Unit 1 Review

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following binary (base-2) numbers is LARGEST? A. 11000000 B. 01111111 C. 00000001 D. 10111111

A. 11000000

Convert the binary (base-2) number 1001 to decimal (base-10). A. 9 B. 10 C. 16 D. 17

A. 9

A user wants to save a data file on an online storage site. The user wants to reduce the size of the file, if possible, and wants to be able to completely restore the file to its original version. Which of the following actions best supports the user's needs? A. Compressing the file using a lossless compression algorithm before uploading it B. Compressing the file using a lossy compression algorithm before uploading it C. Compressing the file using both lossy and lossless compression algorithms before uploading it D. Uploading the original file without using any compression algorithm

A. Compressing the file using a lossless compression algorithm before uploading it

Consider the following numeric values. Binary 1011 Binary 1101 Decimal 5 Decimal 12 Which of the following lists the values in order from least to greatest? A. Decimal 5, binary 1011, decimal 12, binary 1101 B. Decimal 5, decimal 12, binary 1011, binary 1101 C. Decimal 5, binary 1011, binary 1101, decimal 12 D. Binary 1011, binary 1101, decimal 5, decimal 12

A. Decimal 5, binary 1011, decimal 12, binary 1101

Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string more than once and replaces each instance of that pair with a corresponding character that does not appear in the string. The algorithm saves a list containing the mapping of character pairs to their corresponding replacement characters. For example, the string "THIS_IS_THE_BEST_WISH" can be encoded as "%#_#_E_BEST_W#H" by replacing all instances of "TH" with "%" and replacing all instances of "IS" with "#". For which of the following strings is it NOT possible to use byte pair encoding to shorten the string's length? A. "BANANA" B. "LEVEL_UP" C. "MEET_ME_LATER" D. "NEITHER_HERE_NOR_THERE"

B. "LEVEL_UP"

Which of the following is an advantage of a lossless compression algorithm over a lossy compression algorithm? A. A lossless compression algorithm can guarantee that compressed information is kept secure, while a lossy compression algorithm cannot. B. A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot. C. A lossless compression algorithm typically allows for faster transmission speeds than does a lossy compression algorithm. D. A lossless compression algorithm typically provides a greater reduction in the number of bits stored or transmitted than does a lossy compression algorithm.

B. A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot.

Which of the following is NOT true of how computers represent complex information? A. Computing devices use patterns of bits to represent complex information B. Abstraction helps represent complex information by surfacing complexity that might otherwise be hidden C. Depending on context the same sequence of bits may represent different types of information D. Common abstractions that are represented by computing devices include numbers, characters, and color. Answer

B. Abstraction helps represent complex information by surfacing complexity that might otherwise be hidden

A computer program uses 4 bits to represent nonnegative integers. Which of the following statements describe a possible result when the program uses this number representation? I. The operation 4 + 8 will result in an overflow error. II. The operation 7 + 10 will result in an overflow error. III. The operation 12 + 3will result in an overflow error. A. I only B. II only C. II and III only D. I, II, and III

B. II only

Which of the following is true of lossy and lossless compression algorithms? A. Lossy compression algorithms are used when perfect reconstruction of the original data is important. B. Lossy compression algorithms are typically better than lossless compression algorithms at reducing the number of bits needed to represent a piece of data. C. Lossless compression algorithms are only used to compress text data. D. Lossless compression algorithms only allow for an approximate reconstruction of the original data. Answer

B. Lossy compression algorithms are typically better than lossless compression algorithms at reducing the number of bits needed to represent a piece of data.

A computer program performs the operation "2 divided by 3" and represents the result as the value 0.6666667. Which of the following best explains this result? A. An overflow error occurred. B. The precision of the result is limited due to the constraints of using a floating-point representation. C. The program attempted to execute the operation with the arguments in reverse order. D. The program attempted to represent a floating-point number as an integer.

B. The precision of the result is limited due to the constraints of using a floating-point representation.

A media librarian at a movie studio is planning to save digital video files for archival purposes. The movie studio would like to be able to access full-quality videos if they are needed for future projects. Which of the following actions is LEAST likely to support the studio's goal? A. Using video file formats that conform to published standards and are supported across many different devices B. Using lossy compression software to reduce the size requirements of the data being stored C. Using storage media that can be expanded for additional data capacity D. Using a system that incorporates redundancy to handle disk failure

B. Using lossy compression software to reduce the size requirements of the data being stored

Your computer uses 4 bits to represent decimal numbers (0, 1, 2, 3 and so on) in binary. What is the SMALLEST number for which an overflow error occur? A. 14 B. 15 C. 16 D. 17

C. 16

Consider the 4-bit binary numbers 0011, 0110, and 1111. Which of the following decimal values is NOT equal to one of these binary numbers? A. 3 B. 6 C. 9 D. 15

C. 9

Which of the following best describes how computing devices represent information? A. A computer will either represent information as bits or bytes but not both B. A computer represents data as a byte which is either a 0 or a 1 C. A computer represents data as bits which is either a 0 or a 1 D. A computer represents information as bits which contain 8 bytes.

