apcsp exam tri 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works. The members of the IETF are:

A loosely organized collection of citizens and engineers.

Which of the following is NOT true about TCP/IP packets?

TCP guarantees that no packets are ever dropped

According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?

about.example.com

According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?

about.example.com

Approximately how much bigger (how many more bytes) is a megabyte than a kilobyte?

1,000 times bigger

Consider the following three binary numbers: 01010 010000 1110 Which of the following lists the numbers in order from least to greatest?

01010 1110 010000

Select the answer that lists the units of bytes in ascending order (from smallest to largest)

1 bit (binary digit*) = the value of 0 or 1 8 bits = 1 byte 1024 bytes = 1 kilobyte 1024 kilobytes = 1 megabyte 1024 megabytes = 1 gigabyte 1024 gigabytes = 1 terabyte 1024 terabytes = 1 petabyte 1024 petabytes = 1 exabyte

What is the 4-bit binary number for the decimal number Ten (10)?

1010

Two students have developed a protocol in which they send 4-bit messages to each other. They decide to modify their protocol to start sending 8-bit messages instead. How many more values can be represented in an 8-bit message than a 4-bit message?

24 = 16 times as many values

A video-streaming Web site uses 32-bit integers to count the number of times each video has been played. In anticipation of some videos being played more times than can be represented with 32 bits, the Web site is planning to change to 64-bit integers for the counter. Which of the following describes the result of using 64-bit integers instead of 32-bit integers?

2^32 times as many

The world is currently in a transition to using IPv6, a newer version of the IP protocol that uses 128-bit addresses instead of 32-bit addresses used by IPv4. What is the main problem that IPv6 was created to solve?

32-bit addresses could not ensure that every internet-connected device can receive a unique IP address

What is the minimum number of bits you would need to encode the 26 letters of the alphabet plus a space - a total of 27 characters?

5 bits

8 bits is enough to represent 256 different numbers. How many total bits do you need to represent 512 (twice as many) numbers?

9 bits

Which of the following statements are true about routers and routing on the Internet. Choose two answer

A packet traveling between two computers on the Internet may be rerouted many times along the way or even lost or "dropped". Routers act independently and route packets as they see fit.

ASCII is a character-encoding scheme that uses a numeric value to represent each character. For example, the uppercase letter "G" is represented by the decimal (base 10) value 71. A partial list of characters and their corresponding ASCII values are shown in the table below. https://images.code.org/b904412c88623430eb43aea06b334af7-image-1461448943197.PNG ASCII characters can also be represented by binary numbers. According to ASCII character encoding, which of the following letters is represented by the 8-bit binary value: 0100 0010

ASCII Character: B

A middle school is expanding to open a high school next year, doubling the total number of students. The school keeps a database in which each student's unique ID number is stored as an 8 bit number called studentID. Before the arrival of the new students almost every 8 bit number has already been assigned to a student. Of the options provided below, which is the smallest change to the way studentID is represented necessary to ensure each incoming student receives a unique ID?

Add a bit to studentID to double the number of IDs that the database can represent.

There are 32 students standing in a classroom. Two different algorithms are given for finding the average height of the students. Algorithm A Step 1: Step 2: Step 3: Step 4: Step 5: All students stand. A randomly selected student writes his or her height on a card and is seated. A randomly selected standing student adds his or her height to the value on the card, records the new value on the card, and is seated. The previous value on the card is erased. Repeat step 3 until no students remain standing. The sum on the card is divided by 32. The result is given to the teacher. Algorithm B Step 1: Step 2: Step 3: Step 4: Step 5: All students stand. Each student is given a card. Each student writes his or her height on the card. Standing students form random pairs at the same time. Each pair adds the numbers written on their cards and writes the result on one student's card; the other student is seated. The previous value on the card is erased. Repeat step 3 until one student remains standing. The sum on the last student's card is divided by 32. The result is given to the teacher. Which of the following statements is true?

Both Algorithm A and Algorithm B always calculate the correct average.

