AP Computer Science Test !!!

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is true about the computing devices exchanging data over the Internet?

All the computing devices that are exchanging data over the Internet are following the rules of the Internet Protocol (IP).

How is bandwidth measured?

Bits per second

What would happen if the World Wide Web went down?

If the Internet went down, the World Wide Web would also go down, since the WWW is built off of Internet protocols.

Which of these is not a protocol that powers the Internet?

PII

What is pseudocode?

Pseudocode is a language that represents concepts across programming languages, but cannot actually be run by a computer.

One problem with packet-based messaging systems like the Internet Protocol is that packets might arrive out of order. TCP is a protocol that can deal with out-of-order packets. When used over IP, each IP packet contains a TCP segment with metadata and data. Which part of the packet contains the sequencing information that's used by TCP to reassemble packets?

TCP metadata

What does Domain Name System (DNS) protocol do?

Converts a domain name into an IP address.

A startup is developing a new web browser with a focus on accessibility for visually impaired users. The startup founder is considering the benefits and drawbacks of releasing the code online under an open source license. What would be a consequence of releasing the code with an open source license?

Other companies and individuals would be able to view and use the code according to the conditions of the open source license.

An Apple iPhone, an Android phone, a desktop computer, a tablet, and a wireless router are all computing devices. Why are those devices considered computing devices?

They are capable of running computer programs.

Which of these values can be stored in a single bit?

0

When writing binary data, we often put a space between each byte to make it easier for humans to read. Consider this binary data: 010101011101001011000000010101011101001011000000 Which choice puts a space after each byte?

01010101 11010010 11001000

Which statements are true about computing devices? 1. All computing devices are able to run computer programs. 2. All computing devices are capable of being interconnected to form computer networks. 3. All computing devices have ways to store data for later use.

1.

David used a tool to measure how many bits he could transfer over his home connection to the Internet. This table shows the bits transferred each second (second; bits transferred): 1- 900 2- 800 3- 700 4- 1100 5 - 800 According to those measurements, what is the bandwidth of the connection?

1100 bits

VSCII is a character encoding scheme developed in the 1990s in order to encode text written in Vietnamese. VSCII uses one byte to encode each character. This binary data is a VSCII encoding of a single Vietnamese word: 10101110101110001010111010111000 How many characters are encoded in that binary data?

2

Which of these statements about the Internet Protocol (IP) are true? 1. It is the only protocol used in Internet communications. 2. It is used every time a computing device sends a message over the Internet. 3. It is one of many protocols used on the Internet.

2 & 3 only

The Internet Protocol (IP) includes a rule that each message must include a source IP address and a destination IP address. What are the likely consequences of a computer sending a message that does not follow that IP rule? 1. The computer will be put on a blocklist and not permitted to send future messages over the Internet for a period of time. 2. The message might not travel over the Internet or arrive at its destination at all. 3. The message will still travel over the Internet but the contents of the message will be censored.

2 only

Which of these is a requirement for a computer to access the Internet? 1. A web browser that can load websites and associated multimedia files 2. The ability to connect that computer to another Internet-connected device 3. An encryption key used to secure communications between the computer and other Internet-connected computing devices

2 only

Chris is experimenting with assigning and displaying variables. Here's his code: test1 ← 200 DISPLAY (test1) test2 ← 100 test2 ← test1 DISPLAY (test2) test1 ← test2 DISPLAY (test1) What will be the output of that code?

200 200 200

Doc decides to design a clock that shows all the numbers in binary, and is figuring out how many bits will be required to show the minutes. What's the least number of bits that you'll need to represent 59 in binary?

6

Matty is programming a music simulator. Here's part of his code: vocals ← 6 bass ← 9 guitar ← 7 DISPLAY (guitar) DISPLAY (vocals) DISPLAY (bass) After running that code, what will be displayed?

7 6 9

Lexi is making a program to track her grades. She made the mistake of using the same variable name to track 3 different test grades, though. Here's a snippet of her code: a ← 89 a ← 97 a ← 93 What will be the value of a after this code runs?

