exam study guide

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following best explains what happens when a new device is connected to the Internet? A A device driver is assigned to the device. B An Internet Protocol (IP) address is assigned to the device. C A packet number is assigned to the device. D A Web site is assigned to the device.

B An Internet Protocol (IP) address is assigned to the device.

A color in a computing application is represented by an RGB triplet that describes the amount of red, green, and blue, respectively, used to create the desired color. A selection of colors and their corresponding RGB triplets are shown in the following table. Each value is represented in decimal (base 10). Color Name RGB Triplet indigo (75, 0, 130) ivory (255, 255, 240) light pink (255, 182, 193) light yellow (255, 255, 224) magenta (255, 0, 255) neutral gray (127, 127, 112) pale yellow (255, 255, 160) vivid yellow (255, 255, 14) 22. What is the binary RGB triplet for the color indigo? A (00100101, 00000000, 10000010) B (00100101, 00000000, 01000001) C (01001011, 00000000, 10000010) D (01001011, 00000000, 01000001)

C (01001011, 00000000, 10000010)

Which of the following activities poses the greatest personal cybersecurity risk? A Making a purchase at an online store that uses public key encryption to transmit credit card information B Paying a bill using a secure electronic payment system C Reserving a hotel room by e-mailing a credit card number to a hotel D Withdrawing money from a bank account using an automated teller machine (ATM)

C Reserving a hotel room by e-mailing a credit card number to a hotel

A list of binary values (0 or 1) is used to represent a black-and-white image. Which of the following is LEAST likely to be stored as metadata associated with the image? A Copyright information for the image B The date and time the image was created C The dimensions (number of rows and columns of pixels) of the image D A duplicate copy of the data

D A duplicate copy of the data

A library of e-books contains metadata for each book. The metadata is intended to help a search feature find books that users are interested in. Which of the following is LEAST likely to be contained in the metadata of each e-book? A An archive containing previous versions of the e-book B The author and title of the e-book C The date the e-book was first published D The genre of the e-book (e.g., comedy, fantasy, romance, etc.)

A An archive containing previous versions of the e-book

Which of the following is LEAST likely to indicate a phishing attack? A An e-mail from your bank asks you to call the number on your card to verify a transaction B An e-mail from a merchant asks that you click on a link to reset your password C An e-mail from a utility company asks you to enter your date of birth and social security number for verification purposes D An e-mail indicates that you have won a large sum of money and asks you to enter your bank account number so that the money can be transferred to you

A An e-mail from your bank asks you to call the number on your card to verify a transaction

A student is deciding between storing data on the cloud or storing data on a nonnetworked local device. Which of the following is most likely to be true? A The cloud storage solution will allow the data to be accessed by multiple users simultaneously. B The cloud storage solution will ensure that the data can be accessed in the event of a network failure. C The local device will be more vulnerable to DDoS attacks than the cloud storage solution is. D The local device will ensure that the data is backed up in the event of a hardware failure.

A The cloud storage solution will allow the data to be accessed by multiple users simultaneously.

A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent to the user? A The file is broken into packets for transmission. The packets must be reassembled upon receipt. B The file is broken into packets for transmission. The user's browser must request each packet in order until all packets are received. C The server attempts to connect directly to the user's computer. If the connection is successful, the entire file is sent. If the connection is unsuccessful, an error message is sent to the user. D The server repeatedly attempts to connect directly to the user's computer until a connection is made. Once the connection is made, the entire file is sent.

A The file is broken into packets for transmission. The packets must be reassembled upon receipt.

A program is expressed in a programming language. Which of the following is true of the program? A The program can also be expressed as binary code, but will be more easily understood by humans when expressed in a higher-level programming language. B The program can also be expressed as binary code, which will reduce the likelihood of errors. C The program cannot be expressed as binary code, because binary code can only be used to represent data. D Some parts of the program can be expressed as binary code, but operations must be expressed using a higher-level programming language.

