Computer Science Praxis Exam Questions
What is the output for the following segment of pseudocode? int num <-- 2 if(num < 5) print "Pikachu" else if (num < 10) print "Bulbasar" end if end if end if
"Pikachu"
Consider the following segment of pseudocode with the missing code: for(**missing code**) print "I will not skateboard in the halls" end for If the string "I will not skateboard in the halls." executes 500 times, what might the missing code be?
(int i <-- 0 ; i < 500 ; i <-- i + 1)
1) What are some of the general components of an IDE?
-Compiling and building tools -Code completion/insight -Resource Management -Debugging tools
Which of the following are examples of a digital divide? SELECT ALL THAT APPLY 1. An older couple cannot post messages on a social media network without help from their grandchildren. 2. A student is unable to view a video homework assignment because the student does not have access to a high-speed internet connection. 3. A family finds that its broadband internet connection is slower when the three children in the household simultaneously access the internet.
1 & 2
Match the four hardware devices with the four classifications. 1) CPU 2) Joystick 3) ROM 4) Speaker A) Input device B) Output Device C) Processing device D) Storage device
1) CPU = Processing device 2) Joystick = Input device 3) ROM = Storage device 4) Speaker = Output device
What are the three general types of errors?
1) Compiling 2) Run Time 3) Logic
What are the four general parts to every loop?
1) Initialization 2) condition 3) Action Block 4) increment
Which THREE of the following are factors that contribute to the digital divide? 1. Different physical access to computers and networks 2. Different levels of information literacy 3. Different accessibility needs when working with digital technologies 4. Different manufactures of physical digital devices.
1, 2 & 3
To teach students in Java class about List objects, a teacher gives the students an assignment to design and implement a program that randomly selects cards out of a deck to simulate a five card draw poker game. As the students were working on the assignment, the professor received feedback from some of the students. Which of the following pieces of student feedback are reasonable examples of obstacles to equal access to completing the assignment. SELECT ALL THAT APPLY 1. I've never played cards, so I had to learn how a deck of cards works. 2. I struggled with avoiding duplicates in the five card draw when selecting the cards at random. 3. I couldn't figure out how to initialize the deck of cards using a List object 4. I didn't know the rules of the five card draw poker so I spent a lot of time researching poker.
1, 4
Which of the following are impacts of computing? SELECT ALL THAT APPLY 1. Computing has enabled the creation of interactive art forms. 2.Computers analyze images produced by medical imaging devices. 3. Computers enable people who speak different languages to communicate.
1,2,3
Put the four items in order lowest level of abstraction to highest level of abstraction. 1. Field 2. Database 3. Record 4. Table
1. Field 2. Record 3. Table 4. Database
Indicate whether the characteristic best applies to lossy or lossless compression: 1. Allows perfect reconstruction of the original data from the compressed data. 2. Generally achieves a greater compression ratio. 3. Is more appropriate for streaming music and video.
1. lossless compression 2. lossy compression 3. lossy compression
Convert the following binary number to their decimal equivalent: 1100111
103
Convert the following binary number to their decimal equivalent: 1011
11
Convert the following binary number to their decimal equivalent: 111
15
Place the four numbers in order from least to greatest: 1. 71 (base 10) 2. 1000110 (base 2) 3. 48 (base 16) 4. 73 ( base 10)
2, 1, 3, 4
Consider the following pseudocode: void h (int n) if(n >= 4) h(n/2) end if print n end h h(16) what is the output from the pseudocode?
2,4,6,8
Convert the following binary number to their decimal equivalent: 10100
20
Exactly 2KB is exactly how many bytes?
2048 Bytes
Which of the following is the decimal representation of the sum of binary numbers 1011 and 1011?
22
Convert the following binary number to their decimal equivalent: 100111101100
2540
The following is a segment of code: If(sum <=50) What are some possible tests cases, using edge casing, for this segment of code?
49, 50, 51
Convert the following binary number to their decimal equivalent: 101
5
Convert the following binary number to their decimal equivalent: 110110
54
IF the ASCII decimal value for A is 65 and the value for 'a' is 97, what is the ASCII decimal value for E?
69
Consider a program written in an object-oreiented programming language, Which of the following statements are true if class B is a child of parent class A? SELECT ALL THAT APPLY A) Public methods in A are accessible in B and can be overloaded by other methods in B B) Public methods in A are accessible and can be overridden by other methods in B C) Public methods in B are accessible and can be overloaded by other methods in A D) Public methods in B are accessible and can be overridden by other methods in A
A & B
What is a heuristic function?
A heuristic function, also simply called a heuristic, is a function that ranks alternatives in search algorithms at each branching step based on available information to decide which branch to follow. For example, it may approximate the exact solution.
To increase the efficiency of adding items to the end of a list, what can be used and why does it increase the efficiency?
A tail can be used that points to the end of the list. It helps provide quick access to the end of the list so the program does not have to traverse the entire list.
A computer simulation of operations at a car wash with several wash stations is run several times. In each run of the simulation, only the number of available wash stations is changed. Which of the following changes if most likely to occur between runs of the simulation? A) A change in the average wait time per customer to enter a wash station. B) A change in the amount charged per car wash. C) A change in the amount of water used per car wash. D) A change in the average length of time needed to wash a car once the car enters the wash station.
