APCSP Final
A color in a computing application is represented by an RGB triplet that describes the amount of red, green, and blue, respectively, used to create the desired color. A selection of colors and their corresponding RGB triplets are shown in the following table. Each value is represented in decimal (base 10) COLOR NAME RGB TRIPLET indigo (75, 0, 130) ivory (255, 255, 240) light pink (255, 182, 193) light yellow (255, 255, 224) magenta (255, 0, 255) neutral gray (127, 127, 112) pale yellow (255, 255, 160) vivid yellow (255, 255, 14) What is the binary triplet for the color indigo?
(01001011, 00000000, 10000010)
A programmer wants to determine whether a score is within 10 points of a given target. For example, if the target is 50, then the scores 40, 44, 50, 58, and 60 are all within 10 points of the target, while 38 and 61 are not. Which of the following Boolean expressions will evaluate to TRUE if and only if SCORE is within 10 points of TARGET?
(target - 10 = score) AND (score = target + 10)
Consider the 4-bit binary numbers 0011, 0110, and 1111. Which of the following decimal values is NOT equal to one of these binary numbers?
9
A list of binary values. (0 or 1) is used to represent a black-and-white image. Which of the following is LEAST likely to be stored as metadata associated with the image?
A duplicate copy of the data
Which of the following is an advantage of a lossless compression algorithm over a lossy algorithm?
A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot
Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system?
A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user's computer using the recorded data.
A file storage application allows users to save their files on cloud servers. A group of researchers gathered user data for the first eight years of the application's existence. Some of the data are summarized in the following graphs. The line graph on the left shows the number of registered users each year. The circle graph shows the distribution of file sizes currently stored by all users. * graph and pie chart* Which of the following best describes the average amount of data stored per user for the first 8 years of the application's existence?
Across all eight years, the average amount of data stored per user appears to increase by about 10 GB each
which of the following best exemplifies the use of multi factor authentication to protect an online banking system?
After entering a password for an online bank account, a user must also enter a code that is sent to the user's phone via text message
Individuals sometimes attempt to remove personal information from the Internet. Which of the following is the LEAST likely reason the personal information is hard to remove?
All personal information is stored online using authentication measures, making the information hard to access.
The following procedure is intended to return true if at least two of the three parameters are equal in value and is intended to return false if otherwise. PROCEDURE AnyPairs (x, y, z) { IF (x = y) { RETURN (true) } ELSE { RETURN (y = z) } } For which of the following procedure calls does the procedure NOT return the intended value?
AnyPairs ("bat", "cat", "bat")
Which of the following segments will move the robot to the gray square along the path indicated by the arrows?
Bot Mover 1 Bot Mover 3 Bot Mover 0
The question below uses a robot in a grid of squares. The robot is represented as a triangle, which is initially in the bottom left square of the grid and facing right. *picture* The following programs are each intended to move the robot to the gray square. Program II uses the procedure GoalReached, which returns true if the robot is in the gray square and returns false otherwise. *picture Which of the following statements best describes the correctness of the programs?
Both program I and program II correctly move the robot to the gray square
Assume that the list originalList contains integer values and that the list newList is initially empty. The following code segment is intended to copy all even numbers from originalList to newList so that the numbers in newList appear in the same relative order as in originalList. The code segment may or may not work as intended. Line 1: FOR EACH number IN originalList Line 2: { Line 3: IF (number MOD 2 = 0) Line 4: { Line 5: INSERT (newList, 1, number) Line 6: } Line 7: } Which of the following changes, if any, can be made so that the code segment works as intended?
Changing line 5 to APPEND(newList, number)
Flight simulation software, which imitates the experience of flying, is often used to train airline pilots. Which of the following is LEAST likely to be an advantage of using flight simulation software for this purpose?
Flight simulation software provides a more realistic experience for pilots than actual training flights
A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best explains the result of this configuration as compared to a configuration in which the router does not limit the bandwidth?
Guest users will be restricted in the maximum amount of data that they can send and receive per second.
