside​ ​of​ ​envelopes​ ​for​ ​all​ ​to​ ​read​ ​instead​ ​of​ ​letters​ ​put inside​ ​envelopes AND The​ ​mailman​ ​would​ ​sometimes​ ​take​ ​a​ ​different​ ​path​ ​to​ ​deliver​ ​each​ ​letter​ ​to​ ​your​ ​home

FOUR INDEPENDENT ALGORITHMS listed below can be executed on a row of NUMBER cards (Not FACE cards) on a table. There are an EVEN number of cards,and they are in no special order. Which of the Algorithms involves BOTH Selection and Iteration? For this question select TWO correct answers (A) Look over all the cards to find the smallest one, and move it to the leftmost position. (B) Compare the first two cards. If the one on the left is greater, switch them (C) Compare the values of each pair of cards. For example, compare cards 0 and 1, compare cards 2 and 3, and so on for all pairs. Swap positions when the first card is greater than the second of the pair. (D) Find the middle card and switch it with the card in the rightmost position

Look over all the cards to find the smallest one, and move it to the leftmost position AND Compare the values of each pair of cards. For example, compare cards 0 and 1, compare cards 2 and 3, and so on for all pairs. Swap positions when the first card is greater than the second of the pair.

​You​ ​have​ ​been​ ​hired​ ​by​ ​a​ ​company​ ​to​ ​generate​ ​a​ ​simulation​ ​of​ ​a​ ​process​ ​within​ ​their​ ​multinational company.​ ​​ ​You​ ​try​ ​to​ ​convince​ ​them​ ​that​ ​there​ ​is​ ​significant​ ​value​ ​to​ ​starting​ ​with​ ​a​ ​simple​ ​model​ ​even though​ ​it​ ​might​ ​not​ ​model​ ​their​ ​process​ ​exactly.​ ​​ ​Which​ ​arguments​ ​below​ ​are​ ​viable​ ​supports​ ​for​ ​your position? Select​ ​​two​​ ​answers. (A) Models​ ​and​ ​simulations​ ​often​ ​omit​ ​unnecessary​ ​features​ ​of​ ​the​ ​objects​ ​or​ ​phenomena​ ​under investigation. (B) Writing​ ​very​ ​detailed​ ​models​ ​and​ ​simulations​ ​will​ ​help​ ​minimize​ ​costs​ ​as​ ​they​ ​are​ ​easier​ ​to​ ​write than​ ​more​ ​abstract​ ​models​ ​and​ ​simulations. (C) Simple​ ​models​ ​and​ ​simulations​ ​will​ ​execute​ ​faster​ ​allowing​ ​more​ ​opportunity​ ​for​ ​rapid​ ​testing and​ ​development. (D) Less​ ​abstract​ ​models​ ​and​ ​simulations​ ​omit​ ​details​ ​to​ ​simplify​ ​the​ ​study​ ​of​ ​the​ ​objects​ ​or processes​ ​involved

Models​ ​and​ ​simulations​ ​often​ ​omit​ ​unnecessary​ ​features​ ​of​ ​the​ ​objects​ ​or​ ​phenomena​ ​under investigation AND Simple​ ​models​ ​and​ ​simulations​ ​will​ ​execute​ ​faster​ ​allowing​ ​more​ ​opportunity​ ​for​ ​rapid​ ​testing and​ ​development

You​ ​have​ ​been​ ​asked​ ​to​ ​create​ ​a​ ​computational​ ​artifact​ ​utilizing​ ​a​ ​set​ ​of​ ​tools​ ​which​ ​are​ ​unfamiliar​ ​to you.​ ​ When​ ​creating​ ​the​ ​schedule​ ​for​ ​delivery,​ ​which​ ​would​ ​​not​​ ​be​ ​advised​ ​if​ ​you​ ​hope​ ​to​ ​deliver​ ​this product​ ​on​ ​time: (A) Building​ ​in​ ​time​ ​for​ ​multiple​ ​attempts​ ​at​ ​generating​ ​small​ ​pieces​ ​of​ ​the​ ​ultimate​ ​deliverable​ ​as well​ ​as​ ​integration​ ​time​ ​for​ ​all​ ​the​ ​small​ ​pieces. (B) Allotting​ ​a​ ​portion​ ​of​ ​the​ ​schedule​ ​to​ ​find​ ​the​ ​appropriate​ ​tool​ ​for​ ​the​ ​task. (C) Searching​ ​for​ ​existing​ ​public​ ​domain​ ​artifacts​ ​that​ ​can​ ​be​ ​combined​ ​to​ ​advance​ ​your​ ​project toward​ ​the​ ​deliverable. (D) Planning​ ​a​ ​set​ ​of​ ​sequential​ ​tasks​ ​with​ ​precise​ ​timing​ ​by​ ​which​ ​you​ ​can​ ​deliver​ ​exactly​ ​on​ ​the due​ ​date