A) A change in the average wait time per customer to enter a wash station.
Which of the following best describes a web server? A) A computer system that delivers Web pages to clients. B) A computer system that determines the shortest path between two computers over the internet. C) A computer system running software that provides a user-friendly interface for creating Web pages. D) A computer system that translates domain names to IP addresses.
A) A computer system that delivers Web pages to clients.
The Caesar cipher, also known as a shift cipher, encrypts words by replacing each letter in the word with a letter that is a fixed number of positions forward in the alphabet. For instance, with the shift of 2, the word "zoo" is encrypted as "bqq". For a student learning cryptography, which of the following activities best demonstrates the vulnerabilities of the Caesar cipher encryption technique. A) Analyzing the frequency of letters in the encrypted text to show how easy it is to break the Caesar cipher. B) Using a program that takes an input message and returns the Caesar cipher encrypted text. C) Using public and private key encryption to see how a more secure encryption algorithm works D) Viewing program code that can both code and decode a message using the Caesar cipher.
A) Analyzing the frequency of letters in the encrypted text to show how easy it is to break the Caesar cipher.
Which pillar of cybersecurity is compromised when someone logs into a system using a stolen login and password? A) Authentication B) Confidentially C) Integrity D) Nonrepudiation
A) Authentication
Which of the following is a factor that affects the size of a digital audio file? A) Bit rate B) Intensity C) Tone D) Volume
A) Bit Rate
As art of a class project, students are downloading population data from a web site. Which of the following file formats would be best if the students plan to write programs to analyze the data? A) CSV B) JPEG C) HTML D) PDF
A) CSV Concurrent Versions System (CVS) is a program that lets a code developer save and retrieve different development versions of source code.
Which of the following features would be the most beneficial for deaf people who are accessing a web site? A) Captions for video media B) Limited use of color contrast and sound to convey meaning C) Alternate text for all images D) An advanced speech synthesizer
A) Captions for video media
Integrated development environments (IDEs) contain programming tools to help developers create software. Which of the following describes an IDE feature and its intended purpose? A) Code completion: Suggests subsequent text based on current text B) Complier: Maintains a logical ordering of source-code files. C) Debugger: Generates API documentation in HTML format D) Interpreter: Optimizes code to minimize the programs running time.
A) Code completion: Suggests subsequent text based on current text
Which of the following statements best describes a difference between code written in a high level programming language and code written in a low level programming language? A) Code written in a high level language can generally make use of more abstractions than code written in a low level package. B) Code written in a high level language is generally more difficult to maintain than code written in a low level language. C) Code written in a high level language is usually better optimized for particular hardware than code written in a low level language D) Code written in a high level language is usually less portable than code written in a low level language.
A) Code written in a high level language can generally make use of more abstractions than code written in a low level package.
Although self driving cars have imperfect driving records, the potential benefits could outweigh the costs. Which of the following statements best explains why research to improve self driving cats is worthwhile? A) Computers do not get distracted, so the number of traffic collisions due to distracted driving by humans can be reduced. B) Once pedestrians learn to be more careful around self driving cars, potential injuries will be avoided. C) Self-driving cars will make travel more productive, allowing employees to move further away from cities. D) Software bugs are to be expected in the beginning, but eventually all the software bugs will be fixed.
A) Computers do not get distracted, so the number of traffic collisions due to distracted driving by humans can be reduced.
A software engineer is developing a simulation of customers and cashiers in a store for the purpose of better understanding customer wait times. The following information is stored for each customer. -Arrival time: the time at which this customer joins a line for a cashier. -Service time: the time it takes a cashier to complete the customers order Which of the following is the most important appropriate abstract data type to store customer objects in this simulation? A) Customer objects should be placed in a queue data structure in the order of their arrival time. B) Customer objects should be pushed onto a stack data structure in the order of their arrival time. C) Customer objects should be put into a dictionary data structures using the customer's arrival time as the key. D) Customer objects should be put into the dictionary data structure using the customer's service time as the key.
A) Customer objects should be placed in a queue data structure in the order of their arrival time.
A traveler is keeping a digital photo journal. When the journal is ready, it will be posted on an internet web site that offers controlled access. Which of the following presents the greatest risk to the traveler's privacy? A) Posting the journal using HTTP B) Posting the journal using HTTPS A) It gives users access to files from any internet connected device. D) Posting the journal using public Wi-Fi and HTTPS
A) It gives users access to files from any internet connected device.
Which of the following is an advantage of cloud-based storage? A) It gives users access to files from any internet connected device. B) It gives users the greatest control of files. C) It gives the users the most secure way to store files D) It gives users the quickest way to store files.
A) It gives users access to files from any internet connected device.
