Study guide
111101111011110 = How old are they in decimal?
30
A musician decides to make a digital recording of their concert so that they can share it with fans that cannot attend the concert in person. What is true about the process of converting the concert's audio waves into a digital recording? A.If the recording equipment uses a very small sampling interval, the digital recording will be a very good representation but will not contain every detail. B.To capture the most amount of details in the digital recording of the concert, the recording process must take samples at the largest interval possible. C.In order for the digital recording to be a more accurate representation of the concert, the recording should use fewer bits to represent each sample. D.As long as the musician purchases a computer with enough storage capacity, the digital recording can record every detail of the original analog data.
A.If the recording equipment uses a very small sampling interval, the digital recording will be a very good representation but will not contain every detail.
A group of researchers surveyed German Internet users to discover their amount of participation in online politics, such as signing a petition and engaging in an online political group, and their level of concern about privacy. The researchers then used statistical methods to make correlations between demographic characteristics, privacy concerns, and online political participation. Which research finding is most indicative of a digital divide in online political participation? A.Men engaged more frequently in online political participation than women. B.People with more privacy concerns were more likely to participate more in online politics than those with fewer privacy concerns. C.Older people did not participate any more or less in online politics than younger people. D.Highly educated people engaged as frequently in online political participation as people without a formal education.
A.Men engaged more frequently in online political participation than women.
Cora is planning to take photos of her cat and print posters of each photo to hang on her walls. What advice will help her the most in creating high-quality posters? A.She should save photos with a lossless compression algorithm, to ensure that the posters are of highest quality. B.She should save the photos as JPEG photos, because only JPEG photos can be printed out. C.She should save the photos as black and white, as color photos can't be saved in full detail. D.She should take the photos using a real camera, as phone cameras can't save high resolution photos.
A.She should save photos with a lossless compression algorithm, to ensure that the posters are of highest quality.
How does the Internet Protocol (IP) fit into the Internet technology suite? A.The Internet Protocol is a protocol used in all Internet communication, but other protocols are also used. B.The Internet Protocol is the only protocol that powers communication on the Internet. C.The Internet Protocol was recently proposed and is slowly replacing the old protocols that powered the original Internet. D.The Internet Protocol is one of many protocols in the Internet technology stack but isn't used as frequently as other protocols.
A.The Internet Protocol is a protocol used in all Internet communication, but other protocols are also used.
A high school provides email addresses to freshman students. The email system typically assigns an email address in the format "[email protected]". However, if a student has the same name as a previous student, the system assigns them a different format. In order to figure out whether an email address is already assigned, the system does a binary search through its list of existing email addresses. Which of these statements is true? A.The list of email addresses must be sorted for binary search to work. B.In the worst case that the email address is not in the list, binary search will need to look at every item in the list. C.The code for the binary search algorithm must be written in binary to achieve optimum efficiency. D.The list of email addresses don't need to be sorted for binary search to work, but that would improve the efficiency of the algorithm.
A.The list of email addresses must be sorted for binary search to work.
Imagine that you wanted to build a directory that listed the contents of the World Wide Web. What type of item would each listing be? A.webpage B.An Internet-connected computing device C.A network router D.A computer network
A.webpage
What is true about the computing devices exchanging data over the Internet? A.If a computing device attempts to send data to another device and it does not follow the rules of the Internet protocol (IP), the device will receive a warning from the Internet Protocol Authority (IPA). B.All the computing devices that are exchanging data over the Internet are following the rules of the Internet Protocol (IP). C.Many computing devices are exchanging data following the rules of the Internet Protocol (IP), but not all devices. The data that isn't sent according to the IP will arrive more slowly. D.As long as a computing device is sending messages over an Ethernet or fiber optic cable, that data will automatically be following the rules of the Internet Protocol (IP).
B.All the computing devices that are exchanging data over the Internet are following the rules of the Internet Protocol (IP).
When packets are routed on the Internet, the route for a particular packet is not pre-determined. Instead, the next hop is decided by each router along the way. How does that increase the fault tolerance of routing on the Internet? A Each router can pick a connection that's closest to the destination. B.Each router can pick a connection that's currently working and available. C.Each router can decide to pick a connection that has higher bandwidth. D.Each router can decide whether to discard the packet.
B.Each router can pick a connection that's currently working and available.