Planning​ ​a​ ​set​ ​of​ ​sequential​ ​tasks​ ​with​ ​precise​ ​timing​ ​by​ ​which​ ​you​ ​can​ ​deliver​ ​exactly​ ​on​ ​the due​ ​date

A student draws a gorgeous digital image on her school computer. She decides she wants to show her brother, so she saves it and later downloads the image onto her home computer. When she opens and resizes the image at home, the quality is noticeably inferior to the original she saved. Which of the following is a reasonable explanation for the reduced quality? (A) Low bandwidth of her Wi-Fi connection caused a slow download. (B) High latency of her Wi-Fi connection caused a delay in starting the download. (C) The process she used to save the image utilized a "lossless" compression algorithm. (D) The process she used to save the image utilized a "lossy" compression algorithm.

The process she used to save the image utilized a "lossy" compression algorithm

Your school uses network filtering hardware and software to deny access to blacklisted websites and files. In the school's library there is a student accessing one of the blacklisted websites. Which of the following methods is the student most likely using to defeat the network filtering. Select two answers. (A) The student is using a personal device that is connected to the school's WiFi but since it is not running the network filtering software, the school is unable to filter the Internet traffic. (B) The student is using a personal mobile device that is connected to the Internet through a data plan. (C) The student is using a school device that allowed the configuration of a proxy server to encrypt the data of the blacklisted website. (D) The student used brute force attack methods on the filtering system and discovered the password that allows it to be disabled.

The student is using a personal mobile device that is connected to the Internet through a data plan AND the student is using a school device that allowed the configuration of a proxy server to encrypt

Which​ ​of​ ​the​ ​following​ ​is​ ​a​ ​characteristic​ ​of​ ​the​ ​fault-tolerant​ ​nature​ ​of​ ​communication​ ​on​ ​the Internet? A. The​ ​ability​ ​of​ ​users​ ​to​ ​trust​ ​that​ ​the​ ​software​ ​they​ ​download​ ​is​ ​free​ ​of​ ​viruses​ ​if​ ​it​ ​says​ ​it is​ ​free​ ​of​ ​malware. B. The​ ​ability​ ​to​ ​provide​ ​data​ ​transmission​ ​even​ ​when​ ​some​ ​connections​ ​have​ ​failed. C. The​ ​ability​ ​to​ ​resolve​ ​errors​ ​in​ ​domain​ ​name​ ​server​ ​lookups. D. The​ ​ability​ ​to​ ​transfer​ ​data​ ​using​ ​multiple​ ​protocols​ ​such​ ​as​ ​hypertext​ ​transfer​ ​protocol (HTTP),​ ​Internet​ ​Protocol​ ​(IP),​ ​and​ ​simple​ ​mail​ ​protocol​ ​(SMTP)

The​ ​ability​ ​to​ ​provide​ ​data​ ​transmission​ ​even​ ​when​ ​some​ ​connections​ ​have​ ​failed