Which of the following would be classified as an input device? A) Keyboard B) Monitor C) A pair of speakers D) A printer
A) Keyboard
Taking massive open online courses (MOOCs) is one example of using the internet for education. MOOCs allow students from all parts of the world to take a course simultaneously. Some MOOCs are managed by private organizations and other by colleges and universities. Which of the following statements is true about the positive and negative impacts of online learning using MOOCs? A) MOOCs allow virtually unlimited enrollment, but face-to-face communication is limited. B) MOOCs are free and accredited but provide only certificates of completion. C) MOOCs have high course completion rates, but the number of available course is limited. D) MOOCs provide one-on-one access to instructors, but access to course materials is only available while the course is in session.
A) MOOCs allow virtually unlimited enrollment, but face-to-face communication is limited.
A file 4.5KB in size. What is the files probable file type? a) Text b) Image c) Audio d) Video
A) Text
Which of the following best describes the main purpose for encoding? A) To format data for efficient storage and transmission B) To maintain data confidentiality C) To minimize data size D) To slow down the transfer of data between computers.
A) To format data for efficient storage and transmission
Each employee of a company is assigned a unique identification number. All of the identification numbers are stored using 32 bits. For example, one employee has the ID number 1001 0110 0000 1110 1010 0101 1111 0000. Which of the following statements about the ID numbers is true? A) Writing the greatest possible ID number in a hexadecimal requires 8 hexadecimal digits. B) Writing the greatest possible ID number in hexadecimal requires 16 hexadecimal digits C) Writing the greatest possible ID number in decimal (base 10) requires 5 digits. D) Writing the greatest possible ID number in decimal (base 10) requires 8 digits.
A) Writing the greatest possible ID number in a hexadecimal requires 8 hexadecimal digits.
Which of the following data types is the best choice when declaring a variable that will be used to store a worker's hourly wage and that will be used to calculate the worker's total weekly earnings? A) float B) int C) String D) boolean
A) float
A technology company has developed an application that allows users to combine a text file and a recording of a person speaking to create accurate audio representation of the person speaking the text. Which of the following is possible uses of the application? SELECT ALL THAT APPLY. a) Audio versions of unrecorded speeches delivered by famous individuals could be produced from transcripts and recorded speeches delivered by the same individual. b) An audio file could be fabricated in which an individual seems to be uttering slanderous statements about another individual. c) Security systems based on voice activation could be circumvented by unauthorized users.
A, B, C
Which of the following are OOP capable languages? a. Python b. C d. Swift d. Fortran
A, C
Which of the following are valid variables names? a. CowsEat4u b. #1Fan c. CS_For_AR d. 411info e. Stars Fall f. num1
A, C, F
Which of the following is the best way to obtain end-user feedback as part of the process of developing a web site? A) A/B testing B) Managerial code reviews C) Scrum stand-up meetings D) Unit testing
A/B testing A/B testing is a user experience research methodology. A/B tests consist of a randomized experiment with two variants, A and B. It includes application of statistical hypothesis testing or "two-sample hypothesis testing" as used in the field of statistics.
What are some advantages/disadvantages of storing data in the cloud compared to storage on a local network?
Advantages are data backup if local machine crashes, not limited to local machine memory sizes can access from different devices. Disadvantages are that you need internet access.
What is a factorial algorithm?
Algorithm of this program is very easy − START Step 1 → Take integer variable A Step 2 → Assign value to the variable Step 3 → From value A upto 1 multiply each digit and store Step 4 → the final stored value is factorial of A STOP.
A set of instructions that a computer can execute is known as what?
Algorithms
What is an end-user license?
An end-user license agreement is a legal contract entered into between a software developer or vendor and the user of the software, often where the software has been purchased by the user from an intermediary such as a retailer.
Classify the following as linked list, array or both: Can access items anywhere in structure quickly using indexing
Array
Classify the following as linked list, array or both: Has to find enough memory in contiguous memory for the entire structure.
Array
Classify the following as linked list, array or both: Uses less memory than its counterpart of the same length.
Array
Match the five pillars of cybersecurity with the example of violations of the pillars of cybersecurity. Authentication Availability Confidentiality Integrity Nonrepudiation An employee changes the modification metadata of a file to claim credit for the work of someone else.
Authentication
Match the five pillars of cybersecurity with the example of violations of the pillars of cybersecurity. Authentication Availability Confidentiality Integrity Nonrepudiation Access to a company's web site is slowed because of a denial of service (DoS) attack.
Availability
Which of the following is an example of the internet of Things (IoT)? A) A driver uses a remote car starter to warm up the car when it is cold. B) A coffeemaker in the kitchen turns on when an alarm clock uses the internet to send it a message. C) A computer automatically runs a daily scan to look for viruses. D) A customer receives an automatically generated e-mail via the internet for a special discount at a local shop
B) A coffeemaker in the kitchen turns on when an alarm clock uses the internet to send it a message.
Which of the following is an example of crowdsourcing? A) A language-learning platform offers a free service to allow anyone to learn a language. B) A language learning platform builds a collection of documents in native languages by soliciting aid from users of its internet services. C) A language learning platform offers the use of a free language translator that automatically collects user data which is used to improve the translator. D) A language learning platform offers the use of a free language translator to its registered users and then sells the user data for a profit in order to offer other free services.
