P3 - Abstracting & P4 - Analyzing Problems and Artifacts

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following has the greatest potential for compromising a user's personal privacy?

A. A group of cookies stored by the user's Web browser -This option is correct. The aggregation of information in browser cookies can be used by websites that the user visits to track the user and collect information about the user.

Which of the following is LEAST likely to indicate a phishing attack?

A. An e-mail from your bank asks you to call the number on your card to verify a transaction -This option is correct. Phishing attacks are characterized by communication from a person trying to trick another person into divulging personal information. Because the phone number on a bank card is public information and not personal, this request does not indicate a phishing attack.

A retailer that sells footwear maintains a single database containing records with the following information about each item for sale in the retailer's store. -Item identification number -Footwear type (sneakers, boots, sandals, etc.) -Selling price (in dollars) -Size -Color -Quantity available Using only the database, which of the following can be determined?

A. Which items listed in the database are not currently in the story. -This option is correct. Because the database stores information on item identification numbers and quantities available, the retailer can search for all item identification numbers that have a quantity of 0.

An office building has two floors. A computer program is used to control an elevator that travels between the two floors. Physical sensors are used to set the following Boolean variables. The figure shows a table with 2 columns and 5 rows. The top row contains the column labels, from left to right; column 1, Variable; column 2, Description. From top to bottom, the data is as follows: Row 2; Variable, onFloor1, Description, set to true if the elevator is stopped on floor 1; otherwise set to false. Row 3; Variable, onFloor2, Description, set to true if the elevator is stopped on floor 2; otherwise set to false. Row 4; Variable, callTo1, Description, set to true if the elevator is called on floor 1; otherwise set to false. Row 5; Variable, callTo2, Description, set to true if the elevator is called on floor 2; otherwise set to false. The elevator moves when the door is closed and the elevator is called to the floor that it is not currently on. Which of the following Boolean expressions can be used in a selection statement to cause the elevator to move?

B. (onFloor1 AND callTo2) OR (onFloor2 AND callTo1)

A code segment will be used to swap the values of the variables a and b using the temporary variable temp. Which of the following code segments correctly swaps the values of a and b ?

B. Choice B has three boxes in a column. In choice B the top box reads temp left arrow a, the middle box reads a left arrow b, and the bottom box reads b left arrow temp. -This option is correct. The value of the variable is stored in the variable temp. Then the value of the variable b is stored in the variable a. Finally, the value of the variable temp (which now contains the original value of the variable a) is stored in the variable b.

A large data set contains information about all... 0/1 MC point A large data set contains information about all students majoring in computer science in colleges across the United States. The data set contains the following information about each student. The student's gender The state in which the student attends college The student's grade point average on a 4.0 scale Which of the following questions could be answered by analyzing only information in the data set?

B. How many states have a higher percentage of female computer science majors than male computer science majors attending college in that state?

A large data set contains information about all students majoring in computer science in colleges across the United States. The data set contains the following information about each student. The student's gender The state in which the student attends college The student's grade point average on a 4.0 scale Which of the following questions could be answered by analyzing only information in the data set?

B. How many states have a higher percentage of female computer science majors than male computer science majors attending college in that state? -This option is correct. The data set stores information about an individual student's gender and state. This information can be aggregated to extract information about the percentage of female majors in each state.

Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?

B. Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer. -This option is correct. Because the cookies created during the anonymous browsing session were deleted, no information exists in the browser to inform future visits to the same website. Thus, any shopping cart items will not be available for future purchase.

Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?

B. Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer. -This option is correct. Because the cookies created during the anonymous browsing session were deleted, no information exists in the browser to inform future visits to the same website. Thus, any shopping cart items will not be available for future purchases.

A certain computer game is played between a human player and a computer-controlled player. Every time the computer-controlled player has a turn, the game runs slowly because the computer evaluates all potential moves and selects the best one. Which of the following best describes the possibility of improving the running speed of the game?

B. The game's running speed might be improved by using a process that finds approximate solutions every time the computer-controlled player has a turn. -This option is correct. Selecting the best move is an optimization problem that cannot be solved in a reasonable time based on the information that the game runs slowly. If the algorithm for selecting the best move is running too slowly, the game may run more quickly if a heuristic is used to find approximate solutions.

A cable television company stores information about movie purchases made by subscribers. Each day, the following information is summarized and stored in a publicly available database. The day and date each movie was purchased The title of each movie purchased The cities where subscribers purchased each movie The number of times each movie was purchased by subscribers in a given city A sample portion of the database is shown below. The database is sorted by date and movie title. A table is shown with four columns titled Day and Date, Movie Title, City, and Number of Times Purchased. The first row reads Saturday 1/5/2014, Movie A, Houston Texas, and 1. The second row reads Saturday 1/5/2014, Movie A, Detroit Michigan, and 2. The third row reads Saturday 1/5/2015, Movie B, Houston Texas, and 1. The fourth row reads Saturday 1/5/2014, Movie C, Anchorage Alaska, and 1. The fifth row reads Sunday 1/6/2014, Movie A, Wichita Kansas, and 3. Which of the following CANNOT be determined using only the information in the database?

B. The number of movies purchased by an individual subscriber for a particular month -This option is correct. It is not possible to determine the number of movies purchased by an individual subscriber for a particular month. In this database, information about individual subscribers, such as their ID number, is not stored.

