Comp 111 Questions Exam Prep

¡Supera tus tareas y exámenes ahora con Quizwiz!

How many different modes of values do 7 bits allow for? • 14 • 49 • 77 • 128 • 64

128

When did personal computers become available?

1966-1990

How many FB users as a portion of the world population? About 25%

25%

How many different modes or values do 8 bits allow for?

256

How many revolutions have we had in our history of local and intermediate communication towards global and immediate communication?

3

How many pillars are there to information assurance? •

5, • availability, integrity, authentication, confidentiality, non repudiation

How many OSI layers are there? • 7 • 3 • 8 • 5

7

How many MB is equivalent to 8GB

8000MB

Computer networks a. allow people to share hardware resources. • make it easier for people to share data • support collaborations through tools as email and messaging • all of the above none of the above

All of the above

In machine learning how are clusters defined? • Both by their centre and Gaussians • Centre • Gaussians • All of the above

All of the above

Over the years, what has changed in the information about social networks? • It has become more structured • It has become more explicit • It has become more shared • All of the above

All of the above

What type of information can we encode into binary using ASCII? • Video • Images • Text All of the above

All of the above

Algorithms: Which of the following statements is true? • One algorithm can be part of another algorithm • One algorithm can serve another algorithm • One algorithm can trigger another algorithm • All of the above.

All of the above.

What affects bandwidth? • Amount of traffic, connection & info being transmitted • the amount of traffic, and the protocols of the network • information being transmitted • Amount of traffic, connection, protocols & physical media

Amount of traffic, connection, protocols & physical media

What is a hash?

Answer: Data that has been one-way encoded.

What is a motherboard?

Answer: It is a circuit board that contains a computer's CPU.

What happens when you boot up a PC?

Answer: Part of the OS are copied from a hard drive into memory.

What does the speed of a processor depend on? • Architecture, clock speed, word size and number of cores • Only clock speed and number of cores • Only clock speed • Architecture, number of cores and clock speed

Architecture, clock speed, word size and number of cores

How does Bluetooth differ from wifi? • Bluetooth uses encryption when talking to the web server • Bluetooth allows for communicating over larger differences • Bluetooth links between devices doesn't involve intermediates • Bluetooth is much faster than Wi-Fi

Bluetooth links between devices doesn't involve intermediates

A modem • Converts an analogy signal to a digital signal • Converts a digital signal into an analogy signal • Both are correct Neither are correct

Both are correct

What is a relational database? • A database that combines data in tables • A database that is based on the relational model • None are correct • Both are correct

Both are correct

• Used to help raise awareness of integrity • Allows for ranking of individuals and their trustworthiness • Both are correct • None are correct

Both are correct

Why is facebook beating every rival? • Able to neutralise threats posed by competitors • Able to use data from sister companies • Can use data from sister companies & neutralise competitors • Can use data from sister companies and has millions of users

Can use data from sister companies & neutralise competitors

What does unsupervised learning tasks include? • clustering, gaussians, classification • Only classification • Clustering, dimension reduction, association rule learning • Only, dimension reduction and association rule learning

Clustering, dimension reduction, association rule learning

What tends to be more explicit? Knowledge, information or data? • Data • Information • Knowledge • all of the above

Data

What is the act of removing erroneous data from a database called? • Data scrubbing • Data cleaning • Data deleting • Data filtering

Data scrubbing

If we increase the input size or an algorithm what will happen to the process time? • Process time would be increased linearly • Process time would be increased exponentially • Process time would stay the same • Depends on the algorithm, all of the above can be correct

Depends on the algorithm, all of the above can be correct

Data has been encoded deterministically when... • Encoding different data would produce a different output • All of the above • Encoding data at another time produces the same output. • There is a way to translate the output back into the input.