B) A language learning platform builds a collection of documents in native languages by soliciting aid from users of its internet services.
Which of the following is the most effective way to prevent a successful cyberattack of a computer system? A) Disable the use of e-mail on the computer system B) Disconnect the computer system from the internet. C) Make sure all security software is up-to-date. D) Use a strong password.
B) Disconnect the computer system from the internet.
A program has been stored in memory and is ready to be executed. The three steps in the fetch-decode-execute cycle are shown below. The program counter is a counter that stores the memory location of the next instruction to be executed: - Executing the instruction - Fetching and decoding the instruction - Incrementing the program counter Assume the three-step cycle for the previous instruction has just completed. In which of the following orders must these three steps be performed to complete the next instruction? A) Fetch and decode the instruction, execute the instruction, increment the program counter. B) Fetch and decode the instruction, increment the program counter, execute the instruction. C) Increment the program counter, execute the instruction, fetch and decode the instruction. D) Execute the instruction, increment the program counter, fetch and decode the instruction.
B) Fetch and decode the instruction, increment the program counter, execute the instruction.
A computer simulation is created to simulate the growth of certain plant species in different conditions. Which of the following actions could be used to validate the model used in the simulation? A) Express the simulation software using both recursive and iterative algorithms. Compare the results of the recursive algorithm to those of the iterative algorithm. B) Perform real-world experiments on the plant species growth in different environments. Compare the experimental results to the results provided by the simulation. C) Remove any unnecessary details from the model. Compare the running times of the original simulation and the simplified simulation. D) Run the simulation software on multiple devices. Compare the results obtained from each of the devices.
B) Perform real-world experiments on the plant species growth in different environments. Compare the experimental results to the results provided by the simulation.
A major technology company has millions of users and has collected a great deal of information about them though various means, including surveys and cookies. Which of the following uses of the data would be the most ethical? A) Selling the user data as is to another company B) Requesting that users specifically opt in to sharing data with another company C) Removing personally identiable information from the data before sharing it with another company. D) Including a provision that grants the company the right to sell user data in a lengthy terms of service agreement
B) Requesting that users specifically opt in to sharing data with another company
Geofencing is the use of geolocation data to trigger an action when a mobile device crosses a virtual boundary, called a geofence. A student wants to create a smartphone application that uses geofencing to help new students move from on location in a school to another location in the school. Which of the following features of the application might require a heuristic solution? A) The application detects when a student leaves a classroom. B) The application finds the best path from one classroom to the next. C) The application requires login information consisting of a student identification number and password. D) The application retrieves a student's schedule and sends schedule information to the students smartphone.
B) The application finds the best path from one classroom to the next.
Which of the following is the best reason to use named constants instead of hard-coded values in a program? A) To make the program easier for clients to use B) To make the program easier for programmers to maintain C) To make the program execute in less time D) To make the program use less memory
B) To make the program easier for programmers to maintain
What is the terminating case (ends he recursive call) inside of a recursive function?
Base Case
Indicate the type of search or sort for the following statement: A search that has to be presorted before it will work
Binary Search
Consider the following list and arrange them in order from highest level of abstraction to the lowest level of abstraction. Assembly Language Block-based programming language Logic Gate Machine Language
Block-based programming Assembly Language Machine Language Logic Gate
Indicate the type of search or sort for the following statement: Compares an number in a list to its neighbor to the right. It will swap the item if it is greater than its neighbor. As passes continue, larger values seem to travel to the right of the list of values.
Bubble sort
Indicate the type of search or sort for the following statement: Has an average-case performance of O(n^2).
Bubble sort, insertion sort, and selection sort
Which if the following are correct variable declaration and initialization in our pseudocode? (Pick one) a. num int <-- 20 b. 20 <-- int num c. Int num <-- 20 d. Int num = 20 e. 20 = int num
C
Which of the following is an example of the use of a device on the internet of Things? (IoT) A) A car alerts a driver that it is about to hit an object. B) A hiker uses a GPS watch to keep track of her position. C) A refrigerator orders milk from an online delivery service when the milk in the refrigerator is almost gone. D) A runner uses a watch with optical sensors to monitor his heart rate.
C) A refrigerator orders milk from an online delivery service when the milk in the refrigerator is almost gone.
Which of the following best descibes the average running time of a linear search algorithm and a binary search algorithm on a SORTED array of integers, in terms of the length if the array? LINEAR SEARCH BINARY SEARCH A) Logarithmic Logarithmic B) Logarithmic Linear C) Linear Logarithmic D) Linear Linear
C) Linear, logarithmic
Huffman coding assigns unique variable-length codes to input values based on the frequency of occurrence of each value. Frequently occurring values are assigned codes that contain fewer bits than values that occur less frequently, which are assigned codes that contain more bits. Which of the following best describes an appropriate use of Huffman coding? a) Decryption b) Efficient sorting c) Lossless compression d) lossy compression
C) Lossless compression Huffman coding is appropriately used for lossless compression because the original values can be recovered from the uniquely assigned codes with no loss of data.