C. A computer represents data as bits which is either a 0 or a 1

Which of the following actions is most likely to raise legal or ethical concerns? A. An analyst writes a program that scans through a database of open-access scientific journals and creates a document with links to articles written on a particular topic. B. A computer scientist adds several features to an open-source software program that was designed by another individual. C. A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song. D. A public interest group alerts people to a scam that involves charging them for a program that is available for free under a Creative Commons license.

C. A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song.

A certain programming language uses 4-bit binary sequences to represent nonnegative integers. For example, the binary sequence 0101 represents the corresponding decimal value 5. Using this programming language, a programmer attempts to add the decimal values 14 and 15 and assign the sum to the variable total. Which of the following best describes the result of this operation? A. The correct sum of 29 will be assigned to the variable total. B. An overflow error will occur because 4 bits is not large enough to represent either of the values 14 or 15. C. An overflow error will occur because 4 bits is not large enough to represent 29, the sum of 14 and 15. D. A round-off error will occur because the decimal values 14 and 15 are represented as approximations due to the fixed number of bits used to represent numbers.

C. An overflow error will occur because 4 bits is not large enough to represent 29, the sum of 14 and 15.

Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string more than once and replaces each instance of that pair with a corresponding character that does not appear in the string. The algorithm saves a list containing the mapping of character pairs to their corresponding replacement characters. For example, the string "THIS_IS_THE_BEST_WISH" can be encoded as "%#_#_%E_BEST_W#H" by replacing all instances of "TH" with "%" and replacing all instances of "IS" with "#". Which of the following statements about byte pair encoding is true? A. Byte pair encoding is an example of a lossy transformation because it discards some of the data in the original string. B. Byte pair encoding is an example of a lossy transformation because some pairs of characters are replaced by a single character. C. Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version. D. Byte pair encoding is an example of a lossless transformation because it can be used to transmit messages securely.

C. Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.

Which of the following is true of intellectual property? A. Information created on a computer is not owned by anyone since only analog information is protected under copyright law. B. You do not need to cite work created by someone else if both the original work and your use of it are in digital form. C. Creative Commons enables content creators to freely distribute their otherwise copyrighted work. D. Creative Commons has severely hindered broad and open access to digital information

C. Creative Commons enables content creators to freely distribute their otherwise copyrighted work.

A programmer is developing software for a social media platform. The programmer is planning to use compression when users send attachments to other users. Which of the following is a true statement about the use of compression? A. Lossless compression of video files will generally save more space than lossy compression of video files. B. Lossless compression of an image file will generally result in a file that is equal in size to the original file. C. Lossy compression of an image file generally provides a greater reduction in transmission time than lossless compression does. D. Sound clips compressed with lossy compression for storage on the platform can be restored to their original quality when they are played.

C. Lossy compression of an image file generally provides a greater reduction in transmission time than lossless compression does.

Convert the decimal (base-10) number 20 to binary (base-2). A. 10010 B. 00101 C. 11000 D. 10100

D. 10100

Internet protocol version 4 (IPv4) represents each IP address as a 32-bit binary number. Internet protocol version 6 (IPv6) represents each IP address as a 128-bit binary number. Which of the following best describes the result of using 128-bit addresses instead of 32-bit addresses? A. 4 times as many addresses are available. B. 96 times as many addresses are available. C. 2 to the fourth power times as many addresses are available. D. 2 raised to the ninety-sixth power times as many addresses are available.

D. 2 raised to the ninety sixth power times as many addresses are available.

How many total numbers can be represented with an 8-bit binary (base-2) system? A. 127 B. 128 C. 255 D. 256

D. 256

A video game character can face toward one of four directions: north, south, east, and west. Each direction is stored in memory as a sequence of four bits. A new version of the game is created in which the character can face toward one of eight directions, adding northwest, northeast, southwest, and southeast to the original four possibilities. Which of the following statements is true about how the eight directions must be stored in memory? A. Four bits are not enough to store the eight directions. Five bits are needed for the new version of the game. B. Four bits are not enough to store the eight directions. Eight bits are needed for the new version of the game. C. Four bits are not enough to store the eight directions. Sixteen bits are needed for the new version of the game. D. Four bits are enough to store the eight directions.

D. Four bits are enough to store the eight directions.

Ryan is designing an app that needs to quickly send low quality photos between users. Most smartphones take much higher quality photos than Ryan needs for his app. Which answer best describes the type of compression Ryan should choose and why? A. Lossless compression since it ensures perfect reconstruction of the photo. B. Lossy compression since it ensures perfect reconstruction of the photo. C. Lossless compression since it typically results in smaller data sizes. D. Lossy compression since it typically results in smaller data sizes.

D. Lossy compression since it typically results in smaller data sizes.

Jorge is sending a large image file to a friend as part of a shared classroom project. Which of the following is most likely true if Jorge opts to compress the image before sending it? A. The image can no longer be represented using bits. B. The image will have been converted into an analog form. C. The image will require more pixels to display it on the screen. D. The image will require fewer bits in order to be represented.