Encoding data at another time produces the same output

The hexadecimal system contains 4-bit characters, each character from 0-9 and from a to... • B • F • Q • R

F

A database typically refers to a collection of interrelated tables with data. • True • False

False

A gigabyte (GB) is ten times as big as a megabyte (MB)

False

According to Moore's law, the power of a silicon chip of the same price would double

False

By definition, a computer network must be connected to the Internet

False

Java, Python, C++ ect. are different ways to format an image • true • false

False

Most wireless computer networks today use infrared signals to transmit data.

False

Only about half of the world's countries have Internet connectivity

False

The contents of RAM cannot be changed.

False

What is software made of?

Information

What is an affordance? • It refers to our ability to operate a certain technological artefact • It is a rule about how we interact with objects around us. • It is the position of an object on the scale from being not affordable at all to very affordable • It is a quality of an object that defines its possible uses or makes clear how it can or should be used.

It is a quality of an object that defines its possible uses or makes clear how it can or should be used.

Which tends to be more tacit? • Knowledge • Information • Data All tend to be equally tacit

Knowledge

What is a service that connects computers and peripherals in the same building called? • Lan • Wan • Ran • Ban

LAN

Who created the concept of RFID technology? • Leon Theremin • Tim Berners-Lee • Steve Jobs

Leon Theremin

Which of these technologies was created most recently? • Netbook • Notebook • Ipad • Android

Netbook

What is NOT a method for biometric identification? • Password • Hand Geometry • Faceprint keystroke

Password

According to Kevin Mitnick, what is the weakest link in security? • Firewalls • Intrusion-detection systems • People • Biometric devices

People

What is not a pillar of Information Assurance • Integrity • Privacy • Availability • Authenticity • Utility

Privacy

In terms of relative accessibility and storage space, human's short-term memory compares to what in computers? • USB Flash drive • SD cards • RAM • Hard Disk Drive • DVD

RAM

What doesn't affect bandwidth? • The physical media that make up the network • The amount of network traffic • The type of information being transmitted The type of network connection

The type of information being transmitted

Who invented the WWW?

Tim Berners-Lee

A byte is a larger quantity of information than a bit • true • false

True

A smartphone is a pocket-sized digital computer that can be used as a phone

True

ASCII is a way to translate videos, images, sound and text into binary • true • false

True

We cannot run applications on our everyday computers without an operating system • true • false

True

External drives are typically connected to the computer by: • USB and Firewire • Firewire • USB • Ram

USB and Firewire

What kind of network is the internet? • LAN • WAN • Neither LAN nor WAN • Can be either LAN or WAN

WAN

What is true about machine learning? • there are two types supervised and unsupervised learning • machine learning employs algorithms trained by data • algorithm used in machine learning date back to 18th century • all true

all true

To get a comprehensive understanding of communication hardware how can we break it down? • by distinguishing between wired communication and wireless communication • by distinguishing between sender and receivers which both can be either humans or technology • by distinguishing between physical and non-physical ICT • by distinguishing between the 5 senses

by distinguishing between sender and receivers which both can be either humans or technology

A modem... • converts digital signal into analogy signal and vice versa • allows a Windows PC to run Macintosh applications. • increases the speed with which a computer can communicate

converts digital signal into analogy signal and vice versa

What tends to be more standalone • knowledge • information • data

data

What is data compression commonly used for ? • digital photographs, video clips, music files and text • digital photographs, video clips and music files • digital text file • only music files

digital photographs, video clips, music files and text

Microsoft Windows was the first operating system with a user interface based on windows & icons

false

When systems do not speak the language of the user, which heuristic is violated? • "user control and freedom" • "error prevention" • "match between system and the real world" • "flexibility and efficiency of use" • "Recognition rather than recall"

match between system and the real world"

Data has become • limited • more valuable than oil • none are correct

more valuable than oil

Big data is... • Usually relational and centralised and not distributed • non-relational • non-relational, highly distributed and decentralised • centralised

non-relational, highly distributed and decentralised

In alphabetic order, the three fundamental activities of computers are •

to communicate information • to process information • to store information

What is a purpose database query? • to create tables from input • correlate information • to receive information from all appropriate records • All are true

to receive information from all appropriate records

Mixed reality is a term used to describe • Different perceptions of users of an ICT system • A Human-Computer interface that combines elements from the real environment with virtual environments • The state when managers and developers of an ICT system have different views on future development. • All of the above are true • None of the above are true.