Which of the following best describes an essential characteristic that can be used to distinguished a recursive algorithm from a non-recursive algorithm? A) Being implemented with a procedure or method that has one parameter. B) Creating and initializing an accumulator to store the result while the algorithm is running. C) Making progress towards a solution by running the algorithm on a smaller version of the original pattern D) Returning a fixed, literal value in the simplest case or cases.
C) Making progress towards a solution by running the algorithm on a smaller version of the original pattern
Which of the following software license agreements allows users to use, modify, and sell or give away source code without the payment of royalties to the original developers? A) Creative Commons Attribution-NoDerivs license B) End-user license C) Open-Source license D) Proprietary license
C) Open-Source license
In an online scam, a bank customer recieves an e-mail warning of suspicious activity on the customer's account. The e-mail asks the customer to click on a link in the e-mail, which, the e-mail claims, will allow the customer to log into his or her account and verify his or her identity. The e-mail has the look and feel of a legitamate e-mail, but the link points to a malicious web site. Which of the following best describes the scam? A) Spam B) Hacking C) Phishing D) Robocalls
C) Phishing
Which of the following best describes the primary way in which a distributed denial-of-service (DDoS) attack differs from a denial-of service (DoS) attack? A) The goal of the attack B) The number of computers being attacked. C) The number of computers launching the attack. D) The time period in which the attack occurs.
C) The number of computers launching the attack.
A software application that sends encrypted data over the internet uses a popular pseudorandom number generator. The application uses a seed value of 1024. Which of the following statements about the application is true? A) The length of the key used to encrypt the data is 1024 bits. B) The sequence of random numbers generated will repeat every 1024 numbers. C) The sequence of random numbers generated by all instances of the application will be the same. D) Increasing the seed value from 1024 to 2048 would make the applications data significantly more resistant to hacking.
C) The sequence of random numbers generated by all instances of the application will be the same.
A city is conducting a census. A variety of data are collected from each household in the city, including information about incomes, levels of education, ages, and races of the members of the household. However, to be anonymous, names and addressed are not collected. Which of the following best describes a valid visualization of the census data using a spreadsheet? A) Using a spreadsheet chart, the total number of colleges graduates living on each street in the city could be reported. B) Using the filter feature in the spreadsheet, all ages could be converted to birth years. C) Using a spreadsheet formula, the average income per household could be estimated. D) Using the column sort features in the spreadsheet, the oldest person could be identified.
C) Using a spreadsheet formula, the average income per household could be estimated.
A software developer is designing a simulation of city street traffic over a 24 hour period. As part of the design, the simulation will use a variable that represents the amount of time, in hours, that elapses between the entry of successive cars onto the street. During a run simulation, which of the following best describes what values should be assigned to the variable in order to create the most realistic simulation? A) Values that decrease linearly during the simulation. B) Values that increase exponentially during the simulation. C) Values that oscillate during the simulation above and below a specified mean. D) Values randomly generated during the simulation that are integers between 1 and 23, inclusive.
C) Values that oscillate during the simulation above and below a specified mean.
A component that executes program instructions? CPU LCD RAM ROM USB
CPU (Central Processing Unit)
Just because a procedure is defined does not mean it will execute. How do you execute a procedure in a program?
Call the procedure
A(n) ___________ is to a blueprint as a(n) _________________ is to a house.
Class, object
Match the five pillars of cybersecurity with the example of violations of the pillars of cybersecurity. Authentication Availability Confidentiality Integrity Nonrepudiation A hospital post all patients medical records on its public web site.
Confidentiality
A programmer uses code published online under a Creative Commons Attribution (CCBY) licensed in a commercial product. Which of the following best describes an acceptable use of the code? a) Copying code from the online source into the programmers product without any other actions. b) Copying code from the online source into the programmer's product and limiting the copied code to ten lines of code. c) Copying code from the online source into the programmers product and changing all variable names. d) Copying code from the online source into the programmers product and crediting the original author in the manner indicated by the license.
D
Which of the following is a video file format? a) .xls b) .jpeg c) .mp3 d) .wmv
D) .wmv
What is the maximum number of distinct symbols that could appear in the hexadecimal representation of a postive integer? A) 8 B) 10 C) 15 D) 16
D) 16
Which of the following best describes a situation in which a heuristic should be used to find a solution? A) An accountant is calculating the taxes of her clients. B) A researcher is compiling the results from the separate research groups into one list. C) A nurse is determining the correct dosage of medications for a patient based on his age and weight. D) A family is planning a cross-country road trip and wants a route that avoids roads at times they are normally congested.
D) A family is planning a cross-country road trip and wants a route that avoids roads at times they are normally congested.
Which of the following spreadsheet functions would be most useful for detecting improbably high or low values that have become part of a data set as a result of data entry errors? a) A function that averages numeric values in a column or row. b) A function that counts the values in a column or row. c) A function that rounds a numeric value. d) A function that sorts values in a column or row.
D) A function that sorts values in a column or row. A function that sorts values in a column or row will facilitate detecting extreme values in that column or row.
Which of the following is most likely to be permitted as fair use? A) A small business owner uses copyrighted music in an advertisement on a social media website. B) A student uses an image from a Web site for a research project without documenting its source C) A teacher digitizes a computer science textbook and posts it to an electronic blackboard. D) A teacher shows a two-minute video clip of a movie illustrating a concept the class has just discussed.
