Comp Sci

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

According to Moore's Law, increases in technological performance should approximately double every year. If this holds true, by what factor can performance be expected to increase over 5 years? 10 times 100 times 32 times 16 times

32 times

l = input h = input perimeter = <missing code> Display perimeter What belongs in the missing code if perimeter = 2l + 2h? 2 x (l x h) (2 * l) + (2 * h) 2 l + 2 h l + h

(2 * l) + (2 * h)

To be eligible for a particular ride at an amusement park, a person must be at least 12 years old and must be between 50 and 80 inches tall, inclusive. Let age represent a person's age, in years, and let height represent the person's height, in inches. Which of the following expressions evaluates to true if and only if the person is eligible for the ride? (age ≥ 12) AND ((height ≥ 50) AND (height ≤ 80)) (age ≥ 12) AND ((height ≤ 50) AND (height ≥ 80)) (age ≥ 12) AND ((height ≤ 50) OR (height ≥ 80)) (age ≥ 12) OR ((height ≥ 50) AND (height ≤ 80)))

(age ≥ 12) AND ((height ≥ 50) AND (height ≤ 80))

y = 2 repeat until condition y = y - 5 What condition would get an infinite loop? y = -108 y != -3 y >= 8 y < -53

y >= 8

When green flag pressed repeat forever if __ then go to x: 0, y: 0 This Scratch program is intended to send the sprite back to the center of the screen if it moves too close to the bottom of the window. Based on the intention, which answer choice carries this out? y position < 175 y position < -175 x position < 175

y position < -175

Consider the following segment of code. IF (num > 10) { num ← num * 2 } IF (num < 40) { num ← num / 2 } DISPLAY (num) Which of the following numbers, if originally assigned to num, would display the same value for num after executing the above block of code? 1 10 15 20

15

What would be the final value of the variable var3 once the following program has run? var1 ← 4 var2 ← 2 var3 ← var1 + var2 var1 ← var3 * var2 var2 ← var2 + var1 - var3 var3 ← var1 + var2 6 8 12 20

20

num = random(10,20) - random(0,10) num = random(num-5, num+5) What is the maximum number "num" can be? 10 15 20 25

25

A certain computer has two identical processors that are able to run in parallel. The table below indicates the amount of time it takes each processor to execute each of two processes. Assume that neither process is dependent on the other. P = 30 sec Q = 40 sec Which of the following best approximates the difference in execution time between running the two processes in parallel instead of running them one after the other on a single processor? Responses 15 seconds 30 seconds 45 seconds 75 seconds

30 seconds

A store uses binary numbers to assign a unique binary sequence to each item in its inventory. What is the minimum number of bits required for each binary sequence if the store has between 75 and 100 items in its inventory? 5 6 7 8

7

A sorted list of numbers contains 128 elements. Which of the following is closest to the maximum number of list elements that can be examined when performing a binary search for a value in the list? 2 8 64 128

8

if a < 5 and b >= 5 and c > 0 num = a - b + c display The number is + num Which input values will get the message, The number is 10? A = 5 B = 7 C = 12 A = 4 B = 5 C = 1 A = 3 B = 3 C = 10 A = 2 B = 6 C = 6

A = 4 B = 5 C = 1

The following code segment is intended to remove all duplicate elements in the list myList. The procedure does not work as intended. j ←← LENGTH(myList) REPEAT UNTIL(j = 1) { IF(myList[j] = myList[j - 1]) { REMOVE(myList, j) } j ←← j - 1 } For which of the following contents of myList will the procedure NOT produce the intended results? Select two answers. A. [10, 10, 20, 20, 10, 10] B. [30, 30, 30, 10, 20, 20] C. [30, 50, 40, 10, 20, 40] D. [50, 50, 50, 50, 50, 50]

A and C

A group of students take hundreds of digital photos for a science project about weather patterns. Each photo file contains data representing the level of red, green, and blue for each pixel in the photo. The file also contains metadata that describes the date, time, and geographic location where the photo was taken. For which of the following goals would analyzing the metadata be more appropriate than analyzing the data? Select two answers. A. Determining the chronological order of the photos B. Determining the number of clouds in a particular photo C. Determining whether a photo is suitable for printing in black-and-white D. Determining whether two photos were taken at the same location on different days

A and D

Which of the following actions is most likely to raise legal or ethical concerns? An analyst writes a program that scans through a database of open-access scientific journals and creates a document with links to articles written on a particular topic. A computer scientist adds several features to an open-source software program that was designed by another individual. A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song. A public interest group alerts people to a scam that involves charging them for a program that is available for free under a Creative Commons license.

A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song.

Which of the following best describes a challenge involved in using a parallel computing solution? A. A parallel computing solution may not be appropriate for an algorithm in which each step requires the output from the preceding step B. A parallel computing solution may not be appropriate for an algorithm in which the same formula is applied to many numeric data elements C. A parallel computing solution may not be appropriate for an algorithm that can be easily broken down into small independent tasks D. A parallel computing solution may not be appropriate for an algorithm that searches for occurrences of a key word in a large number of documents

A. A parallel computing solution may not be appropriate for an algorithm in which each step requires the output from the preceding step

Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system? A. A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user's computer using the recorded data B. A user has a very common password for an online banking account. Someone else guesses the password after a few attempts and gains access to the user's account C. A user logs into an unsecure Web site. Someone else is able to view unencrypted log-in information as it is transmitted over the Internet. The user has the same username and password for multiple accounts, so the user's log-in information for multiple systems may be compromised D. A user receives an e-mail that claims to be from the user's bank. The e-mail instructs the user to click on a link to a Web site and enter a username and password to verify an account. Shortly after following the steps, the user discovers that the Web site is fraudulent and that the user's username and password were stolen