​In​ ​the​ ​process​ ​of​ ​engineering​ ​a​ ​piece​ ​of​ ​software,​ ​which​ ​of​ ​the​ ​following​ ​statements​ ​would​ ​generally be​ ​considered​ ​to​ ​be​ ​most​ ​accurate? (A) Software​ ​engineering​ ​places​ ​much​ ​greater​ ​emphasis​ ​on​ ​using​ ​the​ ​correct​ ​set​ ​of​ ​software commands​ ​than​ ​it​ ​does​ ​the​ ​sequence​ ​of​ ​the​ ​commands. (B) Having​ ​multiple​ ​people​ ​collaborating​ ​on​ ​the​ ​engineering​ ​of​ ​a​ ​piece​ ​of​ ​software​ ​is​ ​not​ ​very productive​ ​as​ ​the​ ​creation​ ​of​ ​software​ ​is​ ​best​ ​left​ ​to​ ​a​ ​single​ ​person​ ​and​ ​vision. (C) The​ ​end​ ​user​ ​of​ ​the​ ​software​ ​must​ ​be​ ​considered​ ​in​ ​the​ ​design,​ ​implementation,​ ​and​ ​release​ ​of the​ ​software. (D) Software​ ​engineers​ ​should​ ​not​ ​concern​ ​themselves​ ​with​ ​choosing​ ​any​ ​particular​ ​development tool​ ​or​ ​program

The​ ​end​ ​user​ ​of​ ​the​ ​software​ ​must​ ​be​ ​considered​ ​in​ ​the​ ​design,​ ​implementation,​ ​and​ ​release​ ​of the​ ​software

A​ ​high​ ​school​ ​surveys​ ​all​ ​of​ ​its​ ​1,750​ ​students​ ​to​ ​determine​ ​the​ ​average​ ​number​ ​of​ ​hours​ ​U.S.​ ​high school​ ​students​ ​sleep​ ​per​ ​night.​ ​Which​ ​of​ ​the​ ​following​ ​is​ ​a​ ​true​ ​statement? (A)​ ​The​ ​high​ ​school​ ​should​ ​not​ ​use​ ​the​ ​data​ ​from​ ​this​ ​study​ ​because​ ​it​ ​is​ ​based​ ​on​ ​direct​ ​observation. (B)​ ​The​ ​high​ ​school​ ​can​ ​use​ ​this​ ​data​ ​to​ ​determine​ ​the​ ​average​ ​number​ ​of​ ​hours​ ​U.S.​ ​high​ ​school​ ​students sleep​ ​per​ ​night. (C)​ ​The​ ​high​ ​school​ ​cannot​ ​draw​ ​meaningful​ ​conclusions​ ​from​ ​this​ ​data​ ​because​ ​the​ ​sample​ ​size​ ​is​ ​too small. (D)​ ​The​ ​high​ ​school​ ​can​ ​use​ ​the​ ​results​ ​of​ ​this​ ​survey​ ​to​ ​conclude​ ​that​ ​U.S.​ ​high​ ​school​ ​students​ ​do​ ​not get​ ​enough​ ​sleep.

The​ ​high​ ​school​ ​cannot​ ​draw​ ​meaningful​ ​conclusions​ ​from​ ​this​ ​data​ ​because​ ​the​ ​sample​ ​size​ ​is​ ​too small

Consider​ ​the​ ​following​ ​algorithms​ ​to​ ​store​ ​a​ ​color​ ​digital​ ​image.​ ​​ ​Which​ ​algorithms​ ​are​ ​examples​ ​of "lossy"​ ​compression? Select​ ​two​ ​answers: (A) The​ ​algorithm​ ​breaks​ ​the​ ​image​ ​into​ ​quadrants,​ ​and​ ​those​ ​quadrants​ ​into​ ​sub-quadrants​ ​creating 16​ ​uniformly​ ​sized​ ​parts.​ ​​ ​The​ ​parts​ ​are​ ​saved​ ​in​ ​separate​ ​smaller​ ​files​ ​along​ ​with​ ​the information​ ​needed​ ​to​ ​completely​ ​reassemble​ ​the​ ​original​ ​image. (B) The​ ​image​ ​is​ ​divided​ ​into​ ​squares​ ​that​ ​are​ ​2​ ​by​ ​2​ ​pixels​ ​each.​ ​​ ​Each​ ​square​ ​is​ ​translated​ ​into​ ​a single​ ​pixel​ ​whose​ ​color​ ​is​ ​the​ ​average​ ​of​ ​the​ ​color​ ​values​ ​from​ ​the​ ​4​ ​pixels​ ​in​ ​the​ ​square. (C) The​ ​algorithm​ ​find​ ​runs​ ​of​ ​identical​ ​pixels.​ ​​ ​It​ ​saves​ ​the​ ​same​ ​information​ ​by​ ​saving​ ​the​ ​pixel value​ ​once​ ​and​ ​then​ ​the​ ​number​ ​of​ ​consecutive​ ​identical​ ​pixels. (D) The​ ​algorithm​ ​translates​ ​a​ ​color​ ​image​ ​into​ ​a​ ​grayscale​ ​version​ ​of​ ​the​ ​color​ ​original​ ​storing​ ​only averages​ ​of​ ​the​ ​data​ ​used​ ​to​ ​store​ ​the​ ​original​ ​colors​ ​in​ ​the​ ​picture.

