Fundamentals of Computing Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Felipe is trying to find information on wind power in Germany. Which of the following would be the most effective search query for this?

"wind power" +Germany

Which of the following CSS rules will select the HTML element with the id logo and set the font size for that element to 60 pixels?

#logo { font-size: 60px; }

Which of the following code snippets will select all HTML elements with the class "alert" and set their color to be red?

.alert { color: red; }

Which of the following is the correct HTML code to create a hyperlink that displays Click Me and links to google.com?

<a href="https://google.com"> Click Me </a>

Which of the following HTML code snippets is the proper way to set the background color of an <h1> tag to be blue?

<h1 style="background-color:blue;">Hello</h1>

Which of the following is a valid HTML tag?

<h1>

Which of the following lines of HTML code will insert an image into a webpage?

<img src="https://codehs.com/static/img/logo.png">

Which of the following HTML code snippets will generate the following table?

<table border="1"> <tr> <th>Name</th> <th>Score</th> </tr> <tr> <td>Karel</td> <td>32</td> </tr> </table>

Which of the following tags defines a table header?

<th>

Which of the following tags defines a table row?

<tr>

Which of the following HTML code snippets would produce the following web page: Apples Bananas Oranges

<ul> <li>Apples</li> <li>Bananas</li> <li>Oranges</li> </ul>

Which of the following statements is the simplest and most accurate definition of a computer?

A computer is something that performs calculations by following and executing specific instructions to solve a problem.

What is the Internet Protocol (IP)?

A protocol that defines the structure of an Internet address and assigns a unique address to every device on the Internet

What information is contained in a packet?

A small part of a digital message, and metadata about the message, including where it came from and where it is going

Which of the following choices correctly orders the early types of computers from earliest to most recent?

Abacus, Analytical Engine, ENIAC, IBM Laptop

Which of the following is an example of two factor authentication?

After inputting your password, you receive a text message with a unique pin.

Which of the following lists the types of copyright license from most restrictive to least restrictive?

All Rights Reserved, Some Rights Reserved, Public Domain

A privacy policy discloses:

All of the above

How can you be an upstander if you witness cyberbullying?

All of the above

Victims of cyberbullying may experience which of the following?

All of the above

Which of the following are best practices for having a secure password?

All of the above

Which of the following is an application of Artificial Intelligence?

All of the above

Which of the following actions will help you avoid violation of copyright laws?

All of these answers

Which of the following devices is not connected to the Internet of Things?

An AM/FM radio without any bluetooth or Internet connection capabilities

Which of the following is not a good practice for effective Internet searches?

Be general in your search query to get as many results possible

How is the bandwidth of a network measured?

Bitrate. Higher bitrate means higher bandwidth.

Which of the following choices lists the three main components of a computer's hardware?

CPU, Memory, Motherboard

What does CPU stand for?

Central Processing Unit

Which STEM field is the only one to have more annual jobs than graduates?

Computing

In cybersecurity, what does CIA stand for?

Confidentiality, Integrity, Availability

What is the function of the <br> tag?

Create a line break on the resulting webpage

Which of the following is not true about cybersecurity?

Cyber attacks can devastate large organizations, but individuals are largely unaffected.

Is the following statement true, or false: Everyone in the world has internet access.

False

True or False. The information about a particular person that exists on the Internet is a result of only a portion of their online activity. Some things don't matter or are not part of a person's digital footprint.

False

True or False: As long as you cite your source, you are free to use or share any kind of media you find on the Internet.

False

True or False: It is legal to practice hacking public websites as long as you are a student learning about cybersecurity.

False

True or false: The internet is a great place to socialize, and because it is completely online, everyone is safe.

False

By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, even if you change your settings.

False. It depends if the privacy policy allows you to opt in or out of sharing data.

By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, no matter what.

False. It depends if the privacy policy allows you to opt in or out of sharing data.

Which of the following pieces of information would be safe to include in an online username?

Favorite sport

Suppose you want to make a visualization that shows how many students bought certain quantities of candy from the vending machine during the month of September. Of the choices below, which chart would best convey this information to the person looking at the graph?

Histogram

A person's digital footprint consists of the following: I. Comments you leave II. Pictures you post III. Topics you search IV. Apps you use V. Music you download VI. Emails you send

I - VI all

Which of the following is true about the Internet of Things? I. The Internet of Things is the network of devices with the ability to connect and exchange data. II. The Internet of Things increases our vulnerability to cyber attacks. III. The Internet of Things is purely positive-there are no negative consequences to increased connectivity

I and II

Which of the following fields use computers? I. Computer Science II. Medicine III. Video Gaming IV. Automotive (Cars)

I, II, III, IV

Which of the following items is an example of a user application? I. Browser II. Text editor III. Games IV. File Explorer

I, II, III, IV

Which of the following are ways that data is collected about you: I - Websites store data that tracks how you use the website II - Websites store cookies in your browser so that the next time you visit the website things like your profile login and recent activity are saved III - Some apps store geolocation information from your phone to track your location IV - Transaction data is stored by credit card companies when you purchase things with a credit card