A. A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user's computer using the recorded data

Which of the following is an example of an attack using a rogue access point? A. An unauthorized individual gains the ability to view network traffic by connecting to a network router that uses weak or no security measures B. An unauthorized individual physically disconnects an exposed network router, making the network unavailable to some users C. An unauthorized individual poses as a network administrator and attempts to trick a user into providing personal information D. A group of unauthorized individuals overwhelms a network router with traffic, making it unavailable to some users

A. An unauthorized individual gains the ability to view network traffic by connecting to a network router that uses weak or no security measures

Which of the following research proposals is most likely to be successful as a citizen science project? A. Collecting pictures of birds from around the world that can then be analyzed to determine how location affects bird size B. Monitoring a group of cells in a laboratory to determine how growth rate is affected by exposure to varying temperatures C. Using a simulation to determine which one from a set of chemicals causes the most significant change to local animal and plant life D. Using specialized equipment to perform three-dimensional scans of complex proteins found in human cells

A. Collecting pictures of birds from around the world that can then be analyzed to determine how location affects bird size

Which of the following is a true statement about the use of public key encryption in transmitting messages? A. Public key encryption enables parties to initiate secure communications through an open medium, such as the Internet, in which there might be eavesdroppers B. Public key encryption is not considered a secure method of communication because a public key can be intercepted C. Public key encryption only allows the encryption of documents containing text; documents containing audio and video must use a different encryption method D. Public key encryption uses a single key that should be kept secure because it is used for both encryption and decryption

A. Public key encryption enables parties to initiate secure communications through an open medium, such as the Internet, in which there might be eavesdroppers.

A certain computer has two identical processors that are able to run in parallel. The following table indicates the amount of time it takes to execute each of four processes on a single processor. Assume that none of the processes is dependent on any of the other processes. P = 30 seconds Q = 10 seconds R = 20 seconds S = 15 seconds Which of the following parallel computing solutions would minimize the amount of time it takes to execute all four processes? A. Running processes P and Q on one processor and processes R and S on the other processor B. Running processes P and R on one processor and processes Q and S on the other processor C. Running processes P and S on one processor and processes Q and R on the other processor D. Running process P on one processor and processes Q, R, and S on the other processor

A. Running processes P and Q on one processor and processes R and S on the other processor

Each student at a school has a unique student ID number. A teacher has the following spreadsheets available. -Spreadsheet I contains information on all students at the school. For each entry in this spreadsheet, the student name, the student ID, and the student's grade point average are included. -Spreadsheet II contains information on only students who play at least one sport. For each entry in this spreadsheet, the student ID and the names of the sports the student plays are included. -Spreadsheet III contains information on only students whose grade point average is greater than 3.5. For each entry in this spreadsheet, the student name and the student ID are included. -Spreadsheet IV contains information on only students who play more than one sport. For each entry in this spreadsheet, the student name and the student ID are included. The teacher wants to determine whether students who play a sport are more or less likely to have higher grade point averages than students who do not play any sports. Which of the following pairs of spreadsheets can be combined and analyzed to determine the desired information? A. Spreadsheets I and II B. Spreadsheets I and IV C. Spreadsheets II and III D. Spreadsheets III and IV

A. Spreadsheets I and II

Which of the following best explains how symmetric encryption algorithms are typically used? A. Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data B. Symmetric encryption uses a single key that should be made public. The same key is used for both encryption and decryption of data C. Symmetric encryption uses two keys that should both be kept secret. One key is used for encryption, and the other is used for decryption D. Symmetric encryption uses two keys. The key used for encryption should be made public, but the key used for decryption should be kept secret

A. Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data

An online gaming company is introducing several new initiatives to encourage respectful communication between players of online games. Which of the following best describes a solution that uses crowdsourcing? A. The company allows individual players to endorse fellow players based on courteous interactions. Once a player receives enough endorsements, the player is given free rewards that can be used during gameplay B. The company eliminates chat from gameplay and sets the default chat policy to off. Players must actively turn on chat to converse outside of gameplay C. The company introduces software that monitors all chats. Inappropriate conversations are identified, and players involved in the conversations are banned from the game D. The company updates the acceptable content guidelines to explicitly describe appropriate and inappropriate behavior. All players must electronically sign an agreement to adhere to the guidelines

A. The company allows individual players to endorse fellow players based on courteous interactions. Once a player receives enough endorsements, the player is given free rewards that can be used during gameplay

A video-streaming Web site keeps count of the number of times each video has been played since it was first added to the site. The count is updated each time a video is played and is displayed next to each video to show its popularity. At one time, the count for the most popular video was about two million. Sometime later, the same video displayed a seven-digit negative number as its count, while the counts for the other videos displayed correctly. Which of the following is the most likely explanation for the error? A. The count for the video became larger than the maximum value allowed by the data type used to store the count B. The mathematical operations used to calculate the count caused a rounding error to occur C. The software used to update the count failed when too many videos were played simultaneously by too many users D. The software used to update the count contained a sampling error when using digital data to approximate the analog count

A. The count for the video became larger than the maximum value allowed by the data type used to store the count

Which of the following applications is most likely to benefit from the use of crowdsourcing? An application that allows users to convert measurement units (e.g., inches to centimeters, ounces to liters) An application that allows users to purchase tickets for a local museum An application that allows users to compress the pictures on their devices to optimize storage space An application that allows users to view descriptions and photographs of local landmarks

An application that allows users to view descriptions and photographs of local landmarks

