CSP MidTerm Exam
Which of the following is an advantage of a lossless compression algorithm over a lossy compression algorithm?
A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot.
Which of the following is a primary reason for the use of open protocols on the Internet?
Open protocols provide a way to standardize data transmission between different devices.
Which of the following actions is most likely to be effective in reducing the digital divide at a local level?
Providing free community access to computers at schools, libraries, and community centers
A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet. Which of the following activities is LEAST likely to be effective in this purpose?
Putting all government forms on the city Web site
Which of the following is a true statement about data compression?
There are trade-offs involved in choosing a compression technique for storing and transmitting data.
Which of the following are true statements about the data that can be represented using binary sequences? 1.Binary sequences can be used to represent strings of characters. 2.Binary sequences can be used to represent colors. 3. Binary sequences can be used to represent audio recordings.
1, 2, and 3
Directions: For the question or incomplete statement below, two of the suggested answers are correct. For this question, you must select both correct choices to earn credit. No partial credit will be earned if only one correct choice is selected. Select the two that are best in each case. Researchers have developed a simulation of packets traveling between server computers and client computers in a network. Of the following, which two outcomes are most likely to be results of the simulation? Select two answers.
1. Better understanding of the effect of temporarily unavailable network connections 2. Better understanding of the impact of increased connection speeds for frequently visited servers
The figure below represents a network of physically linked devices, labeled A through F. A line between two devices indicates a connection. Devices can communicate only through the connections shown. Which of the following statements are true about the ability for devices A and C to communicate? Select two answers.
1. If devices B and D were to fail, then information sent from device A could not reach device C. 2. If devices D and F were to fail, then information sent from device A could not reach device C.
Directions: For the question or incomplete statement below, two of the suggested answers are correct. For this question, you must select both correct choices to earn credit. No partial credit will be earned if only one correct choice is selected. Select the two that are best in each case. Which of the following can be represented by a single binary digit? Select two answers.
1. The remainder when dividing a whole number by 2 2. The value of a Boolean variable
Each student that enrolls at a school is assigned a unique ID number, which is stored as a binary number. The ID numbers increase sequentially by 1 with each newly enrolled student. If the ID number assigned to the last student who enrolled was the binary number 1001 0011, what binary number will be assigned to the next student who enrolls?
1001 0100
An online store uses 6-bit binary sequences to identify each unique item for sale. The store plans to increase the number of items it sells and is considering using 7-bit binary sequences. Which of the following best describes the result of using 7-bit sequences instead of 6-bit sequences?
2 times as many items can be uniquely identified.
A video-streaming Web site uses 32-bit integers to count the number of times each video has been played. In anticipation of some videos being played more times than can be represented with 32 bits, the Web site is planning to change to 64-bit integers for the counter. Which of the following best describes the result of using 64-bit integers instead of 32-bit integers?
232 times as many values can be represented.
The figure below represents a network of physically linked computers labeled A through G. A line between two computers indicates that the computers can communicate directly with each other. Any information sent between two computers that are not directly connected must go through at least one other computer. For example, information can be sent directly between computers A and B, but information sent between computers A and C must go through other computers. What is the minimum number of connections that must be broken or removed in the network before computer E can no longer communicate with computer F?
3
Consider the 4-bit binary numbers 0011, 0110, and 1111. Which of the following decimal values is NOT equal to one of these binary numbers?
9
Which of the following school policies is most likely to have a positive impact on the digital divide?
A school provides a laptop or tablet computer to all students enrolled at the school.
Which of the following best explains what happens when a new device is connected to the Internet?
An Internet Protocol (IP) address is assigned to the device.
A certain programming language uses 4-bit binary sequences to represent nonnegative integers. For example, the binary sequence 0101 represents the corresponding decimal value 5. Using this programming language, a programmer attempts to add the decimal values 14 and 15 and assign the sum to the variable total. Which of the following best describes the result of this operation?