93

Consider the following code snippet: DISPLAY (":") DISPLAY ("-") DISPLAY ("D") After the code runs, what is displayed?

: - D ("DISPLAY" adds a space after each thing it prints)

Compression algorithms vary in how much they can reduce the size of an image. Which of the following would likely be the easiest to compress?

A black & white icon of a girl

Which of these situations describes the creation of a computer network?

A college campus creates multiple computer labs in different parts of the campus and connects the labs to each other with underground fiber optic cables. Students can save their file on a computer in one lab and still access their files from another lab.

Which of these situations describes a computer network?

A company gives every employee a desktop computer and connects each of the computers to each other using wires, so that they can quickly transfer files and messages.

Kelly has several computing devices around her house that are connected to the Internet: - A smart home assistant (connected via wireless) - A laptop computer (connected via wireless) - A desktop computer (connected via Ethernet) Which of her devices use the Internet Protocol (IP) when sending data through the Internet?

All of the devices

What is a networking protocol?

An agreed-upon set of rules that describe how computing devices can communicate in a network.

A scientist is researching the effects of magnesium supplements on depression, and is considering how to publish their research. They would love for their research to be read by: - researchers at universities - doctors all around the world - mental health counselors - anyone with a history of depression Which decision would best support the scientist's goals?

An online open access journal

The IPv6 protocol is the most recent version of the Internet Protocol (IP). IPv6 includes several new features related to both addressing and routing. Which of the following features of IPv6 most directly increases the scalability of the Internet?

CORRECT (SELECTED) Each IPv6 address is a 128-bit number. That means there are 2^128 (3.4 x 10^38) possible addresses for Internet-connected computing devices.

Which of these is an accurate description of how the TCP/IP protocols send data around the internet?

Computers split messages into packets and send them through routers to their final destination. The destination computer acknowledges the receipt of each packet, so that the sending computer can ensure every packet is delivered.

Which statement is true about computing devices in a computer network?

Each computing device must be able to send data to the other computing devices.

Audacity is an audio editing application that provides a variety of effects that you can apply to audio files. Which of these effects sounds like a lossy operation?

Equalization: Adjusts the volume levels of particular frequencies.

Michael types a URL into her browser and loads up a webpage on bugs. Which protocols were used in fetching and loading the webpage?

IP, TCP, and HTTP

The video sharing site YouTube originally stored the number of video views in a 32-bit signed integer. Then "Gangnam Style" received more than 2,147,483,647 views (more than any other video at that time), and YouTube could not display an accurate number of views until they changed their code. What is the best explanation of what happened?

Integer overflow error

When a computer loads a webpage, it sends a message to a web server over the Internet. How many Internet protocols are used to send and receive the message?

It always uses multiple protocols.

Amazon describes their web services platform like this: Amazon Web Services (AWS) is a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of enterprise, start-up and public sector business with organizations in over 190 countries around the world. What does it mean for the platform to be scalable?

It continues operating when experiencing traffic surges

Which of these is a way that the Internet Protocol (IP) contributes to Internet communications?

It describes a way to uniquely identify computing devices that are connected to the Internet so that messages can be sent to them.

Each IP packet contains a destination address. What is the primary purpose of the destination address?

It helps the router know where to send the packet.

How often is the Internet Protocol (IP) used in Internet communications?

It is used whenever two computing devices communicate with each other over the Internet.

Which of these situations describes the invention of a networking protocol?

Leighton proposes a set of rules that describe a way for computers to send data on low-bandwidth connections and lists them in a document. Multiple network administrators agree to the rules and implement them.

An environmental engineer is researching a new kind of biodegradable plastic and finds exciting results. The engineer wants to make sure that their findings will be available to a diverse audience. Their hope is that journalists, professionals from other industries, and future environmental engineers will be able to read them. Which type of publication would best support the engineer's goals?

Open access journal about environmental engineering

What does HyperText Transfer Protocol (HTTP) do?

Requests the webpage contents from an IP address.

What does Transport Layer Security (TLS) do?