Assume that the Boolean variable hot is assigned the value true and the Boolean variable humid is assigned the value false. Which of the following will display the value true? A. If hot, display hot AND humid B. If NOT humid, display hot OR humid C. If hot OR humid, display hot D. If hot AND humid, display hot

B and C

In the following procedure, the parameter age represents a person's age. The procedure is intended to return the name of the age group associated with age. People who are under 18 are considered minors, people who are 65 and older are considered senior citizens, and all other people are considered adults. The procedure does not work as intended. Line 1: PROCEDURE ageGroup(age) Line 2: { Line 3: result ←← "adult" Line 4: IF(age ≥ 65) Line 5: { Line 6: result ←← "senior citizen" Line 7: } Line 8: RETURN(result) Line 9: Line 10: result ←← "adult" Line 11: IF(age < 18) Line 12: { Line 13: result ←← "minor" Line 14: } Line 15: RETURN(result) Line 16: } Removing which two lines of code will cause the procedure to work as intended? Select two answers. A. Line 3 B. Line 8 C. Line 10 D. Line 15

B and C

A company delivers packages by truck and would like to minimize the length of the route that each driver must travel in order to reach n� delivery locations. The company is considering two different algorithms for determining delivery routes. Algorithm I: Generate all possible routes, compute their lengths, and then select the shortest possible route. This algorithm does not run in reasonable time. Algorithm II: Starting from an arbitrary delivery location, find the nearest unvisited delivery location. Continue creating the route by selecting the nearest unvisited location until all locations have been visited. This algorithm does not guarantee the shortest possible route and runs in time proportional to n^2 Which of the following best categorizes algorithm II? A. Algorithm II attempts to use an algorithmic approach to solve an otherwise undecidable problem B. Algorithm II uses a heuristic approach to provide an approximate solution in reasonable time C. Algorithm II provides no improvement over algorithm I because neither algorithm runs in reasonable time D. Algorithm II requires a much faster computer in order to provide any improvement over algorithm I

B. Algorithm II uses a heuristic approach to provide an approximate solution in reasonable time

Which of the following best explains how an analog audio signal is typically represented by a computer? A. An analog audio signal is measured as input parameters to a program or procedure. The inputs are represented at the lowest level as a collection of variables B. An analog audio signal is measured at regular intervals. Each measurement is stored as a sample, which is represented at the lowest level as a sequence of bits C. An analog audio signal is measured as a sequence of operations that describe how the sound can be reproduced. The operations are represented at the lowest level as programming instructions D. An analog audio signal is measured as text that describes the attributes of the sound. The text is represented at the lowest level as a string

B. An analog audio signal is measured at regular intervals. Each measurement is stored as a sample, which is represented at the lowest level as a sequence of bits

Which of the following best explains how data is transmitted on the Internet? A. Data is broken into packets, which are all sent to the recipient in a specified order along the same path B. Data is broken into packets, which can be sent along different paths C. All data is transmitted in a single packet through a direct connection between the sender and the recipient D. Multiple data files are bundled together in a packet and transmitted together

B. Data is broken into packets, which can be sent along different paths

A city maintains a database of all traffic tickets that were issued over the past ten years. The tickets are divided into the following two categories. -Moving violations -Nonmoving violations The data recorded for each ticket include only the following information. -The month and year in which the ticket was issued -The category of the ticket Which of the following questions CANNOT be answered using only the information in the database? A. Have the total number of traffic tickets per year increased each year over the past ten years? B. In the past ten years, were nonmoving violations more likely to occur on a weekend than on a weekday? C. In the past ten years, were there any months when moving violations occurred more often than nonmoving violations? D. In how many of the past ten years were there more than one million moving violations?

B. In the past ten years, were nonmoving violations more likely to occur on a weekend than on a weekday?

The author of an e-book publishes the e-book using a no-rights-reserved Creative Commons license. Which of the following best explains the consequences of publishing the book with this type of license? A. The contents of the e-book will be encrypted and can only be decrypted by authorized individuals B. Individuals can freely distribute or use the contents of the e-book without needing to obtain additional permissions from the author C. Individuals will be legally prevented from sharing the e-book on a peer-to-peer network D. Individuals will be legally prevented from using excerpts from the e-book in another published work

B. Individuals can freely distribute or use the contents of the e-book without needing to obtain additional permissions from the author

A certain social media application is popular with people across the United States. The developers of the application are updating the algorithm used by the application to introduce a new feature that allows users of the application with similar interests to connect with one another. Which of the following strategies is LEAST likely to introduce bias into the application? A. Enticing users to spend more time using the application by providing the updated algorithm for users who use the application at least ten hours per week B. Inviting a random sample of all users to try out the new algorithm and provide feedback before it is released to a wider audience C. Providing the updated algorithm only to teenage users to generate excitement about the new feature D. Testing the updated algorithm with a small number of users in the city where the developers are located so that immediate feedback can be gathered

B. Inviting a random sample of all users to try out the new algorithm and provide feedback before it is released to a wider audience

In a science experiment, result X is expected to occur 25% of the time and result Y is expected to occur the remaining 75% of the time. The following code segment is intended to simulate the experiment if there are 100 trials. Line 1: xCount ←← 0 Line 2: yCount ←← 0 Line 3: REPEAT 100 TIMES Line 4: { Line 5: IF(RANDOM(1, 4) = 1) Line 6: { Line 7: xCount ←← xCount + 1 Line 8: } Line 9: IF(RANDOM(1, 4) > 1) Line 10: { Line 11: yCount ←← yCount + 1 Line 12: } Line 13: } Line 14: DISPLAY("Result X occurred") Line 15: DISPLAY(xCount) Line 16: DISPLAY("times and result Y occurred") Line 17: DISPLAY(yCount) Line 18: DISPLAY("times.") A programmer runs the code segment, and the following message is displayed. Result X occurred 24 times and result Y occurred 70 times. The result shows that 94 trials were counted, rather than the intended 100 trials. Which of the following changes to the code segment will ensure a correct simulation of the experiment? A. Replacing line 9 with IF(RANDOM(1, 4) ≥ 2) B. Replacing line 9 with ELSE C. Interchanging lines 5 and 9 D. Interchanging lines 7 and 11