A The program can also be expressed as binary code, but will be more easily understood by humans when expressed in a higher-level programming language.

Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true? A The activities of a user browsing in an anonymous window will not be visible to people who monitor the user's network, such as the system administrator. B Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer. C A user will not be able to log in to e-mail or social media accounts during the anonymous browsing session. D A user browsing in an anonymous window will be protected from viruses launched from any Web sites visited or files downloaded.

B Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer.

Which of the following are benefits of using well-named variables in a computer program? Select two answers. A The program will run faster. B The program will be easier for people to read. C The program will have a greater data storage capacity. D The program will be easier to modify in the future.

B The program will be easier for people to read. D The program will be easier to modify in the future.

An office uses an application to assign work to its staff members. The application uses a binary sequence to represent each of 100 staff members. What is the minimum number of bits needed to assign a unique bit sequence to each staff member? A 5 B 6 C 7 D 8

C 7

Computers are often used to search through large sets of data to find useful patterns in the data. Which of the following tasks is NOT an example where searching for patterns is needed to produce useful information? A A credit card company analyzing credit card purchases to identify potential fraudulent charges B A grocery store analyzing customers' past purchases to suggest new products the customer may be interested in C A high school analyzing student grades to identify the students with the top ten highest grade point averages D An online retailer analyzing customers' viewing habits to suggest other products based on the purchasing history of other customers

C A high school analyzing student grades to identify the students with the top ten highest grade point averages

The transmission control protocol (TCP) and Internet protocol (IP) are used in Internet communication. Which of the following best describes the purpose of these protocols? A To ensure that communications between devices on the Internet are above a minimum transmission speed B To ensure that private data is inaccessible to unauthorized devices on the Internet C To establish a common standard for sending messages between devices on the Internet D To validate the ownership of encryption keys used in Internet communication

C To establish a common standard for sending messages between devices on the Internet

A text-editing application uses binary sequences to represent each of 200 different characters. What is the minimum number of bits needed to assign a unique bit sequence to each of the possible characters? A 4 B 6 C 7 D 8

D 8

Which of the following best characterizes a high-level programming language? A A language comprised entirely of hardware logic gates B A language in which each instruction corresponds directly to an instruction in a computer's machine code C A language that is easy for a computer to interpret but difficult for humans to interpret D A language that uses multiple abstractions to manage complexity

D A language that uses multiple abstractions to manage complexity

Which of the following actions are generally helpful in program development? 1. Consulting potential users of the program to identify their concerns 2. Writing and testing small code segments before adding them to the program 3. Collaborating with other individuals when developing a large program A I and II only B I and III only C II and III only D I, II, and III

D I, II, and III

Which of the following best describes one of the benefits of using an iterative and incremental process of program development? A It allows programmers to implement algorithmic solutions to otherwise unsolvable problems. B It eliminates the need for programmers to test completed programs. C It enables programmers to create programs that use the lowest-level abstractions available. D It helps programmers identify errors as components are added to a working program.

D It helps programmers identify errors as components are added to a working program.

Which of the following best explains how IP addresses are assigned? A As a new device is connected to the Internet, it is assigned an IP address to enable communication on the network. B IP addresses are assigned only to servers that host Web sites; user devices do not require an IP address. C New devices are connected to the Internet without an IP address, but are eventually assigned an IP address once they can be verified by a certificate authority. D New devices are connected to the Internet without an IP address; IP addresses are assigned only for encrypted communications.

A As a new device is connected to the Internet, it is assigned an IP address to enable communication on the network.

An online store uses 6-bit binary sequences to identify each unique item for sale. The store plans to increase the number of items it sells and is considering using 7-bit binary sequences. Which of the following best describes the result of using 7-bit sequences instead of 6-bit sequences? A 2 more items can be uniquely identified. B 10 more items can be uniquely identified. C 2 times as many items can be uniquely identified. D 10 times as many items can be uniquely identified.

