Computer Science Example Test

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following should be considered when making an ethical decision concerning an innovation? Select two answers.

What the beneficial and harmful effects of the innovation will be on a population How the cost of the innovation will affect the digital divide

Martin is helping his Technology teacher create a website for his school. They decide to upload all the senior yearbook pictures to a link on the school website. Senior students can securely login and retrieve their yearbook picture from this link. The students will then be able to print the pictures digitally using a high-resolution color printer made available to them at their school. Martin is nervous about his responsibility because he knows that these pictures are cherished and valued by the seniors. Help Martin choose the correct format for saving the pictures and uploading it to the website.

.PNG because it offers lossless compression, and it compatible for viewing on the web.

Evaluate 19 MOD 5

4

Suppose that in 1970, a certain microchip had 2,000 transistors on it. According to Moore's Law, which is the best estimate of the number of transistors on a chip of the same size and cost in 1980?

60,000`

A high school science teacher wants to improve her own performance in the class for Professional Development and she creates a survey to collect information from her students. She uses a cloud-based database to store, retrieve, and analyze the data. The data set contains the following from each student. the student's gender Subject Rating: the student's rating of the subject (scale of "Love science" to "Hate science") the student's rating of the teacher's subject knowledge Peer Rating: the student's rating of his/her peers in the class (scale of "Highly Cooperative class" to "Highly Disruptive class" the student's recommendation for improvements (open ended) Which of the following can be answered by analyzing the above data set in an objective and neutral manner? Select two answers.

A class that has a majority number of students giving it a positive Peer Rating of "Highly Cooperative class" will also have a majority of students who report that they "Love science" More female students report that they "Love science" than male students

Which of the following is NOT an example of plagiarism? Select two answers.

A student uses a complicated idea from a source in her paper and gives attribution. A student refers to the fact that Washington D.C. is the capital of the United States, without providing a citation.

A crime investigator is accessing an online database of crimes within a certain radius of the city center. The database contains the following information: Date of crime Name of offenders Neighborhood of crime The investigator is looking for other crimes that occurred in a certain area on a certain date. Which of the following algorithms can he use to find all crimes that occurred in a certain neighborhood on a certain day? I. Make a new list by filtering the data so only the crimes from a certain neighborhood are on the list. Perform multiple binary searches to find all crimes that occurred in a certain neighborhood on a certain day, adding each new occurrence to a final list. II. Make a new list by filtering the data so only the crimes from a certain neighborhood are on the list. Perform multiple linear searches to find all crimes that occurred on the given day, adding each new occurrence to a final list.

Algorithm II only

For this method, the key is a single number. To encrypt a message, each letter is replaced by a letter a fixed interval down the alphabet. For example, A maps to F, B maps to G, and so on.

Caesar cipher

After collecting a large quantity of data, analysts often have to resort to "cleaning" the data to ensure high data quality. This also provides an opportunity for discovering patterns and trends, beyond the obvious, using sophisticated statistical algorithms. This is referred to as .

Data Mining

Data cleaning is usually undertaken before collected data is ready or analysis. From the choices give, what statement best explains the concept of Data Cleaning?

Cleaning of data is when collected data is standardized for easy processing by a computer.

Which of the following is NOT true about personal data that technology companies potentially collect about their users?

Companies are required by law to give users options to personalize what data they collect

Which of the following is the best definition of metadata?

Data that describes other data

Which of the following is NOT a computationally hard problem?

Finding the MOD of two numbers

_________ is a heuristic method of breaking encryption by comparing how often letters appear in the cipher text to how often they appear in typical English writing.

Frequency analysis

Which of the following is the most accurate statement about the difference between natural human languages and programming languages?

Human languages have a larger "vocabulary," or set of different words, than programming languages.