B. Replacing line 9 with ELSE

A state government is attempting to reduce the digital divide. Which of the following activities has the greatest potential to contribute to the digital divide rather than reducing it? A. Providing programs that focus on technology literacy at local libraries B. Requiring applicants for government jobs to apply using an online platform C. Working with technology companies to offer computing devices at discounted prices to individuals with reduced incomes D. Working with telecommunications companies to build network infrastructure in remote areas

B. Requiring applicants for government jobs to apply using an online platform

Which of the following statements about the Internet is true? A. The Internet is a computer network that uses proprietary communication protocols B. The Internet is designed to scale to support an increasing number of users C. The Internet requires all communications to use encryption protocols D. The Internet uses a centralized system to determine how packets are routed

B. The Internet is designed to scale to support an increasing number of users

A program developed for a Web store represents customer account balances using a format that approximates real numbers. While testing the program, a software developer discovers that some values appear to be mathematically imprecise. Which of the following is the most likely cause of the imprecision? A. The account balances are represented using a fixed number of bits, resulting in overflow errors B. The account balances are represented using a fixed number of bits, resulting in round-off errors C. The account balances are represented using an unlimited number of bits, resulting in overflow errors D. The account balances are represented using an unlimited number of bits, resulting in round-off errors

B. The account balances are represented using a fixed number of bits, resulting in round-off errors

RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone's GPS unit to track a user's location, running speed, and distance traveled. Users can use the application to review information and statistics about their previous runs. At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application shares the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other's contact lists or if they typically run at similar speeds. A basic RunRoutr account is free, but it displays advertisements that are targeted to individual users based on data collected by the application. For example, if a user's running route begins or ends near a particular store, the application may display an advertisement for that store. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application. Which of the following is most likely to be a data privacy concern for RunRoutr users? A. Users of the application are required to carry their smartphones with them while running in order to enable all of the application's features B. Users of the application may have the ability to determine information about the locations of users that are not on their contact lists C. Users of the application may not be able to accurately track their running history if they share their smartphone with another family member D. Users of the application may not be compatible with any other users in their area

B. Users of the application may have the ability to determine information about the locations of users that are not on their contact lists

Delivery trucks enter and leave a depot through a controlled gate. At the depot, each truck is loaded with packages, which will then be delivered to one or more customers. As each truck enters and leaves the depot, the following information is recorded and uploaded to a database. -The truck's identification number -The truck's weight -The date and time the truck passes through the gate -Whether the truck is entering or leaving the depot Using only the information in the database, which of the following questions CANNOT be answered? A. On which day in a particular range of dates did the greatest number of trucks enter and leave the depot? B. What is the average number of customer deliveries made by each truck on a particular day? C. What is the change in weight of a particular truck between when it entered and left the depot? D. Which truck has the shortest average time spent at the depot on a particular day?

B. What is the average number of customer deliveries made by each truck on a particular day?

If Bool1 AND Bool2 display Pass else display Fail if NOT(Bool1) OR NOT(Bool2) display Pass else display Fail What condition must be fufilled in order for the program to display Pass Pass? Bool1, Bool2, and Bool3 must all be true Bool1 and Bool2 must both be true, while Bool3 must be false Bool1 must be true, while Bool2 and Bool3 must both be false Bool1, Bool2, and Bool3 must all be false

Bool1 and Bool2 must both be true, while Bool3 must be false

Which of the following best explains how fault tolerance in a network is achieved? By providing high-bandwidth connections between devices, enabling data packets to be transmitted as quickly as possible By providing multiple paths between devices, enabling routing to occur even in the presence of a failed component By providing open network protocols, ensuring that all devices on the network are interacting in a standard way By providing software to monitor all network traffic, ensuring that data packets are sent and received in the proper order

By providing multiple paths between devices, enabling routing to occur even in the presence of a failed component

A code segment is intended to transform the list utensils so that the last element of the list is moved to the beginning of the list. For example, if utensils initially contains ["fork", "spoon", "tongs", "spatula", "whisk"], it should contain ["whisk", "fork", "spoon", "tongs", "spatula"] after executing the code segment. Which of the following code segments transforms the list as intended? A) len ←← LENGTH(utensils) temp ←← utensils[len] REMOVE(utensils, len) APPEND(utensils, temp) B) len ←← LENGTH(utensils) REMOVE(utensils, len) temp ←← utensils[len] APPEND(utensils, temp) C) len ←← LENGTH(utensils) temp ←← utensils[len] REMOVE(utensils, len) INSERT(utensils, 1, temp) D) len ←← LENGTH(utensils) REMOVE(utensils, len) temp ←← utensils[len] INSERT(utensils, 1, temp)

C

Which of the following best exemplifies the use of multifactor authentication to protect an online banking system? A. When a user resets a password for an online bank account, the user is required to enter the new password twice B. When multiple people have a shared online bank account, they are each required to have their own unique username and password C. After entering a password for an online bank account, a user must also enter a code that is sent to the user's phone via text message D. An online bank requires users to change their account passwords multiple times per year without using the same password twice

C. After entering a password for an online bank account, a user must also enter a code that is sent to the user's phone via text message