D) A teacher shows a two-minute video clip of a movie illustrating a concept the class has just discussed.
Why might a developer embed a script in HTML code? A) Because scripts are needed to control presentation of content styles. B) Because scripts are needed to protect the copyrights of the page. C) Because scripts are needed to provide semantic markup of content. D) Because scripts are needed to support dynamic web page behavior.
D) Because scripts are needed to support dynamic web page behavior.
Which of the following best describes how network load and latency change as more devices are connected to the internet in a home network? A) Both the network load and the latency decrease B) The network load decreases and the latency increases. C) The network load increases and the latency decreases. D) Both the network load and the latency increase.
D) Both the network load and the latency increase.
Which of the following is a primary difference between encoding and encryption? A) Encoding involves binary digits and encryption does not. B) Encoding transforms data and encryption does not. C) Encryption is used in online transactions and encoding is not. D) Encryption is used to restrict access and encoding is not.
D) Encryption is used to restrict access and encoding is not.
Which of the following network devices is responsible for finding and changing the paths of data packets as needed? A) Network firewall B) Network interface card C) Network repeater D) Network Router
D) Network Router
Writers and graphic artist are working to develop illustrations of a children's book. Which of the following aspects of the creative process has been most significantly enhanced by the availability of software? A) Determining the layout, size, and number of illustrations B) Designing sketches to illustrate the author concepts. C) Selecting sketches to recommend for each illustration. D) Sharing illustrations among all the artist and writers to obtain feedback.
D) Sharing illustrations among all the artist and writers to obtain feedback.
An algorithm was written for drawing the part of a line segment that lies within given drawing window. The algorithm takes advantage of the fact that there are simple tests to determine if a line segment lies entirely inside or outside the window's border when these test are both negative. This algorithm is representative of which of the following common approaches to solving problems? A) Building a solution by combining small pieces of the solution one at a time and in sequence. B) Expressing a solution of a large problem in terms of the solutions of smaller, similarly structured problems. C) Guessing a solution, using a measure of error to refine that initial estimate, and the repeating the process with the new guess. D) Solving easy cases first and hard cases only when necessary
D) Solving easy cases first and hard cases only when necessary
What is the role of the compiler in the process of developing executable software? A) Managing specification files created as part of the development process. B) Running and testing the executable created by the programmer. C) Tracking older versions of the software in case an error is found and the software needs to be reverted to an earlier form. D) Translating a program written in an abstract, high-level language into a program with the same behavior expressed in machine code.
D) Translating a program written in an abstract, high-level language into a program with the same behavior expressed in machine code.
Which of the following best describes an appropriate use of a wireless communication technology? A) Using Bluetooth on a boat to call rescue vessels B) Using cellular communication in a sparsely populated area to connect a mobile device to the internet. C) Using satellite communication to connect a wireless keyboard to a nearby computer D) Using Wi-Fi to connect a laptop and router within a house.
D) Using Wi-Fi to connect a laptop and router within a house.
Consider the following pseudocode procedure header int average (int a, int b, int c) Which of the following is a valid call to the procedure average? A) average (3, 4) B) average ( "2", 3, 4 ) C) average( 2.5, 5, 6) D) average (average (1, 2, 3), 4, 5)
D) average (average (1, 2, 3), 4, 5)
Which of the following requires the longest runtime on a linked list that has a tail: a. inserted a node at the front of the linked list? b. Inserting a node at the end of a linked list? c. Delete the last node from the linked list?
D. You will have to traverse down the list to the node before the last node to reference null.
Identify the protocol for the following statement: Assigns internet addressed to computers and user. A) SMPT B) DHCP C) IP D) FTP E) TCP
DHCP (Dynamic Host Configuration Protocol)
Match the four technology descriptions with the four acronyms: DNS HTML HTTP TCO The protocol used for transferring web pages.
DNS (Domain Name System)
Answer the following question in regards to data being transferred over the internet: What is data broken down into and transferred over the internet as?
Data Packets
One may run into errors as they write a program. The act of looking for these errors is known as what?
Debugging
What data structure uses keys and corresponding values?
Dictionary
Which of the following is the hexadecimal representation of the decimal 231^19
E7^16
What is the difference between encoding and encryption?
Encoding is transforming data from one format to another and the information is not kept secret. Encryption is transferring data into a form that can only be read by specific individuals and the information is meant to be kept secret.
What is the process of converting data into a form that is unreadable?
Encryption
What are the three basic operations that can be performed on a queue?
Enqueue, dequeue, peek poll, offer, peek
Which type of programming paradigm centers on flow being determined by events?