Which of the following is an example of abstraction? I. If you are driving a car, you may not know how the engine works, but you can use the steering wheel and pedals as an interface to control where the car goes. II. A team of programmers each writes one function for a large programming project. Each does not know in detail how the other functions work, but they can still integrate each function into a working project. III. A delivery service has an app to determine the shortest route to reach 100 destinations. It is too complicated to calculate the absolute best route, so the app uses an approximate solution that is reasonably efficient.

I and II

Which of the following would be considered lossless compression of an image? I. compress the image in a zip file II. reducing the RGB values of every pixel in an image by 50% III. resize an image from 1000x800 pixels to 250x200 pixels

I and II only

At the end of each day, the owners of a local fruit stand tabulate the following information in a CSV file. - Date - Name of fruit - Count sold that day - Count remaining in sellable condition Sample data from one day are shown here: 2016-08-18, Apples, 12, 25 2016-08-18, Cucumber, 5, 6 2016-08-18, Peaches, 1, 9 2016-08-18, Watermelon, 1, 4 Using only the information from the database, which of the following can be determined: I. The types of fruit that need to be re-ordered II. Most popular fruit among men III. Average number of each fruit type sold per month

I and III only

Which of the following correctly describes the processes used by modern search engines to provide results to users? I. Search engines work by searching their index of the web. II. Search engines use algorithms to rank the results of the search. III. Search engines use software programs called spiders to index the web. IV. Search engines index the content of all webpages on the internet each day.

I, II, and III

Select the benefits of HTTPS protocol I. HTTPS ensures that only the client and the server can view the packets sent during their communication and they cannot be intercepted by a third party. II. HTTPS verifies the identity of the server through a Certificate Exchange III. HTTPS provides reasonable assurance by which the user can assume minimal cybersecurity risk of transactions carried out on that site.

II and III

Which of the following are examples of machine learning? I. An online graphing calculator II. A smart thermostat III. Keyboard suggestions for mobile phones IV. Product recommendations from an online store

II, III, and IV only

Which of the following statements about compression are true? I. Compression is only useful when transferring files over a network II. After a file is compressed, it can never be restored to its original state without some loss of information or quality. III. In some situations, it is more appropriate to use lossy data compression rather than lossless data compression.

III only

The Internet is a packet-switched system through which digital data is sent by breaking data into packets which contain both the data being transmitted and the control information for routing the data. Which one of the following statements is an accurate statement about packet-switching?

Packets from a sender can take different routes to reach the same destination computer.

Traditional data analysis tools such as spreadsheets, and databases are rendered inadequate when the size of data to be analyzed increases exponentially (in the order of an Exabyte). Some of the reasons for this include the following, EXCEPT

It is impossible to have a bandwidth that is large enough to allow the large volume of data to be transferred.

Traditional data analysis tools such as spreadsheets, and databases are rendered inadequate when the size of data to be analyzed increases exponentially (in the order of an Exabyte). Some of the reasons for this include the following:

It is impractical to have a RAM/Main Memory that is large enough to hold the data that needs to be analyzed. Since the traditional methods of analyzing data perform sequential operations, it will take too many years to process data. Analysis is not done is a distributed manner, so data is not stored across multiple computers.

This problem is about different algorithms carried out of a row of numbered cards on a table. Each card has a number, there is an even number of cards, and they are in no special order. Which of the following algorithms is most likely to involve selection AND iteration?

Look over all the cards to find the smallest one, and move it to the leftmost position.

Which of these is NOT a computing-related innovation for the medical field?

Manual blood pressure monitor

Which of the following is an example of how the digital divide can affect data collection and analysis?

Members of an online social network are asked to watch a streaming video about a current event, and answer a survey. People on low-bandwidth networks that cannot handle streaming video would be unlikely to respond.

Which one of the following is true about Metadata?

Metadata is mostly information that describes the data that has been collected.

Which of the following statements about data analysis and processing is NOT true given modern computing technology?

Metadata is only useful for datasets that are small enough to be analyzed by hand, so it is often not considered in modern data analysis.

