Study Questions for AP CSP Quarter 3 Test

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following best explains how data is transmitted on the Internet?

Data is broken into packets, which can be sent along different paths.

A person wants to transmit an audio file from a device to a second device. Which of the following scenarios best demonstrates the use of lossless compression of the original file?

A. A device compresses the audio file before transmitting it to a second device. The second device restores the compressed file to its original version before playing it.

Which of the following best describes a challenge involved in using a parallel computing solution?

A. A parallel computing solution may not be appropriate for an algorithm in which each step requires the output from the preceding step.

Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system?

A. A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user's computer using the recorded data.

A library of e-books contains metadata for each book. The metadata are intended to help a search feature find books that users are interested in. Which of the following is LEAST likely to be contained in the metadata of each e-book?

A. An archive containing previous versions of the e-book

Researchers have developed a simulation of packets traveling between server computers and client computers in a network. Of the following, which two outcomes are most likely to be results of the simulation? Select two answers.A.

A. Better understanding of the effect of temporarily unavailable network connections D. Better understanding of the impact of increased connection speeds for frequently visited servers

A user wants to save a data file on an online storage site. The user wants to reduce the size of the file, if possible, and wants to be able to completely restore the file to its original version. Which of the following actions best supports the user's needs?

A. Compressing the file using a lossless compression algorithm before uploading it

A group of students take hundreds of digital photos for a science project about weather patterns. Each photo file contains data representing the level of red, green, and blue for each pixel in the photo. The file also contains metadata that describes the date, time, and geographic location where the photo was taken. For which of the following goals would analyzing the metadata be more appropriate than analyzing the data? Select two answers.

A. Determining the chronological order of the photos D. Determining whether two photos were taken at the same location on different days

Which of the following is a primary benefit of making a computing system fault-tolerant?

A. If one component of the system fails, users of the system can often still access it.

According to information in the table, what color is represented by the binary RGB triplet (11111111, 11111111, 11110000) ?

A. Ivory

Which of the following explains a benefit of using open standards and protocols for Internet communication?

A. Open standards and protocols allow different manufacturers and developers to build hardware and software that can communicate with hardware and software on the rest of the network.

Which of the following hypotheses is most consistent with the data in the graph?

A. Participants who read more were generally more likely to say they are interested in the application.

Which of the following is a true statement about the use of public key encryption in transmitting messages?

A. Public key encryption enables parties to initiate secure communications through an open medium, such as the Internet, in which there might be eavesdroppers.

Which of the following parallel computing solutions would minimize the amount of time it takes to execute all four processes?

A. Running processes P and Q on one processor and processes R and S on the other processor

Which of the following best explains how symmetric encryption algorithms are typically used?

A. Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

Which of the following statements best explains the ability of the network to provide fault tolerance?

A. The network is considered fault-tolerant because there are redundant paths between each pair of devices.

According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?

A. about.example.com

Which of the following is an advantage of a lossless compression algorithm over a lossy compression algorithm?

B. A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot.

An individual receives an e-mail that appears to be from an insurance company. The message offers a low insurance rate, and prompts the recipient to click a link to learn more. Which of the following is most indicative that the e-mail is part of a phishing attempt?

B. After clicking the link, a Web page opens that prompts the recipient for personal information.

Which of the following best explains what happens when a new device is connected to the Internet?

B. An Internet Protocol (IP) address is assigned to the device.

Which of the following best explains how fault tolerance in a network is achieved?

B. By providing multiple paths between devices, enabling routing to occur even in the presence of a failed component

Which of the following is an example of symmetric encryption?

B. Finn and Gwen develop a system that maps each letter of the alphabet to a unique symbol using a secret key. Finn uses the key to write a message to Gwen where each letter is replaced with the corresponding symbol. Gwen uses the key to map each symbol back to the original letter.

A computer program uses 4 bits to represent nonnegative integers. Which of the following statements describe a possible result when the program uses this number representation? I. The operation will result in an overflow error. II. The operation will result in an overflow error. III. The operation will result in an overflow error.

B. II only

Internet protocol version 6 (IPv6) has been introduced to replace the previous version (IPv4). Which of the following best describes a benefit of IPv6 over IPv4?

B. IPv6 allows for a greater number of addresses than IPv4, which allows more devices to be connected to the Internet.

Which of the following best explains how the Internet is a fault-tolerant system?

B. The Internet is fault-tolerant because there are usually multiple paths between devices, allowing messages to sometimes be sent even when parts of the network fail.

An online store uses 6-bit binary sequences to identify each unique item for sale. The store plans to increase the number of items it sells and is considering using 7-bit binary sequences. Which of the following best describes the result of using 7-bit sequences instead of 6-bit sequences?

C. 2 times as many items can be uniquely identified.

A video-streaming Web site uses 32-bit integers to count the number of times each video has been played. In anticipation of some videos being played more times than can be represented with 32 bits, the Web site is planning to change to 64-bit integers for the counter. Which of the following best describes the result of using 64-bit integers instead of 32-bit integers?