C 2 times as many items can be uniquely identified.

Which of the following is an underlying assumption that is made when Moore's law is used? A As computer hardware improves, the algorithms used in programs will become more efficient. B As computer hardware improves, developers will become more skilled at writing code. C As computer hardware improves, future computers will be able to run faster than current computers. D As computer hardware improves, the number of cybersecurity concerns will increase.

C As computer hardware improves, future computers will be able to run faster than current computers.

Which of the following can be represented by a sequence of bits? 1. An integer 2. An alphanumeric character 3. A machine language instruction A I only B III only C I and II only D I, II, and III

D I, II, and III

Which of the following is NOT a way to enhance privacy when browsing the Internet? A Blocking browser cookies B Using online anonymity software C Using proxy servers D Visiting only bookmarked Web sites

D Visiting only bookmarked Web sites

Which of the following has the greatest potential for compromising a user's personal privacy? A A group of cookies stored by the user's Web browser B The Internet Protocol (IP) address of the user's computer C The user's e-mail address D The user's public key used for encryption

A A group of cookies stored by the user's Web browser

Which of the following best describes the role of the Internet Engineering Task Force (IETF) ? A Developing standards and protocols for Internet communication B Preventing copyrighted materials from being illegally distributed online C Preventing malicious software from being distributed online D Verifying the ownership of encrypted keys used in secured messages

A Developing standards and protocols for Internet communication

An online retailer uses an algorithm to sort a list of n items by price. The table below shows the approximate number of steps the algorithm takes to sort lists of different sizes. Based on the values in the table, which of the following best characterizes the algorithm for very large values of n ? A The algorithm runs in reasonable time. B The algorithm runs, but not in reasonable time. C The algorithm attempts to solve an undecidable problem. D The algorithm attempts to find an approximate solution whenever it fails to find an exact solution.

A The algorithm runs in reasonable time.

Which of the following best describes the purpose of machine learning programs? A To analyze large data sets, recognize patterns, and make predictions based on data B To automatically translate algorithms from natural language to machine language C To determine whether an algorithm can be constructed to answer "yes" or "no" for all possible inputs D To find approximate solutions to problems that would otherwise require an unreasonably long amount of time to solve

A To analyze large data sets, recognize patterns, and make predictions based on data

A retailer that sells footwear maintains a single database containing records with the following information about each item for sale in the retailer's store. • Item identification number • Footwear type (sneakers, boots, sandals, etc.) • Selling price (in dollars) • Size • Color • Quantity available Using only the database, which of the following can be determined? A Which items listed in the database are not currently in the store B Which colors are more popular among men than women C Which type of footwear is most popular among adults D The total number of shoes sold in a particular month

A Which items listed in the database are not currently in the store

A programmer is writing a program that is intended to be able to process large amounts of data. Which of the following considerations is LEAST likely to affect the ability of the program to process larger data sets? A How long the program takes to run B How many programming statements the program contains C How much memory the program requires as it runs D How much storage space the program requires as it runs

B How many programming statements the program contains

A large data set contains information about all students majoring in computer science in colleges across the United States. The data set contains the following information about each student. • The student's gender • The state in which the student attends college • The student's grade point average on a 4.0 scale Which of the following questions could be answered by analyzing only information in the data set? A Do students majoring in computer science tend to have higher grade point averages than students majoring in other subjects? B How many states have a higher percentage of female computer science majors than male computer science majors attending college in that state? C What percent of students attending college in a certain state are majoring in computer science? D Which college has the highest number of students majoring in computer science?

B How many states have a higher percentage of female computer science majors than male computer science majors attending college in that state?

Which of the following is a true statement about Internet communication? A Devices from different manufacturers are required to run the same operating system to communicate over the Internet. B Every device connected to the Internet is assigned a digital certificate by a certificate authority. C Every device connected to the Internet is assigned an Internet protocol (IP) address. D Every device connected to the Internet requires a high-bandwidth connection to enable redundant routing to each device.

