apcsp everything mcq

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

For Valentines Day, you want to write a program that automatically added a red hue to a picture. In your program, you have a function where you pass a pixel RGB value and that function increases the amount of red in that RGB value and returns the value. Given an input value of (134, 156, 232), which of the following will most likely be an output of the function? A (136, 156, 232) B (184, 156, 232) C (84, 156, 232) D (134, 125, 175)

(184, 156, 232)

Resolution is a measurement of the number of pixels, typically expressed as a horizontal x vertical measurement. An 1080p image has a resolution of 1920 x 1080. Given this, how many pixels are there in total in an 1080p image? A 1080 B 1920 C 1920 + 1080 D 1920 * 1080

1920 * 1080

How many colors can be created from a one bit pixel? A.) 1 B.) 2 C.) 8 D.) 16

2

Early computers used an 8 bit color scheme, where the color was represented using 8 binary digits. This yielded a total of 256 possible colors. By moving to a RGB 24 bit color representation, how colors are now possible? A 272 B 768 C 2 to the power of 24 D 24 to the power of 2

2 to the power of 24

What is the maximum unsigned value that could be represented by an 8 bit number? A 8 B 64 C 255 D 256

256

How many possible values can be created with only 10 bits? A.) 2 B.) 10 C.) 10² D.) 2¹⁰

2¹⁰

What is the value of 1011110 in hexadecimal? A 5E16 B 6E16 C 7E16 D 8E16 E 9E16

5E 16

How many bits are used to encode a character according to the extended ASCII encoding scheme? A.) 2 bits B.) 4 bits C.) 6 bits D.) 8 bits

8 bits

Bryan received a new smart phone to replace his old smart phone. Which of the following best explains what happens when Bryan connects his new smart phone to the Internet? A A new Internet Protocol (IP) address is assigned to Bryan's new smart phone. B The Internet Protocol (IP) address from Bryan's previous smart phone is assigned to his new smart phone. C The device driver from Bryan's previous smart phone is assigned to his new smart phone. D A new device driver is assigned to Bryan's new smart phone.

A new Internet Protocol (IP) address is assigned to Bryan's new smart phone

Your manager at Spotify is considering implementing a plan to compress data by reducing the sampling rate for the songs. They have asked you to put together a presentation outlining some of the benefits of using a data compression method like this. Which of the following would not be a valid point to include in your presentation? A Compressing the data like this will be a lossless data compression and it will be possible to revert back to the original version in the future if the company chooses to do that. B Compressing the data like this will save disk space and allow the company to expand their digital library with new songs from new artists. C Compressing the data like this will result in less bandwidth for the company as they stream songs to the users. D Compressing the data like this will make it downloads smaller for the user, which could result in less buffering while waiting for a song to download.

Compressing the data like this will be a lossless data compression and it will be possible to revert back to the original version in the future if the company chooses to do that.

The IETF (Internet Engineering Task Force) is responsible for developing and overseeing internet standards. Which of the following is not a common protocol maintained by the IETF? A Hypertext Transfer Protocol (HTTP) B Internet Protocol (IP) C Global Positioning System (GPS) D Simple Mail Transfer Protocol (SMTP)

Global Positioning System (GPS)

A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best explains the result of this configuration as compared to a configuration in which the router does not limit the bandwidth? Responses A The amount of time it takes guest users to send and receive large files is likely to decrease. B The number of packets required for guest users to send and receive data is likely to decrease. C Guest users will be prevented from having fault-tolerant routing on the Internet. D Guest users will be restricted in the maximum amount of data that they can send and receive per second.

Guest users will be restricted in the maximum amount of data that they can send and receive per second.

Which of the following best describes a benefit of IPv6 over IPv4? A IPv6 address are not hierarchical. B IPv6 addresses are shorter. C IPv6 allow for greater number of IP addresses. D IPv6 allow data to be sent peer-to-peer without the user of a router.

IPv6 allow for greater number of IP addresses.

Which of the following statements about lossy data compression is NOT true. A Many pictures can be saved in a lossy format without telling any difference from the original B Text files cannot easily be compressed in a lossy format C Given two files of the same size, one compressed with lossy and the other with lossless data, the files will take up the same amount of disk space D Lossy data compression of an audio file will take longer to download than a lossless data compression of the same audio file

Lossy data compression of an audio file will take longer to download than a lossless data compression of the same audio file

ASCII is a character-encoding scheme that uses a numeric value to represent each character. For example, the uppercase letter "G" is represented by the decimal (base 10) value 71. A partial list of characters and their corresponding ASCII values are shown in the table below. https://codehs.com/uploads/f9eda68424ffa6dd15fbd0e472b3c080 ASCII characters can also be represented by hexadecimal numbers. According to ASCII character encoding, which of the following letters is represented by the hexadecimal (base 16) number 50? A.) Z B.) P C.) A D.) V

P

Which of the following is a true statement about the use of public key encryption in transmitting messages? Responses A Public key encryption enables parties to initiate secure communications through an open medium, such as the Internet, in which there might be eavesdroppers. B Public key encryption is not considered a secure method of communication because a public key can be intercepted. C Public key encryption only allows the encryption of documents containing text; documents containing audio and video must use a different encryption method. D Public key encryption uses a single key that should be kept secure because it is used for both encryption and decryption.

