Coding 1b Final

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Beckett is developing a new gaming app. He doesn't have the resources to test the game on every type of device that the game could be played on (various smartphones, tablets, laptops, desktops, even TVs). Which of the following would be most helpful to him? A) Emulator B) Responsive design C) Launch pad D) Buffer

A

For what purpose might a software team use a tool such as Skype or Slack? A) communication B) coding C) review D) maintenance

A

Given the following table called Dog, what is most likely the primary key? A) dog_ID B) owner_ID C) name D) dob

A

Given the following table, what is most likely the primary key? A) student_ID B) name C) dob D) grad_year

A

In order to use a module in Python, does it always have to be imported? A) Yes, every module that is used in a program must be imported first. B) No, you only have to import the math module. C) No, you only have to import modules that contain more than 10 functions. D) No, you don't have to import any module before using it.

A

Is it possible to encrypt only part of a drive on a USB or hard drive? A) Yes, most programs allow you to choose which parts you want to encrypt. B) Yes, but you can only encrypt files on certain sectors of the drive. C) No, the drive must either be totally encrypted or not encrypted at all. D) Yes, but the drive must be at least 25 percent encrypted.

A

Manuela cannot get the following code to work. What is her error? prices = float(input("Please enter all the prices: ")) myList = [x for y in prices.split()] A) She cannot have two different variables (x and y) on line 2. They should match. B) She must use the variable s instead of x and y on line 2. C) She can only create a list using this method if the variables are strings (hers are floats). D) She needs to use parentheses instead of square brackets in line 2.

A

Shonda is concerned that someone might change the data that is being sent as a file. Which of the following would help Shonda learn ways to be sure that the data received is the same as the data that was sent? A) digital signatures B) data at rest C) symmetrical encryption D) asymmetrical encryption

A

What is the first step in planning a software project? A) defining the roles for each team member B) conducting research C) creating a flowchart D) keeping a written record

A

What is the role of syntax in pseudocode? A) It isn't necessary. B) It relies on indentation. C) It relies on brackets. D) It prevents error messages.

A

What should you do first if you suspect that your computer has a virus? A) run anti-virus software B) change all of your passwords C) delete all the files from your hard drive D) change from symmetrical to asymmetrical keys

A

Which if the following statements is TRUE? A) Databases can use different structures such as flat files, heaps, B+ tree, and ISAM. B) Heaps use a linked list structure to store data. C) Databases always use heaps as their underlying data structure. D) ISAM is the slowest and least efficient data structure.

A

Which of the following is NOT something data in a database normally does? A) determine the style of a webpage B) link to other data C) be queried D) be returned as a result

A

Which of the following statements is false? A) Authentication cannot be done on mobile phones. B) Authenticating a user means asking them to provide a username and password. C) Digital certificates can be used to manage system authentication. D) Digital certificates are issued by a certificate authority.

A

Which of the following statements is false? A) It is always preferable to sacrifice ease of use for security. B) Security controls should be proportional to how much security the software requires. C) It is important to design security measures before developing the software. D) Being aware of the inputs and outputs of a software system can help you secure it better.

A

Which of these aspects of debugging is useful if you are trying to determine whether a variable holds the value that you want it to have at a certain point in the program? A) inline inspection B) variable generator C) version control D) step over functionality

A

Working with others to improve code is referred to as peer code review. A) True B) False

A

A database structured like a tree with a large root node and smaller child nodes is called a(n): A) flat file. B) heap. C) B+ tree. D) ISAM.

B

A small startup company notices strange things happening each night in their software after business hours. Database entries are being changed and passwords are being reset. Which of the following would be most helpful to them? A) firewall B) audit trail C) buffer overflow D) antivirus program

B

Gabriel owns a store that sells cell phones. Some of the sales clerks are not entering sales into the system, which means that their inventory counts are not accurate. What can Gabriel implement to determine which clerks are not entering their sales? A) encryption detection B) an audit trail C) a symmetrical key D) a password protocol

B

Galen wants to change the way that the screen appears to the user. Which aspect does Galen need to work with under the MVC model? A) model B) view C) controller D) template

B

Hector is creating a website where users will be able to sign up to receive an email newsletter. Which of these will Hector need to make this work properly? A) Python loop B) database C) CSS documentation D) logic error debugging

