Computing Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

Felipe is trying to find information on wind power in Germany. Which of the following would be the most effective search query for this?

"wind power" +Germany

How many times should you call the start function in a program?

0

How many times should the start function be defined in a program?

1

Suppose we used an Internet Addressing protocol that used 4 bits to encode a single address. How many devices would be supported on the Internet? How many unique addresses would there be?

16

How many times should Karel turn left in order to turn right?

3

Which of the following statements is the simplest and most accurate definition of a computer? A computer is a machine that is able to solve any problem. A computer is a machine that can be programmed. A computer is something that performs calculations by following and executing specific instructions to solve a problem. A computer is something that runs applications and accesses the internet.

A computer is something that performs calculations by following and executing specific instructions to solve a problem.

What is the Internet Protocol (IP)?

A protocol that defines the structure of an Internet address and assigns a unique address to every device on the Internet

What is a code comment?

A way to give notes to the reader to explain what your code is doing

Which of the following choices correctly orders the early types of computers from earliest to most recent? Abacus, Analytical Engine, ENIAC, IBM Laptop Analytical Engine, Abacus, IBM Laptop, ENIAC ENIAC, Analytical Engine, Abacus, IBM Laptop IBM Laptop, ENIAC, Analytical Engine, Abacus

Abacus, Analytical Engine, ENIAC, IBM Laptop

Which of the following is an example of two factor authentication? You are asked to factor a large prime number in order to gain access to sensitive data. You are asked to reset your password every other time you enter a secure website. After inputting your password, you are asked to enter it again. After inputting your password, you receive a text message with a unique pin.

After inputting your password, you receive a text message with a unique pin.

Which of the following lists the types of copyright license from most restrictive to least restrictive? Public Domain, All Rights Reserved, Some Rights Reserved Public Domain, Some Rights Reserved, All Rights Reserved All Rights Reserved, Some Rights Reserved, Public Domain All Rights Reserved, Public Domain, Some Rights Reserved

All Rights Reserved, Some Rights Reserved, Public Domain

A privacy policy discloses: How a company uses your data How a company shares your data How a company gathers your data

All of the above

How can you be an upstander if you witness cyberbullying? Reach out to the victim-let them know that you care and encourage them to seek help Tell a teacher, parent, or counselor about the bullying Report bullying to the website admin

All of the above

Victims of cyberbullying may experience which of the following? Isolation Low self-esteem Depression

All of the above

Which of the below are examples of control structures? (I) if (II) if/else (III) while (IV) for

All of the above

Which of the following actions will help you avoid violation of copyright laws? Always cite sources Check the copyright to make sure it can be used by others without permission Use public domain media

All of the above

Which of the following are best practices for having a secure password? Creating a password that is long in length Creating a password that has a combination of letters, numbers, and special characters Using a password manager

All of the above

Which of the following is an application of Artificial Intelligence? Game AI's Foreign language translation Recognizing handwriting All of the above

All of the above

Why do we use functions in programming? Break down our program into smaller parts Avoid repeating code Make our program more readable

All of the above

Why should a programmer indent their code? Helps show the structure of the code Easier for other people to understand Indenting is a key part of good programming style

All of the above

Which of the following devices is not connected to the Internet of Things? - An AM/FM radio without any bluetooth or Internet connection capabilities - A wearable device that measures your physical activity and allows you to track your activity through a mobile app - A smart thermostat that allows you to remotely control your home's temperature through a mobile app - A digital baby monitor that allows you to stream video and audio of your nursery from the Internet

An AM/FM radio without any bluetooth or Internet connection capabilities

Which of the following is not a good practice for effective Internet searches? Search for specific keywords that define your topic Use quotation marks to search for exact phrases Be general in your search query to get as many results possible Use + or - to include or exclude different topics

Be general in your search query to get as many results possible

How is the bandwidth of a network measured?

Bitrate. Higher bitrate means higher bandwidth.

A natural science museum opened a new display that lets the visitors view animations of how the health of a coral reef varies based on water temperature, pollution levels, and the number of fish living around the reef. The visitors are able to choose a numerical value for each of the conditions. The exhibit's animations are determined by using a database to look up how healthy the coral reef is at the particular settings the visitor chooses and displaying a corresponding picture. What is one advantage of using an interactive exhibit like this instead of showing a poster with the same information?

