MIDTERM REVIEW CSP

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following is the most accurate description of what is known as the "digital divide".

.people's access to computing and the Internet differs based on socioeconomic or geographic characteristics.

Using exactly 8 binary digits to represent each character, and without using any spaces, how would a computer represent "AK"?

0110000101101011

Pick the two expressions involving the Modulo operation that compute to the exact same value.

1 MOD 16 9 MOD 8

Binary number sequences can be used to represent multiple types of data, including images, data, numbers, text, and sound. The computer determines what type of data a number sequence represents by the context in which it is used. Which of the following could NOT be represented by the sequence 0100 0001

1011 1110

What is the highest decimal (base 10) value you could represent in Binary if you used all 10 of your fingers as bits? If your finger is up that means 1 and a finger down means 0.

1023

When responding to a questions with 4 choices, the most efficient method will require _________________ number of bits.

2

An online store uses 6-bit binary sequences to identify each unique item for sale. The store plans to increase the number of items it sells and is considering using 7-bit binary sequences. Which of the following best describes the result of using 7-bit sequences instead of 6-bit sequences?

2 times as many items can be uniquely identified.

Suppose the ESPN website uses 8-bit unsigned integers to store how many points a team has scored in an NBA game. For example: 0000 00102 represents 2 points0000 10002 represents 8 points What is the highest possible score the ESPN website could display?

255^10

A video-streaming website uses 32-bit integers to count the number of times each video has been played. In anticipation of some videos being played more times than can be represented with 32 bits, the website is planning to change to 64-bit integers for the counter. Which of the following best describes the result of using 64-bit integers instead of 32-bit integers?

2^32 times as many values can be represented.

What is the minimum number of bits you would need to encode the UPPER and LOWER case letters of the alphabet plus a space?

6

The standard QWERTY keyboard has 47 keys that can place characters on the screen. Each of these keys can also display a second character by holding the "Shift" key at the same time. What is the minimum number of bits would you need to encode everything that could be typed on this keyboard?

7

Computers are often used to search through large sets of data to find useful patterns in the data. Which of the following tasks is NOT an example where searching for patterns is needed to produce useful information?

A high school analyzing student grades to identify the students with the top ten highest grade point averages

Choose the answer that is NOT a feature of Public Key Cryptography:

A publicly accessible database keeps track of all private keys so that messages can be encrypted.

What is a function parameter?

A way to give input to a function that controls how the function runs.

A binary message consisting of four bits was sent to you by a friend. The message was supposed to be ABBB. Unfortunately, your friend set the bit on the wire once every 3 seconds, but you read the wire once every second. Assuming that the first bit was sent and read at the same time, what message did you receive instead?

AAAB

A binary message consisting of four bits was sent to you by a friend. The message was supposed to be ABAB. Unfortunately, your friend set the bit on the wire once every second, but you read the wire once every 2 seconds. Assuming that the first bit was sent and read at the same time, what message did you receive instead?

AABB

Which of the following is LEAST likely to indicate a phishing attack?

An email from your bank asks you to call the number on your card to verify a transaction.

A computer program uses 3 bits to represent integers. When the program adds the decimal (base 10) numbers 5 and 3, the result is 0. Which of the following is the best explanation for the result?

An overflow error occurred

What is an API?

Application Program Interface

Which of the following statements is the LEAST TRUE about personal data that technology companies potentially collect about theirusers?

Companies are required by law to give users options to personalize what data they collect about them

Select the two true statements about functions with parameters:

Functions with parameters can be used to prevent the creation of duplicated code. Parameters help generalize the solution of a specific problem.

From the list provided choose the two (2) answers that correctly describe which internet protocol relies on the other. For example: if protocol A relies on protocol B, it means that A is a higher level protocol than B, and thus protocol B must exist and work properly in order for protocol A to do its job.

HTTP relies on TCP/IP DNS relies on TCP/IP

A large data set contains information about all students majoring in computer science in colleges across the United States. The data set contains the following information about each student. The student's gender The state in which the student attends college The student's grade point average on a 4.0 scale Which of the following questions could be answered by analyzing only information in the data set?

How many states have a higher percentage of female computer science majors than male computer science majors attending college in that state?

Which of the following are true statements about digital certificates in Web browsers? I. Digital certificates are used to verify the ownership of encrypted keys used in secured communication II. Digital certificates are used to verify that the connection to a Web site is fault tolerant.

I only

How does a computer resolve a domain name into an IP address?

It asks a DNS server for the corresponding IP address

Why is a multi-alphabet cipher, like Vigenere's cipher, hard to crack?

It cannot be solved using frequency analysis directly The key length is variable and potentially very long

Historically it has been observed that computer processing speeds tend to double every two years. This is known as:

Moore's Law

_______ is said to be a set of rules governing the exchange or transmission of data between devices.

Protocol

Which of the following statements best describes the properties of public key encryption?

