APCSP Midterm Study Questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

How many bits does an IPv4 address have? A. 32 bits B. 64 bits C. 128 bits D. 256 bits

A. 32 bits

Convert 57 (base 10) to base 4 A. 323 B. 321 C. 231 D. 221

B. 321

Which of the following is a true statement about program documentation? A.Program documentation should not be changed after it is first written. B. Program documentation is only needed for programs in development; it is not needed after a program is completed. C. Program documentation is useful when programmers collaborate but not when a programmer works individually on a project. D. Program documentation is useful during initial program development and also when modifications are made to existing programs.

D. Program documentation is useful during initial program development and also when modifications are made to existing programs.

Define decomposition A. Breaking big problems into smaller more manageable pieces. B. Ignoring problems because they are too hard C. The process of computer hardware breaking down when exposed to water D. When a virus slowly breaks down and corrupts files

A. Breaking big problems into smaller more manageable pieces.

Binary numbers are important because a binary number can be converted into every other base. A. True B. False

A. True

Which of the following cannot be represented by a sequence of bits? A. Machine language B. Colors C. Computing Devices D. Integers

C. Computing Devices

Which of the following is an advantage of a lossless compression algorithm over a lossy compression algorithm? A. A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot. B. A lossless compression algorithm typically provides a greater reduction in the number of bits stored or transmitted than does a lossy compression algorithm. C. Both A and B D. None of the Above

A. A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot.

Which of the following activities is most likely to be successful as a citizen science project? A. Collecting pictures of plants from around the world that can be analyzed to look for regional differences in plant growth B. Designing and building a robot to help with tasks in a medical laboratory C. Sorting scientific records and removing duplicate entries in a database with a large number of entries D. Using a simulation to predict the impact of a construction project on local animal populations.

A. Collecting pictures of plants from around the world that can be analyzed to look for regional differences in plant growth

Which of the following best explains how data is typically assembled in packets for transmission over the Internet? A. Each packet contains data to be transmitted, along with metadata containing information used for routing the data B. Each packet contains an encrypted version of the data to be transmitted, along with metadata containing the key needed to decrypt the data C. Each packet contains only the metadata used to establish a direct connection so that the data can be transmitted D. Each packet contains multiple data files bundled together, along with metadata describing how to categorize each data file

A. Each packet contains data to be transmitted, along with metadata containing information used for routing the data

Which data compression algorithm is a destructive process? A. Lossless Data Compression B. Lossy Data Compression

A. Lossless Data Compression

What kind of malicious attack is a virus? A. self- replicating program that embeds itself into other code B. stand-alone self replicating program that targets network resources C. harmful program disguised as a helpful resource D. None of the Above

A. self- replicating program that embeds itself into other code

What is the difference between analog and digital data? A. Analog data can only hold a finite amount. Digital data has endless storage. B. Analog data is detailed infinitely. Digital data can only store finite amounts in binary. C. Analog can has endless storage but is detailed infinitely D. There is no difference between the two

B. Analog data is detailed infinitely. Digital data can only store finite amounts in binary.

Which of the following best explains how fault tolerance in a network is achieved? A. By providing high-bandwidth connections between devices, enabling data packets to be transmitted as quickly as possible B. By providing multiple paths between devices, enabling routing to occur even in the presence of a failed component C. By providing open network protocols, ensuring that all devices on the network are interacting in a standard way D. By providing software to monitor all network traffic, ensuring that data packets are sent and received in the proper order

B. By providing multiple paths between devices, enabling routing to occur even in the presence of a failed component

A programmer is writing a program that is intended to be able to process large amounts of data. Which of the following considerations is LEAST likely to affect the ability of the program to process larger data sets? A.How long the program takes to run B. How many programming statements the program contains C. How much memory the program requires as it runs D. How much storage space the program requires as it runs

B. How many programming statements the program contains

Which of the following best explains how messages are typically transmitted over the Internet? A. The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient's device. B. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device. C. The message is transmitted as a single file and received in whole by the recipient's device. D. The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient's device.

B. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device.

Which of the following actions is most likely to raise legal or ethical concerns? A. An analyst writes a program that scans through a database of open-access scientific journals and creates a document with links to articles written on a particular topic. B. A computer scientist adds several features to an open-source software program that was designed by another individual. C. A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song. D. A public interest group alerts people to a scam that involves charging them for a program that is available for free under a Creative Commons license.

C. A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song.

Convert 7A2 (base 15) to base 11 A. 1300 B. 1321 C. 1230 D. 1330

D. 1330

Which of the following is not a common number system utilized in the representation of data? A. Base 32 B. Base 10 C. Base 2 D. Base 16

D. Base 32

What stage of the design cycle can be skipped, if you feel you are able to do so? A. Developing Ideas B. Inquiring and Analyzing C. Evaluating D. None of the Above

D. None of the Above

Which of the following is a primary reason for the use of open protocols on the Internet? A. Open protocols allow devices to specify how data packets are to be routed on the Internet in advance. B. Open protocols ensure that all data transmission on the Internet is kept secure. C. Open protocols ensure that all Internet users are provided connections with equal bandwidth. D. Open protocols provide a way to standardize data transmission between different devices.

D. Open protocols provide a way to standardize data transmission between different devices.


Set pelajaran terkait

George Washington Leads A New Nation

View Set

Microbiology Final Exam (Mcgraw-Hill) ch 10,5,11,20, 6

View Set

Contracts Short Answer Questions

View Set

Cognition, Traumatic Brain Injury, Unit 4, Sem 4

View Set

Module 6 TR Puzzle (Extra Credit)

View Set