D. The image will require fewer bits in order to be represented.

The position of a runner in a race is a type of analog data. The runner's position is tracked using sensors. Which of the following best describes how the position of the runner is represented digitally? A. The position of the runner is determined by calculating the time difference between the start and the end of the race and making an estimation based on the runner's average speed. B. The position of the runner is measured and rounded to either 0 or 1 depending on whether the runner is closer to the starting line or closer to the finish line. C. The position of the runner is predicted using a model based on performance data captured from previous races. D. The position of the runner is sampled at regular intervals to approximate the real-word position, and a sequence of bits is used to represent each sample.

D. The position of the runner is sampled at regular intervals to approximate the real-word position, and a sequence of bits is used to represent each sample.

A user reads reviews of a popular artist's new album and then downloads the album from the Web site of a licensed online music seller. Which of the following is LEAST likely to be a consequence of this action? A. Advertisements for the artist's other albums will be displayed when the user visits a different Web site. B. Album reviews from other people who live nearby will be displayed to the user. C. Similar artists will be recommended to the user based on the user's download selection. D. The user will be in violation of the Digital Millennium Copyright Act (DMCA).

D. The user will be in violation of the Digital Millennium Copyright Act (DMCA).

A text-editing application uses binary sequences to represent each of 200 different characters. What is the minimum number of bits needed to assign a unique bit sequence to each of the possible characters? A. 4 B. 6 C. 7 D. 8

D. 8

A researcher wants to publish the results of a study in an open access journal. Which of the following is a direct benefit of publishing the results in this type of publication? A. The researcher can allow the results to be easily obtained by other researchers and members of the general public. B. The researcher can better anticipate the effect of the results and ensure that they are used responsibly. C. The researcher can ensure that any personal information contained in the journal is kept private and secure. D. The researcher can prevent copies of the research from being accessed by academic rivals.

A. The researcher can allow the results to be easily obtained by other researchers and members of the general public.

Arman takes a picture with his smartphone which he subsequently posts online. Beatrice finds the picture online and posts a copy of it on her website with an attached Creative Commons license. Which of the following best describes who owns the photo? A. Beatrice owns the photo because only holders of a Creative Commons license can own works online. B. Arman owns the photo because he was the original creator and did not license the work. C. Arman owns the photo because it was granted a Creative Commons license by another person online. D. Both own the photo because creating a copy makes it her intellectual property.

B. Arman owns the photo because he was the original creator and did not license the work.

When visiting a museum, Lian takes a photo of a painting with a smartphone which stores the photo as an image file. Which of the following best describes the differences between the painting itself and the photo of the painting stored on the smartphone? A. Both the painting and the photo are analog B. The photo is a digital representation of the analog painting C. Sampling can be used to determine whether the analog image is an accurate representation of the painting D. The phone can represent the photo in either digital or analog formats depending on the sampling technique that is used

B. The photo is a digital representation of the analog painting

Which of the following is true of how computers represent numbers? A. Using a fixed but large number of bits can eliminate the possibility of round off error when representing numbers in binary B. With a fixed number of bits some numbers are too large to represent in a computer which will lead to overflow errors. C. Using a fixed but large number of bits, for example 128, eliminates the possibility of overflow errors. D. With a large but fixed number of bits it is possible to eliminate either round-off errors or overflow errors, but not both.

B. With a fixed number of bits some numbers are too large to represent in a computer which will lead to overflow errors.

A programmer created a piece of software and wants to publish it using a Creative Commons license. Which of the following is a direct benefit of publishing the software with this type of license? A. The programmer can ensure that the algorithms used in the software are free from bias. B. The programmer can ensure that the source code for the software is backed up for archival purposes. C. The programmer can include code that was written by other people in the software without needing to obtain permission. D. The programmer can specify the ways that other people are legally allowed to use and distribute the software.

D. The programmer can specify the ways that other people are legally allowed to use and distribute the software.

Lucy is completing a project as part of a science class using materials she found online. Which of the following is MOST LIKELY to lead to legal consequences? A. Modifying a piece of open source software. B. Using open access research for which she does not acquire a license. C. Failing to publish her work under a Creative Commons license. D. Using images posted online by another student without permission or citation.

D. Using images posted online by another student without permission or citation.

A musician is creating a song using audio samples. Which of the following actions will minimize the risk of a copyright violation when creating sample-based music? A. Using samples found on popular music-streaming sites B. Using samples found on peer-to-peer networks C. Using samples from non-digital sound sources (vinyl records, tapes, etc.) D. Using samples published with a no-rights-reserved Creative Commons license

D. Using samples published with a no-rights-reserved Creative Commons license


Kaugnay na mga set ng pag-aaral

IB Physics HL Astrophysics Option D.5: Further Cosmology

View Set

Chapter 64: Arthritis and Connective Tissue Diseases

View Set

Chapter 15: Restraint Alternatives and Safe Restraint Use

View Set