Event-driven
Identify the protocol for the following statement: A protocol that is used to transfer and manipulate files on the internet. A) SMPT B) DHCP C) IP D) FTP E) TCP
FTP (File Transfer Protocol)
A sales representative has a list of clients to visit during an upcoming sales trip. No two clients live in the same city, and each client will be visited one time. The sales representative will return to the starting city at the end of the trip. To minimize travel expenses, a programmer at the sales representatives company has implemented an algorithm that generates all possible orderings of the clients cities and then evaluates each ordering with respect to travel expenses. Which of the following best describes the running time of the algorithm in terms of the number of cities? a) Factorial b) Linear c) Logarithmic d) Quadratic
Factorial
Linear algorithm loop
For Loop
In a basic (singly) linked list, flow goes which way through the list?
From the head to the tail.
What type of scope is visible throughout the entire program?
Global
Match the four technology descriptions with the four acronyms: DNS HTML HTTP TCO A markup language for creating web pages.
HTML
Match the four technology descriptions with the four acronyms: DNS HTML HTTP TCO The service that maps domain names to IP addresses.
HTTP
When working with a linked list where does the computer/program start in the link list?
Head
What does a web server use to provide contents to clients?
Hypertext Transfer protocol (HTTP)
Identify the protocol for the following statement: A set of rules that govern the format of data sent over the internet. A) SMPT B) DHCP C) IP D) FTP E) TCP
IP (Internet Protocol)
What is heuristic?
In mathematical optimization and computer science, heuristic is a technique designed for solving a problem more quickly when classic methods are too slow, or for finding an approximate solution when classic methods fail to find any exact solution. This is achieved by trading optimality, completeness, accuracy, or precision for speed. In a way, it can be considered a shortcut.
What is a linear search algorithm?
In this type of search, a sequential search is made over all items one by one. Every item is checked and if a match is found then that particular item is returned, otherwise the search continues till the end of the data collection.
In OOP, the process of one class acquiring properties from another class is known as what?
Inheritance
What is the process of assigning a value to a variable known as?
Initialization
Match the five pillars of cybersecurity with the example of violations of the pillars of cybersecurity. Authentication Availability Confidentiality Integrity Nonrepudiation A student uses a bug in a teacher gradebook software to change all students grades to A's.
Integrity
A language that changes code to machine readable code one command at a time is known as what time of language?
Interrupted
Answer the following question in regards to data being transferred over the internet: What happens if the receiving device is missing a packet?
It request the sender to send that packet of data again.
What type of network connects devices over a relatively short distance and this type of network is commonly found in homes and small businesses.
LAN (Local Area Network)
A technology used in flat-screened displays CPU LCD RAM ROM USB
LCD (Liquid Crystal Display)
Stacks are _____ and queues are _______.
LIFO FIFO
What is Latency?
Latency is the time it takes for data to be transferred between its original source and its destination, measured in milliseconds. Internet latency and network latency affect satellite internet connections, cable internet connections, as well as some WiFi connections.
What are collections of premade code that can be imported into a program for use in that program?
Libraries
Classify the following as linked list, array or both: Stored in dynamic memory
Linked list
Classify the following as linked list, array or both: Structure can grow or shrink
Linked list
A file is compressed and its file size shrinks slightly. However, it can be decompressed back to it original file size. What type of compression may have occurred?
Lossless
Identify the following file type as taking advantage of lossless or lossy data compression: PNG
Lossless
Identify the following file type as taking advantage of lossless or lossy data compression: WAV
Lossless
What us lossless compression?
Lossless compression reduces a file's size with no loss of quality. This seemingly magical method of reducing file sizes can be applied to both image and audio files. Lossless compression basically rewrites the data of the original file in a more efficient way. However, because no quality is lost, the resulting files are typically much larger than image and audio files compressed with lossy compression. For example, a file compressed using lossy compression may be one tenth the size of the original, while lossless compression is unlikely to produce a file smaller than half of the original size.
Identify the following file type as taking advantage of lossless or lossy data compression: GIF
Lossy
Identify the following file type as taking advantage of lossless or lossy data compression: JPEG
Lossy
What is lossy compression?
Lossy file compression results in lost data and quality from the original version. Lossy compression is typically associated with image files, such as JPEGs, but can also be used for audio files, like MP3s or AAC files. The "lossyness" of an image file may show up as jagged edges or pixelated areas. In audio files, the lossyness may produce a watery sound or reduce the dynamic range of the audio. Because lossy compression removes data from the original file, the resulting file often takes up much less disk space than the original. For example, a JPEG image may reduce an image's file size by more than 80%, with little noticeable effect. Similarly, a compressed MP3 file may be one tenth the size of the original audio file and may sound almost identical.
A divide and conquer sort algorithm that divides list into smaller partitions until one item is inside each list. It then merges the smaller lists into larger list until one sorted list remains.
Merge Sort
Has an average-case performance of O(nlog^2n).
Merge sort and quick sort
Quadratic algorithm loop
Nested Loop
Answer the following question in regards to data being transferred over the internet: Do data packets all take the same route to get to the target machine?
No
Linked lists use basic construct (object) known as __________. This object stores a ____________ and a reference to the next __________.
Node Variable Node
Match the five pillars of cybersecurity with the example of violations of the pillars of cybersecurity. Authentication Availability Confidentiality Integrity Nonrepudiation A private investigator uses a copy of a coworkers fingerprint to gain access to a computer with a biometric fingerprint sensor
Nonrepudiation
Constructing classes and instantiating objects from those class is an example of what type of programming paradigm?