The​ ​image​ ​is​ ​divided​ ​into​ ​squares​ ​that​ ​are​ ​2​ ​by​ ​2​ ​pixels​ ​each.​ ​​ ​Each​ ​square​ ​is​ ​translated​ ​into​ ​a single​ ​pixel​ ​whose​ ​color​ ​is​ ​the​ ​average​ ​of​ ​the​ ​color​ ​values​ ​from​ ​the​ ​4​ ​pixels​ ​in​ ​the​ ​square AND The​ ​algorithm​ ​translates​ ​a​ ​color​ ​image​ ​into​ ​a​ ​grayscale​ ​version​ ​of​ ​the​ ​color​ ​original​ ​storing​ ​only averages​ ​of​ ​the​ ​data​ ​used​ ​to​ ​store​ ​the​ ​original​ ​colors​ ​in​ ​the​ ​picture

​If​ ​Alice​ ​wishes​ ​to​ ​send​ ​Bob​ ​an​ ​encrypted​ ​message​ ​using​ ​public-key​ ​encryption,​ ​she​ ​should​ ​encrypt​ ​her message​ ​with​ ​________________, (A) her​ ​private​ ​key (B) her​ ​public​ ​key (C) Bob's​ ​private​ ​key (D) Bob's​ ​public​ ​key

bob's public key

What is a disadvantage of the open standard of Internet addressing and routing? Select two answers. (A) censorship (B) possibility of denial of service attacks (C) redundancy (D) hierarchy

censorship and possibility of denial of service attacks

In the process of digging, a landscaping company cuts a fiber line. Transmission of Internet traffic is still possible through additional pathways that provide alternate routes between the source and destination. The additional pathways describe a concept known as: (A) bandwidth (B) hierarchy (C) latency (D) redundancy

redundancy

Which type of chart would best display the individual data from 1,000 individuals' daily time spent in social media? (A) Pie Chart (B) Bar Chart (C) Line Chart (D) Scatter Plot

scatter plot

Which​ ​one​ ​of​ ​these​ ​would​ ​be​ ​least​ ​likely​ ​to​ ​make​ ​programming​ ​code​ ​easily​ ​modifiable​ ​in​ ​the​ ​future? (A)​ ​Using​ ​meaningful​ ​variable​ ​names​ ​which​ ​reflect​ ​the​ ​purpose​ ​of​ ​the​ ​data​ ​that​ ​is​ ​stored​ ​in​ ​them. (B)​ ​Combining​ ​duplicated​ ​code​ ​into​ ​one​ ​procedure. (C)​ ​Creating​ ​more​ ​procedures​ ​for​ ​the​ ​program. (D)​ ​Increasing​ ​the​ ​number​ ​of​ ​comments​ ​in​ ​your​ ​code​ ​by​ ​which​ ​others​ ​can​ ​understand​ ​the​ ​program​ ​and why​ ​you​ ​implemented​ ​it​ ​that​ ​way.


Conjuntos de estudio relacionados

Principles of Management: Chapter 10 (Wesson)

View Set

Mental Health Exam 4 CH 16, 17, 22, 24, 26 & 27

View Set

ECO 155 Chapter 16 (Final Review)

View Set

foundations of entrepreneurship exam #1

View Set

3.5 Profitability and liquidity ratio analysis!

View Set

PrepU Chapter 42: Assessment and Management of Patients with Obesity

View Set