Serves a website over a secure, encrypted connection. Only used sometimes

Devon loves retro songs and discovers a website with audio recordings of many old songs. She's also a video editor, so she is inspired to make a YouTube channel with cool visuals for retro songs. Assuming US copyright laws, is Devon allowed to use audio recordings of retro songs for her music videos?

She can use the audio recordings if they are explicitly licensed for re-use, like with a Creative Commons license, and she follows the conditions of that license.

Brenda is making a website about the fluffiest dogs. She discovers a cute photo of a dog on a social media account. Assuming US copyright laws, is Brenda allowed to use the photo on her website?

She can use the photo if it is explicitly licensed for re-use, like with a Creative Commons license, and she follows the conditions of that license.

Jim-e Stack navigates to "https://www.nationaltrust.org.uk/" in his browser and sees a front page that includes a logo, photos, an interactive slideshow, and a custom font. Which of these resources are loaded using the Hypertext Transfer Protocol?

The HTML of the webpage, the custom font file, the slideshow JavaScript library, the logo, and each image file

Every year during the Christmas holiday, Google hosts a website to help track the path of Santa around the globe. The website goes from zero traffic to millions of visitors in a small period of time. Before the website goes live, site reliability engineers (SREs) are in charge of making sure that the Santa tracking website will be able to withstand the spike in traffic. Which of these strategies is the best way to verify that the Santa tracking website is scalable?

The SREs can use Google-owned machines to simulate large amounts of visitors on the website and monitor the website to see how it reacts.

Which of the following best describes how TCP can reassemble out-of-order packets?

The TCP metadata contains a packet that identifies the correct order for the packets.

A film scanner is a device that can scan photographic film and save it as a digital image. The resolution of a film scanner measures the number of dots per inch (dpi) that it captures. This table lists the resolutions of various film scanners: - Braun NovoScan 3-in-1 = 1800 dpi - Pacific Image Prime = 10,000 dpi - Plustek OpticFilm 8200i = 7200 dpi - Veho VFS-014-SF= 3200 dpi Which of the following comparisons between scanners is the most likely to be true?

The Veho scanner may miss some details of a scanned document that the Plustek scanner captures.

Is the World Wide Web within the larger Internet, or is the Internet within the larger World Wide Web?

The World Wide Web is within the larger Internet.

Devon navigates to "https://www.orbis.org/en/where-we-work" in her browser and sees a webpage that includes a logo, map graphics, interactive map pop-ups, and a custom font. Which of these resources are loaded using the Hypertext Transfer Protocol?

The logo, each graphic file, the custom font file, the JavaScript code for the map pop-ups, and the HTML of the webpage.

What is bandwidth?

The maximum amount of data that can be transferred in a given time

A photographer puts their photos online and encourages their fans to make memes with the photos by overlaying funny captions. What approach will allow fans to legally make memes of the photos?

The photographer should write "This work is licensed under a Creative Commons Attribution license."

Brenda and Brandon are setting up a home security system for their house. The system can currently store 2 months of video on an 8GB hard drive. They are going away for 3 months and want video for all 3 months. What are the best options for them to consider?

They could save the videos using a lossy compression algorithm.

Which of the following statements about IP addresses is true?

When data is sent between devices on the Internet, they identify each other with an IP address.

The following processes are used by video compression algorithms. Categorize each process as either lossless or lossy: - inter-frame coding: Instead of storing every pixel for every frame, the computer stores the differences between the pixels. - entropy coding: The computer replaces frequently occurring patterns of bits with shorter representations, remembering the replacements in a table. - subjective field of interest: The computer detects when a person is the focus of the video frame, and stores less information about the background.

lossless, lossless, lossy


Kaugnay na mga set ng pag-aaral

Lesson 1: Common Computing Devices

View Set

PC2 [Exam 1] Enteral Feeding(NG tubes), Oxygenation, Urinary w/Latex

View Set

Chapter 14- Temporomandibular Joint

View Set

Types of Ownership (Property Ownership)

View Set

MGT 371 ch3 - solving problems analytically and creatively

View Set