This question refers to the same data from the High School Survey about college plans from the previous question. Amara decides to make a visualization of a portion of the responses showing only a few states and a few areas of study. She wants to make an effective visualization that shows for comparison: Students' average likelihood of attending college in-state broken down by which state they live in and what they plan to major in. For example, in Illinois (IL) on average students who want to study economics are very likely to say they want to attend college in-state. Amara makes four different visualizations shown below (marked A, B, C, D). According to good principles of visualization, and for what Amara wants to show, which one of these would be considered the best visual representation?

Chart B (Vertical Bar Chart)

The figure represents a network of physically linked computers labeled A through F. A line between two computers indicates that the computers can communicate directly with each other. Any information sent between two computers that are not directly connected must go through at least one other computer. The weight or cost of sending information from one computer to another is indicated by the number above the line. For example, information can be sent directly between computers A, and B and will cost 5. Information sent between computers A and D must go through either computer C (with total cost 5), or through computer B (with total cost 8) https://images.code.org/e4cea982e5881df71e417c2f6d6dc45a-image-1463323561451.png Question: Computer A sends a packet intended to reach computer F. Along its path it arrives at Computer C. Which computer should Computer C forward the packet to in order to use the most cost effective path?

Computer D

Which of the following statements describes a limitation of using a computer simulation to model a real-world object or system?

Computer simulations usually make some simplifying assumptions about the real-world object or system being modeled.

Consider the following numbers given in Binary (BIN), Decimal (DEC), and Hexadecimal (HEX) representations: BIN: 1110 DEC: 13 HEX: F Which of the following lists the numbers in order from least to greatest?

DEC: 13, BIN: 1110, HEX: F

Biologists ften attach tracking collars to wild animals. For each animal, the following geolocation data is collected at frequent intervals. time date location of the animal Which of the following questions about a particular animal could NOT be answered using only the data collected from the tracking collars?

Do the movement patterns of the animal vary according to the weather?

Biologists often attach tracking collars to wild animals. For each animal, the following geolocation data is collected at frequent intervals. The time The date The location of the animal Which of the following questions about a particular animal could NOT be answered using only the data collected from the tracking collars?

Do the movement patterns of the animal vary according to the weather?

An artist makes an RGB raster image in which each pixel color is encoded with 12-bits --- 4 bits each for red, green and blue. Which of the following correctly shows the hexadecimal value for Red as a 12-bit representation.

F00

A programmer completes the user manual for a video game she has developed and realizes she has reversed the roles of goats and sheep throughout the text. Consider the programmer's goal of changing all occurrences of "goats" to "sheep" and all occurrences of "sheep" to "goats." The programmer will use the fact that the word "foxes" does not appear anywhere in the original text. Which of the following algorithms can be used to accomplish the programmer's goal?

First, change all occurrences of "goats" to "foxes." Then, change all occurrences of "sheep" to "goats." Last, change all occurrences of "foxes" to "sheep."

The Chart below from Google Trends shows the prevelance of some search terms in the United States between 2004 and the present. Which of the following is the most accurate statement of what this chart is showing. https://images.code.org/56a21ebf1889a58b0954483f4ccb9bdf-image-1470159033425.png

Generally speaking, since 2009 more people use "red" in their search terms more than they use "blue", "yellow", "green", or "purple"

The various protocols in use on the internet are said to operate in layers in which the protocol(s) at each layer solve one problem related to networked communication, and higher layers are built on top of, and rely on, the lower layers to do their jobs. From the list provided choose the two (2) answers that correctly describe which internet protocol relies on the other. For example: if protocol A relies on protocol B, it means that A is a higher level protocol than B, and thus protocol B must exist and work properly in order for protocol A to do its job.

HTTP relies on TCP/IP DNS relies on TCP/IP

What is the best explanation for why digital data is represented in computers in binary?

It's easier, cheaper, and more reliable to build machines and devices that only have to distinguish between binary states.

How does a computer resolve a domain name into an IP address?