C. 2^32 times as many values can be represented.

A store uses binary numbers to assign a unique binary sequence to each item in its inventory. What is the minimum number of bits required for each binary sequence if the store has between 75 and 100 items in its inventory?

C. 7

Which of the following best approximates the minimum possible time to execute all three processes when the two processors are run in parallel?

C. 80 seconds

Which of the following best exemplifies the use of multifactor authentication?

C. A Web site requires a user to enter a password as well as a numeric code received via text message before the user can log in to an account.

A certain programming language uses 4-bit binary sequences to represent nonnegative integers. For example, the binary sequence 0101 represents the corresponding decimal value 5. Using this programming language, a programmer attempts to add the decimal values 14 and 15 and assign the sum to the variable total. Which of the following best describes the result of this operation?

C. An overflow error will occur because 4 bits is not large enough to represent 29, the sum of 14 and 15.

Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string more than once and replaces each instance of that pair with a corresponding character that does not appear in the string. The algorithm saves a list containing the mapping of character pairs to their corresponding replacement characters. For example, the string can be encoded as by replacing all instances of with and replacing all instances of with . Which of the following statements about byte pair encoding is true?

C. Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.

Digital images are often represented by the red, green, and blue values (an RGB triplet) of each individual pixel in the image. A photographer is manipulating a digital image and overwriting the original image. Which of the following describes a lossless transformation of the digital image?

C. Creating the negative of an image by creating a new RGB triplet for each pixel in which each value is calculated by subtracting the original value from 255. The negative of an image is reversed from the original; light areas appear dark, and colors are reversed.

When a cellular telephone user places a call, the carrier transmits the caller's voice as well as the voice of the person who is called. The encoded voices are the data of the call. In addition to transmitting the data, the carrier also stores metadata. The metadata of the call include information such as the time the call is placed and the phone numbers of both participants. For which of the following goals would it be more useful to computationally analyze the metadata instead of the data? i. To determine if a caller frequently uses a specific word ii. To estimate the number of phone calls that will be placed next Monday between 10:30 A.M. and noon. iii. To generate a list of criminal suspects when given the telephone number of a known criminal

C. II and III only

A programmer is developing software for a social media platform. The programmer is planning to use compression when users send attachments to other users. Which of the following is a true statement about the use of compression?

C. Lossy compression of an image file generally provides a greater reduction in transmission time than lossless compression does.

A program is used to assign processes to each of the processors. Which of the following describes how the program should assign the four processes to optimize execution time?

C. Processes W and Z should be assigned to one processor, and processes X and Y should be assigned to the other processor.

Which of the following best describes a direct benefit in using redundant routing on the Internet?

C. Redundancy often allows messages to be sent on the network even if some network devices or connections have failed.

In which of the following situations would it be most appropriate to choose lossy compression over lossless compression?

C. Storing music files on a smartphone in order to maximize the number of songs that can be stored

Which of the following best describes the relationship between the World Wide Web and the Internet?

C. The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.

A binary number is to be transformed by appending three 0s to the end of the number. For example, 11101 is transformed to 11101000. Which of the following correctly describes the relationship between the transformed number and the original number?

C. The transformed number is 8 times the value of the original number.

The transmission control protocol (TCP) and Internet protocol (IP) are used in Internet communication. Which of the following best describes the purpose of these protocols?

C. To establish a common standard for sending messages between devices on the Internet

ASCII characters can also be represented by hexadecimal numbers. According to ASCII character encoding, which of the following letters is represented by the hexadecimal (base 16) number 56?

C. V

Which of the following best explains how a certificate authority is used in protecting data?

D. A certificate authority verifies the authenticity of encryption keys used in secured communications.

A list of binary values (0 or 1) is used to represent a black-and-white image. Which of the following is LEAST likely to be stored as metadata associated with the image?

D. A duplicate copy of the data

A video game character can face toward one of four directions: north, south, east, and west. Each direction is stored in memory as a sequence of four bits. A new version of the game is created in which the character can face toward one of eight directions, adding northwest, northeast, southwest, and southeast to the original four possibilities. Which of the following statements is true about how the eight directions must be stored in memory?

D. Four bits are enough to store the eight directions.

A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best explains the result of this configuration as compared to a configuration in which the router does not limit the bandwidth?

D. Guest users will be restricted in the maximum amount of data that they can send and receive per second.

Which of the following is a primary reason for the use of open protocols on the Internet?

D. Open protocols provide a way to standardize data transmission between different devices.

Which of the following best explains the relationship between the Internet and the World Wide Web?

D. The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that is accessed via the Internet.

Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes the ability of the two computers to communicate with each other across the Internet?

D. The computers can communicate directly because Internet communication uses standard protocols.

Which of the following best describes the ability of parallel computing solutions to improve efficiency?

D. The efficiency of a solution that can be broken down into parallel portions is still limited by a sequential portion.

In public key cryptography, the sender uses the recipient's public key to encrypt a message. Which of the following is needed to decrypt the message?

D. The recipient's private key

A user unintentionally installs keylogging software on a computer. Which of the following is an example of how the keylogging software can be used by an unauthorized individual to gain access to computing resources?