C Every device connected to the Internet is assigned an Internet protocol (IP) address.

An algorithm has been developed to compute the sum of all the elements in a list of integers. Which of the following programming structures must be added to the existing algorithm so that the new algorithm computes the sum of only the even integers in the list? A Iteration B Searching C Selection D Sequencing

C Selection

An Internet user has a need to send private data to another user. Which of the following provides the most security when transmitting private data? A Certifying the data with a Creative Commons license before sending it B Sending the data using a high-bandwidth connection C Sending the data using public-key encryption D Sending the data using redundant routing

C Sending the data using public-key encryption

Which of the following best explains how a certificate authority is used in protecting data? A A certificate authority certifies the safety of a particular Web site so that users know that it does not contain any viruses. B A certificate authority issues passwords that grant access to secure databases. C A certificate authority maintains a secure database that maps all Web domain names to the IP addresses of the servers where the sites are hosted. D A certificate authority verifies the authenticity of encryption keys used in secured communications.

D A certificate authority verifies the authenticity of encryption keys used in secured communications.

Which of the following describes a benefit of using hexadecimal numbers instead of binary numbers to represent data? A Hexadecimal can be used to represent fractional values, but binary can only represent integers. B Hexadecimal can be used to represent a wider variety of data types than binary can, including color and geolocation data. C Hexadecimal is easier for a computer to understand than binary is. D A hexadecimal representation of a value generally requires fewer digits than a binary representation of the same value.

D A hexadecimal representation of a value generally requires fewer digits than a binary representation of the same value.

The latency of a network connection is most appropriately measured with which of the following units? A Bits per byte B Bits per second C Bytes D Milliseconds

D Milliseconds

Consider the domain names example.com and cs.example.com. Which of the following best describes the hierarchy of these domain names? A The domain example.com is a subdomain of cs.example.com, which is a subdomain of the top-level domain cs. B The domain example.com is a subdomain of cs.example.com, which is a subdomain of the top-level domain .com. C The domain cs.example.com is a subdomain of example.com, which is a subdomain of the top-level domain cs. D The domain cs.example.com is a subdomain of example.com, which is a subdomain of the top-level domain .com.

D The domain cs.example.com is a subdomain of example.com, which is a subdomain of the top-level domain .com.

In public key cryptography, the sender uses the recipient's public key to encrypt a message. Which of the following is needed to decrypt the message? A The sender's public key B The sender's private key C The recipient's public key D The recipient's private key

D The recipient's private key

Which of the following statements is true? A Every problem can be solved with an algorithm for all possible inputs, in a reasonable amount of time, using a modern computer. B Every problem can be solved with an algorithm for all possible inputs, but some will take more than 100 years, even with the fastest possible computer. C Every problem can be solved with an algorithm for all possible inputs, but some of these algorithms have not been discovered yet. D There exist problems that no algorithm will ever be able to solve for all possible inputs.

D There exist problems that no algorithm will ever be able to solve for all possible inputs.

An Internet service provider (ISP) is considering an update to its servers that would save copies of the Web pages most frequently visited by each user. Which of the following is LEAST likely to occur as a result of the update? A Average response time for user requests might decrease. B Privacy of users might be negatively affected. C Storage requirements for the servers might increase. D Web sites that are not visited frequently might no longer be accessible to users.

