AP CSP 2018 Mid Term Review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

1.) HTTP 2.) TCP/IP 3.) DNS

1.) identifies the resource requested 2.) uses a "handshake" to relay packet information 3.) translates the name of a web server to a valid IP address

Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve.

A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption to encrypt their customers' credit card information. Is this a secure form of payment?

Utilize a crowdsourcing website to raise the needed capital.

A problem on many college campuses is the theft of student bicycles. A group of enterprising students has developed a product that can be attached to a bicycle and uses GPS positioning to locate the bike should it be stolen. The students are very technologically savvy but have very little actual business experience. Based on their backgrounds, what is the most likely method the students can use to raise funding for their venture?

The frequency of a particular item occurring in a data set.

A programmer is writing a system that is intended to be able to store large amounts of personal data. As the programmer develops the data system, this is LEAST likely to impact the programmer's choices in designing the structure of the system?

The process she used to save the image utilized a "lossy" compression algorithm.

A student draws a gorgeous digital image on her school computer. She decides she wants to show her brother, so she saves it and later downloads the image onto her home computer. When she opens and resizes the image at home, the quality is noticeably inferior to the original she saved. What is a reasonable explanation for the reduced quality?

First sort by the functional status of the devices in the room. Filter the data to eliminate the working devices. Then filter by the type of device to eliminate desktop computers.

A student is gathering information for the IT department in her school over summer. She uses Google Sheets to collect data about the number of laptops and desktops, and their functional status; working or needs repair with each classroom's data on a separate sheet. What is the most efficient way to create a report for the school that needs information on the unique number of non-working laptops in each classroom?

Decimal (base 10) Hexadecimal (base 16)

A student is taking a survey of her class in order to determine their average hours of sleep per night. She is tracking the number of students in her class that have replied. She sees that the number of students who have replied is represented by the digits "12" but she does not remember what base she used. What are possible bases that the number 12 could be in?

The teacher may realize there are, in fact, other words overused by her students. The teacher may find other words the students use frequently with the word "that", and can help the students find new appropriate expressions. The teacher may decide to study the issue further, and test individual paragraphs in the students' works, or may decide to test all of their essays in one word cloud.

A word cloud is an image made of words which vary in size based on their frequency or importance. A literature teacher is exploring the overuse of the word "that" in her students' writing. The students disagree with the teacher, so the teacher creates a word cloud for each student from their essays to visually demonstrate the frequency of the word "that." What are some possible outcomes of this exploration?

1.) 100 2.) C0 3.) 11000011 4.) 200

Arrange the following four values from smallest to largest. Decimal 200 Binary 11000011 Hexadecimal C0 Decimal 100

Conduct their training sessions via video conference so that teams from across the country engage each other and the host team and receive immediate feedback.

As part of its outreach program, a high school robotics team has decided to offer online programming assistance to other teams across the country. In addition to sharing and demonstrating programming concepts, the team would like to be able to answer questions in real time from other teams across the country. What is the best option for the robotics team to use to achieve its goals?

Phishing

Bill receives an unsolicited e-mail from an address that appears to be his bank. The e-mail is asking Bill to verify his account information in a reply. The e-mail looks legitimate and even has his bank's logo and address. Bill replies to the email with his account number and security information. The next day, Bill receives a call from his bank that his account has been closed and all of the funds have been withdrawn. Bill has been defrauded and is a victim of which e-mail scam?

GIF. Storing the data in pairs allow us only to use the 3 bytes once for each set of consecutive colors.

Both BMP and GIF are lossless formats. Which format is more efficient for storing and representing most images and why?

Facial recognition software that allows officers to instantly run checks on potential suspects.

Computing technology makes large contributions to multiple fields outside of the computer industry. What is NOT a technology advancement in law enforcement that is being used by officers in the field?

TCP/IP

DNS is a higher level of abstraction than

Increase the resolution of an image.

Digital data can be compressed in order to reduce file size, and speed of transmission through a network. While some compression techniques are lossy, others preserve the original data in the compressed form. Compression techniques (lossy or lossless) can do the following EXCEPT

Algorithms for lossless compression exist, so you can use those to compress the images.

Don't remember the question really, but it's something about a person or company wanting to compress an image or something.

redundancy

Ensuring that if any single node in the network were to stop working, packets can still be delivered is an example of this

The compression software uses a lossy compression technique.

Every photo that is saved to disk is retrieved with lower image quality as compared to the original picture. What is the most likely reason for the reduced quality?

32

How many bits are used in the address of an IPv4 packet?