Public key encryption is an encryption method which relies on separate keys for encrypting and decrypting information. Public key encryption makes use of mathematical problems which no algorithm can be used to solve.

Which of the following activities poses the greatest personal cyber security risk?

Purchasing a couch by emailing a credit card number to the couch owner

Which of the following is considered an unethical use of computer resources?

Purchasing a single-user copy of photo editing software and installing it on all the computers in a computer lab

Big data is more readily available today than it has ever been in the past. It is being created, accessed, and manipulated by professionals and amateurs alike. Which of the following statements below accurately describes the relationship between reading data and updating data?

Reading data requires less storage than updating data.

Which of the following statements are true about routers and routing on the Internet.

Routers act independently and route packets as they see fit. A packet traveling between two computers on the Internet may be rerouted many times along the way or even lost or "dropped".

Which of the following is NOT true about TCP/IP packets?

TCP guarantees that no packets are ever dropped.

One possible disadvantage of using the Internet to collect data is:

That the researcher limits the pool of people available to respond to those who have the education, resources, physical access, and inclination to use the Internet.

Both online newspapers and social media sites are used to distribute information on the Internet. Which of the following best describes an advantage that online newspapers have over social media sites?

The ability to provide credibility to the information distributed

Which of the following is a benefit of the fault-tolerant nature of Internet routing?

The ability to provide data transmission even when some connections between routers have failed

Which of the following can be represented by a single binary digit?

The answer to a True / False question The remainder when dividing a whole number by 2

This is a model of a cocktail party. The men and women at the party form groups. A party-goer becomes uncomfortable and switchesgroups if their current group has too many members of the opposite sex. Makayla is having a party next week for her graduation. Her parents gave her a maximum of 100 guests that she is able to invite.Makayla decides that she will create this simulation to help her make the arrangements for the party. Based on the simulation, she can infer:

The boys and girls will mingle at the party but eventually they will disperse into mostly same-sex groups

Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes whether these two computers can communicate with each other across the Internet?

The computers can communicate directly because Internet communication uses standard protocols that are used by all computers on the Internet.

A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent back to the user?

The file is broken into packets and sent over a network. The packets must be reassembled by the user's computer when they are received. If any packets are missing, the TCP re-requests the missing packets.

A programmer is writing a system that is intended to be able to store large amounts of personal data. As the programmer develops the data system, which of the following is LEAST LIKELY to impact the programmer's choices in designing the structure of the system?

The spelling of an individual's last name

Which of the following would pose the greatest threat to a user's personal privacy if it were to be leaked to the public?

The user's browser cookies

When a computer scientist uses the term "Big Data" what do they typically mean?

There is enough data that traditional data processing applications are inadequate.

A good business practice is to send a copy of data off-site in the event of a catastrophic event such as a fire at the organization's primary location. How can organizations keep their data secure while transmitting and storing their data in an off-site location?

They should encrypt their data using public key encryption.

Jerry and Ron are each working on separate programs with different purposes and implementations. They each use the following binary sequence in their programs: 0110110001000111 Which of the following statements is true?

This binary sequence MIGHT represent the same type of data. Jerry and Ron MIGHT agree on a chunk size for their binary sequence

Which of the following statements about writing functions and Top-Down Design is NOT true?

Two programmers solving the same problem using Top-Down Design should arrive at identical programs.

Which of the following statements best describes the properties of Vigenere's cipher?

Vigenere's cipher is a highly secure encryption scheme that in which a single shared key is used by both the sender and receiver of the message.

A school sports reporter has been given access to a data set of sports statistics that she is going to analyze for a research project. Which of the following types of software can she NOT use to organize and analyze the data?

Webpage Software

In cryptography, what would be an appropriate definition for cipher?

an algorithm for performing encryption and decryption

_______ could be described as the width of the access door or pipe that everyone uses to access the internet.

bandwidth

The number of bits that are conveyed or processed by unit of time e.g. 8 bits/second

bitrate

Which of the following are possible when working with large data sets?

it takes time and resources to sort through large data sets the data could be accessed by those without permission

What is the result when a number that is too large is stored in a specific number of bits?For example, if the decimal value 16 is converted to binary and stored in 4 bits.

overflow


Kaugnay na mga set ng pag-aaral

Georgira Rules and Codes Pertinent to Life and Accident & Sickness Ins

View Set

Endocrine PhysioEx Metabolism Lab Assignment

View Set

Population Health Final, Pop health Final Exam-back of the book questions, pop final

View Set

Ch. 9 Quantitative and Qualitative Measurement Instruments

View Set

Human Anatomy Muscular System Mastering AP Questions

View Set

Nutrition, Science, Application: Chapter 5 Quiz

View Set

Soil Aeration and Temperature (8)

View Set

Work Element Two: Field equipment and Instruments

View Set