OOP
In OOP, what is the ability to process objects differently depending on their data type or class?
Polymorphism
What is the segment of code that can be called multiple times in various places inside of a program?
Procedure
What is a Proprietary license?
Proprietary software refers to any software that has a copyright and has limits to use and distribution
What are the three basic operations that can be performed on a stack data structure?
Push, Pop, Peek
What is a quadratic algorithm?
Quadratic Time Complexity represents an algorithm whose performance is directly proportional to the squared size of the input data set (think of Linear, but squared). Within our programs, this time complexity will occur whenever we nest over multiple iterations within the data sets.
A memory device for temporary storage of data and programs. CPU LCD RAM ROM USB
RAM (Random Access Memory)
A storage device for data and start-up instructions for a computer. CPU LCD RAM ROM USB
ROM (Read only Memory)
Exponential algorithm type
Recursive
What type of procedure calls itself inside of its definition?
Recursive
What networking hardware device directs the data leaving the network on where to go over the internet to other networks
Router
Identify the protocol for the following statement: A protocol for e-mail messages on the internet. A) SMPT B) DHCP C) IP D) FTP E) TCP
SMTP (Simple Mail Transverse Protocol)
What are areas of code where names, such as variables, are valid and what are two examples used to define these areas?
Scope Whitespace(Tab) {}
Searches an unsorted part of a list to find the best item for a specific location in the list (e.g. smallest number to the first index). If there is a better item for the specified location, the items are swapped.
Selection Sort
What are the specific rules for programming languages when constructing programs in that language?
Syntax
Identify the protocol for the following statement: A set of rules that governs the delivery of data over the internet and sets up a connection between the sending and receiving computers. A) SMPT B) DHCP C) IP D) FTP E) TCP
TCP (Transmission Control Protocol)
Match the four technology descriptions with the four acronyms: DNS HTML HTTP TCO The protocol that governs packet transmission on the internet.
TCP (Transmission control protocol)
What is Internet of Things (IoT)
The Internet of things describes physical objects that are embedded with sensors, processing ability, software, and other technologies, and that connect and exchange data with other devices and systems over the Internet or other communications networks.
How does the computer/program know when it reaches the end of a linked list?
The last node will return null.
When a program pop from a stack, which value is removed?
The last value added.
When a program adds to the queue, where is the value added?
To the end of the queue.
A connect and protocol used for communication and power supply? CPU LCD RAM ROM USB
USB (Universal serial bus)
What are names that refer to values in the scope of a program?
Variables
Factorial Algorithm type
Visit location
Identify if the following IPv4 addresses are valid or invalid: a). 255.255.255.255 b) 1.0.234 c) 192.156.12.10 d) 1e4:10:f119:8a2e:560:7b2a:1
a) Valid b) Invalid c) Valid d) Valid e) Invalid
Evaluate the following expressions: a. 1-10 / 5-2 b. Integer Division: 25/2 c. 5 % 3 d. 10 % 5 e. 5*3 % 2
a. -3 b. 12 c. 2 d. 0 e. 1
What is the data type of the following values ( Integer, float, string, character, and boolean): a. 56 b. 'Z' c. 1.01 d. "Snake" e. false f. 450901023146632546 g. 0.00000000000000000000000001 h. "5120" i. '4' j. "true"
a. int b. char c. float d. string e. boolean f. int g. float h. string i. char j. string
What are the missing data types in the following variable declarations and initializations in pseudocode? a. _________ num <-- 4 b. ________ age <-- "34" c. ________ hungry <-- true
a. int b. string c. boolean
Classify the following loops as a pretest or post test loop. a. While loop b. For loop c. Do-While loop
a. pretest b. pretest c. posttest
Classify the following as linked list, array or both: Can store a series of strings.
both
Classify the following as linked list, array or both: Is a data structure
both
Segments of code that are not executed by a computer and help make the problem easier to read are known as?
comments
Transforming data from a higher level language to machine language so a computer can use is an example of what?
encoding
Binary trees are examples of what data structure?
graph
What is a data structure that uses edges and vertices?
graph
A program generates a "random" number from a generator that uses a predetermined list of numbers and formulas. What type of number generator is being used?
pseudo-random
What possible code can be inserted into the **missing code** section that will produce the following output? (n is any even integer) int x <-- n if(**missing code**) print "The number is even" else print "The number is odd" end if Output: "The number is even."
x % 2 = 0 x % 2 (does not equal) 1
What is IDE?
· An integrated development environment (IDE) is software for building applications that combines common developer tools into a single graphical user interface (GUI).
What are the four components of computational thinking?
· Decomposition- breaking down a complex problem or system into smaller, more manageable parts. · Pattern Recognition- Looking for similarities among and within problems. · Abstraction- Focusing on the important information only, ignoring irrelevant detail. · Algorithms- Developing a step by step solution to the problem, or the rules to follow to solve the problem.
What is a computer?
· Devices that store, retrieve, and process data.
1) What is the role of a programming language?
· Provide a way to create programs for a computer.