It asks a DNS server for the corresponding IP address

A compression scheme for long strings of bits called run-length encoding is described as follows: Rather than record each 0 and 1 individually, instead record "runs" of bits by storing the number of consecutive 1s and 0s that appear. Since it's binary, any run of 0s must be followed by a run of 1s (even if the run is only 1-bit long) and vice versa. Thus, you can store a list of small numbers that represents the alternating runs of 0s and 1s. Here is an example: https://images.code.org/e36d29fd5a1cf276b4a0437cbc5c9235-image-1470149724968.png To uncompress the data back into its original binary state, you simply reverse the process. This technique is an example of what type of compression?

Lossless compression

The colors of the pixels in a digital image are often represented by red, green, and blue values between 0 and 255 (an RGB triplet). A photographer is manipulating a digital image to lighten it because all of the RGB values in the image are less than 100, making it very dark. He does this by adding 20 to the R, G, and B values of each pixel, then overwriting the original image. What type of transformation is the photographer using on the digital image?

Lossless transformation

A raw digital sound file samples a sound wave at some interval and measures the height of the wave at each point. Thus, raw sound is recorded as a list of numbers. In very broad terms the MP3 audio compression algorithm identifies frequencies and volume levels - low and high - that are outside the range of human hearing and removes the data representing these frequencies from the original. This technique results in a smaller audio file that sounds exactly the same to the human ear. This technique is an example of what type of compression?

Lossy compression

A user clicks on a website, and it begins to load immediately, but it takes a long time to load completely and pictures appear slowly, one by one. Which of the following is demonstrated through this situation?

Low bandwidth, low latency

Which of the following BEST describes how protocols on the Internet (e.g. IP, TCP, HTTP) make use of abstraction to accomplish their respective purposes?

Low level protocols can provide functionality to high level protocols without revealing the details of how this is accomplished.

The next 3 questions all refer to data collected in a hypothetical survey of high school seniors, and a student, Amara, who is working with this data. The survey of high school seniors asked: What state do you live in? How likely are you to attend college in your home state? (on a scale of 1-5, 5 meaning "very likely") What do you plan to study? Amara does an initial computation on the data to make a summary table. A small segment is shown below. https://images.code.org/ff9364011a142bbef6eab000897d8db4-image-1470316223714.png Amara is tasked with cleaning the data to prepare it for further analysis. Which of the following would be the least appropriate modifications to make to the data to prepare it for further analysis?

Round up all non-integer values for "Likelihood of staying in state"

The AP CS Principles framework contains the following statement: 7.1.1G Search trends are predictors. Which of the following is the most accurate statement about using search trends as predictors of future events?

Search trends are imperfect predictors of future events that may not fully represent society at large.

This question refers to the same data from the High School Survey about college plans from the previous question. Amara plans to use the survey data to create a visualization and short write up about students' plans for college, but first she wants to learn more about how the survey was conducted. Of the following things she might learn about the survey, which are the most likely sources of bias in the results based how it was collected? Choose two answers.

She learns that responses were collected only by mobile app. She learns that the survey was only available to students who scored at the top 10% on the PSAT.

A programmer is writing a system that is intended to be able to store large amounts of personal data. As the programmer develops the data system, which of the following is LEAST likely to impact the programmer's choices in designing the structure of the system?

The frequency of a particular item occurring in a data set.

Which of the following is a true statement about data compression?

There are trade-offs involved in choosing a compression technique for storing and transmitting data.

A certain social media Web site allows users to post messages and to comment on other messages that have been posted. When a user posts a message, the message itself is considered data. In addition to the data, the site stores the following meta data. The time the message was posted The name of the user who posted the message The names of any users who comment on the message and the times the comments were made For which of the following goals would it be more useful to analyze the data instead of the metadata?