D Web sites that are not visited frequently might no longer be accessible to users

Which of the following actions are likely to be helpful in reducing the digital divide? Select two answers. A Designing new technologies intended only for advanced users B Designing new technologies to be accessible to individuals with different physical abilities C Implementing government regulations restricting citizens' access to Web content D Having world governments support the construction of network infrastructure

B Designing new technologies to be accessible to individuals with different physical abilities D Having world governments support the construction of network infrastructure

A bookstore has a database containing information about each book for sale in the store. A sample portion of the database is shown below. Author Title Selling Price Genre Quantity Available J. M. Barrie Peter and Wendy $6.99 Fantasy 3 L. Frank Baum The Wonderful Wizard of Oz $7.99 Fantasy 2 Arthur Conan Doyle The Hound of the Baskervilles $7.49 Mystery 4 Mary Shelley Frankenstein $7.99 Horror 4 Jules Verne Twenty Thousand Leagues Under the Sea $6.99 Science Fiction 3 H. G. Wells The War of the Worlds $4.99 Science Fiction 3 A store employee wants to calculate the total amount of money the store will receive if they sell all of the available science fiction books. Which columns in the database can be ignored and still allow the employee to perform this calculation? Select two answers. A Author B Title C Genre D Quantity Available

A Author B Title

According to information in the table, what color is represented by the binary RGB triplet (11111111, 11111111, 11110000) ? Color Name RGB Triplet indigo (75, 0, 130) ivory (255, 255, 240) light pink (255, 182, 193) light yellow (255, 255, 224) magenta (255, 0, 255) neutral gray (127, 127, 112) pale yellow (255, 255, 160) vivid yellow (255, 255, 14) A Ivory B Light yellow C Neutral gray D Vivid yellow

A Ivory

The following algorithm is intended to determine the average height, in centimeters, of a group of people in a room. Each person has a card, a pencil, and an eraser. Step 2 of the algorithm is missing. Step 1: All people stand up. Step 2: (missing step) Step 3: Each standing person finds another standing person and they form a pair. If a person cannot find an unpaired standing person, that person remains standing and waits until the next opportunity to form pairs. Step 4: In each pair, one person hands their card to the other person and sits down. Step 5: At this point, the standing person in each pair is holding two cards. The standing person in each pair replaces the top number on their card with the sum of the top numbers on the two cards and replaces the bottom number on their card with the sum of the bottom numbers on the two cards. The sitting partner's card is discarded. Step 6: Repeat steps 3-5 until there is only one person standing. Step 7: The last person standing divides the top number by the bottom number to determine the average height. Which of the following can be used as step 2 so that the algorithm works as intended? A Step 2: Each person writes their height, in centimeters, at the top of the card and writes the number 1 at the bottom of the card. B Step 2: Each person writes their height, in centimeters, at the top of the card and writes the number 2 at the bottom of the card. C Step 2: Each person writes the number 1 at the top of the card and writes their height, in centimeters, at the bottom of the card. D Step 2: Each person writes the number 2 at the top of the card and writes their height, in centimeters, at the bottom of the card.

A Step 2: Each person writes their height, in centimeters, at the top of the card and writes the number 1 at the bottom of the card.

Both online newspapers and social media sites are used to distribute information on the Internet. Which of the following best describes an advantage that online newspapers have over social media sites? A The ability to distribute information instantaneously B The ability to provide credibility to the information distributed C The ability to provide information that is widely accessible D The ability to provide media-rich content for low cost

B The ability to provide credibility to the information distributed

A group of planners are using a simulation to examine whether or not a park that they are designing is going to affect foot traffic in the area. The simulation uses a model that includes input variables for the park such as the number of entrances, sidewalks, and bike trails and the square footage of open space (grassy areas). The simulation can then be run multiple times using different values for the input variables to represent different park designs. However, the simulation takes a very long time to run. The planners update the model by removing some variables they consider less important than others. Of the following, which is the most likely effect the updated model will have on the simulation? A The updated model is likely to decrease the runtime of the simulation because the time required for simulations generally depends on the complexity of the model used. B The updated model is likely to decrease the runtime of the simulation because simulations that use older models tend to require more time to run than simulations that use newer models. C The updated model is unlikely to decrease the runtime of the simulation because the simulation is computationally complex, regardless of the model used. D The updated model is unlikely to provide any benefit because removing details from a model will compromise the accuracy of the simulation.

