APCOMP

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following best explains what happens when a new device is connected to the Internet?

An Internet Protocol (IP) address is assigned to the device.

Which number system is used to store information digitally in a computer?

Binary (base 2)

Which of the following is a benefit of the fault-tolerant nature of Internet routing?

The ability to provide data transmission even when some connections between routers have failed

Which of the following data structures is immutable?

Tuple

Which of the following programs would produce the following output: 1. honey 2. bread 3. jelly 4. plates

my_list = ["honey", "bread", "jelly", "plates"] for index in range(len(my_list)): print (str(index+1) + ". " + my_list[index])

Which of the following programs would alter my_list to consist of the following: ['red', 'green', 'blue', 'orange', 'yellow']

my_list = ['red', 'green', 'blue', 'orange'] my_list.append('yellow')

Consider the following network diagram: Each box represents a device connected to the network, each line represents a direct connection between two devices. Which of the following statements are true about this network: I - The network is fault tolerant. If one connection fails, any two devices can still communicate. II - Computers C and E need to first communicate with at least one other device in order to communicate with each other.

1 only

Consider the following numbers: The decimal value 1010 The binary value 10012 Hexadecimal value C16 Which of the following lists the numbers in order from least to greatest?

10012, 1010, C16

What is the decimal value of 11012?

1310

How many different digits are used in the Hexadecimal number system?

16

How many different values can be represented using 4 bits?

16 different values

An online store uses 8-bit binary values to identify each unique item for sale. The store plans to increase number of items it sells and is considering changing to 9-bit binary values. Which of the following best describes the result of using 9-bit values instead of 8-bit values?

2 times as many items can be uniquely identified

A news website uses 32-bit integers to count the number of times an article has been viewed. The website is becoming more popular, and expects some of the articles to exceed the number of views that can be represented with 32 bits. In anticipation of this, the website is planning to change to 64-bit integers for the view counter. Which of the following best describes the result of using 64-bit integers instead of 32-bit integers?

232 times as many values can be represented

Suppose the ESPN website uses 8-bit unsigned integers to store how many points a team has scored in an NBA game. For example: 0000 0010 represents 2 points 0000 1000 represents 8 points What is the highest possible score the ESPN website could display?

25510

An IPv4 address has 32 bits, so there are 232 (over 4 billion) possible IPv4 addresses. Since the Internet is gaining devices quickly, we will soon surpass 232 unique devices on the Internet. In anticipation of all the new Internet devices, we are in the process of switching to IPv6, which uses 128 bits for a single address. That's 96 extra bits to represent one address! Which of the following statements correctly describes how many more addresses will be possible to represent by switching from IPv4 to IPv6?

296 times as many addresses can be represented with IPv6

How many times does this program print That's a large class!? num_students = [23, 21, 33, 35, 24, 35] for num in num_students: if num > 23: print ("That's a large class!")

4

What is the value of num after this code runs? shapes = ["triangle", "square", "hexagon", "circle", "pentagon"] num = len(shapes)

5

Which values entered into 'my_list' would print a value of '-1' after the program has run? my_list = [...] num = 0 for thing in my_list: num = num - thing print (num)

5, -10, 6

What is a Distributed Denial of Service (DDoS) attack?

An attempt to deny access to a website by flooding the website's servers with millions of requests from different computers

Which of the following is LEAST likely to indicate a phishing attack?

An email from your bank asks you to call the number on your card to verify a transaction.

A computer program uses 3 bits to represent integers. When the program adds the decimal (base 10) numbers 6 and 2, the result is 0. Which of the following is the best explanation for this result?

An overflow error occurred.

What would the following program print to the screen when run? my_list = [7, 0, 0, "d", "n", "o", "B"] my_list.reverse() for thing in my_list: print (thing)

B o n d 0 0 7

ASCII is a character encoding scheme that uses a numeric value to represent each character. For example, the uppercase letter 'G' is represented by the binary (base 2) value 0100 0111, which is equivalent to the decimal (base 10) value 71. A subset of characters and their corresponding ASCII values are shown in the table below: Which ASCII character is represented by the decimal (base 10) number 72?

H

Which of the following are true statements about digital certificates in Web browsers? I. Digital certificates are used to verify the ownership of encrypted keys used in secure communication. II. Digital certificates are used to verify that the connection to a Web site is fault tolerant.