Which of the following is NOT a benefit of collaborating to develop a computing innovation? A. Collaboration can decrease the size and complexity of tasks required of individual team members B. Collaboration can make it easier to find and correct errors during the development process C. Collaboration eliminates the need to resolve differences of opinion D. Collaboration facilitates multiple perspectives in developing ideas

C. Collaboration can make it easier to find and correct errors during the development process

RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone's GPS unit to track a user's location, running speed, and distance traveled. Users can use the application to review information and statistics about their previous runs. At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application shares the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other's contact lists or if they typically run at similar speeds. A basic RunRoutr account is free, but it displays advertisements that are targeted to individual users based on data collected by the application. For example, if a user's running route begins or ends near a particular store, the application may display an advertisement for that store. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application. Businesses have the ability to target advertisements to different groups of people who use RunRoutr. Which of the following groups is LEAST likely to receive targeted advertisements? A. Individuals who appear on each other's contact lists B. Individuals who are interested in running and fitness C. Individuals who sign up for a premium account D. Individuals whose running routes begin or end near a particular business location

C. Individuals who sign up for a premium account

Which of the following best describes a direct benefit in using redundant routing on the Internet? A. Redundancy enables messages to be transmitted with as few packets as possible B. Redundancy enables network devices to communicate with as few network connections as possible C. Redundancy often allows messages to be sent on the network even if some network devices or connections have failed D. Redundancy prevents network communications from being intercepted by unauthorized individuals

C. Redundancy often allows messages to be sent on the network even if some network devices or connections have failed

In which of the following situations would it be most appropriate to choose lossy compression over lossless compression? A. Storing digital photographs to be printed and displayed in a large format in an art gallery B. Storing a formatted text document to be restored to its original version for a print publication C. Storing music files on a smartphone in order to maximize the number of songs that can be stored D. Storing a video file on an external device in order to preserve the highest possible video quality

C. Storing music files on a smartphone in order to maximize the number of songs that can be stored

RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone's GPS unit to track a user's location, running speed, and distance traveled. Users can use the application to review information and statistics about their previous runs. At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application shares the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other's contact lists or if they typically run at similar speeds. A basic RunRoutr account is free, but it displays advertisements that are targeted to individual users based on data collected by the application. For example, if a user's running route begins or ends near a particular store, the application may display an advertisement for that store. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application. Adrianna uses RunRoutr to suggest a running route. All compatible users near Adrianna receive a notification that shows her running route. Which of the following data is not obtained using data collected from Adrianna's smartphone but necessary for RunRoutr to share Adrianna's running route? A. Adrianna's average running speed B. Adrianna's preferred running distance C. The current locations of other RunRoutr users D. The usernames on Adrianna's contact list

C. The current locations of other RunRoutr users

A binary number is to be transformed by appending three 0s to the end of the number. For example, 11101 is transformed to 11101000. Which of the following correctly describes the relationship between the transformed number and the original number? A. The transformed number is 3 times the value of the original number B. The transformed number is 4 times the value of the original number C. The transformed number is 8 times the value of the original number D. The transformed number is 1,000 times the value of the original number

C. The transformed number is 8 times the value of the original number

RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone's GPS unit to track a user's location, running speed, and distance traveled. Users can use the application to review information and statistics about their previous runs. At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application shares the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other's contact lists or if they typically run at similar speeds. A basic RunRoutr account is free, but it displays advertisements that are targeted to individual users based on data collected by the application. For example, if a user's running route begins or ends near a particular store, the application may display an advertisement for that store. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application. Which of the following is most likely to be a benefit to users of the application? A. The application allows users to identify all other users in a particular area B. Users of the application may be able to easily identify all other users in a particular area as a result of the application's algorithm for determining whether users are compatible C. Users of the application may see health benefits as a result of the application encouraging them to exercise with each other D. Users of the application who live in rural areas have the ability to use all the features of the application, even when they do not have Internet and geolocation connectivity

C. Users of the application may see health benefits as a result of the application encouraging them to exercise with each other

hours = input where = input if where = Land if hours > 5 Display Hike else Display Climbing if where = Water if hours > 3 Display Rafting Trip else Display Lake Canoeing What is displayed if the user inputs 5 and land? Hike Climbing Rafting Trip Lake Canoeing

Climbing

Individuals sometimes attempt to remove personal information from the Internet. Which of the following is the LEAST likely reason the personal information is hard to remove? A. Internet users with a copy of the information might redistribute the personal information without first seeking permission B. There are potentially an extremely large number of devices on the Internet that may contain the information C. Automated technologies collect information about Internet users without their knowledge D. All personal information is stored online using authentication measures, making the information hard to access

D. All personal information is stored online using authentication measures, making the information hard to access

A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best explains the result of this configuration as compared to a configuration in which the router does not limit the bandwidth? A. The amount of time it takes guest users to send and receive large files is likely to decrease B. The number of packets required for guest users to send and receive data is likely to decrease C. Guest users will be prevented from having fault-tolerant routing on the Internet D. Guest users will be restricted in the maximum amount of data that they can send and receive per second

D. Guest users will be restricted in the maximum amount of data that they can send and receive per second

Which of the following best explains the relationship between the Internet and the World Wide Web? A. Both the Internet and the World Wide Web refer to the same interconnected network of devices B. The Internet is an interconnected network of data servers, and the World Wide Web is a network of user devices that communicates with the data servers C. The Internet is a local network of interconnected devices, and the World Wide Web is a global network that connects the local networks with each other D. The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that is accessed via the Internet