A programmer completes the user manual for a video game she has developed and realizes she has reversed the roles of goats and sheep throughout the text. Consider the programmer's goal of changing all occurrences of "goats" to "sheep" and all occurrences of "sheep" to "goats." The programmer will use the fact that the word "foxes" does not appear anywhere in the original text. Which of the following algorithms can be used to accomplish the programmer's goal?

C. First, change all occurrences of "goats" to "foxes." Then, change all occurrences of "sheep" to "goats." Last, change all occurrences of "foxes" to "sheep."

Digital images are often represented by the red, green, and blue values (an RGB triplet) of each individual pixel in the image. A photographer is manipulating a digital image and overwriting the original image. Which of the following describes a lossless transformation of the digital image?

C. Creating the negative of an image by creating a new RGB triplet for each pixel in which each value is calculated by subtracting the original value from 255. The negative of an image is reversed from the original;light areas appear dark, and colors are reversed. -This option is correct. If a negative of the original image is made, each RGB triplet value will be computed by subtracting the original value from 255. The original value can then be restored by subtracting the new value from 255. This process is lossless because the exact original can be restored.

The procedure below is intended to display the index in a list of unique names (nameList) where a particular name (targetName) is found. If targetName is not found in nameList, the code should display 0. text... Which of the following procedure calls can be used to demonstrate that the procedure does NOT work as intended?

C. FindName (["Andrea", "Ben", "Chris"], "Ben") -This option is correct. The procedure will not display the correct value of foundIndex if the target name is "Ben". In the FOR EACH loop, when the value of name is "Andrea", the ELSE statement sets foundIndex to 0. When the value of the name is "Ben", the ELSE statement sets foundIndex to 1. But as the loop continues, and the value of name is "Chris", the ELSE statement sets foundIndex to 0. The procedure displays 0, even though the correct answer is 1. Related Content & Skills Big Idea BI 5 EK 5.3.1.D EK 5.3.1.E EU 5.3 LO 5.3.1 Computational Thinking Practices P3 - Abstracting

A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet. Which of the following activities is LEAST likely to be effective in this purpose?

C. Putting all government forms on the city Web site -This option is correct. Putting all government forms on the city website is least likely to be effective in reducing the digital divide because all citizens may not have equitable access to the Internet.

Which of the following activities poses the greatest personal cybersecurity risk?

C. Reserving a hotel room by e-mailing a credit card number to a hotel -This option is correct. As an email message passes through the Internet, it goes through intermediate computers and routers. These computers and routers could read the contents of the email. The credit card number could be read from the email.

An algorithm has been developed to compute the sum of all the elements in a list of integers. Which of the following programming structures must be added to the existing algorithm so that the new algorithm computes the sum of only the even integers in the list?

C. Selection

Which of the following is a true statement about cloud computing?

C. Storing data using cloud computing can help ensure that data are not lost if a user's computer stops functioning. -This option is correct. Cloud computing uses the Internet to store data on servers that are backed up in fail-safe ways. If a user's computer were to stop functioning, the user could access his or her cloud data from another computer.

Historically, it has been observed that computer processing speeds tend to double every two years. Which of the following best describes how technology companies can use this observation for planning purposes?

C. Technology companies can set research and development goals based on anticipated processing speeds. -This option is correct. If it is assumed that computer processing speeds will double every two years, then companies can design new products with this assumption.

Under which of the following conditions is it most beneficial to use a heuristic approach to solve a problem?

C. When the problem cannot be solved in a reasonable time and an approximate solution is acceptable

Which of the following programs is most likely to benefit from the use of a heuristic?

C.A program that finds the shortest driving route between two locations on a map -This option is correct. Finding the shortest driving route is an optimization problem that cannot be solved in a reasonable time, and a heuristic is a technique that can find an approximate solution more quickly when exact methods are too slow.

A new bank plans to make customer convenience a priority by minimizing the amount of time a customer waits in line. The bank is considering two options: a single line where the customer at the front waits for the next available teller, or separate lines for each teller. The bank decides to use a computer simulation of these two options to determine the average wait time for customers. Which of the following is NOT true about the bank's plan?

D. The simulation will not produce usable results because actual customer data are not available -This option is correct. Although actual customer data is not available in the bank's simulation, it can give information that relates to the average customer wait time for each option.

A new bank plans to make customer convenience a priority by minimizing the amount of time a customer waits in line. The bank is considering two options: a single line where the customer at the front waits for the next available teller or separate lines for each teller. The bank decides to use a computer simulation of these two options to determine the average wait time for customers. Which of the following is NOT true about the bank's plan?

D. The simulation will not produce usable results because actual customer data are not available. -This option is correct. Although actual customer data is not available in the bank's simulation, it can give information that relates to the average customer wait time for each option.

Which of the following statements is true?

D. There exist problems that no algorithm will ever be able to solve for all possible inputs -This option is correct. Some problems, such as determining if any program will eventually stop, cannot be solved by an algorithm.

A student is recording a song on her computer. When the recording is finished, she saves a copy on her computer. The student notices that the saved copy is of lower sound quality than the original recording. Which of the following could be a possible explanation for the difference in sound quality?

The song was saved using fewer bits per second than the original song.


Kaugnay na mga set ng pag-aaral

14: Women and Food 2: Focus on Breastfeeding

View Set

Chapter 108: Complementary and Alternative Therapy

View Set

Ch. 22 Ownership, Risk, and Warranties

View Set

Living Environment - New York Regents June 2021 Exam

View Set