An algorithm will be used to calculate the difference between the smallest and largest values in a list. For the list of [10, 3, 5, 6], it should calculate a difference of 7. There are two proposals for the algorithm: Algorithm 1: Set minVal to the first value in the list and maxVal to the last value in the list. Iterate through each number in the list. If the number is greater than maxVal, store it in maxVal. If the number is less than minVal, store it in minVal. After loop, set maxDiff to the difference between maxVal and minVal. Algorithm 2: Set minVal to 1000 and maxVal to 0. Iterate through each number in the list. If the number is greater than maxVal, store it in maxVal. If the number is less than minVal, store it in minVal. After loop, set maxDiff to the difference between maxVal and minVal. I. Algorithm 1 does not work on lists where the smallest value is at the start of the list or the largest value is at the end of the list. II. Algorithm 2 does not work on lists that contain all negative numbers or all numbers over 1000. Which of these statements are true about these algorithms? A.I only B.II only C.I and II D.Neither I nor II
B.II only
Railways have devices called "axle counters" that count up how many train axles have passed by, and helps decide if a train has fully passed part of a track. However, because of a bug in the design of the axle counter logic, a train that has exactly 256 axles will result in a count of 0, and its existence will be ignored. Thus, trains that run on these buggy railways must have less than 256 axles. What is the most likely cause of this bug? A.Round-off error in floating-point arithmetic B.Integer overflow error C.Incorrect use of integer instead of floating-point representation D.Limited precision of floating-point numbers
B.Integer overflow error
A copywriter is writing a help center article for a video conferencing service. This is their draft so far: Bandwidth requirements Recommended bandwidth for meetings: For high quality video: 600 <UNIT> For screen sharing only: 75 <UNIT> For audio call only: 80 <UNIT> What would be the most appropriate unit to replace <UNIT>? A. Seconds B.Kilobits per second C.Seconds per kilobit D.Kilobits
B.Kilobits per second
Ryland is creating an article about commonly used compression algorithms for an online educational site. He's debating whether to express each algorithm in natural language, flow charts, pseudocode, or C++, a general-purpose programming language. Which of these is a good argument for expressing the algorithm in pseudocode? A.Pseudocode can express more detail than natural language, flow charts, and C++. B.Pseudocode doesn't depend on the syntax and subtleties of a particular programming language, so his readers will be able to understand it as long as they know at least one language. C.Pseudocode can be understood by anyone, even those without any programming experience. D.Pseudocode can run on any computer, so all his readers will be able to run the algorithm themselves.
B.Pseudocode doesn't depend on the syntax and subtleties of a particular programming language, so his readers will be able to understand it as long as they know at least one language.
A programmer comes up with an algorithm for reversing a list of strings. This table shows how many steps the algorithm requires for different list lengths. List length 10 50 100 500 Steps 5 25 50 250 Which function best describes how the number of steps changes as the list length (nnn) increases? A. 2/n B n/2 C. n-2 D. n E n^2
B.n/2
How many bits are in 2 bytes? A.2 bits B.8 bits C.16 bits D.32 bits
C.16 bits
Which of these situations describes a computer network? A.An airport provides power outlets next to the seats in the boarding waiting areas. The outlets are constantly in use by passengers charging their laptops and smartphones. B. A programmer runs an algorithm on their computer that can play chess. The algorithm efficiently searches through a graph of all the possible moves and subsequent moves and picks the move with the highest probability of winning. C.A video gaming club sets up six powerful computers in a room and connects them with Ethernet cables to a router. The club members play multiplayer games together. D.A fashion designer creates a glove that changes colors as your fingers move. The glove embeds flex sensors, a microcomputer, and LEDs. The embedded flex sensors are input sources for the microcomputer, relaying the current angle of a finger bend. The microcomputer then runs a program to determine the color and relays that to the LEDs.
C.A video gaming club sets up six powerful computers in a room and connects them with Ethernet cables to a router. The club members play multiplayer games together.
Which of these is an accurate description of how the TCP/IP protocols send data around the internet? A.Computers split messages into packets, and come up with a routing path for the message. Routers send the message along that path until it reaches its final destination. B.Computers split messages into metadata and data, then send the metadata in a separate packet before sending the data packet. Routers send each packet to the receiving computer. C.Computers split messages into packets and send them through routers to their final destination. The destination computer acknowledges the receipt of each packet, so that the sending computer can ensure every packet is delivered. D.Computers split messages into packets. Routers continually send those packets to their final destination. The sending computer does not wait for a response from the receiver, so that it can send packets quickly.
C.Computers split messages into packets and send them through routers to their final destination. The destination computer acknowledges the receipt of each packet, so that the sending computer can ensure every packet is delivered.
Silas develops this algorithm to compute the calories burned for an activity for a given number of minutes and body weight: If the activity is running, compute caloriesPerMin by dividing weight by 10.5 If the activity is walking, compute caloriesPerMin by dividing weight by 15.5 Compute numCalories by multiplying caloriesPerMin by numMinutes He implements the algorithm in an app, and users soon ask for the ability to compute the total calories for multiple sessions of walking or running. What structure must be added to the original algorithm so that it can compute the total across multiple sessions? A.Selection B.Sequencing C.Iteration D.None of the above
C.Iteration
A software engineer at a mapping company is tasked with coming up with an algorithm to solve a new problem. The engineer is nervous about whether they'll be able to solve it. Which of these outcomes is the least likely? A.The engineer may discover that the problem is an undecidable problem, so they will not be able to solve it for all inputs. B.The engineer may discover that the problem is solvable, but requires an unreasonable amount of time to find an optimal solution. C.The engineer may discover that the algorithm is only solvable in a programming language that their company does not use. D.The engineer may invent an algorithm that solves the problem correctly in polynomial time.