D. The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that is accessed via the Internet

RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone's GPS unit to track a user's location, running speed, and distance traveled. Users can use the application to review information and statistics about their previous runs. At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application shares the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other's contact lists or if they typically run at similar speeds. A basic RunRoutr account is free, but it displays advertisements that are targeted to individual users based on data collected by the application. For example, if a user's running route begins or ends near a particular store, the application may display an advertisement for that store. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application. Which of the following data must be collected from a user's smartphone in order for RunRoutr to suggest a running route? A. Available running routes near the user's home B. The current time C. The starting location of the user's previous run D. The user's geographic position

D. The user's geographic position

Which of the following best explains the ability to solve problems algorithmically? A. Any problem can be solved algorithmically, though some algorithmic solutions may require humans to validate the results B. Any problem can be solved algorithmically, though some algorithmic solutions must be executed on multiple devices in parallel C. Any problem can be solved algorithmically, though some algorithmic solutions require a very large amount of data storage to execute D. There exist some problems that cannot be solved algorithmically using any computer

D. There exist some problems that cannot be solved algorithmically using any computer

Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are used? A. Unauthorized individuals can deny service to a computing system by overwhelming the system with login attempts B. Unauthorized individuals can exploit vulnerabilities in compression algorithms to determine a user's password from their decompressed data C. Unauthorized individuals can exploit vulnerabilities in encryption algorithms to determine a user's password from their encryption key D. Unauthorized individuals can use data mining and other techniques to guess a user's password

D. Unauthorized individuals can use data mining and other techniques to guess a user's password

Which of the following is an example of a phishing attack? A. Loading malicious software onto a user's computer in order to secretly gain access to sensitive informationLoading malicious software onto a user's computer in order to secretly gain access to sensitive information B. Flooding a user's computer with e-mail requests in order to cause the computer to crash C. Gaining remote access to a user's computer in order to steal user IDs and passwords D. Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information

D. Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information

A scientist wants to investigate several problems. In which of the following situations is using a simulation LEAST suitable for solving a problem? A. When a scientific study requires performing a large number of trials that need to be conducted very quickly B. When it is considered acceptable to make simplifying assumptions when modeling a real-world object or phenomenon C. When performing an experiment that would be too costly or dangerous to conduct in the real world D. When the solution to the problem requires real-world data inputs that are continually measured at regular intervals

D. When the solution to the problem requires real-world data inputs that are continually measured at regular intervals

Which of the following actions is most likely to help reduce the digital divide? Adding a requirement that all users of a popular social media site link their accounts with a phone number. Deploying satellites and other infrastructure to provide inexpensive Internet access to remote areas of Earth Digitizing millions of books from university libraries, making their full text available online Offering improved Internet connections to Internet users who are willing to pay a premium fee for more bandwidth

Deploying satellites and other infrastructure to provide inexpensive Internet access to remote areas of Earth

Repeat requested times if available > 0 display Enjoy! available = available - 1 else display Sorry sold out. display Bars remaining: + available What would be displayed if the machine had 2 bars but someone requests 3? Enjoy! Enjoy! Bars remaining: 0 Enjoy! Enjoy! Sorry sold out Enjoy! Enjoy! Sorry sold out. Bars remaining: 0 Enjoy! Enjoy! Sorry sold out. Bars remaining: 2

Enjoy! Enjoy! Sorry sold out. Bars remaining: 0

For which of the following situations would it be best to use a heuristic in order to find a solution that runs in a reasonable amount of time? Appending a value to a list of n elements, which requires no list elements be examined. Finding the fastest route that visits every location among n locations, which requires n! possible routes be examined. Performing a binary search for a score in a sorted list of n scores, which requires that fewer than n scores be examined. Performing a linear search for a name in an unsorted database of n people, which requires that up to n entries be examined.

Finding the fastest route that visits every location among n locations, which requires n! possible routes be examined.

Which of the following is a primary benefit of making a computing system fault-tolerant? If one component of the system fails, users of the system can often still access it. If one component of the system is hacked, no information will be stolen. If the system becomes too expensive, making it fault-tolerant will save money. If the system cannot operate efficiently, making it fault-tolerant will speed up its operation.

If one component of the system fails, users of the system can often still access it.

Which of the following best describes the function performed the command a MOD b in the CollegeBoard AP Computer Science Principles Pseudocode? It finds the remainder when a is divided by b It finds the remainder when b is divided by a It multiplies a and b It divides a by b

It finds the remainder when a is divided by b

A software development company has created an application called FileCleanUp. When the application is run on a user device, it searches for all files (including pictures, videos, and documents) that have not been accessed in the past month, stores them on the company's Web server, and deletes them from the user device. The application runs once each day. Users have the ability to manually retrieve files from the server if they are needed. Which of the following is most likely to be a harmful effect of using FileCleanUp? It prevents users from accessing frequently used files when there is no Internet connectivity. It prevents users from accessing infrequently used files when there is no Internet connectivity. It prevents users from accessing frequently used files when there is reliable Internet connectivity. It prevents users from accessing infrequently used files when there is reliable Internet connectivity.

It prevents users from accessing infrequently used files when there is no Internet connectivity.