Public key encryption enables parties to initiate secure communications through an open medium, such as the Internet, in which there might be eavesdroppers.

Run length encoding takes all runs of a characters and replaces them with the character written once, followed by the number of times it is repeated. For example, run length encoding converts a sequence of 6 a's aaaaaa into only two characters: a6. Which of the following pieces of data would most likely benefit the most from using run length encoding? A The text of a novel. B The data of an image stored as hexadecimal values. C Single character values from a test sample where most of the sample is the same. D The text from a computer program.

Single character values from a test sample where most of the sample is the same.

Which of the following statements about the Internet is true? Responses A The Internet is a computer network that uses proprietary communication protocols. B The Internet is designed to scale to support an increasing number of users. C The Internet requires all communications to use encryption protocols. D The Internet uses a centralized system to determine how packets are routed.

The Internet is designed to scale to support an increasing number of users.

What happens after a user enters the URL for the web page into the browser? A The server sends a response to the browser with the resource attached B The browser sends a message to a server requesting a resource C The browser sends a response to the server with the resources attached D The browser takes the resource and renders it in the browser window

The browser sends a message to a server requesting a resource

A student has come up with an algorithm to compress the text of a book using symbols for common words since the book would not normally use symbols. For example, the word the is replaced with ! and the word that is replaces with @. With this in mind, "the black cat that jumped out of the alley" becomes "! black cat @ jumped out of ! alley". Which statement below is true about the student's compression? A This is a lossy compression that can be restored back to the original. B This is a lossy compression that cannot be restored back to the original. C This is a lossless compression that can be restored back to the original. D This is a lossless compression that cannot be restored back to the original.

This is a lossless compression that can be restored back to the original.

Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are used? Responses A Unauthorized individuals can deny service to a computing system by overwhelming the system with login attempts. B Unauthorized individuals can exploit vulnerabilities in compression algorithms to determine a user's password from their decompressed data. C Unauthorized individuals can exploit vulnerabilities in encryption algorithms to determine a user's password from their encryption key. D Unauthorized individuals can use data mining and other techniques to guess a user's password.

Unauthorized individuals can use data mining and other techniques to guess a user's password.

Which of the following statements about encryption is NOT true? A As the number of bits used to store a key increase in a linear fashion, the amount of possible keys increases exponentially. B Website encryption is done using a form of symmetric encryption. C A Caesar cipher is an example of symmetric encryption. D Modern day encryption share some similarities to the concepts of a Caesar cipher.

Website encryption is done using a form of symmetric encryption.

Public key encryption relies on a one-way function, which is easy to do in one direction but hard to do in reverse. Which of the following functions would best represent a one-way function? In other words, given a known input and a known output, which function would it be hardest to guess the secret number? A input * secret number = output B input MOD secret number = output C input + secret number = output D input raised to the power of secret number = output

input MOD secret number = output

According to the domain name system (DNS), which of the following is a subdomain of the domain codehs.com? A codehs.edu B login.codehs.com C codehs.com.edu D code.hs.com

login.codehs.com

The function darkenPixel takes the row and column for an image pixel and updates it to be 50% darker. Given an image of width w and height h, which of the following programs segments will darken just the left half of the image? wIndex ← 1 hIndex ← 1 REPEAT h TIMES { REPEAT w / 2 TIMES { darkenPixel(hIndex, wIndex) wIndex ← wIndex + 1 } hIndex ← hIndex + 1 } B wIndex ← 1 hIndex ← 1 REPEAT h / 2 TIMES { REPEAT w TIMES { darkenPixel(hIndex, wIndex) wIndex ← wIndex + 1 } hIndex ← hIndex + 1 } C wIndex ← 1 hIndex ← 1 REPEAT h TIMES { REPEAT w / 2 TIMES { darkenPixel(hIndex, wIndex + w / 2) wIndex ← wIndex + 1 } hIndex ← hIndex + 1 } D wIndex ← 1 hIndex ← 1 REPEAT h / 2 TIMES { REPEAT w TIMES { darkenPixel(hIndex + h / 2, wIndex) wIndex ← wIndex + 1 } hIndex ← hInde

wIndex ← 1 hIndex ← 1 REPEAT h TIMES { REPEAT w / 2 TIMES { darkenPixel(hIndex, wIndex) wIndex ← wIndex + 1 } hIndex ← hIndex + 1 }


Ensembles d'études connexes

IB Biology HL: Ecology & Conservation

View Set

Biology of Women (Disease & Immune) Review for Exam 2

View Set

Ch. 23 The Urinary System (Exam 4)

View Set

Ch. 8 Intellectual Property Rights_EXAM 2

View Set

quiz 1 - Intro to Health Insurance

View Set

Mental Health Moodle Quizzes (also includes the midterm questions)

View Set