APCS

¡Supera tus tareas y exámenes ahora con Quizwiz!

A color in a computing application is represented by an RGB triplet that describes the amount of red, green, and blue, respectively, used to create the desired color. A selection of colors and their corresponding RGB triplets are shown in the following table. Each value is represented in decimal (base 10). What is the binary RGB triplet for the color indigo (75, 0, 130)? (01001011, 00000000, 10000010) (00100101, 00000000, 10000010) (00100101, 00000000, 01000001) (01001011, 00000000, 01000001)

(01001011, 00000000, 10000010)

Convert the decimal (base-10) number 20 to binary (base-2). 00101 10010 10100 11000

10100

Which of the following binary (base-2) numbers is LARGEST? 00000001 11000000 01111111 10111111

11000000

When converting the text message "HI" to machine language (base2), how many bits would be required to send the message? 16 8 12 6

16

Your computer uses 4 bits to represent decimal numbers (0, 1, 2, 3 and so on) in binary. What is the SMALLEST number for which an overflow will occur? 14 17 15 16

16

An online store uses 6-bit binary sequences to identify each unique item for sale. The store plans to increase the number of items it sells and is considering using 7-bit binary sequences. Which of the following best describes the result of using 7-bit sequences instead of 6-bit sequences? 10 times as many items can be uniquely identified. 2 more items can be uniquely identified. 10 more items can be uniquely identified. 2 times as many items can be uniquely identified.

2 times as many items can be uniquely identified.

How many total numbers can be represented with an 8-bit binary (base-2) system? (use numbers only)

256

A video-streaming Web site uses 32-bit integers to count the number of times each video has been played. In anticipation of some videos being played more times than can be represented with 32 bits, the Web site is planning to change to 64-bit integers for the counter. Which of the following best describes the result of using 64-bit integers instead of 32-bit integers? 2^32 times as many values can be represented. 32^2 times as many values can be represented. 32 times as many values can be represented. 2 times as many values can be represented.

2^32 times as many values can be represented.

Convert the binary (base-2) number 1001 to decimal (base-10). 16 17 10 9

9

Which of the following best describes how computing devices represent information? A computer will either represent information as bits or bytes but not both A computer represents data as bits which is either a 0 or a 1 A computer represents data as a byte which is either a 0 or a 1 A computer represents information as bits which contain 8 bytes.

A computer represents data as bits which is either a 0 or a 1

Which of the following is an advantage of a lossless compression algorithm over a lossy compression algorithm? A lossless compression algorithm typically provides a greater reduction in the number of bits stored or transmitted than does a lossy compression algorithm. A lossless compression algorithm can guarantee that compressed information is kept secure, while a lossy compression algorithm cannot. A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot. A lossless compression algorithm typically allows for faster transmission speeds than does a lossy compression algorithm.

A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot.

Which of the following is NOT true of how computers represent complex information? Depending on context the same sequence of bits may represent different types of information Computing devices use patterns of bits to represent complex information Abstraction helps represent complex information by surfacing complexity that might otherwise be hidden Common abstractions that are represented by computing devices include numbers, characters, and color

Abstraction helps represent complex information by surfacing complexity that might otherwise be hidden

Arman takes a picture with his smartphone which he subsequently posts online. Beatrice finds the picture online and posts a copy of it on her website with an attached Creative Commons license. Which of the following best describes who owns the photo? Arman owns the photo because he was the original creator but he did not license the work. Beatrice owns the photo because only holders of a Creative Commons license can own works online. Arman owns the photo because it was granted a Creative Commons license by another person online. Both own the photo because creating a copy makes it her intellectual property.

Arman owns the photo because he was the original creator but he did not license the work.

Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string more than once and replaces each instance of that pair with a corresponding character that does not appear in the string. The algorithm saves a list containing the mapping of character pairs to their corresponding replacement characters. For example, the string "THIS_IS_THE_BEST_WISH" can be encoded as "%#_#_%E_BEST-W#H" by replacing all instances of TH with "%" and replacing all instances if IS with "#" Which of the following statements about byte pair encoding is true? Byte pair encoding is an example of a lossy transformation because some pairs of characters are replaced by a single character. Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version. Byte pair encoding is an example of a lossless transformation because it can be used to transmit messages securely. Byte pair encoding is an example of a lossy transformation because it discards some of the data in the original string.

Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.

Which of the following is true of intellectual property? Information created on a computer is not owned by anyone since only analog information is protected under copyright law. You do not need to cite work created by someone else if both the original work and your use of it are in digital form. Creative Commons enables content creators to freely distribute their otherwise copyrighted work. Creative Commons has severely hindered broad and open access to digital information

Creative Commons enables content creators to freely distribute their otherwise copyrighted work.

Which of the following is true of lossy and lossless compression algorithms? Lossy compression algorithms are used when perfect reconstruction of the original data is important. Lossy compression algorithms are typically better than lossless compression algorithms at reducing the number of bits needed to represent a piece of data. Lossless compression algorithms only allow for an approximate reconstruction of the original data. Lossless compression algorithms are only used to compress text data.

Lossy compression algorithms are typically better than lossless compression algorithms at reducing the number of bits needed to represent a piece of data.