• A Human-Computer interface that combines elements from the real environment with virtual environments

Application often refers to...

• A computer programme • The procedures of software • A use case of software

What is a firewall? • Safety measure to protect internet from unauthorised access • A tool to block sites that are unwanted by the government • A tool to contain viruses • A filter between a private network and the internet

• A filter between a private network and the internet

What poses a threat to the browser? • Visual basic scripting • Java • Flash • All of the above

• All of the above

Which of the following affects the processing speed of a computer? • The internal clock rate of the processor • The architecture of the processor • The number of processors • All of the above

• All of the above

How are online social networks different from actual (offline) social networks? • The information about connections is centralised • The information about connections is formalised • The information about connections is structured • All of the above are true • None of the above are true.

• All of the above are true

How are online social networks different from actual (offline) social networks? • The information about connections is centralised • The information about connections is formalised • The information about connections is structured • All of the above are true.

• All of the above are true.

Transistors: which of the statements (if any) is false? • The smaller transistors get, the higher their design costs • Quantum computing can offer higher speed for applications • Transistors are getting smaller and smaller All true

• All true

What is the difference between a Logistics Information System and Financial Information System? • An LIS supports decisions related to space utilisation, whereas FIS supports decisions related to scheduling and assigning employees • An LIS supports decisions related to monitoring cost trends, whereas an FIS supports decisions related to product cost calculations. • An LIS supports decisions related to improving budget allocation, whereas FIS supports decisions related to allocating human and financial resources • An LIS supports decisions related to improving shipment planning, whereas FIS supports decisions related to determining portfolio structures.

• An LIS supports decisions related to improving shipment planning, whereas FIS supports decisions related to determining portfolio structures.

To run, all applications on a general-purpose computer rely on • A licence agreement. • An operating system. • Both of the above are true. • None of the above are true.

• An operating system.

Your email is private except for: • The copy stored on the servers of your internet provider • The copy stored at the destination ISP's Server. • The copy stored on the servers between you and the receiver • Answer: All of the above.

• Answer: All of the above.

What is the purpose of a Denial of Service attack? • To act as website visitor and upload a Trojan horse. • Flooding a server with requests in order to shut it down. • To hack into financial transactions and modifying them • To organise a large number of computers for a common cause.

• Answer: Flooding a server with requests in order to shut it down.

What is the name for software that augments the physical environment with the digital information? • Virtual reality browser • Augmented reality browser • Virtual reality portal • Augmented reality portal

• Augmented reality browser

Way network performance can be measured • Bandwidth • Bandwidth and latency • Latency and speed • All are untrue

• Bandwidth and latency

What is a 4G network • Based on fourth generation wireless phone network technology • can transmit four gigabytes of data every second. • only works with 4G or later laptops and smartphones.

• Based on fourth generation wireless phone network technology

What type of technology is used/based on by the photographic imagery and editing programs? • ASCII • Bitmapped graphics • JPEG • PNG

• Bitmapped graphics

Which of the following encoding systems allow for 2-way translation (both encoding & decoding)? • Base 64 • Hexadecimal • Neither base64 nor hexadecimal • Both base64 and hexadecimal

• Both base64 and hexadecimal

Data refers to...

• Both part of software and the constituents of software

Choosing a data type that can more accurately hold some content normally comes at the cost of: • Speed of processing • Storage size • Both speed and size • Neither speed nor size.

• Both speed and size

Choosing a data type that can more accurately hold the data (such as numeric constraints) normally comes at the cost of • Speed of processing • Storage size • Both speed and size • Neither speed nor size.

• Both speed and size

What computer component processes information?

• Both the CPU and the GPU.