C.The engineer may discover that the algorithm is only solvable in a programming language that their company does not use.
I. Numbers II.Text documents III.Photos Which types of data are stored on a computer using bits? A.I only B. I and II only C. I and III only D. I,II and III
D. I,II and III
Which of these values can be stored in a single bit? A.4 B.[0, 1, 0] C.11 D.0
D.0
Consider this sequence of bits: 1011001010010010 How many bytes long is that sequence of bits? A.8 B.4 C.16 D.2
D.2
A ship goes missing in the Pacific Ocean. A programmer develops a program that can analyze satellite imagery for signs of the ship (based on colors and reflections). The programmer tries to run the program on their own computer and realizes their computer is too slow to process all of the satellite imagery of the Pacific Ocean in time for an emergency rescue. They decide to use distributed computing to improve the performance. How could a distributed computing solution help? A.A distributed computing solution would complete each imagery analysis operation more quickly by using heuristics to look for signs of the ship. B.A distributed computing solution can analyze multiple images at once by utilizing all the processors on the computer. C.A distributed computing solution would complete each imagery analysis operation more quickly by using binary search to halve the number of images. D.A distributed computing solution can process multiple images at once by using multiple computers.
D.A distributed computing solution can process multiple images at once by using multiple computers.
Which of the following aspects of the Internet has most increased its scalability? A.A message sent over the Internet on a wired Ethernet connection depends on electricity. B.A government can use hardware or software to restrict the Internet communications coming into the country. C.Networking hardware requires raw materials that must be mined out of the earth, such as copper and tin. D.Any computing device can connect to the Internet as long as it follows the open Internet protocols.
D.Any computing device can connect to the Internet as long as it follows the open Internet protocols.
How often is the Internet Protocol (IP) used in Internet communications? A.It is only used when a computer is loading webpages from the World Wide Web. B.It is used whenever two computing devices are different types of devices (e.g. a laptop and a smartphone) and transfer data to each other over the Internet, but not when they are the same type of device. C.It is only used when a computing device sends a real-time audio stream over the Internet to another computing device. D.It is used whenever two computing devices communicate with each other over the Internet.
D.It is used whenever two computing devices communicate with each other over the Internet.
A computational linguist is creating software that can analyze the sentiment of blog posts and categorize them as "positive" or "negative". Their software has two phases: -Setup: Retrieves the top 10 blog posts of a given author. -Analysis: Classifies the sentiment of each blog post using a machine learning algorithm. The initial setup takes 4 minutes. The analysis operation takes 2 minutes per blog post (20 minutes total for the 10 blog posts). The linguist would like to improve the efficiency by parallelizing the analysis operations. What is true about the potential efficiency gains? A.It's possible for the new version with the parallelized analysis to take a total time of less than 4 minutes (including setup and analysis). B.Once the analysis operations are parallelized, the analysis phase will never take longer than 2 minutes total. C.The version with parallelized analysis operations will always take less time than the sequential version, even if the linguist runs the software on a computer that cannot do parallel computing. D.The parallelized version could reduce the time taken for the analysis phase to less than 4 minutes.
D.The parallelized version could reduce the time taken for the analysis phase to less than 4 minutes.
A photographer puts their photos online and encourages their fans to make memes with the photos by overlaying funny captions. What approach will allow fans to legally make memes of the photos? A.The photographer should write "Copyright © 2019 Todd's Takes" under each of their photos. B.The photographer should write "This work is licensed under a Creative Commons Attribution No Derivatives license." C.The photographer should link to an open source license (like the MIT license) from the gallery page. D.The photographer should write "This work is licensed under a Creative Commons Attribution license."
D.The photographer should write "This work is licensed under a Creative Commons Attribution license."
Byte pair encoding is a compression algorithm that replaces the most common pairs of characters in a string with a character that isn't in the data, and creates a table of replacement mappings. Which of these words could byte pair encoding compress the most? A.balloons B.zookeeper C.ball D.bookkeeper
D.bookkeeper
Which of the following is a single byte of digital information? A.1000 B.0101100001 C.1010100111010111 D.1 E.01010001
E.01010001
Each IP packet contains a destination address. What is the primary purpose of the destination address? A.It prevents the packet from being intercepted by cybercriminals. B.It tells the router where the packet came from. C.It helps the receiving computer reassemble the packets. D.It helps the sending computer know how long to wait before retrying. E.It helps the router know where to send the packet.
E.It helps the router know where to send the packet.