Ryan is designing an app that needs to quickly send low quality photos between users. Most smartphones take much higher quality photos than Ryan needs for his app. Which answer best describes the type of compression Ryan should choose and why? Lossy compression since it typically results in smaller data sizes. Lossless compression since it ensures perfect reconstruction of the photo. Lossy compression since it ensures perfect reconstruction of the photo. Lossless compression since it typically results in smaller data sizes.

Lossy compression since it typically results in smaller data sizes.

A photographer used her digital camera on a very sunny day. When reviewing her photos, there was too much light in the pictures to the point that the images looked washed out. To improve the look of the images she decided to take out some of the brightness by manipulating the RGB numbers. What would she need to do as a part of the manipulation of RGB numbers? Subtract a constant number from the R and G numbers but not the B number. Add a constant number to all RGB numbers Subtract a constant number from all RGB numbers Add a constant number to the R and G numbers but not the B number

Subtract a constant number from all RGB numbers

A program developed for a Web store represents customer account balances using a format that approximates real numbers. While testing the program, a software developer discovers that some values appear to be mathematically imprecise. Which of the following is the most likely cause of the imprecision? The account balances are represented using an unlimited number of bits, resulting in overflow errors. The account balances are represented using a fixed number of bits, resulting in overflow errors. The account balances are represented using a fixed number of bits, resulting in round-off errors. The account balances are represented using an unlimited number of bits, resulting in round-off errors.

The account balances are represented using a fixed number of bits, resulting in round-off errors.

Jorge is sending a large image file to a friend as part of a shared classroom project. Which of the following is most likely true if Jorge opts to compress the image before sending it? The image can no longer be represented using bits. The image will have been converted into an analog form. The image will require fewer bits in order to be represented. The image will require more pixels to display it on the screen.

The image will require fewer bits in order to be represented.

When visiting a museum Lian takes a photo of a painting with a smartphone which stores the photo as an image file. Which of the following best describes the differences between the painting itself and the photo of the painting stored on the smartphone? The photo is a digital representation of the analog painting The phone can represent the photo in either digital or analog formats depending on the sampling technique that is used Sampling can be used to determine whether the analog image is an accurate representation of the painting Both the painting and the photo are analog

The photo is a digital representation of the analog painting

The position of a runner in a race is a type of analog data. The runner's position is tracked using sensors. Which of the following best describes how the position of the runner is represented digitally? The position of the runner is predicted using a model based on performance data captured from previous races. The position of the runner is determined by calculating the time difference between the start and the end of the race and making an estimation based on the runner's average speed. The position of the runner is sampled at regular intervals to approximate the real-word position, and a sequence of bits is used to represent each sample. The position of the runner is measured and rounded to either 0 or 1 depending on whether the runner is closer to the starting line or closer to the finish line.

The position of the runner is sampled at regular intervals to approximate the real-word position, and a sequence of bits is used to represent each sample.

In a certain computer program, two positive integers are added together, resulting in an overflow error. Which of the following best explains why the error occurs? The program can only use a fixed number of bits to represent integers; the computed sum is greater than the maximum representable value. The program attempted to perform an operation that is considered an undecidable problem. The precision of the result is limited due to the constraints of using a floating-point representation. The program cannot represent integers; the integers are converted into decimal approximations, leading to rounding errors.

The program can only use a fixed number of bits to represent integers; the computed sum is greater than the maximum representable value.

Which of the following can be represented by a single binary digit? Select two answers. The remainder when dividing a whole number by 2 The value of a Boolean variable The position of the minute hand of a clock The volume of a car radio

The remainder when dividing a whole number by 2 The value of a Boolean variable

ASCII is a character-encoding scheme that uses a numeric value to represent each character. For example, the uppercase letter "G" is represented by the decimal (base 10) value 71. A partial list of characters and their corresponding ASCII values are shown in the table below. According to ASCII character encoding, which of the following letters is represented by the binary number (base2) 1010101?

U

Lucy is completing a project as part of a science class using materials she found online. Which of the following is MOST LIKELY to lead to legal consequences? Using open access research for which she does not acquire a license. Modifying a piece of open source software. Using images posted online by another student without permission or citation. Failing to publish her work under a Creative Commons license.

Using images posted online by another student without permission or citation.

Which of the following is true of how computers represent numbers? Using a fixed but large number of bits can eliminate the possibility of round off error when representing numbers in binary With a large but fixed number of bits it is possible to eliminate either round-off errors or overflow errors, but not both. Using a fixed but large number of bits, for example 128, eliminates the possibility of overflow errors. With a fixed number of bits some numbers are too large to represent in a computer which will lead to overflow errors.

With a fixed number of bits some numbers are too large to represent in a computer which will lead to overflow errors.

Consider the following numeric values. Move the items to organize the values from least to greatest decimal 5 decimal 12 binary 1011 binary 1101

decimal 5 binary 1011 decimal 12 binary 1101

Place the following value systems in order of data size of transmission across the internet from the most data transmitted to the least data transmitted. hexadecimal decimal binary

hexadecimal decimal binary


Conjuntos de estudio relacionados

Sensation and Perception exam review

View Set

Lesson 4 - Vowel Sounds /oo/, /yoo/

View Set

A Beka 6th Grade Health Test 1 Review

View Set

CCNA1 FINAL EXAM STUDY GUIDE part5

View Set

ap human geography: chapter 7 ethnicity

View Set