To determine the topics that many users are posting about

A certain social media Web site allows users to post messages and to comment on other messages that have been posted. When a user posts a message, the message itself is considered data. In addition to the data, the site stores the following metadata: 1. The time the message was posted 2. The name of the user who posted the message 3. The names of any users who comment on the message and the times the comments were made For which of the following goals would it be more useful to analyze the data instead of the metadata?

To determine the topics that many users are posting about

A school starts tracking which websites each computer in the school is visiting by monitoring the packets leaving the school. A sample of the information they have collected appears below: IP Address Time URL ... ... ... 1.1.1.1 11:05:23.22 example.com 1.5.1.8 11:05:29.71 news.com 1.1.5.1 11:06:13.48 sports.com 1.5.1.8 11:08:09.95 example.com ... ... ... 1.1.5.1 17:04:29.20 news.com Which of the following is MOST likely to be answerable using all the data collected by this monitoring?

Which websites are most frequently visited before and after school hours from a school computer

Number systems with different bases such as binary (base-2), octal (base-8), decimal (base-10), and hexadecimal (base-16), are all used to view and represent digital data. Which of the following is NOT true about representing digital data?

When data is large enough computers switch to using decimal representation instead of binary, because you can represent larger numbers with fewer digits.

Under which of the following conditions is it most beneficial to use a heuristic approach to solve a problem?

When the problem cannot be solved in a reasonable time and an approximate solution is acceptable

Under which of the following conditions is it most beneficial to use a heuristic approach to solve a problem?

When the problem cannot be solved in a reasonable time and an approximate solution is acceptable.

A bakery collects data on sales. Each sales record includes the date of the sale and some metadata about the items that were part of the sale. The data includes: the names of the items sold, the types of items sold, the number of each item sold, and the price of each item sold. Which of the following CANNOT be determined from the bakery's data set?

Which customer most frequently purchases bread.

The image below shows an encoding for a black and white pixel image. The first two bytes of the data (circled in red) are used to encode the width and height of the image. What is the best term for this type of "data about the data"? https://images.code.org/2c8176f4d417465876c036a3d4cb0ad8-image-1470152993359.png

metadata

The table below shows the time a computer system takes to complete a specified task on the customer data of different-sized companies. Based on the information in the table, which of the following tasks is likely to take the longest amount of time when scaled up for a very large company of approximately 100,000 customers?

sorting data

ASCII is a character-encoding scheme that uses a numeric value to represent each character. For example, the uppercase letter "G" is represented by the decimal (base 10) value 71. A partial list of characters and their corresponding ASCII values are shown in the table below https://media.quizizz.com/resource/gs/quizizz-media/questions/L2FwcGhvc3RpbmdfcHJvZC9ibG9icy9BRW5CMlVwOXVKSWdjM0VpNVptZnBJaHk4WjF2WmtuR210NS1MZTlBWWY2OGhlcUpjakNUdEtoVW9JR1N1UU1FN3NaWTBudzI1U1M2YTEzOGcwYmFnNGw5SDFmOWVlTVVIQS5WY3l5cUtXdFNyYWYtVFR4?w=200&h=160

v


Set pelajaran terkait

Which sentence is Grammarly correct?

View Set

Simple, Compound, and Complex Sentences

View Set

ENGL 2646EL 12 - The Study and Evolution of the English Language

View Set

Chapter 5: Price Elasticity of Demand and Supply

View Set

HU2000: Critically Thinking- Analyze Arguments and Diagram Decisions (Ch. 5) & Evaluate the Credibility of Claims and Sources (Ch. 6) REVIEW QUIZ

View Set

EXIT HESI Review, EXIT ALL HESI CUSTOM, Exit HESI 2021, Hesi exit #2

View Set

Roman Numerals (1, 5, 10, 20, 30, 40, 50, 60, 70, 80, 90, 100, 500, 1000)

View Set

Theology 7 - Chapter 11 - Jesus Founds His Church

View Set

ECON 201 - Quiz 3: Check Your Understanding

View Set

Adult Psych Midterm Chap 1 Multiple Choice

View Set

MRKT 345 Midterm Exam Chapters 8-11

View Set