Assume the variables alpha and beta each are initialized with a numeric value. Which of the following code segments can be used to interchange the values of alpha and beta using the temporary variable temp? I. temp <--- alpha alpha <--- beta beta <--- temp II. temp <--- alpha beta <--- alpha alpha <--- temp III. temp <--- beta beta <--- alpha alpha <--- temp
I and III only
A biologist wrote a program to stimulate the population of a sample of bacteria. The program uses the following procedures. TABLE: procedure call I Explanation -——————-——————-——————-——————-—— InitialPopulation() / Returns the number of \ bacteria at the start of / the simulation ————-——————-——————-——————-————— NextPopulation \ Based on the current (currPop). / value of currPop, returns \ the number of bacteria / after one hour ————-——————-——————-——————-————— Code for the simulation is shown below. hours <—- 0 startPop <——- InitialPopulation ( ) currentPop <——- startPop REPEAT UNTIL ((hours = 24) OR (currentPop = 0)) { currentPop <—— NextPopulation(currentPop) hours <—— hours + 1 } DISPLAY (currentPop - startPop) Which of the following are true statements about the simulation? I. The simulation continues until either 24 hours pass of the population reaches 0 II. The simulation displays the average change in population. per hour over the course of the simulation III. The simulation displays the total population at the end of the simulation
I only
Which of the following can be represented by a sequence of bits? I. An integer II. An alphanumeric character III. A machine language instruction
I, II, and III
consider the following algorithms. Each algorithm operates on a list containing n elements, where n is a very large integer. I. An algorithm that accesses each element in the list twice II. An algorithm that access each element in the list n times III. An algorithm that accesses only the first 10 elements in the list, regardless of the size of the list
I, II, and III
which of the following actions are generally helpful in program development? I. Consulting potential users of the program to identify their concerns. II. Writing and testing small code segments before adding them to the program III. Collaborating with other individuals when developing a large program
I, II, and III
the figure below represents a network of physically linked devices labeled A through I. A line between devices indicates that the devices can communicate directly with each other. Any information sent between two devices that are now directly connected must go through at least one other device. For example, in the network represented below, information can be sent directly between A and B, but information sent between devices A and G must go through other devices. Which of the following statements is true about the network?
If devices B and F fail, then device A will not be able to communicate with device G
The author of an e-book publishes the e-book using a no-rights-reserved Creative Commons license. Which of the following best explains the consequences of publishing the book with this type of license?
Individuals can freely distribute of use the contents of the e-book without needing to obtain additional permissions from the author
RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone's GPS unit to track a user's location, running speed, and distance traveled. Users can use the application to review information and statistics about their previous runs. At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application shares the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other's contact lists or if they typically run at similar speeds. A basic RunRoutr account is free, but it displays advertisements that are targeted to individual users based on data collected by the application. For example, if a user's running route begins or ends near a particular store, the application may display an advertisement for that store. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application. Businesses have the ability to target advertisements to different groups of people who use RunRoutr. Which of the following groups is LEAST likely to receive targeted advertisements?
Individuals who sign up for a premium account
A student wrote the following program to remove all occurrences of the strings "the" and "a" from the list wordList. Line 1: index <—— LENGTH (wordList) Line 2: REPEAT UNTIL (index < 1) Line 3: { Line 4: IF ((wordList [index] = "the") OR (wordList[index] "a")) Line 5: { Line 6: REMOVE (wordList, index) Line 7: } Line 8: } What must be changed in order for the program to work correctly?
Inserting index <———- index -1 between lines 7 and 8
A certain social media application is popular with people across the United States. The developers of the application are updating the algorithm used by the application to introduce a new feature that allows users of the application with similar interests to connect with one another. Which of the following strategies is LEAST likely to introduce bias into the application
Inviting a random sample of all users to try out the new algorithm and provide feedback before it is released to a wider audience.
A color in a computing application is represented by an RGB triplet that describes the amount of red, green, and blue, respectively, used to create the desired color. A selection of colors and their corresponding RGB triplets are shown in the following table. Each value is represented in decimal (base 10) COLOR NAME RGB TRIPLET indigo (75, 0, 130) ivory (255, 255, 240) light pink (255, 182, 193) light yellow (255, 255, 224) magenta (255, 0, 255) neutral gray (127, 127, 112) pale yellow (255, 255, 160) vivid yellow (255, 255, 14) According to the information in the table, what color is represented by the binary RGB triplet(11111111, 11111111, 11110000)?