Which of the following statements describes how we interact with ICT? • We interact with software through hardware • we interact with hardware though software • Both the above answers are true • none of the above answers are true

• Both the above answers are true

In the context of Porter's 5 forces model, which is a difference between buyer power and supplier power? • Buyer power is low when customers have many choices, whereas supplier power is low when customers have fewer options. • Buyer power is higher when customers have few choices, whereas supplier power is high when customers have more options. • Buyer power is low when customers have many choices, whereas supplier power is low when customers have more options. • Buyer power is higher when customers have many choices, whereas supplier power is high when customers have fewer options.

• Buyer power is higher when customers have many choices, whereas supplier power is high when customers have fewer options.

Our collective use of IT may come at the cost of: • Equality and privacy • Enjoyment and privacy • Concentration and privacy • Concentration, privacy and equality.

• Concentration, privacy and equality.

Encryption and perimeter defence are two control measures related to which pillar of information assurance? • Confidentiality • Integrity • Availability • Privacy • availability

• Confidentiality

k-nearest neighbour (k-NN) is an algorithm for • Data clustering • Data visualisation • Data classification • None of the above

• Data clustering

What are the components of software?

• Data, application and user interface.

What do we find when breaking down relational databases?

• Databases > tables > records > fields.

Which memory component/s is/are positioned farthest from the GPU? • Disk drives • Read-only memory • Random-access memory • Read-only memory and random-access memory

• Disk drives

What is true about domain names? • Each registered domain name has a unique IP address • Each IP address has a unique domain name • A domain name is necessary to connect to a web site • All of the above are true.

• Each registered domain name has a unique IP address

As computers evolved they become • Faster • slower • Stay the same • Fast and slower

• Faster

Which of the following statements relating to network interference is true? • Fibre optic cables are mostly immune to network interference • Wired networks are largely immune to network interference • Wireless networks are largely immune to network interference • The 2.4GHz radio frequency is the safest wireless frequency.

• Fibre optic cables are mostly immune to network interference

In what other ways have user interfaces changed?

• From static to dynamic. • From application-based to user-centric From detached to interactive.

Which of the following components are primarily involved in which activity? • GPU • HDD • USB drive • keyboard • WiFi connection • Monitor • touch screen • SSD

• GPU= processing • HDD= storing • USB drive= storing • keyboard= communication • WiFi connection= communication • Monitor = communication • touch screen= communication • SSD= storing

The transport layer of the Open Systems Interconnection model is primarily concerned with.. • Getting data on and off the network • Assigning the IP-addresses • Ensuring a stable connection between sender and receiver • All of the above.

• Getting data on and off the network

The abbreviation Gb stands for

• Gigabit (1 million kilobit)

Usability and user experience are related in the following way: • They refer to the same thing • Good usability us important for a good user experience • All of the above statements are tur • None of the above statements are true

• Good usability us important for a good user experience

What are the primary components of a network? • Hardware and protocol • Computers, software and cables • Cables and devices • Devices and operating systems.

• Hardware and protocol

Which is the correct workflow for data science? • Tidy communicate understand import • Communicate understand tidy import • Import tidy understand communicate • Understand tidy import communicate

• Import tidy understand communicate

What is understanding the role of information in generating and using business intelligence? • Information literacy • Business ability • Business mastery • Information retrieval

• Information literacy

Transaction processing systems • Involve low volumes of data • Require extensive managerial judgement • Involve operations that are repetitive • Require maximum human involvement

• Involve operations that are repetitive

What has been so special about Moore's Law? • It has global ramifications for software piracy • It has been accurate in its prediction about computer power • International ratification of this law will bring about a new era for the internet • It is likely to remain accurate for another 50 years.

• It has been accurate in its prediction about computer power

What can we say about the number of transistors that a dollar can buy? • It is still growing exponentially • It is predicted to grow until 2020 • Both a and b are true • It is has been growing since a few years ago

• It is has been growing since a few years ago

In the context of the data component of an information system, external data sources include: • Transaction data • Personnel records • Labour statistics • Sales records

• Labour statistics

Algorithms can deal with a variety of problems of different sizes by • Looping and repeating • Recording and looping • Looping • repeating

• Looping and repeating

What is not a browser threat? • Cookies • VBS • Flash Network

• Network

Which of the following statements about data science and machine learning is true? • They are terms for the same basic concept • Neural networks are a form of supervised learning • Both statements are true • Neither statement is true.

