CSP Study Guide Stephen Evert

¡Supera tus tareas y exámenes ahora con Quizwiz!

Consider these files: A 3-second audio recording of a baby's first word. A 30-second video recording of a baby's first steps. Is it possible for the 30-second video recording to have a smaller file size than the 3-second audio recording?

Yes, if the 30-second video is compressed with a lossy compression algorithm.

Huang loves retro songs and discovers a website with audio recordings of many old songs. He's also an animator, so he is inspired to make a video channel with animated music videos for retro songs. Can he use that audio?

He can use the audio recordings if they are explicitly licensed for re-use, like with a Creative Commons license, and he follows the conditions of that license.

Which of the following best illustrates inequity caused by the digital divide? Choose 1 answer: Choose 1 answer: (Choice A)A school institutes a policy that does not allow students to use their cell phones during class time. (Choice B)A community college student does their homework in the waiting room of a local hospital because they don't have Wi-Fi at home. (Choice C)After a presidential election debate, one of the candidates has more articles written about them online than the other candidates. (Choice D)A student is unable to watch an educational video because the youtube.com web servers suffer a worldwide outage that day.

(Choice B)A community college student does their homework in the waiting room of a local hospital because they don't have Wi-Fi at home.

You've decided to use binary to communicate "secret" messages to your friend, and you want to tell them to meet you at locker 44. What would that decimal number be in binary?

101100

How many bits are in 2 bytes?

16

Ophelia is working on a program that uses machine learning to analyze hospital CT scans for signs of cancer. With her first version of the program, the computer took an average of 24 minutes to analyze 1000 images. To improve the performance, she parallelized the image analysis operation. When running the parallelized program on a hospital computer, the computer took an average of 6 minutes to analyze 1000 images. What is the speedup of the parallel solution?

4

Compression algorithms vary in how much they can reduce the size of a document.

A document of randomly generated letters

What does it mean for a system to be scalable?

A scalable system can handle an increasing number of users.

An online app for playing Chess utilizes a variety of algorithms. Their software engineers would like the algorithms to run in under a second so that users have a great experience. Which algorithm's runtime is most likely to be improved by the use of a heuristic?

Choosing a good move when the computer is playing against the human

When packets are routed on the Internet, the route for a particular packet is not pre-determined. Instead, the next hop is decided by each router along the way. How does that increase the fault tolerance of routing on the Internet?

Each router can pick a connection that's currently working and available.

A programmer wants to present their idea for an algorithm at a company meeting. They're debating whether to express the algorithm in flow charts, pseudocode, or a programming language. Which of these is a good argument for expressing the algorithm in a flow chart at the company meeting?

Flow charts can require less technical knowledge to understand than pseudocode or programming languages.

Many people worry about what would happen if either the Internet or the World Wide Web went down (if they suffered a complete outage and were unreachable).

If the Internet went down, the World Wide Web would also go down, since the WWW relies on the Internet protocols.

In the classic arcade game Donkey Kong, the code calculates the time allowed per level by multiplying the current level by 10 and adding 40. On level 22, that calculated time is 260. However, the game displays a time of 4 instead of 260. It is impossible for anyone to complete the level in just 4 seconds, so no player ever makes it past level 22. What is the most likely cause of the level 22 bug?

Integer overflow error

When do Internet-connected computing devices use the Internet Protocol (IP)?

It is used whenever two computing devices send data to each other over the Internet.

A new Internet provider ZoomyZoomy is creating advertising that focuses on the bandwidth of their connections. What slogan would have the correct unit?

Sign up now for a bandwidth of 50 megabits/second!

According to the Internet Protocol (IP), messages should be split into packets before being sent over the Internet. One problem with splitting the message into packets is that they might arrive out of order. TCP is a protocol that can deal with out-of-order packets. The IP header and TCP header both contain multiple pieces of metadata. Which part of the packet contains the sequencing information that's used by TCP to reassemble packets?

TCP header

How does the Internet Protocol (IP) fit into the Internet technology suite?

The Internet Protocol is a protocol used in all Internet communication, but other protocols are also used.

A programmer is writing a software application about birds that will use a variety of data sources. They want to understand which data sources are analog so that they can think carefully about the process of converting the analog data into digital data. Which of these data sources is analog?

The altitude of a bird as it flies through the sky

Consider this sequence of bits: 0100010000010001 0110101000010010 0111111111110010 1011010110010010 1001000001011011 1100010000110111 0101010011001110 1000111111110011 1100010101011000 1001100100101101 What is true about this binary data?

This sequence of bits might represent numbers, letters, or emoji symbols.

A mathematician comes up with an algorithm for multiplying two matrices together. This table shows how many steps the algorithm requires for different matrix sizes: Matrix sizeSteps11283274645125 Which function best describes how the number of steps changes as the matrix size (nnn) increases?

n3

Which of these are a requirement for a computer to access the Internet? text{I}Istart text, I, end text. A wired connection using either an Ethernet or Fiber optic cable text{II}IIstart text, I, I, end text. A monthly payment to the Internet Engineering Task Force text{III}IIIstart text, I, I, I, end text. The ability to connect that computer to another Internet-connected device

text{III} only


Conjuntos de estudio relacionados

The Great Awakening (US History)

View Set

Intro to Clinical Study Guide #4

View Set

Chapter 1 Quiz (Exceptional Learner)

View Set