By allowing the visitors to interact with the exhibit, the visitors will be able to understand coral reefs better.

Polly and Sergei are working on a project to explain how the rise in oil prices is leading to a rise in lunch prices at their school. Polly wants to have a chart showing the oil prices every day over the past 18 months and a different chart showing the lunch prices every day over the past 18 months. Sergei argues that having two separate charts won't show the relationship between oil prices and lunch prices. He also thinks that the charts are showing too many data points. Instead, he wants to use a program to make a chart that shows both the oil prices and the lunch prices on the same chart. In addition, rather than plotting the prices for every day, he only wants to chart the average monthly prices for oil and lunch. Why would Sergei's approach make it easier for other people to analyze the data than Polly's approach?

By transforming and summarizing the available data, Serge's chart would more effective in showing any trends that may have occurred.

Which of the following choices lists the three main components of a computer's hardware? CPU, Memory, Motherboard CPU, Flash memory, Processor Processor, Binary, RAM Input devices, Output devices, Motherboard

CPU, Memory, Motherboard

What does CPU stand for?

Central Processing Unit

In cybersecurity, what does CIA stand for?

Confidentiality, Integrity, Availability

What do we use control structures for in JavaScript?

Control the flow of the program; how the commands execute.

Which of the following is not true about cybersecurity?

Cyber attacks can devastate large organizations, but individuals are largely unaffected.

Which function will teach Karel how to spin in a circle one time? A function spin() { turnRight(); } B function spin() { turnLeft(); turnLeft(); turnLeft(); turnLeft(); } C function spin() { turnLeft(); turnLeft(); } D function spin() { move(); move(); move(); move(); }

D

True or False. The information about a particular person that exists on the Internet is a result of only a portion of their online activity. Some things don't matter or are not part of a person's digital footprint.

False

True or False: As long as you cite your source, you are free to use or share any kind of media you find on the Internet.

False

True or False: It is legal to practice hacking public websites as long as you are a student learning about cybersecurity.

False

True or false: The internet is a great place to socialize, and because it is completely online, everyone is safe.

False

By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, even if you change your settings.

False. It depends if the privacy policy allows you to opt in or out of sharing data.

By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, no matter what.

False. It depends if the privacy policy allows you to opt in or out of sharing data.

Which of the following pieces of information would be safe to include in an online username? School mascot Favorite sport Year of birth City of residence

Favorite sport

Each of the following answer choices describes a basketball game. Which answer choice describes the game with the lowest level of abstraction? The Warriors won by 10 points. The Warriors had an early lead, but were down by 4 at halftime. They tied it up in the 4th quarter and the game went into overtime. They won by 10 points in overtime. First, Steph Curry jumped in the air and grabbed the ball. Then he dribbled it three times and passed it to Klay Thompson... First, Steph Curry flexed his left and right quad muscles at the exact same time, then he flexed each muscle in his fingers...

First, Steph Curry flexed his left and right quad muscles at the exact same time, then he flexed each muscle in his fingers...

You need to write a program that has Karel move 6 times and then put a ball. Which control structure do you need to use?

For loop

What can be used to teach Karel to turn right?

Functions

Suppose you want to make a visualization that shows how many students bought certain quantities of candy from the vending machine during the month of September. Of the choices below, which chart would best convey this information to the person looking at the graph?

Histogram

Which of the following is an example of a 'runtime error'? I. Karel crashing into a wall II. Leaving a semicolon off the end of a command III. Using the wrong syntax in an if/else statement IV. Not closing all open brackets

I

A person's digital footprint consists of the following: I. Comments you leave II. Pictures you post III. Topics you search IV. Apps you use V. Music you download VI. Emails you send

I - VI all

Which of the following is true about the Internet of Things? I. The Internet of Things is the network of devices with the ability to connect and exchange data. II. The Internet of Things increases our vulnerability to cyber attacks. III. The Internet of Things is purely positive-there are no negative consequences to increased connectivity

I and II

Which of the following fields use computers? I. Computer Science II. Medicine III. Video Gaming IV. Automotive (Cars)

I, II, III, IV

Which of the following items is an example of a user application? I. Browser II. Text editor III. Games IV. File Explorer