• Neural networks are a form of supervised learning

Algorithms can excel at solving... • Fuzzy problems • Problems for which output is not defined • Problems with insufficient input information • None of the above

• None of the above

Transistors: which of these statements is false? • Transistors are getting smaller and smaller • The smaller transistors get, the higher their design costs • Quantum, computing can offer higher speed for applications • None of the above statements are false

• None of the above statements are false

Super-intelligence • Is inevitable, and may exist soon • Is inevitable, but is unlikely to exist soon. • Is known to be possible • None of the other statements are true.

• None of the other statements are true.

In the last 50 years, how have computers changed in what they do?

• Only applications of computers have changed • Fundamental operations haven't changed.

How do JPF and PNG formats differ? • PNG stores images in vector format • PNG allows for transparency while JPG does not • PNG allows for lossless scaling • All of the above

• PNG allows for transparency while JPG does not

A computer's internal bus can be connected to an external bus through • Port • Hardrive • Wireless connection Bluetooth

• Port

When you are working on an unsaved document on a PC, where is the document temporarily stored? • RAM • Memory • ROM • External Hard-drive

• RAM

When you first turn on a computer, the CPU is preset to execute instructions stored in • ROM • Memory • RAM

• ROM

What are examples of switching hardware? • Modems and hubs • Ethernet adaptors and routers • Optical network terminal and Ethernet adaptors • Routers and hubs

• Routers and hubs

What are examples of switching hardware? • Modems and hubs • Ethernet adaptors and routers • Optical network terminal and Ethernet adaptors. • Routers and hubs.

• Routers and hubs.

There is no 100% security. What needs to be balanced? • Privacy and ethics • Security and access • Encryption and decryption • Windows and MacOS

• Security and access

Which of the following statements is most accurate? • Tasks that are easy for humans are also easy for machines • Tasks that are hard for humans are also hard for machines • Some tasks that are easy for people are surprisingly hard for machines • Its easy to find these tasks: easy for people hard for machines.

• Some tasks that are easy for people are surprisingly hard for machines

Which of these words means "tricking" or "fooling"? • Fishing • Cracking • Hacking Spoofing

• Spoofing

How has IT been compared to a house? • IT has become a social space for gatherings • People have much control over how IT looks to them • Switching activities is like navigating through rooms • All of the above.

• Switching activities is like navigating through rooms

How has ICT been compared to a mirror? • ICT has allowed for virtual reality • Increasingly, what's happening in the real world is a reflection of what's happening in ICT • The date we capture is a reflection of what happens in the real world • ICT increasingly reflects who we really are

• The data we capture is a reflection of what happens in the real world

How was the onion presented as a metaphor? • ICT is much more complex than it looks • The layers of the onion represent individual team, organisational and societal use of ICT • Analysing its parts can make you cry • The domain of ICT consists of many hardware and software layers.

• The domain of ICT consists of many hardware and software layers.

Which technology was developed first? • The embedded computer • Laptop • Phone • ipad

• The embedded computer

What made Snap Inc. such a valuable social network company? • Its ongoing revenues • Its ongoing profits • The growth of its user base • The expected value of its data All of the above.

• The expected value of its data

Over the years, what has changed in the information about social networks? • It has become more structured • It has become more explicit • It has become more shared • Only the second and third answers are true • The first three answers are true.

• The first three answers are true.

What is different in how we process and store data on audio and facts? • Only the input is different • The input and data processing are totally different • The input, processing and storage tools are different • None of the above.