A The updated model is likely to decrease the runtime of the simulation because the time required for simulations generally depends on the complexity of the model used.

Which of the following best describes the purpose of the domain name system (DNS) ? A To allow users to refer to Web sites using names (such as example.com) rather than IP addresses (such as 156.33.241.5) B To define the standards and protocols to be used for Internet communication C To issue users a digital certificate to enable Internet communication D To prevent devices from attempting to access certain Internet content

A To allow users to refer to Web sites using names (such as example.com) rather than IP addresses (such as 156.33.241.5)

A bank customer receives an e-mail from a sender claiming to be a bank employee. The e-mail asks the customer to provide personal information and to call a phone number if he or she has any questions. The customer suspects the e-mail might be a phishing attempt. Which of the following responses is most likely to be a privacy risk for the bank customer? A Calling the bank at its official phone number to ask whether the request for personal information is legitimate B Calling the phone number given in the e-mail and providing personal information over the phone C Checking that the domain name of the sender's e-mail address is associated with the bank D Conducting a web search to see if other people have received similar requests for personal information

B Calling the phone number given in the e-mail and providing personal information over the phone

Which of the following is an example of symmetric encryption? A Evy buys a locked box that operates using two different codes. When the first code is entered, a slot opens that allows a message to be put in the box. When the second code is entered, the door to the box opens. Evy gives the first code to her friends so they can leave messages for her and keeps the second code to herself so that she is the only one who can retrieve the messages. B Finn and Gwen develop a system that maps each letter of the alphabet to a unique symbol using a secret key. Finn uses the key to write a message to Gwen where each letter is replaced with the corresponding symbol. Gwen uses the key to map each symbol back to the original letter. C Hannah writes a message to send to Isabel and hides the message under a rock behind the soccer field. Hannah gives Isabel the exact location of the rock so that only Isabel can find the message. D Juan writes a message to send to Kelly and slides the message through a slot in the front of Kelly's locker. Juan knows that Kelly has not shared her locker combination with anyone, so no one other than Kelly will be able to read the message.

B Finn and Gwen develop a system that maps each letter of the alphabet to a unique symbol using a secret key. Finn uses the key to write a message to Gwen where each letter is replaced with the corresponding symbol. Gwen uses the key to map each symbol back to the original letter.

A smartphone stores the following data for each photo that is taken using the phone. • The file name of the photo • The date and time the photo was taken • The geographic location where the photo was taken Assume that all of the photos that have been taken on the phone are accessible. Which of the following can be determined using the photo data described above? I. The number of photos that were taken at a particular geographic location II. The number of photos that were taken in the last year III. The name of the person who took the most recent photo A III only B I and II only C I and III only D I, II, and III

B I and II only

Internet protocol version 6 (IPv6) has been introduced to replace the previous version (IPv4). Which of the following best describes a benefit of IPv6 over IPv4? A IPv6 addresses are shorter than IPv4 addresses, which allows for faster routing of packets. B IPv6 allows for a greater number of addresses than IPv4, which allows more devices to be connected to the Internet. C IPv6 eliminates the use of hierarchy in addressing, making addresses easier to use. D IPv6 allows users to bypass older security protocols so that data can be sent peer-to-peer without the use of routers.

B IPv6 allows for a greater number of addresses than IPv4, which allows more devices to be connected to the Internet.

Which of the following are ways in which a programmer can use abstraction to manage the complexity of a program? Select two answers. A Replacing each instance of repeated code with a call to a procedure B Replacing longer variable names with shorter variable names to reduce typing errors C Replacing several lines of documentation with a single line of documentation D Replacing several lines of documentation with a single line of documentation name one, name two, name three, and name four with a list of strings called names

B Replacing longer variable names with shorter variable names to reduce typing errors D Replacing several lines of documentation with a single line of documentation name one, name two, name three, and name four with a list of strings called names