B

Insecure network architecture is the result of hackers creating flaws in a network that was originally well-designed. A) True B) False

B

It is a violation of copyright to test similar apps before designing one of your own. A) True B) False

B

Khalil has written a program that has an import statement at the top. Which of the following is he using in his code? A) built-in module B) module C) verifier D) importer

B

Laura needs an encryption program that allows her to set up public and private keys, as well as send/receive encrypted messages and attachments easily. Which of the following should she install? A) PublicKey B) Pretty Good Privacy C) BitKey D) AlphaPrivacy

B

Mark is a software vulnerability expert for his company. Which of the following areas is probably NOT one of Mark's responsibilities? A) insufficient testing B) water damage C) lack of an audit trail D) a fundamental design flaw

B

The two main kinds of keys used to identify rows of data within a table are called: A) open and closed. B) primary and foreign. C) iterating and discrete. D) public and private.

B

To find out how many items are in a list, import the length module. A) True B) False

B

What is the output of this line of code? print(12//5) A) an error message B) 2 C) 2.4 D) 3

B

Which line needs to be included for this program to function properly? new_list.append("chocolate") print(new_list) A) import append B) new_list = [] C) import lister D) new_list()

B

Which of the following is the most efficient way to rewrite this code: average = (num1 + num2 + num3) / 3 print(average) A) average = num1 + num2 + num3 / 3 print(average) B) average = total / 3 print(average) C) print(average = num1 + num2 + num3 / 3) D) print((num1 + num2 + num3) / 3)

B

Which of the following statements is TRUE of a heap? A) A heap is more powerful than a B+ tree. B) The root node is equal to or larger than the child nodes. C) A heap allows the fastest, most efficient indexing of all data structures. D) A heap is the most popular form of database storage.

B

Which of the following statements is true? A) Websites don't ever look different on a laptop than they do on a mobile phone. B) Websites should be designed so that they will function well on many different screen sizes. C) Websites must sacrifice visual appeal for screen responsiveness. D) A website will automatically look the same on a tablet as on a mobile phone.

B

Which of the following would add "coral" to a list called colors? A) colors = colors + "coral" B) colors.append("coral") C) colors.add("coral") D) add(colors, "coral")

B

Which of these are examples of cyberattacks? A) wireless access protocol and authentication devices B) denial of service and brute-force attack C) asymmetrical and symmetrical encryption D) encryption and decryption

B

Yolanda wrote a program, but it has a lot of bugs in it. How should Yolanda think about this? A) She just isn't good at programming. B) This is a normal part of development. C) A different programming language should be used. D) The original design was flawed.

B

A web developer creates a website that is really hard to navigate. What aspect of the website needs improving? A) reliability B) originality C) usability D) dependability

C

A website might store information such as user login data in which of the following? A) temporary file B) HTML code C) database D) verification source

C

If a gamer figures out how to get extra lives in a way that the game designers did not intend to be possible, the gamer has taken advantage of: A) a physical vulnerability. B) a lack of an audit trail. C) insufficient testing. D) a decryption error.

C

In the process of testing code, you have paused the debugger. When you wish to resume its execution, which command should you use? A) Start B) Resume C) Continue D) Go on

C

Julie wants to change an existing value in a list. Can she do that with the append function? A) Yes, the append function can change any value the first half of a list. B) Yes, the append function can change any value in the list, as long as the position and value are specified in parentheses. C) No, the append function can only add values onto the end of a list. D) No, the append function can only add values onto the beginning of a list.

C

Khalif is using a framework called Spine to build a website. Characteristics of Spine include its separation of an application into three logical parts: one that interacts with the database, one that contains the user interface, and one that handles the logic. What kind of framework is Spine most likely? A) MTV B) URL routing C) MVC D) Version control

C

Lamar is designing a database with one large table to make things easy. He says that most databases consist of a single table. Is he correct? A) Yes, databases usually have one large table in order to make the programming easier. B) Yes, databases usually have one large table because it is more secure. C) No, databases usually have several smaller tables because it is faster and more secure. D) No, databases usually have two medium tables—one for the client data and the other for the software data.