• The input and data processing are totally different

What is cardinality • The number of entries in a database • The processing time of entries • The number of clusters • The number of cardinal entries

• The number of entries in a database

Which of the following is NOT a trend in software? • Increasingly, software is provided on the web • Software has become easy to share • Software is increasing sold as a service • The number of popular operating systems has been increasing

• The number of popular operating systems has been increasing

The syntax of an algorithm depends on: • The programming language • The hardware components • Both of the above • None of the above

• The programming language

Which of the following does not affect bandwidth? • The amount of network traffic • The software protocols of the network • The type of network connection • The type of information being transmitted

• The type of information being transmitted

What is the problem with IPv4 that IPv6 attempts to solve? • IPv4 is not compatible with mobile devices • IPv4 addresses are too hard for humans to remember • There aren't enough IPv4 addresses for all internet devices • IPv4 is too slow

• There aren't enough IPv4 addresses for all internet devices

In what ways are computers good in processing information?

• They are fast, accurate and can do parallel processing.

What do computers do?

• They communicate, process and store information.

Benefits of databases

• They ease a quick and flexible retrieval of information. • They ease complex mathematical calculations. • They ease the storage of large quantities of information.

What is meant by computers communicating information?

• They read and write data from and to storage • They receive input from users and give output to users • They transmit information to other devices.

What are the properties of high quality data? • Relevant, fast, loadable, consistent, accurate • Timely, relevant, consistent, valid, complete, accurate • Complete, accurate, valid, fast, relevant, consistent • Complete, relevant, valid, loadable, accurate, timely

• Timely, relevant, consistent, valid, complete, accurate

What is the most common reason for installing a Wi-Fi hub in a home? • To enable a PC to connect to a cell phone • To make client/server computing possible • To connect Bluetooth devices to a network • To allow devices to connect to a network without wires

• To allow devices to connect to a network without wires

In the computer discipline what does 'compiling' mean? • Assembling the different components of an algorithm. • Translating programming code to a machine code. • To ensure smooth operation of an algorithm. • None of the above.

• Translating programming code to a machine code.

Almost every Web address begins with http://, but many browsers don't require you to type that

• True

Today most computer's user interfaces are graphical and two dimensional. How about in the past?

• UI's were typically character-based.

External drives are typically connected to the computer by • USB and FireWire • FireWire • USB • RAM

• USB and FireWire

Machine learning is about • Building deep neural network models for data analysis • Making machines that learn from human-computer interactions • Face recognition and friend recommendation on Facebook • Using algorithms to learn from data and build adaptive models.

• Using algorithms to learn from data and build adaptive models.

What is social engineering? • Using social media as a platform to enhance info security • Building systems with security flaws to be exploited later • Using social skills to convince people to reveal information • Manipulating social media to influence decision making

• Using social skills to convince people to reveal information

In bitmaps, a bit can represent

• Whether a pixel is black or white.

What are the main ways consumers pay for IT services? • With money or time • With money, attention of information • With money and information • With money, attention, information or reviews.

• With money, attention of information

Which of the following can be described as the heart or brain of software programs? • the application • data • the user interfaces central processing unit

• central processing unit

The cost of manufacturing microchips • increases linearly over time • decreases linearly over time • increases exponentially with smaller size • decreases exponentially with smaller size

• increases exponentially with smaller size

Algorithms can deal with a variety of different sizes by • hashing and repeating • looping and branching • looping and repeating • looping and hashing

• looping and branching

The common trade - off in storage hardware discussed in class is between... • long term versus short term memory • hard disc drives (HDD) versus solid state drives (SSD) • storage size versus accessibility • human versus machine storage

• storage size versus accessibility

A recent and widely adopted innovation in GPUs in computers is • to directly send information though Bluetooth • to store qubits • the ability to store date in solid state drives • the ability to process information in parallel

• to directly send information though Bluetooth

In what way is WeChat more powerful that FB or Google? • It is used by more people • It combines more functionality in one app • It is under the direct control of the government • It does not need to comply with international regulations on privacy • All of the above.

•It combines more functionality in one app


Conjuntos de estudio relacionados

575 Women's Health Practice Questions

View Set

PN Learning System Comprehensive Final Quiz: Focus review for my mistakes.

View Set

2.07 Brand Marketing Vocabulary Terms

View Set