Ivory
In mathematics, a perfect number is a type of integer. The procedure IsPerfect(num) returns true if num is a perfect number and returns false otherwise. The following program is intended to count and display the number of perfect number between the integers start and end, inclusive. Assume that start is less than end. The program does not work as intended Line 1: currentNum <——- start Line 2: count <—— 0 Line 3: REPEAT UNTIL (currentNum > end) Line 4: { Line 5: count <—— count + 1 Line 6: IF(IsPerfect (currentNum)) Line 7: { Line 8: count <——- count + 1 Line 9: currentNum <——- currentNum + 1 Line 10: } Line 11: currentNum. <—— CurrentNum + 1 Line 12: } Line 13: DISPLAY (count) Which two lines of code should be removed so that the program will work as intended? Select two answers.
Line 5 and Line 9
Assume that the list of numbers "nums" has more than 10 elements. The program below is intended to compule and display the sum of the first 10 elements of nums. Line 1: i <—— 1 Line 2: sum <—— 0 Line 3: REPEAT UNTIL (i > 10) Line 4: { Line 5: i <——- i + 1 Line 6: sum <——— sum + nums [i] Line 7: } Line 8: DISPLAY (sum) Which change, if any, is needed for the program to work as intended?
Lines 5 and 6 should be interchanged
A programmer is developing software for a social media platform. The programmer is planning to use compression when users send attachments to other users. Which of the following is a true statement about the use of compression
Lossy compression of an image file generally provides a greater reduction in transmission time than lossless compression does.
The following procedure is intended to return the value of x times y, where x and y are integers. Multiplication is implemented using repeated addition. *picture of code* for which if the following procedure calls does the procedure NOT return the intended value? select TWO answers
Multiply -2, 5 Multiply -2, -5
A file storage application allows users to save their files on cloud servers. A group of researchers gathered user data for the first eight years of the application's existence. Some of the data are summarized in the following graphs. The line graph on the left shows the number of registered users each year. The circle graph shows the distribution of file sizes currently stored by all users. * graph and pie chart* Which of the following observations is most consistent with the information in the circle graph?
Over 75% of the files stored are 10 MB in size or less
Consider the programs below picture which of the following best compares the values displayed by programs A and B?
Program A and program B display identical values in the same order
Consider the two programs below *picture* Which of the following best compares the values displayed by programs A and B?
Program A and program B display identical values in the same order
An algorithm is intended to display the following output. red red blue red red blue red red blue red red blue which of the following code segments can be used to display the intended output?
REPEAT 3 TIMES REPEAT 2 TIMES DISPLAY "red" DISPLAY "blue"
The grid below contains a robot represented as a triangle, initially facing right. The robot can move into a white or gray square but cannot move into a black region. The code segment below uses the procedure GoalReached, which evaluates to true if the robot is in the gray square and evaluates to false otherwise. REPEAT UNTIL (GoalReached ( ) ) { «MISSING CODE> ) Which of the following replacements for <MISSING CODE> can be used to move the robot to the gray square
REPEAT UNTIL (CAN MOVE (right)) { MOVE_FORWARD ( ) } ROTATE_RIGHT ( )
A state government is attempting to reduce the digital divide. Which of the following activities has the greatest potential to contribute to the digital divide rather than reducing it?
Requiring applicants for government jobs to apply using an online platform
A certain computer has 2 identical processors that are able to run in parallel. The following table indicates the amount of time it takes to execute each of four processes on a single processor. Assume that none of the processors is dependent on any of the other processes. Which of the following parallel computing solutions would minimize the amount of time it takes to execute all four processes?