A list of numbers is considered increasing if each value after the first is greater than or equal to the preceding value. The following procedure is intended to return true if numberList is increasing and return false otherwise. Assume that numberList contains at least two elements. Line 1: PROCEDURE isIncreasing(numberList) Line 2: { Line 3: count ←← 2 Line 4: REPEAT UNTIL(count > LENGTH(numberList)) Line 5: { Line 6: IF(numberList[count] < numberList[count - 1]) Line 7: { Line 8: RETURN(true) Line 9: } Line 10: count ←← count + 1 Line 11: } Line 12: RETURN(false) Line 13: } Which of the following changes is needed for the program to work as intended? In line 3, 2 should be changed to 1 In line 6, < should be changed to ≥ Lines 8 and 12 should be interchanged Lines 10 and 11 should be interchanged

Lines 8 and 12 should be interchanged

What is displayed as a result of running the program if the initial value of a is 6, and the initial value of b is 11? IF (a = b) { DISPLAY ("January") } ELSE { IF (a > b) { DISPLAY ("February") } ELSE { IF (a > 0) { DISPLAY ("March") } ELSE { DISPLAY ("April") } } } January February March April

March

If x < 10 missing boolean operator x > 20 Display "True" What should replace the missing boolean operator if the intention is to display "True" for any values of x which are not between 10 and 20 inclusive? NOT AND OR NOR

OR

Which of the following is a primary reason for the use of open protocols on the Internet? Open protocols allow devices to specify how data packets are to be routed on the Internet in advance. Open protocols ensure that all data transmission on the Internet is kept secure. Open protocols ensure that all Internet users are provided connections with equal bandwidth. Open protocols provide a way to standardize data transmission between different devices.

Open protocols provide a way to standardize data transmission between different devices.

Which of the following actions is most likely to be effective in reducing the digital divide at a local level? Creating an application that offers coupons and discounts for local businesses Offering a discount to utility customers who pay their bills online instead of by mail Providing free community access to computers at schools, libraries, and community centers Requiring applicants for local government jobs to complete an online application

Providing free community access to computers at schools, libraries, and community centers

An algorithm was developed to keep track of how many baskets a student has made while playing basketball. Which of the following program structures should be added to the old algorithm to create a new algorithm that only keeps track of 3-point baskets and not 2-point baskets. Iteration Searching Sequencing Selection

Selection

Which of the following is LEAST likely to be a contributing factor to the digital divide? Some individuals and groups are economically disadvantaged and cannot afford computing devices or Internet connectivity. Some individuals and groups do not have the necessary experience or education to use computing devices or the Internet effectively. Some parents prefer to limit the amount of time their children spend using computing devices or the Internet. Some residents in remote regions of the world do not have access to the infrastructure necessary to support reliable Internet connectivity.

Some parents prefer to limit the amount of time their children spend using computing devices or the Internet.

if num < 20 and num*2 > 30 Display "Proceed" else Display "Stop" What does this display if num = 14? Proceed Stop Proceed Stop Nothing will be displayed

Stop

Which of the following best explains how the Internet is a fault-tolerant system? The Internet is fault-tolerant because cybercriminals can conceal their actions, allowing them the ability to carry out faulty actions without leaving a trace. The Internet is fault-tolerant because there are usually multiple paths between devices, allowing messages to sometimes be sent even when parts of the network fail. The Internet is fault-tolerant because users can transmit messages using a variety of different protocols, allowing them to use devices from any manufacturer. The Internet is fault-tolerant because users usually understand and accept the fact that servers sometimes fail, allowing network engineers to repair faulty devices as quickly as possible.

The Internet is fault-tolerant because there are usually multiple paths between devices, allowing messages to sometimes be sent even when parts of the network fail.

Which of the following best describes the relationship between the World Wide Web and the Internet? Responses The World Wide Web is a protocol that is accessed using a data stream called the Internet. The World Wide Web is a system of linked pages, programs, and files that is accessed using a data stream called the Internet. The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet. The World Wide Web is a Web site that is accessed using a protocol called the Internet.

The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.

A graphic artist uses a program to draw geometric shapes in a given pattern. The program uses an algorithm that draws the shapes based on input from the artist. The table shows the approximate number of steps the algorithm takes to draw different numbers of shapes. Number of Shapes Drawn 4 5 6 7 Number of Steps (respectively) 17 24 35 50 Based on the values in the table, which of the following best characterizes the algorithm for drawing n shapes, where n is a very large number? Responses The algorithm runs in a reasonable amount of time because it will use approximately n steps to draw n shapes. The algorithm runs in a reasonable amount of time because it will use approximately n^2 steps to draw n shapes. The algorithm runs in an unreasonable amount of time because it will use approximately n steps to draw n shapes. The algorithm runs in an unreasonable amount of time because it will use approximately n^2 steps to draw n shapes.

The algorithm runs in a reasonable amount of time because it will use approximately n^2 steps to draw n shapes.

To find a specific value in a sorted list, a sequential or binary search algorithm may be used. Which of the following best describes how the times required for each algorithm to successfully find the desired value compare? The binary algorithm will be faster for every possible sorted list and value sought The binary algorithm will be faster for most sorted lists and values sought, but for some values on some lists the sequential algorithm will be faster The sequential algorithm will be faster for most sorted lists and values sought, but for some values on some lists the binary algorithm will be faster The sequential algorithm will be faster for every possible sorted list and value sought

The binary algorithm will be faster for most sorted lists and values sought, but forsome values on some lists the sequential algorithm will be faster

MeeReader is an e-reading application that allows users to download and read books and articles on a device. Each user creates a profile with the following personal preferences. -Screen brightness and contrast -Choice of typeface and font size -Amount of spacing between lines of text -Activation of a text-to-speech feature that reads the text out loud When the user launches the application, the application scans the user's face and uses facial recognition software to determine the user's identity. Once the user has been identified, the user's personal preferences are applied to whatever book or article the user chooses to read. The application stores all user information in a database, including personal preferences and a record of previously read books and articles. From the perspective of the application's developers, which of the following is most likely to be a benefit of storing all user data in a database? The developers can analyze the data to make improvements to the application based on user behavior. The developers can analyze the data to ensure that no patterns emerge in the data. The developers can reduce the amount of data storage required to support the application. The developers can reduce the need for data encryption.