I only

What kind of data structure is user_data in the following declaration? user_data = ["TJ", 24, "artLover123"]

List

What does this program print? sentence = "My favorite animal is a dog or chipmunk" sentence_list = sentence.split() sentence_list[-3] = "penguin" sentence = " ".join(sentence_list) print (sentence)

My favorite animal is a penguin or chipmunk

Which of the following activities poses the greatest personal cybersecurity risk?

Purchasing a couch by emailing a credit card number to the couch owner

A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet. Which of the following actions is LEAST likely to be effective in this purpose?

Putting helpful tips for operating computers on the city government website

Which of the following is considered an unethical use of computer resources?

Searching online for the answers to CodeHS exercises and quizzes

Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes whether these two computers can communicate with each other across the Internet?

The computers can communicate directly because Internet communication uses standard protocols that are used by all computers on the Internet.

A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent back to the user?

The file is broken into packets and sent over a network. The packets must be reassembled by the user's computer when they are received. If any packets are missing, the browser re-requests the missing packets.

Suppose we have the following function that modifies a pixel and returns the result: RED = 0 GREEN = 1 BLUE = 2 def filter(pixel): pixel[RED] = 255 - pixel[RED]; pixel[GREEN] = 255 - pixel[GREEN]; pixel[BLUE] = 255 - pixel[BLUE]; return (pixel[RED], pixel[GREEN], pixel[BLUE]) Which of the following best describes the result of applying this filter to every pixel in the image?

The image will be inverted, bright pixels will become dark and dark pixels will become bright.

A student is transferring photos from her camera to her computer. The student notices that the saved photos on her computer are lower quality than the original raw photo on her camera. Which of the following could be a possible explanation for the difference in image quality?

The saved image files were compressed with a lossy compression technique.

Which of the following would pose the greatest threat to a user's personal privacy if it were to be leaked to the public?

The user's browser cookies

Which of the following is a true statement about data compression?

There are trade-offs involved in choosing a compression technique for storing and transmitting data.

The RGB encoding scheme encodes a color using 24 bit sequences. The first 8 bits encode the amount of red in the color, the next 8 bits encode the amount of green in the color, and the last 8 bits encode the amount of blue in the color. Which of the following is a true statement about the color encoded by this binary sequence: 1110 1001 0111 1100 0000 1111

This color is mostly red.

What kind of data structure is user_data in the following declaration? user_data = ("TJ", 24, "artLover123")

Tuple

Which of the following is a benefit that online shopping websites provide over brick and mortar stores?

Users can easily see product reviews and determine if an item has been satisfactory for a large number of people

What will be the output of the following program? my_list = [1, 2, 3, 4] num = 5 for index in range(len(my_list)): my_list.append(num + index) print (my_list)

[1, 2, 3, 4, 5, 6, 7, 8]

What does this program print? heights = [65, 56, 67, 48, 64] heights.sort() heights.extend([60, 61, 62]) heights.remove(67) print (heights)

[48, 56, 64, 65, 60, 61, 62]

According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?

about.example.com

Which of the following lines of code will cause an error? Use the following definition of ages: ages = (12, 5, 8)

ages[0] = 3

What does this code snippet print? fruit = ["b", "n", "n"] print ("a".join(fruit))

banan

Given the following list: my_list = ["s", "Z", "e", "c", "c", "e", "r", "h", "e", "p", "t"] which program below would give the following output: s e c r e t

for index in range(len(my_list)): if index % 2 == 0: print (my_list[index])

ASCII is a character encoding scheme that uses a numeric value to represent each character. For example, the uppercase letter 'G' is represented by the binary (base 2) value 0100 0111, which is equivalent to the decimal (base 10) value 71. A subset of characters and their corresponding ASCII values are shown in the table below: ASCII characters can also be represented by hexadecimal (base 16) numbers. According to the ASCII character encoding, which of the following characters is represented by the hexadecimal (base 16) number 6E16

n


Ensembles d'études connexes

Сложение и вычитание натуральных чисел 5 класс

View Set

70 questions- with explanations- go through

View Set

Inman Domain 1, 2, 3, 4 questions

View Set

SB Introduction to Equilibrium & Equilibrium Expressions

View Set

TestOut IT Fundamentals - Chapter 1-8

View Set