The following algorithm is intended to take a positive integer as input and display its individual digits in order from right to left. For example, if the input is 512, the algorithm should produce the output 2 1 5. Step 3 of the algorithm is missing. Step 1: Input a positive integer from the user and store it in the variable number. Step 2: Divide number by 10 and record the integer quotient and the remainder. The integer quotient is the quotient with any part after the decimal point dropped. For example, when 127 is divided by 10, the quotient is 12.7, the integer quotient is 12 and the remainder is 7. Step 3: (missing step) Step 4: Repeat steps 2 and 3 until number is 0. Which of the following can be used as step 3 so that the algorithm works as intended? A Step 3: Display the remainder of number divided by 10 and store the remainder in number. B Step 3: Display the remainder of number divided by 10 and store the integer quotient in number. C Step 3: Display the integer quotient of number divided by 10 and store the remainder in number. D Step 3: Display the integer quotient of number divided by 10 and store the integer quotient in number.

B Step 3: Display the remainder of number divided by 10 and store the integer quotient in number.

Which of the following is a characteristic of the fault-tolerant nature of routing on the Internet? A The ability to use a hierarchical naming system to avoid naming conflicts B The ability to provide data transmission even when some connections have failed C The ability to resolve errors in domain name system (DNS) lookups D The ability to use multiple protocols such as hypertext transfer protocol (HTTP), Internet protocol (IP), and simple mail transfer protocol (SMTP) to transfer data

B The ability to provide data transmission even when some connections have failed

A certain computer game is played between a human player and a computer-controlled player. Every time the computer-controlled player has a turn, the game runs slowly because the computer evaluates all potential moves and selects the best one. Which of the following best describes the possibility of improving the running speed of the game? A The game's running speed can only be improved if the game is played between two human players instead of with the computer-controlled player. B The game's running speed might be improved by using a process that finds approximate solutions every time the computer-controlled player has a turn. C The game's running speed cannot be improved because computers can only be programmed to find the best possible solution. D The game's running speed cannot be improved because the game is an example of an algorithm that does not run in a reasonable time.

B The game's running speed might be improved by using a process that finds approximate solutions every time the computer-controlled player has a turn.

Which of the following scenarios best exemplifies a phishing attack? A user connects to a public wireless network. An unauthorized individual intercepts data transmitted on the network, looking for private information that can be used to gain access to the user's accounts. B A user's e-mail account is overwhelmed with messages containing large attachments, which causes the account to exceed the maximum amount of data allowed and temporarily prevents the user from sending and receiving new messages. C A user receives an e-mail from a sender offering technical help with the user's computer. The e-mail prompts the user to start a help session by clicking a provided link and entering the username and password associated with the user's computer. D A user chooses a weak password for an online account. An unauthorized individual successfully guesses the user's password from a list of common passwords.

C A user receives an e-mail from a sender offering technical help with the user's computer. The e-mail prompts the user to start a help session by clicking a provided link and entering the username and password associated with the user's computer.

Which of the following statements correctly explain how the Internet is able to facilitate communication at a large scale? 1. A central monitoring computer is used to track and maintain the connections of the Internet. 2. Data is routed between points in multiple ways so that if a connection fails, the data can be rerouted around the inoperative connections. 3. Protocols for packets and routing are used so that computers from different manufacturers can communicate in a standard way. A I and II only B I and III only C II and III only D I, II, and III

C II and III only

ASCII is a character-encoding scheme that uses 7 bits to represent each character. The decimal (base 10) values 65 through 90 represent the capital letters A through Z, as shown in the table below. What ASCII character is represented by the binary (base 2) number 1001010 ? A H B I C J D K

C J

A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet. Which of the following activities is LEAST likely to be effective in this purpose? A Holding basic computer classes at community centers B Providing free wireless Internet connections at locations in low-income neighborhoods C Putting all government forms on the city Web site D Requiring that every city school has computers that meet a minimum hardware and software standard

C Putting all government forms on the city Web site

Historically, it has been observed that computer processing speeds tend to double every two years. Which of the following best describes how technology companies can use this observation for planning purposes? A Technology companies can accurately predict the dates when new computing innovations will be available to use. B Technology companies can plan to double the costs of new products each time advances in processing speed occur. C Technology companies can set research and development goals based on anticipated processing speeds. D Technology companies can spend less effort developing new processors because processing speed will always improve at the observed rate.