Running processes P and Q on one processor and processes R and S on the other processor
The following algorithm is intended to determine the average height, in centimelers, of a group of people in a room. Each person has a card, a pencil, and an eraser. Step 2 of the algorithm is missing. Step 1: All people stand up. Step 2: (missing step) Step 3: Each standing person finds another standing person and they form a pair. If a person cannot find an unpaired standing person, that person remains standing and waits until the next opportunity to form pairs. Step 4: In each pair, one person hands their card to the other person and sits down Step 5: At this point, the standing person in each pair is holding two cards. The standing person in each pair replaces the top number on their card with the sum of the top numbers on the two cards and replaces the bottom number on their card with the sum of the bottom numbers on the two cards. The sitting partner's card is discarded. Step 6: Repeat steps 3-5 until there is only one person standing. Step 7: The last person standing divides the top number by the bottom number to determine the average height. Which of the following can be used as step 2 so that the algorithm works as intended?
Step 2: Each person writes their height, in centimeters, at the top of the card and writes the number 1 at the bottom of the card.
The following algorithm is intended to take a positive integer as an input and display its individual digits in order from right to left. For example if the input is 512, the algorithm should produce the output 2 1 5. Step 3 of the algorithm is missing. Step 1: input a positive integer from the user and store it in the variable number Step 2: divide number by 10 and record the integer quotient and the remainder. The integer quotient is the quotient with any part after the decimal point dropped. For example, when 127 is divided by 10, the quotient is 12.7, the integer quotient is 12 and the remainder is 7. Step 3: (missing step) Step 4: Repeat steps 2 and 3 until number is 0 Which of the following can be used as step 3 so that the algorithm works as intended.
Step 3: Display the remainder of number divided by 10 and store the integer quotient in number
Which of the following best explains how symmetric encryption algorithms are typically used?
Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data
An online gaming company is introducing several new initiatives to encourage respectful communication between players of online games. Which of the following best describes a solution that uses crowdsourcing?
The company allows individual players to endorse fellow players based on courteous interactions. Once a player receives enough endorsements, the player is given free rewards that can be used during game play.
A file storage application allows users to save their files on cloud servers. A group of researchers gathered user data for the first eight years of the application's existence. Some of the data are summarized in the following graphs. The line graph on the left shows the number of registered users each year. The circle graph shows the distribution of file sizes currently stored by all users. * graph and pie chart* Which of the following best describes the growth in the number of registered users for the first 8 years of the application's existence?
The number of registered users about doubled each year for years 1 to 5 and then increased at about a constant rate after that
In a certain computer program, two positive integers are added together, resulting in an overflow error. Which of the following best explains why the error occurs?
The program can only use a fixed number of bits to represent integers; the computed sum is greater than the maximum representable value
Consider the following program val <---- 0 sum <---- 0 REPEAT 10 TIMES val <---- val + 2 sum <--- sum + val DISPLAY sum which of the following describes the result of executing the program?
The program displays the sum of the even integers from 2 to 20
A group of planners are using a simulation to examine whether or not a park that they are designing is going to affect foot traffic in this area. The simulation uses a model that includes input variables of the park such as the number of entrances, sidewalks, and bike trails the square footage of open space(grassy areas). The simulation can then be run multiple times using different values for the input variables to represent different park designs. However, the simulation takes a very long time to run. The planners update the model by removing some variables they consider less important than others. Of the following, which is the most likely effect the updated model will have on the simulation?
The updated mode is likely to decrease the runtime of the simulation because the time required for simulations generally depends on the complexity of the model used.
A group of planners are using a simulation to examine whether or not a park that they are designing is going to affect foot traffic in the area. The simulation uses a model that includes input variables for the park such as the number of entrances, sidewalks, and bike trails and the square footage of open space (grassy areas). The simulation can then be run multiple times using different values for the input variables to represent different park designs. However, the simulation takes a very long time to run. The planners update the model by removing some variables they consider less important than others. Of the following, which is the most likely effect the updated model will have on the simulation?
The updated model is likely to decrease the runtime of the simulation because the time required for simulations generally depends on the complexity of the model used.
The procedure BinarySearch (numList, target) correctly implements a binary search algorithm on the list of numbers numList. The procedure returns an index where target occurs in numList, or -1 if target does not occur in numList.. Which of the following conditions must be met in order for the procedure to work as intended
The values in numList must be sorted in order
Which of the following best explains why it is not possible to use computers to solve every problem?
There exist some problems that cannot be solved using any algorithm
which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are used?