Bob's public key

If Alice wishes to send Bob an encrypted message using public-key encryption, she should encrypt her message with

Letters would be written on the outside of envelopes for all to read instead of letters put inside envelopes. The mailman would sometimes take a different path to deliver each letter to your home.

If the post office delivered mail just as routers deliver messages on the Internet, SELECT 2:

High bandwidth, high latency

Imagine you are playing an online game with your friends. You are at a crucial stage in the basketball game and need just one more free throw to win the game. You see the entire complex scene display quickly. You aim at the hoop to shoot your free throw. You click the shoot button but there is a momentary freeze on your screen only to discover that you have lost the game. What is demonstrated by this situation?

Legal regulations and policies regarding the use of video footage dramatically lags behind the technology that is making increased surveillance possible.

In the United States many communities have CCTV, traffic, and other surveillance cameras to ensure the safety of the people. These systems allow the various governments to gather a lot of data on it citizenry.

Synergy is created in the midst of collaboration. Trust relationships are built and enhanced. Projects are completed more timely and efficiently. Collaborative team members must know the limits of what they can deliver.

In the digital world we live in, collaboration is critical. People must be able to work as members of a functional team in order to get things accomplished. Whether the collaboration is taking place in a conference room or a virtual world, there are some tenets about collaboration that ring true. What is true of effective collaboration?

redundancy

In the process of digging, a landscaping company cuts a fiber line. Transmission of Internet traffic is still possible through additional pathways that provide alternate routes between the source and destination. The additional pathways describe a concept known as:

Descriptive metadata is used for discovery and identification (e.g., a title, subject, or keyword) Administrative metadata gives information to help identify the source (e.g., file type, or when file was created). Structural metadata describes how the components are organized (e.g., the chapters of a book).

Metadata is defined as data about data. What is true about metadata types?

The widgets.cs.fbhs.org name server will send the IP address of widgets.cs.fbhs.org

Monica is surfing the web one day after class. She types the following web address, widgets.cs.fbhs.org, into the URL bar in her browser. Which of the following events is most likely to take place among the DNS servers?

HTTPS ensures that only the client and the server can view the packets sent during their communication and they cannot be intercepted by a third party.

NOT a benefit of the HTTPS protocol?

A Public Key database ensures 3rd party accountability of security

NOT a feature of Public Key Cryptography:

Cousin Josiah comments, "Open standards have been instrumental in the growth of the Internet as multiple networks can be connected without concern so long as they implement established standards."

Since it is well known that you took AP CS Principles, your family decides to discuss the internet with you at a holiday party. Aunt Minnie says, "The Internet is wholly interesting because it is all about the documents and information in the documents enabling us to become smarter as a society". Uncle Jack says, "I love that the Internet connects all the devices such that data can be shared at the speed of light." Cousin Josiah comments, "Open standards have been instrumental in the growth of the Internet as multiple networks can be connected without concern so long as they implement established standards." Which of the above statements are correct?

Information cleansing and classification are often employed in the processing of data by which patterns can emerge Storage, processing, or curation often present significant challenge when processing large datasets

Something about big data, SELECT 2:

McKenzie is creating a video project for her U.S. History class. For her project she has collected several clips from various movies depicting wars that the U.S. has fought. She provides a brief commentary on each clip and then shows the clip before moving on. She uploads her project to a popular video sharing site so her teacher can view it. Robert dreams of being a musician. He has purchased top-of the-line sound editing software for his new laptop. Robert begins creating music using the prebuilt loops and sounds that come with the software. For one piece, Robert copies sixteen bars of instrumental music from a popular pop song. It flows nicely with his original music and he sells the new song though a music site for indie recording artists.

Something about copyright violations, SELECT 2:

A government contractor is on a business trip and attempts to transfer files. His files are too large for his email account, so he creates an account in the cloud to store his file until he gets back to work, where he can retrieve it. An employee receives a call from a person stating that they are with the company's IT department. The caller states that they are in the process of updating the server and needs the employee's username and password.

Something about managing digital data and privacy, SELECT 2:

The costs associated with medical advancements are reduced due to large scale collaboration on the data. Effectively analyzing the large, complex datasets requires abilities beyond the skill sets possessed by a single scientist.

Something about modern day data scientists, SELECT 2 (Might have switched the question with number 22, but the answers are correct regardless)

Allow for nested domain naming (e.g., digitalportfolio.collegeboard.org ) Use cache and redundant servers for quick matching of IP addresses to domain names

The Domain Name System (DNS) is designed to

A chemist is trying to create a new plastic that is less rigid and therefore stronger. He develops a computer program that will allow him to quickly research various chemical properties and compositions that he can utilize in his laboratory experiments.