D. The software records all user input on the computer. The recorded information is transmitted to an unauthorized individual, who analyzes it to determine the user's login passwords.

Using only the data collected during the 7-day period, which of the following statements is true?

D. The total number of items purchased on a given date can be determined by searching the data for all transactions that occurred on the given date and then adding the number of items purchased for each matching transaction.

Which of the following is a true statement about data compression?

D. There are trade-offs involved in choosing a compression technique for storing and transmitting data.

Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are used?

D. Unauthorized individuals can use data mining and other techniques to guess a user's password.

Which of the following is an example of a phishing attack?

D. Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information

A Web site uses several strategies to prevent unauthorized individuals from accessing user accounts. Which of the following is NOT an example of multifactor authentication?

D. When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.

Which of the following best explains how IP addresses are assigned?

A. As a new device is connected to the Internet, it is assigned an IP address to enable communication on the network.

A bank customer receives an e-mail from a sender claiming to be a bank employee. The e-mail asks the customer to provide personal information and to call a phone number if he or she has any questions. The customer suspects the e-mail might be a phishing attempt. Which of the following responses is most likely to be a privacy risk for the bank customer?

B. Calling the phone number given in the e-mail and providing the personal information over the phone

A digital photo file contains data representing the level of red, green, and blue for each pixel in the photo. The file also contains metadata that describes the date and geographic location where the photo was taken. For which of the following goals would analyzing the metadata be more appropriate than analyzing the data?

B. Determining the likelihood that the photo was taken at a particular public event

Which of the following best explains how messages are typically transmitted over the Internet?

B. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device.

Which of the following can be represented by a single binary digit? Select two answers.

B. The remainder when dividing a whole number by 2 C. The value of a Boolean variable

In which of the configurations is it possible to have redundant routing between devices Q and V?

Both configuration I and configuration II

What is the binary RGB triplet for the color indigo?

C. (01001011, 00000000, 10000010)

Which of the following scenarios best exemplifies a phishing attack?

C. A user receives an e-mail from a sender offering technical help with the user's computer. The e-mail prompts the user to start a help session by clicking a provided link and entering the username and password associated with the user's computer.

Which of the following is a true statement about Internet communication?

C. Every device connected to the Internet is assigned an Internet protocol (IP) address.

Which of the following statements is true about the network?

C. If devices B and F fail, then device A will not be able to communicate with device G.

What ASCII character is represented by the binary (base 2) number 1001010 ?

C. J

Which of the following activities poses the greatest personal cybersecurity risk?

C. Reserving a hotel room by e-mailing a credit card number to a hotel

Individuals sometimes attempt to remove personal information from the Internet. Which of the following is the LEAST likely reason the personal information is hard to remove?

D. All personal information is stored online using authentication measures, making the information hard to access.

Which of the following is an example of an attack using a rogue access point?

A. An unauthorized individual gains the ability to view network traffic by connecting to a network router that uses weak or no security measures.

Consider the following numeric values. Binary 1011 Binary 1101 Decimal 5 Decimal 12 Which of the following lists the values in order from least to greatest?

A. Decimal 5, binary 1011, decimal 12, binary 1101

Which of the following code segments will move the robot from the center square along the same path as the code segment above?

A. count ←← 0 REPEAT 4 TIMES { count ←← count + 1 REPEAT count TIMES { MOVE_FORWARD() } ROTATE_LEFT() }

The following figures represent different ways of configuring a network of physically linked computers labeled P, Q, R, and S. A line between two computers indicates that the computers can communicate directly with each other. In which configuration is it NOT possible to have redundant routing between computers P and S?

B.

Assume that all of the photos that have been taken on the phone are accessible. Which of the following can be determined using the photo data described above? I. The number of photos that were taken at a particular geographic location II. The number of photos that were taken in the last year III. The name of the person who took the most recent photo

B. I and II only

Which of the following statements about the Internet is true?

B. The Internet is designed to scale to support an increasing number of users.

Which of the following is a characteristic of the fault-tolerant nature of routing on the Internet?

B. The ability to provide data transmission even when some connections have failed

Which of the following questions about a particular animal could NOT be answered using only the data collected from the tracking collars?

C. Do the movement patterns of the animal vary according to the weather?

An Internet user has a need to send private data to another user. Which of the following provides the most security when transmitting private data?

C. Sending the data using public-key encryption


Ensembles d'études connexes

Microbiology: A Human Perspective Ch. 3

View Set

1,2,3,4,5,6,7,8,9,12,31 - Test 1 review

View Set

HRIM 442 Ch 17 Exam 3, Marketing Ch 17, Marketing Ch 17-19, Marketing Chapter 17 & 18, Marketing Chapter 17, mkt ch 16, Marketing 4, MKT 301 - Ch. 16, Marketing Chapter 17, Marketing Chapters 16-18, mktg ch 10, MKTG Ch.10, CH.10-, Marketing Exam 3 Qu...

View Set

Ricci, Kyle & Carman - Chapter 7

View Set

AP Biology - Chemistry of Life - Unit I

View Set

LEGAL ENVIRONMENT - CHAPTERS 8 & 9

View Set