Unauthorized individuals can exploit vulnerabilities in compression algorithms to determine a user's password from their decompressed data
RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone's GPS unit to track a user's location, running speed, and distance traveled. Users can use the application to review information and statistics about their previous runs. At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application shares the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other's contact lists or if they typically run at similar speeds. A basic RunRoutr account is free, but it displays advertisements that are targeted to individual users based on data collected by the application. For example, if a user's running route begins or ends near a particular store, the application may display an advertisement for that store. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application. Which of the following is most likely to be a data privacy concern for RunRoutr users?
Users of the application may have the ability to determine information about the locations of users that are not on their contact lists
RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone's GPS unit to track a user's location, running speed, and distance traveled. Users can use the application to review information and statistics about their previous runs. At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application shares the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other's contact lists or if they typically run at similar speeds. A basic RunRoutr account is free, but it displays advertisements that are targeted to individual users based on data collected by the application. For example, if a user's running route begins or ends near a particular store, the application may display an advertisement for that store. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application. Which of the following is most likely to be a benefit to users of the application?
Users of the application may see health benefits as a result of the application encouraging them to exercise with each other.
Which of the following is an example of a phishing attack?
Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information
A person wants to transmit an audio file from a device to a second device. Which of the following scenarios best demonstrates the use of lossless compression of the original file?
a device compresses the audio file before transmitting it to a second device. The second device restores the compressed file to its original version before playing it.
Which of the following best describes a challenge involved in using a parallel computing solution?
a parallel computing solution may not be appropriate for an algorithm in which each step requires the output from the proceeding step
Which of the following is an example of an attack using a rogue access point?
an unauthorized individual gains the ability to view network traffic by connecting to a network router that uses weak or no security measures
A flowchart is a way to visually represent an algorithm. The flowchart below is used by an application to set the Boolean variable available to true under certain conditions. The flowchart uses the Boolean variable weekday and the integer variable miles. TABLE FLOW CHART Which of the following statements is equivalent to the algorithm in the flowchart?
available <--- weekday AND miles < 20
A database of information about shows at a concert venue contains the following information. Name of the artist performing at the show Date of the show Total dollar amount of all tickets sold Which of the following additional pieces of information would be most useful in determining the artist with the greatest attendance during a particular month
average ticket price
Which of the following research proposals is most likely to be successful as a citizen science project?
collecting pictures of birds from around the world that can then be analyzed to determine how location affects bird size
Which of the following research proposals is most likely to be successful as a citizen science project?
collecting pictures of birds from around the world that can then be analyzed to determine how location affects bird size.
A user wants to save a data file on an online storage cite. The user wants to reduce the size of the file, if possible, and wants to be able to completely restore the file to its original version. Which of the following actions best support the user's needs?
compressing the file using a lossless compression algorithm before uploading it
Ticket prices for a science museum are shown in the following table. TYPE OF TICKET GA COST GUIDED TOUR COST Regular (ages 13 and up) $8 $10 Child (ages 12 and below) $6 $8 A programmer is creating an algorithm to display the cost of a ticket based on the information in the table. The programmer uses the integer variable age for the age of the ticket recipient. The Boolean variable includesTour is true when the ticket is for a guided tour and is false when the ticket is for a general admission. Which of the following code segments correctly displays the cost of a ticket?
cost <--- 6 IF (age>12) { cost <--- cost + 2 } IF (includesTour) { cost <-- cost + 2 } DISPLAY (cost)
which of the following best explains how data is transmitted on the Internet?
data is broken into packets, which ca be sent along different paths
A students overall course grade in a certain class is based on the student's scores on individual assignments. The course grade is calculated by dropping the student's lowest individual assignment score and averaging the remaining scores. For example, if a particular student has individual assignment scores of 85, 75, 90, and 95, the lowest score (75) is dropped. The calculated course grade is (85+95+90)/3= 90 An administrator at the school has data about hundreds of students in a particular course. while the administrator does not know the values of each of the student's individual assignment scores, the administrator does have the following information for each student: The student name A unique student ID number The number of assignments for the course the average assignment score before the low score was dropped the course grade after the lowest score was dropped Which of the following CANNOT be determined by the data alone?