C Technology companies can set research and development goals based on anticipated processing speeds.

A search engine has a trend-tracking feature that provides information on how popular a search term is. The data can be filtered by geographic region, date, and category. Categories include arts and entertainment, computers and electronics, games, news, people and society, shopping, sports, and travel. Which of the following questions is LEAST likely to be answerable using the trends feature? A In what month does a particular sport receive the most searches? B In which political candidates are people interested? C What is the cost of a certain electronics product? D Which region of the country has the greatest number of people searching for opera performances?

C What is the cost of a certain electronics product?

Which of the following statements are true about using a high-level programming language instead of a lower-level language? I. Programs written in a high-level language are generally easier for people to read than programs written in a low-level language. II. A high-level language provides programmers with more abstractions than a low-level language. III. Programs written in a high-level language are generally easier to debug than programs written in a low-level language. A I only B I and III only C II and III only D I, II, and III

D I, II, and III

A student wants to create an algorithm that can determine, given any program and program input, whether or not the program will go into an infinite loop for that input. The problem the student is attempting to solve is considered an undecidable problem. Which of the following is true? A It is possible to create an algorithm that will solve the problem for all programs and inputs, but the algorithm can only be implemented in a low-level programming language. B It is possible to create an algorithm that will solve the problem for all programs and inputs, but the algorithm requires simultaneous execution on multiple CPUs. C It is possible to create an algorithm that will solve the problem for all programs and inputs, but the algorithm will not run in reasonable time. D It is not possible to create an algorithm that will solve the problem for all programs and inputs.

D It is not possible to create an algorithm that will solve the problem for all programs and inputs

Which of the following is a true statement about program documentation? A Program documentation should not be changed after it is first written. B Program documentation is only needed for programs in development; it is not needed after a program is completed. C Program documentation is useful when programmers collaborate but not when a programmer works individually on a project. D Program documentation is useful during initial program development and also when modifications are made to existing programs.

D Program documentation is useful during initial program development and also when modifications are made to existing programs.

Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes the ability of the two computers to communicate with each other across the Internet? A The computers cannot communicate because different manufacturers use different communication protocols. B The computers can communicate, but additional hardware is needed to convert data packets from one computer's protocol to the other computer's protocol. C The computers can communicate directly only if the messages consist of text; other formats cannot be interpreted across computers. D The computers can communicate directly because Internet communication uses standard protocols.

D The computers can communicate directly because Internet communication uses standard protocols.

Which of the following best explains why it is not possible to use computers to solve every problem? A Current computer processing capabilities cannot improve significantly. B Large-scale problems require a crowdsourcing model, which is limited by the number of people available to work on the problem. C The ability of a computer to solve a problem is limited by the bandwidth of the computer's Internet connection. D There exist some problems that cannot be solved using any algorithm.

D There exist some problems that cannot be solved using any algorithm.

Internet protocol version 4 (IPv4) represents each IP address as a 32-bit binary number. Internet protocol version 6 (IPv6) represents each IP address as a 128-bit binary number. Which of the following best describes the result of using 128-bit addresses instead of 32-bit addresses? A 4 times as many addresses are available. B 96 times as many addresses are available. C times as many addresses are available. D times as many addresses are available.

D times as many addresses are available.


Kaugnay na mga set ng pag-aaral

ATI priority setting frameworks advanced test

View Set

NS 415 Test 1 Objectives (Ch 1,2,3,4,17,18,23,25)

View Set

Control of the Internal Environment

View Set

Chapter 15: Pain Management During Childbirth

View Set