I, II, III, and IV

Which of the following are safety guidelines when socializing online? I. Be wary when communicating with people you don't know in real life II. Don't disclose personal information-even if it doesn't seem important III. Don't have any social media accounts IV. Block/report if you are being harassed V. Don't send or receive any emails VI. Ask a trusted adult if you need help

I, II, IV, and VI

Which of the following statements are true about the Internet? I - The Internet connects devices and networks all over the world II - The Internet helps people collaborate to solve problems III - The Internet helps people communicate IV - There are no negative consequences of the Internet, it is purely positive

I, II, and III

Which of the following statements are true about cyberbullying: I. Cyberbullying uses electronic communication to bully a person. II. Cyberbullying is a crime in many states. III. Instances of cyberbullying do not affect the digital footprint of the victim. IV. Cyberbullying hurts real people even though we can't always see their reactions online.

I, II, and IV

Which of the following can help you to maintain your digital footprint? I. Using privacy settings to limit your exposure II. Posting long rants when you are angry about something III. Reviewing posts you are tagged in and taking action if needed IV. Googling yourself on a regular basis

I, III, and IV

Which of the following people can access your digital footprint? I. Teachers, colleges, and scholarship committees II. Potential employers III. Family, friends, and acquaintances

I-III All

Which of the following industries utilize computer science? I. Agriculture II. Government III. Music IV. Healthcare V. Art VI. Film

I-VI, all

Which of the following are true about Internet routing? I - For any two points on the Internet, there exists only one path between the two points II - Routing on the Internet is fault tolerant and redundant

II only

Which of the following statements is true? I. Computers have only been around since the 1940's II. One reason computers were first developed was to do mathematical computations faster III. Some modern computers include laptops, cell phones, and tablets IV. Computers are able to perform tasks by using logic

II, III, IV

What should you do if you are a victim of cyberbullying? I. Respond to the bully II. Keep a record of messages received (print or take screenshots) III. Reach out to parents, teachers, counselors, and school administrators IV. Block communication from the bully (if possible)

II, III, and IV

Alice is buying books from an online retail site, and she finds that she is able to change the price of a book from $19.99 to $1.99. Which part of the CIA triad has been broken?

Integrity

Which of the following statements is something the operating system of a computer is responsible for doing?

Managing memory allocation for all applications.

Which of the following devices is the device that connects all of the physical components of a computer together?

Motherboard

Which of the following choices is a brand-new application of computers, having come about in the past 5 years?

None of the above.

Which of the following describes an instance of legal hacking?

Penetration testing for a company

A person's digital footprint is:

Public and permanent to anyone

What is the fourth step of viewing a web page as described in the video?

Rendering the Page: Your browser takes the resource and renders it in the browser window

What is the second step of viewing a web page as described in the video?

The Request: The browser sends a message to a server requesting a resource

What is the third step of viewing a web page as described in the video?

The Response: The server sends a response to the browser with the resource attached

What is the first step of viewing a web page as described in the video?

The URL: You type the URL for the web page into your browser

What is the bitrate of a system?

The amount of data (in bits) that can be sent in a fixed amount of time

Which of the following is not a characteristic of a credible source?

The author is not named on the website

Which of the following describes a credible source?

The domain is .edu.

What is the latency of a system?

The time it takes for a bit to travel from sender to receiver

Which of the following is an example of metadata about a webpage?

The title of the webpage

What is not true of white hat hackers?

They are breaking the law and are at risk of legal repercussions

What is the purpose of a network device?

To allow computers to connect and communicate with other computers.

What is the purpose of an output device?

To allow the computer to display or communicate the result of a computation

What is the purpose of a storage device?

To allow the computer to store information or programs.

What is the purpose of an input device?

To allow the user to give data or information to the computer.

What is the purpose of the Digital Millennium Copyright Act?

To criminalize the act of circumventing, or getting around, access controls that block access to copyrighted works.

What is the function of the Domain Name System (DNS)?

To translate domain names into IP addresses

True or False: Cyberbullying can be persistent, permanent and discreet (meaning teachers and parents can't see or overhear cyberbullying).

True

What does URL stand for?

Uniform Resource Locator

Which of the following statements is true about data visualizations?

Visualizations take many forms, from tables to charts to images.

The video described several different kinds of charts that we commonly use to visualize data. In which of the following would one of the charts described help to accomplish the accompanying task described?

Your school wants to track how many people attend the football games over time throughout the school year.

According to the Domain Name System (DNS), which of the following is a subdomain of the domain example.com?

about.example.com

Why do we use CSS?

all of the above

Which of the following is a valid CSS rule?

h1 { color: blue; }

Which of the following code snippets will select all <img> tags on a page and give them a height of 200 pixels?

img { height: 200px; }


Set pelajaran terkait

OB R&R ch 10 (the normal postpartal experience)

View Set

Ch. 22 Exam Question: Body Fluids

View Set

OWN Collection of Blood and Non-Blood Specimens

View Set

Human Population Dynamics Part 2

View Set

GRE Literature in English Complete

View Set

QM-Exam 1 - Minimester - Study Guide

View Set