for a given student, the value of the highest assignment score
The figure below represents a network of physically linked devices labeled A through I. A line between two devices indicates that the devices can communicate directly with each other. Any information sent between two devices that are not directly connected must go through at least one other device. For example, in the network represented below, information can be sent directly between A and B, but information sent between devices A and G must go through other devices. *PICTURE* What is the minimum number of devices that must be broken or removed before device B can no longer communicate with device C?
four
Consider two lists of numbers called LIST1 and LIST2. A programmer wants to determine how many different values appear in both lists. For example, if LIST1 contains [10, 10, 20, 30, 40, 50, 60] and LIST2 contains [20, 20, 40, 60, 80], then there are three different values that appear in both lists (20, 40, and 60) The programmer has the following procedures available TABLE Which of the following can be used to assign the intended value to count?
newList1 <--- RemoveAllDups (list1) newList2 <--- RemoveAllDups (list2) bothList <--- Combine (newList1, newList 2) uniqueList <--- RemoveAllDups (bothList) count <--- LENGTH (bothList) - LENGTH (uniqueList)
In the following program, assume the variable n has been initialized with an integer value. IF n>0 n <--- n + 1 ELSE n <--- n * -1 IF n> 1 IF n> 30 DISPLAY "too high" ELSE IF n > 10 DISPLAY "in range" ELSE DISPLAY "too low" ELSE DISPLAY "out of range" Which of the following is NOT a possible value displayed by the program?
out of range
which of the following is a true statement about the use of public key encryption in transmitting messages?
public key encryption enables parties to initiate secure communications through an open medium, such as the internet in which there might be eavesdroppers
Which of the following best describes a direct benefit in using redundant routing on the Internet?
redundancy often allows messages to be sent on the network even if some network devices or connections have failed
Consider the following spinner, which is used to determine how pieces are to be moved on a game board. The region labeled "Move 1 space" is six times as large as each of the other two regions. picture of spinner Which of the following code segments can be used to simulate the behavior of the spinner?
spin <--- RANDOM (1, 8) IF spin = 1 DISPLAY "Lose a turn" ELSE IF spin = 2 DISPLAY "Move 2 spaces" ELSE DISPLAY "Move 1 space"
Consider a game in which a player flips a fair coin three times. If all three coin flips have the same result (wither all heads or all tails) the player wins. Otherwise, the player loses. Which of the following code segments best stimulates the behavior of the game.
sum <---- 0 _______________________________________________________________________________ I REPEAT 3 TIMES I I sum <--- sum + RANDOM (0,1) I I_____________________________________________________________________________I _______________________________________________________________________________I IF sum = 3 OR sum = 0 I I DISPLAY "You win!" I I ELSE I I DISPLAY "You lose" I _______________________________________________________________________________
An online gaming company is introducing several new initiatives to encourage respectful communication between players of online games.Which of the following best describes a solutions that uses crowdsourcing?
the company allows individual players to endorse fellow players based on courteous interactions. Once a player receives enough endorsements, the player is given free rewards that can be used during game play
Which of the following best explains the relationship between the Internet and the World Wide Web?
the internet is a network of interconnected networks and the World Wide Web is a system of linked pages, programs, and files that is accessed via the internet
which of the following statements about the internet is true?
the internet is designed to scale to support an increasing number of users
A library system contains information for each book that was borrowed. Each time a person borrows or returns a book from the library, the following information is recorded in a database. Name and the unique ID number of the person who was borrowing the book Author, title, and the unique ID number of the book that was borrowed Date that the book was borrowed Date that the book was due to be returned Date that the book was returned (or 0 id the book has not been returned yet) Which of the following CANNOT be determined from the information collected by the system?
the total number of books that were never borrowed in a given year
The procedures NumOccurrences is intended to count and return the number of times targetWord appears in the list wordList. The procedure does not work as intended. *picture of code for which of the following code segments will the call to NumOccurrences NOT return. the intended value select two answers
treeList <——- "birch", "maple", "birch" numOccurrences treeList, "birch" treeList <—— "birch", "maple", "oak" numOccurrences treeList, "maple"