What observation states that computing power roughly doubles every two years?

Moore's Law

The Digital Millennium Copyright Act (DMCA) does all of the following EXCEPT:

Protects copyright owners from liability for the misuse of their intellectual property.

Suppose you are working on a programming project. A friend suggests a built-in function you might want to use. What would be the best way to learn about how to use that function for your project?

Read the API for that function.

Consider an algorithm that simulates rolling two number die, Die1 and Die2, with the numbers 1 - 6, and then displays the sum of the two cubes' values. If the sum is greater than 10, the phrase "You are a Winner!" displays, otherwise, "You have Lost!" displays. Put the steps of the algorithm in order. Select two answers. Step 1: Assign random values between 1 and 6 to Die1. Step 2: If sum is greater than 10, display "You are a Winner!". Step 3: Display sum. Step 4: If the sum if less than or equal to 10, display "You have Lost!". Step 5: Assign random values between 1 and 6 to Die2. Step 6: Assign the value of Die1 + Die2 to sum.

Step 1, Step 5, Step 6, Step 3, Step 4, Step 2 Step 5, Step 1, Step 6, Step 3, Step 2, Step 4

A team of students are working on a project for science class. For the project, the students keep track of the weather forecast for 30 days. Each day they record the date, the weather forecast for that day, and whether the forecast was essentially correct for that day. The information collected would be an example of:

The Weather Forecast

You are applying for an internship position at a construction company, and you need to prepare. Your preparation will include research about the company and its business, the background experience of the interviewer, more details about the internship position, and basic interviewing skills. Which of the following applications will be LEAST useful in organizing and analyzing data for this research?

Voice over IP software such as Skype

The working of the Internet can be modeled by the 4 layer TCP/IP Model. Which ways does TCP, the Transport Control Protocol layer interact with the other layers of the internet? Select two answers.

While sending messages, the TCP layer breaks information down into packets and hands it off to the IP layer. TCP assembles all packets received in the correct order, and transmits it to the Application layer that uses Protocols like SMTP for email, VOIP for Skype, etc.

An online gaming website has a list of users that has been sorted alphabetically by last name. In order to find a certain user, a binary search is performed. As many new members are added to the database, will the number of steps the algorithm will take to solve the problem most likely also increase? Why or why not?

Yes, the number of steps in an algorithm changes proportional to the size of the input

Suppose that you currently use a Gmail account for your personal email address. Gmail collects data from its users' emails. You are considering switching to NoSnoopMail™, which does not collect any data from users. Which of the following is NOT a likely difference between Gmail and NoSnoopMail?

You will not be able to send messages to Gmail addresses.

As the president of her school's student council, Kayla is in charge of organizing a fundraiser for the Fall Thriller program. After the event, she is expected to submit a written report with an analysis of how the money was spent, for audit purposes. Kayla has categorized her spending into 4 categories: Promotional material, Decorations, Food, and Entertainment. She is wondering what data chart would be best suited to analyze the percentage spending of the different categories?

a pie chart

What are the two aspects of efficiency?

execution time and memory usage

Which one of the following URLs is a subdomain of cnn.com?

http://money.cnn.com/

For this method, encryption is asymmetric; a secret message can be encrypted using a number that is not private, and decrypted with a number that is private.

public-key encryption

What is the term used to describe a network system in which many paths exist between any two devices?

redundancy

All of the following are examples of machine learning EXCEPT...?

using asymmetric encryption to provide data confidentiality.

For this method, the key consists of several numbers. To encrypt a message, each letter is replaced by a letter a certain interval down the alphabet. However, these intervals themselves change as you iterate through the message

vigenere cipher


Kaugnay na mga set ng pag-aaral

WGU Principles of Accounting VYC1

View Set

Mesolimbic dopamine system and reward

View Set

Environmental Science Chapter 19

View Set

A Elsa le gusta patinar sobre hielo

View Set