CSP Sem 1 Final Review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Convert 57 (base 10) to base 4 a) 323 b) 321 c) 231 d) 221

Correct: B

Which of the following best explains what happens when a new device is connected to the Internet? a) A device driver is assigned to the device. b) An Internet Protocol (IP) address is assigned to the device. c) A packet number is assigned to the device. d) A Web site is assigned to the device.

Correct: B Connecting new devices to the Internet is enabled by the assignment of an IP address.

Convert 3503 (base 9) to base 16 a) A21 b) A22 c) A23 d) A25

Correct: C

Which of the following CANNOT be represented by a sequence of bits? a) Machine language b) Integers c) Colors d) Characters e) Computing device

Correct: E

How many bits does an IPv4 address have? a) 32 bits b) 64 bits c) 128 bits d) 256 bits

Correct: A

What are open source programs? a) programs that are made freely available and may be redistributed/modified b) online research output free of any restrictions on access, but the use may be restricted in some way (ex: can't monetize it)

Correct: A

What does TCP (Transmission Control Protocol) do? a) breaks messages into packets, reassembles them at destination, takes care of errors b) deals w/routing of packets through networks → destination c) allows user on one comp to transfer data to another comp.

Correct: A

What is Creative Commons? a) A public copyright license b) A set of access control technologies for restricting the use of proprietary hardware and copyrighted works. c) A digital library that provides free public access to collections of digitized materials d) A process of obtaining work, information, or opinions from a large group of people who submit their data via the Internet, social media, and smartphone apps.

Correct: A

Which of the following best explains how data is typically assembled in packets for transmission over the Internet? a) Each packet contains data to be transmitted, along with metadata containing information used for routing the data. b) Each packet contains an encrypted version of the data to be transmitted, along with metadata containing the key needed to decrypt the data. c) Each packet contains only the metadata used to establish a direct connection so that the data can be transmitted. d) Each packet contains multiple data files bundled together, along with metadata describing how to categorize each data file.

Correct: A

Which of the following is most likely to be a benefit of storing all user data in a database? a) The developers can analyze the data to make improvements to the application based on user behavior. b) The developers can analyze the data to ensure that no patterns emerge in the data. c) The developers can reduce the amount of data storage required to support the application. d) The developers can reduce the need for data encryption.

Correct: A By storing user data, the developers can use machine learning and data mining and thereby make improvements based on the users' needs.

Which of the following activities is most likely to be successful as a citizen science project? a) Collecting pictures of plants from around the world that can be analyzed to look for regional differences in plant growth. b) Designing and building a robot to help with tasks in a medical laboratory. c) Sorting scientific records and removing duplicate entries in a database with a large number of entries. d) Using a simulation to predict the impact of a construction project on local animal populations.

Correct: A Citizen science is scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices. This project would benefit from using a citizen science model for gathering photographs of plants from amateur photographers around the world.

Which step of the design cycle can you NEVER skip? (College Board verbiage is in parentheses) a) Inquire and analysis (Investigating and Reflecting) b) Developing Ideas (Designing) c) Creating the solution (Prototyping) d) Evaluating (Testing)

Correct: A This step is absolutely necessary, even if you think that you have enough prior knowledge about the topic. You should always do additional research.

What are open access programs? a) programs that are made freely available and may be redistributed/modified b) online research output free of any restrictions on access, but the use may be restricted in some way (ex: can't monetize it)

Correct: B

What does IP (Internet Protocol) do? a) breaks messages into packets, reassembles them at destination, takes care of errors b) deals w/routing of packets through networks → destination c) allows user on one comp to transfer data to another comp.

Correct: B

What is a computing system? a) a physical artifact that can run a program b) a group of comp devices/programs working together c) a group of interconnected comp devices capable of sending/receiving data

Correct: B

Which of the following best explains how messages are typically transmitted over the Internet? a) The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient's device. b) The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device. c) The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient's device. d) The message is transmitted as a single file and received in whole by the recipient's device.

Correct: B Messages are broken into packets. Each packet contains data to be transmitted, as well as metadata for routing and reassembling the data upon receipt. This allows the packets to be received in any order and still be reassembled correctly.

A programmer is writing a program that is intended to be able to process large amounts of data. Which of the following considerations is LEAST likely to affect the ability of the program to process larger data sets? a) How long the program takes to run b) How many programming statements the program contains c) How much memory the program requires as it runs d) How much storage space the program requires as it runs

Correct: B The number of statements in a program is not likely to affect how a program will handle larger data sets. The efficiency of a program is independent of the number of statements it contains. There are some programs with very few statements that take a long time to execute, as well as programs with many statements that take little time to execute.

How many bits does an IPv6 address have? a) 32 bits b) 64 bits c) 128 bits d) 256 bits

Correct: C

What is a computing network? a) a physical artifact that can run a program b) a group of comp devices/programs working together c) a group of interconnected comp devices capable of sending/receiving data

Correct: C

Convert 7A2 (base 15) to base 11 a) 1300 b) 1321 c) 1230 d) 1330

Correct: D

What are the benefits of redundancy? a) Allows for scalability b) Allows for more devices to be connected c) Ensures that there are multiple paths between any two connected devices → fault tolerant d) All of the Above

Correct: D

What is crowdsourcing? a) A public copyright license b) A set of access control technologies for restricting the use of proprietary hardware and copyrighted works. c) A digital library that provides free public access to collections of digitized materials d) A process of obtaining work, information, or opinions from a large group of people who submit their data via the Internet, social media, and smartphone apps.

Correct: D

Which of the following is a primary reason for the use of open protocols on the Internet? a) Open protocols allow devices to specify how data packets are to be routed on the Internet in advance. b) Open protocols ensure that all data transmission on the Internet is kept secure. c) Open protocols ensure that all Internet users are provided connections with equal bandwidth. d) Open protocols provide a way to standardize data transmission between different devices.

Correct: D Protocols are agreed-upon sets of rules that specify the behavior of a system. Protocols used on the Internet enable devices from different manufacturers to communicate in a standard way.

Which of the following is a true statement about program documentation? a) Program documentation should not be changed after it is first written. b) Program documentation is only needed for programs in development; it is not needed after a program is completed. c) Program documentation is useful when programmers collaborate but not when a programmer works individually on a project. d) Program documentation is useful during initial program development and also when modifications are made to existing programs.

Correct: D During initial program development, documentation can allow the writer to organize his or her thinking, state assumptions about input, and explain the path of future development. When modifications are made to existing programs, documentation is used to record the changes or additions to an existing program.

What is DNS (Domain Name System)? a) Allows devices to access the internet b) Converts internet addresses to IP addresses c) a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. d) Both A and B e) Both B and C f) Both A and C

Correct: E


Ensembles d'études connexes

Practice #5 (e-book practice questions)

View Set

Pelvic Bones, Cavities, Walls, and Contents

View Set

Bio Ch. 17 Cell Reproduction and Differentiation

View Set

Business Law Chapter 7: Strict Liability and Product Liability

View Set

Pennsylvania Insurance Laws and Rules (Life Code)

View Set