computer science
What is the minimum number of connections that must be broken or removed in the network before computer E can no longer communicate with computer F?
3
Which of the following has the greatest potential for compromising a user's personal privacy?
A group of cookies stored by the user's Web browser
Which of the following best explains what happens when a new device is connected to the Internet?
An Internet Protocol (IP) address is assigned to the device.
Which of the following best describes a Distributed Denial of Service (DDoS) attack?
An attempt to deny users access to a Web site's resources by flooding the Web site with requests from multiple systems
Which of the following is LEAST likely to indicate a phishing attack?
An e-mail from your bank asks you to call the number on your card to verify a transaction
Biologists often attach tracking collars to wild animals. For each animal, the following geolocation data is collected at frequent intervals. • The time • The date • The location of the animal Which of the following questions about a particular animal could NOT be answered using only the data collected from the tracking collars?
Do the movement patterns of the animal vary according to the weather?
A programmer is writing a program that is intended to be able to process large amounts of data. Which of the following considerations is LEAST likely to affect the ability of the program to process larger data sets?
How many programming statements the program contains
A large data set contains information about all students majoring in computer science in colleges across the United States. The data set contains the following information about each student. • The student's gender • The state in which the student attends college • The student's grade point average on a 4.0 scale Which of the following questions could be answered by analyzing only information in the data set?
How many states have a higher percentage of female computer science majors than male computer science majors attending college in that state?
An author is considering publishing an e-book using a Creative Commons license. In which of the following situations would it be better for the author to use a Creative Commons license instead of a traditional copyright? 1. The author wants to make the e-book available as a free download. 2. The author wants to prevent people from sharing copies of the e-book on peer-to-peer networks. 3. The author wants to allow people permission to use and modify the e-book.
I and III
Which of the following are true statements about digital certificates in Web browsers? 1. Digital certificates are used to verify the ownership of encrypted keys used in secured communication. 2. Digital certificates are used to verify that the connection to a Web site is fault tolerant.
I only
When a cellular telephone user places a call, the carrier transmits the caller's voice as well as the voice of the person who is called. The encoded voices are the data of the call. In addition to transmitting the data, the carrier also stores metadata. The metadata of the call include information such as the time the call is placed and the phone numbers of both participants. For which of the following goals would it be more useful to computationally analyze the metadata instead of the data? 1. To determine if a caller frequently uses a specific word 2. To estimate the number of phone calls that will be placed next Monday between 10:30 A.M. and noon. 3. To generate a list of criminal suspects when given the telephone number of a known criminal
II and III only
Which of the following statements about security in the network is true? 1. Computers A and D need to communicate with at least two additional computers in the network in order to communicate with each other. 2. Computers B and C can communicate with each other without additional computers being aware of the communication.
II only
Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?
Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer.
Which of the following is considered an unethical use of computer resources?
Purchasing a single-user copy of photo editing software and installing it on all the computers in a computer lab
A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet. Which of the following activities is LEAST likely to be effective in this purpose?
Putting all government forms on the city Web site
Which of the following activities poses the greatest personal cybersecurity risk?
Reserving a hotel room by e-mailing a credit card number to a hotel
The table below shows the time a computer system takes to complete a specified task on the customer data of different-sized companies. Based on the information in the table, which of the following tasks is likely to take the longest amount of time when scaled up for a very large company of approximately 100,000 customers?
Sorting data
Which of the following is a true statement about cloud computing?
Storing data using cloud computing can help ensure that data are not lost if a user's computer stops functioning.
Historically, it has been observed that computer processing speeds tend to double every two years. Which of the following best describes how technology companies can use this observation for planning purposes?
Technology companies can set research and development goals based on anticipated processing speeds.
Both online newspapers and social media sites are used to distribute information on the Internet. Which of the following best describes an advantage that online newspapers have over social media sites?
The ability to provide credibility to the information distributed
Which of the following is a characteristic of the fault-tolerant nature of routing on the Internet?
The ability to provide data transmission even when some connections have failed
Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes the ability of the two computers to communicate with each other across the Internet?
The computers can communicate directly because Internet communication uses standard protocols.
A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent to the user?
The file is broken into packets for transmission. The packets must be reassembled upon receipt.
A cable television company stores information about movie purchases made by subscribers. Each day, the following information is summarized and stored in a publicly available database. • The day and date each movie was purchased • The title of each movie purchased • The cities where subscribers purchased each movie • The number of times each movie was purchased by subscribers in a given city A sample portion of the database is shown below. The database is sorted by date and movie title. Which of the following CANNOT be determined using only the information in the database?
The number of movies purchased by an individual subscriber for a particular month
A student is recording a song on her computer. When the recording is finished, she saves a copy on her computer. The student notices that the saved copy is of lower sound quality than the original recording. Which of the following could be a possible explanation for the difference in sound quality?
The song was saved using fewer bits per second than the original song.
Which of the following is a true statement about data compression?
There are trade-offs involved in choosing a compression technique for storing and transmitting data.
A certain social media Web site allows users to post messages and to comment on other messages that have been posted. When a user posts a message, the message itself is considered data. In addition to the data, the site stores the following metadata. • The time the message was posted • The name of the user who posted the message • The names of any users who comment on the message and the times the comments were made For which of the following goals would it be more useful to analyze the data instead of the metadata?
To determine the topics that many users are posting about
An Internet service provider (ISP) is considering an update to its servers that would save copies of the Web pages most frequently visited by each user. Which of the following is LEAST likely to occur as a result of the update?
Web sites that are not visited frequently might no longer be accessible to users.
A retailer that sells footwear maintains a single database containing records with the following information about each item for sale in the retailer's store. • Item identification number • Footwear type (sneakers, boots, sandals, etc.) • Selling price (in dollars) • Size • Color • Quantity available Using only the database, which of the following can be determined?
Which items listed in the database are not currently in the store
According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?
about.example.com