The developers can analyze the data to make improvements to the application based on user behavior.

Which of the following best describes the ability of parallel computing solutions to improve efficiency? Any problem that can be solved sequentially can be solved using a parallel solution in approximately half the time. Any solution can be broken down into smaller and smaller parallel portions, making the improvement in efficiency theoretically limitless as long as there are enough processors available. The efficiency of parallel computing solutions is rarely improved over the efficiency of sequential computing solutions. The efficiency of a solution that can be broken down into parallel portions is still limited by a sequential portion.

The efficiency of a solution that can be broken down into parallel portions is still limited by a sequential portion.

Which of the following best explains how messages are typically transmitted over the Internet? The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient's device. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device. The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient's device. The message is transmitted as a single file and received in whole by the recipient's device.

The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device.

The following figure represents a network of physically linked devices labeled P through S. A line between two devices indicates a connection. Devices can communicate only through the connections shown. Which of the following statements best explains the ability of the network to provide fault tolerance? P - Q - R - S Q - R P - S The network is considered fault-tolerant because there are redundant paths between each pair of devices. The network is considered fault-tolerant because it guarantees that no individual component will fail. The network is not considered fault-tolerant because it relies on physical connections. The network is not considered fault-tolerant because it provides more paths than are needed.

The network is considered fault-tolerant because there are redundant paths between each pair of devices.

A programmer created a piece of software and wants to publish it using a Creative Commons license. Which of the following is a direct benefit of publishing the software with this type of license? The programmer can ensure that the algorithms used in the software are free from bias. The programmer can ensure that the source code for the software is backed up for archival purposes. The programmer can include code that was written by other people in the software without needing to obtain permission. The programmer can specify the ways that other people are legally allowed to use and distribute the software.

The programmer can specify the ways that other people are legally allowed to use and distribute the software.

A researcher wants to publish the results of a study in an open access journal. Which of the following is a direct benefit of publishing the results in this type of publication? The researcher can allow the results to be easily obtained by other researchers and members of the general public. The researcher can better anticipate the effect of the results and ensure that they are used responsibly. The researcher can ensure that any personal information contained in the journal is kept private and secure. The researcher can prevent copies of the research from being accessed by academic rivals.

The researcher can allow the results to be easily obtained by other researchers and members of the general public.

"Every problem may be theoretically solved using an algorithm, however for some problems, this is not practical because it would take an unreasonably long time." Which of the following statements best describes the truth of the above statement? All parts of the statement are completely true The statement is false: today's technology allows any algorithm to be run in a reasonabletime The statement is false: there are some problems for which no algorithm can bedeveloped to solve them All parts of the statement are completely false

The statement is false: there are some problems for which no algorithm can bedeveloped to solve them

A mobile application is used to display local traffic conditions. Which of the following features of the application best exemplifies the use of crowdsourcing? Users can save an address to be used at a later time. Users can turn on alerts to be notified about traffic accidents. Users can submit updates on local traffic conditions in real time. Users can use the application to avoid heavily congested areas.

Users can submit updates on local traffic conditions in real time.

MeeReader is an e-reading application that allows users to download and read books and articles on a device. Each user creates a profile with the following personal preferences. -Screen brightness and contrast -Choice of typeface and font size -Amount of spacing between lines of text -Activation of a text-to-speech feature that reads the text out loud When the user launches the application, the application scans the user's face and uses facial recognition software to determine the user's identity. Once the user has been identified, the user's personal preferences are applied to whatever book or article the user chooses to read. The application stores all user information in a database, including personal preferences and a record of previously read books and articles. Which of the following is most likely to be a beneficial effect of using MeeReader? Users may have a reduced risk of the application being used in unintended ways. Users may have a reduced risk of their biometric data being misused. Users with limited Internet access may be able to more easily obtain books and articles. Users with visual impairments may be able to more easily read or listen to books and articles.

Users with visual impairments may be able to more easily read or listen to books and articles.

[ ][ ][ ][ ][ ] [ ][ ][ ][ ][ ] [ ][ ][=][ ][ ] [ ][ ][ ][ ][ ] [>][ ][ ][ ][ ] Which two answer choices will get the > to the = ? a. REPEAT 2 TIMES{ROTATE LEFT ()MOVE FORWARD ()ROTATE RIGHT ()MOVE FORWARD ()} b. REPEAT 3 TIMES{REPEAT 2 TIMES{MOVE FORWARD ()}ROTATE LEFT ()MOVE FORWARD ()} c. REPEAT 2 TIMES{REPEAT 3 TIMES{MOVE FORWARD ()}ROTATE LEFT ()}REPEAT 2 TIMES (){MOVE FORWARD ()ROTATE LEFT ()} d. REPEAT 4 TIMES{MOVE FORWARD()ROTATE LEFTMOVE FORWARDROTATE RIGHT ()}REPEAT 2 TIMES{ROTATE RIGHTMOVE FORWARDROTATE RIGHT ()MOVE FORWARD()}

a and c

Which of the following are NOT advantages of designing a procedure to use in place of lines of repeated code in a program? Select two answers. a. Debugging will be easier as problems identified with the procedure only needs to befixed once b. Once the procedure is written properly there will be no need to consider propersyntax when writing the rest of the program c. The program will only need to run the code in the procedure once, so overallthe performance will be improved d. Others working on the same program can use the procedure without needing tocompletely understand how it works, as long as it is documented well enough

b and c


Set pelajaran terkait

ACELLUS AP UNITED STATES HISTORY (Unit 1)

View Set