Computer Science 1 Semester Test

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is the decimal value of 11012?

1310

How many different digits are used in the Hexadecimal number system?

16

A news website uses 32-bit integers to count the number of times an article has been viewed. The website is becoming more popular, and expects some of the articles to exceed the number of views that can be represented with 32 bits. In anticipation of this, the website is planning to change to 64-bit integers for the view counter. Which of the following best describes the result of using 64-bit integers instead of 32-bit integers?

232 times as many values can be represented

Suppose the ESPN website uses 8-bit unsigned integers to store how many points a team has scored in an NBA game. For example: 0000 0010 represents 2 points 0000 1000 represents 8 points What is the highest possible score the ESPN website could display?

25510

An IPv4 address has 32 bits, so there are 232 (over 4 billion) possible IPv4 addresses. Since the Internet is gaining devices quickly, we will soon surpass 232 unique devices on the Internet. In anticipation of all the new Internet devices, we are in the process of switching to IPv6, which uses 128 bits for a single address. That's 96 extra bits to represent one address! Which of the following statements correctly describes how many more addresses will be possible to represent by switching from IPv4 to IPv6?

296 times as many addresses can be represented with IPv6

Which of the following statements is the simplest and most accurate definition of a computer?

A computer is something that performs calculations by following and executing specific instructions to solve a problem.

Question: 12 Which of the following choices correctly orders the early types of computers from earliest to most recent?

Abacus, Analytical Engine, ENIAC, IBM Laptop

Which of the following is an example of two factor authentication?

After inputting your password, you receive a text message with a unique pin.

How can you be an upstander if you witness cyberbullying?

All of the above

Which of the following best explains what happens when a new device is connected to the Internet?

An Internet Protocol (IP) address is assigned to the device.

What is the main purpose of the DNS system?

DNS translates the names of websites into IP addresses.

Which of the following is an application of Artificial Intelligence? I. Game AI's II. Foreign language translation III. Recognizing handwriting

I, II, and III

Which of the following people can access your digital footprint? I. Teachers, colleges, and scholarship committees II. Potential employers III. Family, friends, and acquaintances

I-III All

What should you do if you are a victim of cyberbullying? I. Respond to the bully II. Keep a record of messages received (print or take screenshots) III. Reach out to parents, teachers, counselors, and school administrators IV. Block communication from the bully (if possible)

II, III, and IV

A person's digital footprint is:

Public and permanent to anyone

A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet. Which of the following actions is LEAST likely to be effective in this purpose?

Putting helpful tips for operating computers on the city government website

Which of the following is considered an unethical use of computer resources?

Searching online for the answers to CodeHS exercises and quizzes

Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes whether these two computers can communicate with each other across the Internet?

The computers can communicate, but additional hardware is needed to convert data packets from one computer's protocol to the other computer's protocol.

A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent back to the user?

The file is broken into packets and sent over a network. The packets must be reassembled by the user's computer when they are received. If any packets are missing, the browser re-requests the missing packets.

Which of the following pixels has a color value of #00ff00 (expressed in hexadecimal)

green pixel

Refer to the ASCII table from Question 7. Which ASCII character is represented by the decimal (base 10) number 120?

x

If black is 0 and white is 1, which of the following binary codes creates the smiley face pixel image below?

00100100 00000000 01000010 00111100 00000000

Consider the following numbers: The decimal value 1010 The binary value 10012 Hexadecimal value C16 Which of the following lists the numbers in order from least to greatest?

10012, 1010, C16

An online store uses 8-bit binary values to identify each unique item for sale. The store plans to increase number of items it sells and is considering changing to 9-bit binary values. Which of the following best describes the result of using 9-bit values instead of 8-bit values?

2 times as many items can be uniquely identified

Which number system is used to store information digitally in a computer?

Binary (base 2)

Which of the following choices lists the three main components of a computer's hardware?

CPU, Memory, Motherboard

What does CPU stand for?

Central Processing Unit

Which of the following could be TRUE for artificial Intelligence? I. It's the capability of a machine to imitate intelligent human behavior II. It can easily be used to mimic human emotions III. It's a branch of computer science dealing with the simulation of intelligent behaviors in computers IV. It can be easily used to detect irony or sarcasm in a story V. It can be easily used to read body language

I and III

Consider the following network diagram: Each box represents a device connected to the network, each line represents a direct connection between two devices. Which of the following statements are true about this network: I - The network is fault tolerant. If one connection fails, any two devices can still communicate. II - Computers C and E need to first communicate with at least one other device in order to communicate with each other.

I only

Which of the following items is an example of a user application? I. Browser II. Text editor III. Games IV. File Explorer

I, II, III, IV

Which of the following statements is something the operating system of a computer is responsible for doing?

Managing memory allocation for all applications.

Which of the following is not a main method for sending information from one computer to another?

Molecules

Which of the following is not a characteristic of a credible source?

The author is not named on the website

What is the purpose of a network device?

To allow computers to connect and communicate with other computers.

What is the purpose of an output device?

To allow the computer to display or communicate the result of a computation

What is the purpose of an input device?

To allow the user to give data or information to the computer.

Fiber optic cables transfer data at the speed of light, so they have the _______________ latency. This results in the __________ connection.

lowest, fastest

ASCII is a character encoding scheme that uses a numeric value to represent each character. A subset of characters (in the "Char" column) and their corresponding ASCII values are shown in the table below: ASCII characters can also be represented by hexadecimal (base 16) numbers. According to the ASCII character encoding, which of the following characters is represented by the hexadecimal (base 16) number 6E16

n

Which of the following is a benefit of the fault-tolerant nature of Internet routing?

The ability to provide data transmission even when some connections between routers have failed

How many different values can be represented using 4 bits?

16 different values

What is the main purpose of routers?

Routers connect computers and choose the path that information takes from one computer to another.

Which of the following best describes the basic purpose of the internet?

The internet sends information from one computer to another.

The RGB encoding scheme encodes a color using 24 bit sequences. The first 8 bits encode the amount of red in the color, the next 8 bits encode the amount of green in the color, and the last 8 bits encode the amount of blue in the color. Which of the following is a true statement about the color encoded by this binary sequence: 1110 1001 0111 1100 0000 1111

This color is mostly red.

Which of the following is a benefit that online shopping websites provide over brick and mortar stores?

Users can easily see product reviews and determine if an item has been satisfactory for a large number of people

According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?

about.example.com

A computer program uses 3 bits to represent integers. When the program adds the decimal (base 10) numbers 6 and 2, the result is 0. Which of the following is the best explanation for this result?

An overflow error occurred.

Which of the following is not a good practice for effective Internet searches?

Be general in your search query to get as many results possible

True or False: As long as you cite your source, you are free to use or share any kind of media you find on the Internet.

False

By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, even if you change your settings.

False. It depends if the privacy policy allows you to opt in or out of sharing data.

Which of the following pieces of information would be safe to include in an online username?

Favorite sport

Choose the option that correctly identifies this picture:

Motherboard

Which of the following devices is the device that connects all of the physical components of a computer together?

Motherboard

Which of the following choices is a brand-new application of computers, having come about in the past 5 years? I. Analyzing data II. Solving mathematical equations III. Making predictions about future events based on data gathered about past events

None of the answers

Which part of the computer is responsible for managing memory allocation for all applications?

Operating system


संबंधित स्टडी सेट्स

Basic Vehicle Technologies 2 Safety

View Set

Chapter 23: The Digestive System

View Set

ch. 25 Structure and Function of the Cardiovascular System

View Set

C for Everyone: Programming Fundamentals Final Exam (Week 6 Coursera)

View Set