I, II, III, IV

Which of the following statements describes how mobile devices, the use of computers in more and more everyday interactions, and the ability to connect with other devices almost anywhere are changing society? I. People are able to use mobile devices for new applications such as finding directions or finding restaurants II. Data can be collected from thousands of sources and can be combined to provide new services to individuals and companies III. Buildings, cars, classrooms, and offices can now be engineered with sensors to automate tasks like adjusting the thermostat or even driving IV. Data that is collected can be used to identify social problems

I, II, III, IV

Which of the following are ways that data is collected about you: I - Websites store data that tracks how you use the website II - Websites store cookies in your browser so that the next time you visit the website things like your profile login and recent activity are saved III - Some apps store geolocation information from your phone to track your location IV - Transaction data is stored by credit card companies when you purchase things with a credit card

I, II, III, and IV

Which of the following are safety guidelines when socializing online? I. Be wary when communicating with people you don't know in real life II. Don't disclose personal information-even if it doesn't seem important III. Don't have any social media accounts IV. Block/report if you are being harassed V. Don't send or receive any emails VI. Ask a trusted adult if you need help

I, II, IV, and VI

Which of the following statements are true about the Internet? I - The Internet connects devices and networks all over the world II - The Internet helps people collaborate to solve problems III - The Internet helps people communicate IV - There are no negative consequences of the Internet, it is purely positive

I, II, and III

Which of the following statements are true about cyberbullying: I. Cyberbullying uses electronic communication to bully a person. II. Cyberbullying is a crime in many states. III. Instances of cyberbullying do not affect the digital footprint of the victim. IV. Cyberbullying hurts real people even though we can't always see their reactions online.

I, II, and IV

Which of the following can help you to maintain your digital footprint? I. Using privacy settings to limit your exposure II. Posting long rants when you are angry about something III. Reviewing posts you are tagged in and taking action if needed IV. Googling yourself on a regular basis

I, III, and IV

Which of the following people can access your digital footprint? I. Teachers, colleges, and scholarship committees II. Potential employers III. Family, friends, and acquaintances

I-III All

Which of the following statements is true? I. Computers have only been around since the 1940's II. One reason computers were first developed was to do mathematical computations faster III. Some modern computers include laptops, cell phones, and tablets IV. Computers are able to perform tasks by using logic

II, III, IV

What should you do if you are a victim of cyberbullying? I. Respond to the bully II. Keep a record of messages received (print or take screenshots) III. Reach out to parents, teachers, counselors, and school administrators IV. Block communication from the bully (if possible)

II, III, and IV

Which of the following statements are true about using visualizations to display a dataset? I. Visualizations are visually appealing, but don't help the viewer understand relationships that exist in the data II. Visualizations like graphs, charts, or visualizations with pictures are useful for conveying information, while tables just filled with text are not useful. III. Patterns that exist in the data can be found more easily by using a visualization

III only

You need to write a program that has Karel move if the front is clear, but if it isn't clear, Karel will do nothing. Which control structure do you need to use?

If statement

You need to write a program that has Karel put down a tennis ball if the world has dimensions of 1x1. Which control structure do you need to use?

If statement

You need to write a program where Karel will take a ball if there is a ball present, otherwise Karel should put down a ball. Which control structure do you need to use?

If/Else statement

Alice is buying books from an online retail site, and she finds that she is able to change the price of a book from $19.99 to $1.99. Which part of the CIA triad has been broken?

Integrity

Which of the following statements is something the operating system of a computer is responsible for doing? Managing memory allocation for all applications. Providing a way for the user to create text documents. Allowing the user to access the internet. Allowing the user to write programs.

Managing memory allocation for all applications.

Which of the following devices is the device that connects all of the physical components of a computer together? CPU Memory Logic Motherboard

Motherboard

Which of the following choices is a brand-new application of computers, having come about in the past 5 years? Analyzing data Solving mathematical equations Making predictions about future events based on data gathered about past events None of the above.

None of the above

Which of the following describes an instance of legal hacking? Looking for security risks on a product that is excluded from a bug bounty program. Penetration testing for a company Grey hat hacking Security hacking is never legal

Penetration testing for a company

A person's digital footprint is:

Public and permanent to anyone

If Karel is facing North and the code turnLeft(); turnLeft(); runs; which direction is Karel facing now?

South

News reporting agencies often want to find the public's opinion on current events. One particular agency is considering two different strategies to collect this data by collecting responses to online surveys. The two strategies are outlined below. Strategy One 1. Uses a database to store all of the survey responses2. Stores some data as text and some data as numbers3. Will track extra information about the survey taker that won't be publicly visible Strategy Two 1. Uses a single spreadsheet to store all of the survey r Responses2. Stores all data as numbers3. Will not track any information other than the survey responses Which of the following statements is the most accurate comparison of these strategies?