C

The following code is supposed to return the bigger of two numbers, or a message if they are equal. What kind of error does the code have? def bigger(num1, num2): if num1 > num2: return num1 else: return num2 A) syntax error B) runtime error C) logic error D) function error

C

What is one potential problem with a public wireless access points (WAPs)? A) Only certain people can use them. B) The authentication procedure is too complicated for small businesses. C) They are usually unsecure and don't encrypt data. D) They are extremely expensive to establish.

C

What is this an example of? SET counter to 0 SET word_count to 0 WHILE counter < 10 THEN FOR list_item in list: IF list_item is password THEN ADD 1 to word_count INCREMENT counter OUTPUT word_count A) flowchart B) version control C) pseudocode D) MVC

C

Which best describes a foreign key? A) It is simpler than a primary key. B) It applies to only one row of data. C) It links two tables together. D) It needs to be changed frequently.

C

Which of the following is the best way to avoid repeating code that you've written? A) Use a loop. B) Import the repeat module. C) Create a function that can be called. D) Use an asterisk to show that certain code should be repeated.

C

Which of the following will give i the values 6, 7, 8, and 9? A) for i in range(6, 9): B) for i in range(5, 10): C) for i in range(6, 10): D) for i in range(5, 9):

C

Which of these best describes pseudocode? A) a language used to code websites B) a language used to translate Python to binary C) a way of describing the functions and processes of code D) a language used to translate HTML to CSS

C

How can you prevent a program with a logic error from crashing? A) Make sure to correct all logic errors before running the program. B) Run the program with a breakpoint through the debugger. C) Run the program in lite mode. D) A program with a logic error will not crash.

D

Jamal builds websites with applications but has trouble with getting the various parts to work together. Which webinar is MOST likely to help Jamal? A) Python Practices B) Tricks for Back-End Coding C) New Design Strategies D) Web Integration Basics

D

Mei manages cybersecurity for a large company. It appears that hackers are trying to overload the company's system with malware and viruses so that it will crash. What kind of attack does Mei need to respond to? A) asymmetrical encryption B) symmetrical decryption C) brute-force D) denial of service

D

Ozge is writing a program that needs to take in an unknown amount of inputs from the user and add them to a list. Which of the following would be most efficient? A) myList = [] another = "yes" while another == "yes": item = input("Enter the item: ") myList.append(item) another = input("Would you like to input another item?") closeIncorrect B) myList = [] end = int(input("How many items do you have to enter?")) for i in range(1, end + 1): item = input("Enter the item: ") myList.append(item) C) myList = [] for i in range(100): item = input("Enter the item: ") myList.append(item) D) items = input("Enter all your items: ") myList = [x for x in items.split()]

D

Which command would you use with a Python debugger to set a breakpoint? A) l(ist) B) s(tep) C) n(ext) D) b(reak)

D

Which of the following programs correctly finds the circumference of a circle? A) radius = 5 cir = 2 * pi * radius print(cir) B) radius = 5 print( 2 * pi * radius ) C) import math radius = 5 print(2 * pi * math.radius) D) import math radius = 5 print(2 * math.pi * radius)

D

Which of the following statements is false? A) Web integration is often overlooked by inexperienced developers. B) Bringing together a website and an application is known as web integration. C) Web integration involves matching design elements between a website and application. D) An important part of web integration is choosing between HTML and CSS.

D

Which of the following statements is true? A) Data at rest cannot be encrypted. B) Data in transit cannot be encrypted. C) Data in transit cannot be encrypted. D) Digital signatures use encryption.

D

Which of these will correctly create a list? A) my_list = () for i in range(1, 50): my_list.append(i) B) my_list = [] for range(1, 50): my_list.append(i) C) my_list = [] for i: my_list.append(i) D) my_list = [] for i in range(1, 50): my_list.append(i)

D


Kaugnay na mga set ng pag-aaral

Chest Radiography Problem Solving

View Set

Oceanic Art: Art Over the Greatest Expanse

View Set

SIE UNIT 5 Other Investment Vehicles

View Set

(2-2) Nature, Animals - Using Russian Vocabulary Unit 2 Level 2

View Set

Chapter 18: PrepU - Nursing Management: Patients With Vascular Disorders and Problems of Peripheral Circulation

View Set