AP computer Science Exam Unit 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following binary (base-2) numbers is LARGEST? A. 11000000 B. 01111111 C. 00000001 D. 10111111

A-11000000

Convert the binary (base-2) number 1001 to decimal (base-10). A. 9 B. 10 C. 16 D. 17

A-9

Which of the following is true of how computers represent numbers? A. Using a fixed but large number of bits can eliminate the possibility of round off error when representing numbers in binary B. With a fixed number of bits some numbers are too large to represent in a computer which will lead to overflow errors. C. Using a fixed but large number of bits, for example 128, eliminates the possibility of overflow errors. D. With a large but fixed number of bits it is possible to eliminate either round-off errors or overflow errors, but not both.

B-With a fixed number of bits some numbers are too large to represent in a computer which will lead to overflow errors.

Which of the following is NOT true of how computers represent complex information? A. Computing devices use patterns of bits to represent complex information B. Abstraction helps represent complex information by surfacing complexity that might otherwise be hidden C. Depending on context the same sequence of bits may represent different types of information D. Common abstractions that are represented by computing devices include numbers, characters, and color.

B-Abstraction helps represent complex information by surfacing complexity that might otherwise be hidden

Arman takes a picture with his smartphone which he subsequently posts online. Beatrice finds the picture online and posts a copy of it on her website with an attached Creative Commons license. Which of the following best describes who owns the photo? A. Beatrice owns the photo because only holders of a Creative Commons license can own works online. B. Arman owns the photo because he was the original creator and did not license the work. C. Arman owns the photo because it was granted a Creative Commons license by another person online. D. Both own the photo because creating a copy makes it her intellectual property.

B-Arman owns the photo because he was the original creator and did not license the work.

Which of the following is true of lossy and lossless compression algorithms? A. Lossy compression algorithms are used when perfect reconstruction of the original data is important. B. Lossy compression algorithms are typically better than lossless compression algorithms at reducing the number of bits needed to represent a piece of data. C. Lossless compression algorithms are only used to compress text data. D. Lossless compression algorithms only allow for an approximate reconstruction of the original data.

B-Lossy compression algorithms are typically better than lossless compression algorithms at reducing the number of bits needed to represent a piece of data.

When visiting a museum Lian takes a photo of a painting with a smartphone which stores the photo as an image file. Which of the following best describes the differences between the painting itself and the photo of the painting stored on the smartphone? A. Both the painting and the photo are analog B. The photo is a digital representation of the analog painting C. Sampling can be used to determine whether the analog image is an accurate representation of the painting D. The phone can represent the photo in either digital or analog formats depending on the sampling technique that is used

B-The photo is a digital representation of the analog painting

Which of the following best describes how computing devices represent information? A. A computer will either represent information as bits or bytes but not both B. A computer represents data as a byte which is either a 0 or a 1 C. A computer represents data as bits which is either a 0 or a 1 D. A computer represents information as bits which contain 8 bytes.

C- A computer represents data as bits which is either a 0 or a 1

Which of the following is true of intellectual property? A. Information created on a computer is not owned by anyone since only analog information is protected under copyright law. B. You do not need to cite work created by someone else if both the original work and your use of it are in digital form. C. Creative Commons enables content creators to freely distribute their otherwise copyrighted work. D. Creative Commons has severely hindered broad and open access to digital information

C- Creative Commons enables content creators to freely distribute their otherwise copyrighted work

Your computer uses 4 bits to represent decimal numbers (0, 1, 2, 3 and so on) in binary. What is the SMALLEST number for which an overflow error occur? A. 14 B. 15 C. 16 D. 17

C-16

Jorge is sending a large image file to a friend as part of a shared classroom project. Which of the following is most likely true if Jorge opts to compress the image before sending it? A. The image can no longer be represented using bits. B. The image will have been converted into an analog form. C. The image will require more pixels to display it on the screen. D. The image will require fewer bits in order to be represented.

D- The image will require fewer bits in order to be represented.

Convert the decimal (base-10) number 20 to binary (base-2). A. 10010 B. 00101 C. 11000 D. 10100

D-10100

How many total numbers can be represented with an 8-bit binary (base-2) system? A. 127 B. 128 C. 255 D. 256

D-256

Ryan is designing an app that needs to quickly send low quality photos between users. Most smartphones take much higher quality photos than Ryan needs for his app. Which answer best describes the type of compression Ryan should choose and why? A. Lossless compression since it ensures perfect reconstruction of the photo. B. Lossy compression since it ensures perfect reconstruction of the photo. C. Lossless compression since it typically results in smaller data sizes. D. Lossy compression since it typically results in smaller data sizes.

D-Lossy compression since it typically results in smaller data sizes.

Lucy is completing a project as part of a science class using materials she found online. Which of the following is MOST LIKELY to lead to legal consequences? A. Modifying a piece of open source software. B. Using open access research for which she does not acquire a license. C. Failing to publish her work under a Creative Commons license. D. Using images posted online by another student without permission or citation.

D-Using images posted online by another student without permission or citation.


Conjuntos de estudio relacionados

Network Auth Chapter 10, Network Auth Chapter 9, Network Auth Chapter 8

View Set

unit 5- cell membrane and transport

View Set

MAN3303 - Leadership & Management Practices - Chapter 6 Quiz

View Set

Respiratory Review Questions Part 2

View Set

Completing the Application, Underwriting, and Delivering the Policy

View Set