Strategy One will allow the agency to conclude more about the public's opinion because it tracks extra metadata, while Strategy Two will make it hard to find trends and access particular pieces of the data.

If Karel starts at Street 1 and Avenue 3 facing East, what street (row) and avenue (column) will Karel be on after this code runs? move(); move(); move(); turnLeft(); move();

Street 2 and Avenue 6

What is the bitrate of a system?

The amount of data (in bits) that can be sent in a fixed amount of time

Which of the following is not a characteristic of a credible source? The author is not named on the website The domain is .edu or .gov Multiple scholarly sources are cited The source is well-organized and follows rules of spelling and grammar

The author is not named on the website

Which of the following describes a credible source?

The domain is .edu.

What is the latency of a system?

The time it takes for a bit to travel from sender to receiver

What is not true of white hat hackers? They contribute to robust security systems They use the same methods as black hat hackers They alert companies of security vulnerabilities They are breaking the law and are at risk of legal repercussions

They are breaking the law and are at risk of legal repercussions

What is the purpose of a network device?

To allow computers to connect and communicate with other computers.

What is the purpose of an output device?

To allow the computer to display or communicate the result of a computation

What is the purpose of a storage device?

To allow the computer to store information or programs.

What is the purpose of an input device?

To allow the user to give data or information to the computer.

Why do we use if statements in JavaScript?

To do something only if a condition is true

Why do we use if/else statements in JavaScript?

To either do something if a condition is true or do something else

Why do we use while loops in JavaScript?

To repeat some code while a condition is true

What is top down design?

Top down design is a way of designing your program by starting with the biggest problem and breaking it down into smaller and smaller pieces that are easier to solve.

True or False: Cyberbullying can be persistent, permanent and discreet (meaning teachers and parents can't see or overhear cyberbullying).

True

Which of the following statements is true about data visualizations? - Visualizing data has only been possible since computers have become widespread. - Visualizations take many forms, from tables to charts to images. - There is always one exact visualization that should be used to show a particular aspect of a dataset. - The only way to extract information from data is by using a visualization.

Visualizations take many forms, from tables to charts to images.

You need to write a program that has Karel take all the tennis balls where Karel is standing if there are any there. Karel should end up with no tennis balls on that spot. Which control structure do you need to use?

While loop

The video described several different kinds of charts that we commonly use to visualize data. In which of the following would one of the charts described help to accomplish the accompanying task described?

Your school wants to track how many people attend the football games over time throughout the school year.

What is an avenue in a Karel world?

a column

What is a street in a Karel world?

a row

What is the best way for Karel to move 10 times?

for (var i = 0; i < 10; i++) { move(); }

Karel needs to pick up a pile of tennis balls. Which of the following start functions solves the problem at the highest level of abstraction?

function start() { moveToPile(); takePile(); }

What does an if/else statement look like in JavaScript?

if (condition) { //code } else { //code }

Which general if statement definition is written correctly?

if(condition) { //code }

Choose what kind of device a mouse is. Input Device Output Device Storage Device Network Device

input device

Choose what kind of device a web-camera is. Input Device Output Device Storage Device Network Device

input device

Which of these is a valid Karel command? move; MOVE move(); move()

move();

Choose what kind of device a "router* is. Input Device Output Device Storage Device Network Device

network device

Choose what kind of device a "speaker* is. Input Device Output Device Storage Device Network Device

output device

Choose what kind of device a "floppy disk* is. Input Device Output Device Storage Device Network Device

storage device

What commands does SuperKarel know that regular Karel does not?

turnAround() and turnRight()

Which general while loop definition is written correctly?

while (condition) { //code }


Conjuntos de estudio relacionados

General Biology 2 - MIDTERMS (Final Test)

View Set

bio test 4 module 11 gene expressions

View Set

Ch 42 Assessment and Management of Patients with Obesity

View Set

ALC Marksmanship Exam 02/13/2017

View Set

From Treasure Island (Section Questions 1-3)

View Set

Quiz 2: Writing Paragraphs and Mechanics Language Arts 700

View Set

Townsend Press- Advance Word Power Unit 2

View Set