ap computer science midterm

¡Supera tus tareas y exámenes ahora con Quizwiz!

Approximately how much bigger (how many more bytes) is a megabyte than a kilobyte?

1,000 times bigger

An online store uses 6-bit binary sequences to identify each unique item for sale. The store plans to increase the number of items it sells and is considering using 7-bit binary sequences. Which of the following best describes the result of using 7-bit sequences instead of 6-bit sequences?

2 times as many items can be uniquely identified

Arrange these computer files by the amount of space required to store them in order of the SMALLEST to LARGEST 1. 10 minute video 2. A selfie taken during lunch 3. A literary analysis paper

3, 2, 1

What is the minimum number of bits you would need to encode the 26 letters of the alphabet plus a space?

5 bits

Which of the following programs is most likely to benefit from the use of a heuristic?

A program that finds the shortest driving route between two locations on a map

A Binary question is:

A question which can be answered in only one of the two possible ways.

Programming languages have some similarities and differences to the "natural" language you use in everyday speech. Select the two true statements about programming languages:

Ambiguities in natural language necessitate the creation of programming languages for controlling a computer; Compared to the number of words in a natural language, the number of defined words in a programming is very small

A computer program uses 3 bits to represent integers. When the program adds the decimal (base 10) numbers 5 and 3, the result is 0. Which of the following is the best example for the result?

An overflow error occurred

Researchers have developed a simulation of packets traveling between server computers and client computers in a network. Of the following, what is most likely to be the result of the simulation?

Better understanding of the effect of the temporarily unavailable network connections; Better understanding of the impact of increased connection speeds for frequently visited servers.

Computer A sends a packet of information intended to reach Computer F. Along its path it arrives at Computer C. Which computer should Computer C forward the packet in order to use the most cost effective path?

Computer D

Consider the following numbers: -Binary 1100 -Decimal 11 Which number has the least value?

Decimal 11

An artist makes an RGB raster image in which each pixel color is encoded with 12-bits --- 4 bits each for red, green and blue. Which of the following correctly shows the hexadecimal value for Red as a 12-bit representation. A. F00 B. 00F C. FF00 D. FF0000

F00

A large data set contains information about all students majoring in computer science in colleges all across the United States. The data set contains the following information about each student: -The student's gender -The state in which they attend college -The student's grade point average on a 4.0 scale Which of the following questions could be answered by analyzing only the information in the data set?

How many states have a higher percentage of female computer science majors attending college in that state?

How does a computer resolve a domain name into an IP address?

It asks a DNS server for the corresponding IP address.

which of the following is considered an unethical use of computer science?

Purchasing a single-user copy of software and installing it on all computers in a lab

Which of the following is not true about TCP/IP packets?

TCP guarantees that no packets are ever dropped

which of the following is a characteristic of the fault-tolerant nature of routing on the internet?

The ability to provide data transmission even when some connections have failed

Which of the following are benefits of using well-named variables and clear protocols in a computer program?

The program will be easier for people to read; the program will be easier to modify in the future

Which of the following can be represented by a single binary digit

The remainder when dividing a whole number by two

Which of the following is a true statement about data compression?

These are trade-offs involved in choosing a compression technique for storing and transmitting data.

An Internet Service Provider (ISP) is considering an update to its servers that would save copies of the Web pages most frequently visited by each user. Which of the following is LEAST likely to occur as a result of the update?

Web sites that are not visited frequently might no longer be accessible to users.

Under which of the following conditions is it the most beneficial to use a heuristic approach to solve a problem?

When the problem cannot be solved in a reasonable time and an approximate solution is acceptable

A protocol is defined as:

a set of rules governing the exchange or transmission of data between devices

which of the following best explains what happens when a new device is connected to the internet?

an internet protocol (IP) address is assigned to the device

Select the answers that lists the units of bytes in ascending order from smallest to largest:

kilobyte, megabyte, gigabyte, terabyte

The colors of the pixels in a digital image are often represented by red, green, and blue values between 0 and 225 (an RGB triplet). A photographer is manipulating a digital image to lighten it because all of the RGB values in the image are less than 100, making it very dark. He does this by adding 20 to the R, G and B values of each pixel, then overwriting the original image. What type of transformation is the photographer using on the digital image?

lossless transformation

Both online newspapers and social media sites are used to distribute information on the Internet. Which of the following best describes an advantage that online newspapers have over a social media sites?

the ability to provide credibility to the information distributed

Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes whether these two computers can communicate with each other across the Internet?

the computers can communicate directly because Internet communication uses standard protocol

A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent to the user?

the file is broken into packets for transmission. the packets must be reassembled upon recipient.

A student is recording a song on her computer. When the recording is finished, she saves a copy on her computer. The student notices that the saved copy is lower sound quality than the original recording. Which of the following could be a possible explanation for the difference in sound quality?

the song was saved using fewer bits per second than the original song

A school starts tracking which websites each computer in the school is visiting by monitoring the packets leaving the school. Which of the following is MOST likely to be answerable using all the data collected by the monitoring?

which websites are most frequently visited before and after school hours from a school computer.


Conjuntos de estudio relacionados

Chapter 34: Care of the patient with a Psychiatric Disorder

View Set

Windows 10 70-697: Configuring Windows Devices

View Set

CE 499 Hazardous (and Universal) Waste Management

View Set