An overflow error will occur because 4 bits is not large enough to represent 29, the sum of 14 and 15.
Which of the following best explains how fault tolerance in a network is achieved?
By providing multiple paths between devices, enabling routing to occur even in the presence of a failed component
A user wants to save a data file on an online storage site. The user wants to reduce the size of the file, if possible, and wants to be able to completely restore the file to its original version. Which of the following actions best supports the user's needs?
Compressing the file using a lossless compression algorithm before uploading it
Directions: The question or incomplete statement below is followed by four suggested answers or completions. Select the one that is best in each case. Digital images are often represented by the red, green, and blue values (an RGB triplet) of each individual pixel in the image. A photographer is manipulating a digital image and overwriting the original image. Which of the following describes a lossless transformation of the digital image?
Creating the negative of an image by creating a new RGB triplet for each pixel in which each value is calculated by subtracting the original value from 255. The negative of an image is reversed from the original; light areas appear dark, and colors are reversed.
Consider the following numeric values. Binary 1011 Binary 1101 Decimal 5 Decimal 12 Which of the following lists the values in order from least to greatest?
Decimal 5, binary 1011, decimal 12, binary 1101
Which of the following actions is most likely to help reduce the digital divide?
Deploying satellites and other infrastructure to provide inexpensive Internet access to remote areas of Earth
Which of the following best explains how data is typically assembled in packets for transmission over the Internet?
Each packet contains data to be transmitted, along with metadata containing information used for routing the data.
A video game character can face toward one of four directions: north, south, east, and west. Each direction is stored in memory as a sequence of four bits. A new version of the game is created in which the character can face toward one of eight directions, adding northwest, northeast, southwest, and southeast to the original four possibilities. Which of the following statements is true about how the eight directions must be stored in memory?
Four bits are enough to store the eight directions.
The figure below represents a network of physically linked computers labeled A through G. A line between two computers indicates that the computers can communicate directly with each other. Any information sent between two computers that are not directly connected must go through at least one other computer. For example, information can be sent directly between computers A and B, but information sent between computers A and C must go through other computers. Which of the following statements about security in the network is true? 1. Computers A and D need to communicate with at least two additional computers in the network in order to communicate with each other. 2. Computers B and C can communicate with each other without additional computers being aware of the communication.
II only
Which of the following is a primary benefit of making a computing system fault-tolerant?
If one component of the system fails, users of the system can often still access it.
ASCII is a character-encoding scheme that uses 7 bits to represent each character. The decimal (base 10) values 65 through 90 represent the capital letters A through Z, as shown in the table below. What ASCII character is represented by the binary (base 2) number 1001010 ?
J
A programmer is developing software for a social media platform. The programmer is planning to use compression when users send attachments to other users. Which of the following is a true statement about the use of compression?
Lossy compression of an image file generally provides a greater reduction in transmission time than lossless compression does.
A student is recording a song on her computer. When the recording is finished, she saves a copy on her computer. The student notices that the saved copy is of lower sound quality than the original recording. Which of the following could be a possible explanation for the difference in sound quality?
The song was saved using fewer bits per second than the original song.
Which of the following best describes the relationship between the World Wide Web and the Internet?
The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.
Which of the following is a characteristic of the fault-tolerant nature of routing on the Internet?
The ability to provide data transmission even when some connections have failed
Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes the ability of the two computers to communicate with each other across the Internet?
The computers can communicate directly because Internet communication uses standard protocols.
A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent to the user?
The file is broken into packets for transmission. The packets must be reassembled upon receipt.
Which of the following best explains how messages are typically transmitted over the Internet?
The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device.
The following figure represents a network of physically linked devices labeled P through S. A line between two devices indicates a connection. Devices can communicate only through the connections shown. Which of the following statements best explains the ability of the network to provide fault tolerance?
The network is considered fault-tolerant because there are redundant paths between each pair of devices.