The power of computers to enhance scientific methods and increase business performance has grown steadily as the technology has improved. Computational science is a growing field. It allows for enhanced experimenting and results-based research. Review the choices below and select the option that would NOT be a valid application of computational science.

A cloud based platform to distribute the files.

The vice president of a technology company has a large set of files to share with multiple employees across a large geographic area. What is the most efficient way for the vice president to accomplish this?

censorship possibility of denial of service attacks

Two disadvantages of the open standard of Internet addressing and routing?

8

We can convert a number from decimal to octal (base 8) by repeatedly subtracting the largest possible powers of what number?

The seven days of the week

What can be represented by a sequence of 3 bits?

Depending on the picture, either asymmetric or symmetric.

What fundamental cryptographic concept is pictured?

You get an email from the IT support desk that asks you to send a reply email with your username and password to verify your account

What is a scenario most characteristic of a phishing attack.

To connect devices and networks all over the world.

What is the primary function of the Internet?

often uses natural language elements allows for code re-use

What is true about high-level programming languages?

A packet travelling between two computers on the Internet may be rerouted many times along the way. A packet contains addressing information to allow routers to decide how best to forward along that packet towards its destination.

What is true about routing on the Internet

Cloud Drive, as it allows for multiple users and version control.

What storage methods makes accessibility of data easiest for people in multiple locations wanting to utilize data?

2 and 3.

Which are true of metadata? 1.) Something about how automatically generated metadata is more accurate than manually created metadata. 2.) Metadata allows users to find relevant information and discover resources. 3.) Metadata can be used to increase the usefulness of data by providing description of the content and context of data.

Aggregation Suppression Data Swapping Adding Random Noise

Which methods can be used to mitigate the risk of possibly releasing personally identifiable information in large data sets

V

Which of C 67 K 75 V 96 Z 112 represented in binary as a byte, contains the most zeros?

Java functionality protocol (or something. it has java in it).

Which protocol standardization is not apart of the IETF (Internet Engineering Task Force)?

Encrypting your files and sharing your private key to ensure others who you choose to share files with can read them.

You decide you are going to take your internet privacy seriously. What action poses the greatest risk to your internet privacy?

the data cannot be read by intermediaries.

You hired the lowest cost Internet service provider to carry your company's Internet traffic. Upon visiting their premises you are a bit concerned about your data being read at their facility. Concerning the security between you and others you communicate with Encrypting the data before transmission ensures that

571 seconds

Your current connection speed is 700 kilobytes per second (kps). Approximately how long will the download take if your video is 400 megabytes in size?

The student is using a personal mobile device that is connected to the Internet through a data plan. The student is using a school device that allowed the configuration of a proxy server to encrypt the data of the blacklisted website.

Your school uses network filtering hardware and software to deny access to blacklisted websites and files. In the school's library there is a student accessing one of the blacklisted websites. two methods the student most likely use to defeat the network filtering. SELECT 2

The ability to provide data transmission even when some connections have failed.

a characteristic of the fault-tolerant nature of communication on the Internet

Population size Food supply Prevalence of illness in herd

a scientist wants to analyze how illness and population size of deer are related to available food sources. Which of the factors most likely need to be included in her program? (This is a NOT question on the test, the 3 listed as the answer are the correct ones, choose the one that's not listed.)

Public key encryption is an encryption method which relies on separate keys for encrypting and decrypting information.

describe the properties of public key encryption

Crowdsourcing solutions using the Internet

has provided for solutions for problems that were unattainable without the massive connectivity provided by the network.

The Chinese government provides its ISPs with lists of keywords that they use to block access to websites and/or webpages that contain those restricted words. The Chinese government hires people to post pro-government messages and look for possible efforts to initiate public protests and/or activism.

two known forms of censorship currently used in China.


Set pelajaran terkait

Gastrulation, Neurulation, and Somitogenesis

View Set

Ch. 1: Introduction to Health Assessment, Ch. 2: Obtaining a Health History, Ch. 3: Techniques and Equipment for Physical Assessment, Ch. 4: General Inspection and Measurement of Vital Signs, Ch. 5: Cultural Assessment, Ch. 6: Pain Assessment, Ch. 7:...

View Set

Chapter 7: Life Insurance Underwriting and Policy Issue

View Set

CRCM Study Flash Cards Tier 1 Regulations - Non Reg Z

View Set