AP Computer Science

Ace your homework & exams now with Quizwiz!

How much bigger is a megabyte than a kilobyte?

1,000 times bigger

In a black and white image how many bits would it take to represent the smallest possible image with only one pixel?

17

What is the compression rate of the text above?

25.86%

Internet protocol version 4 (IPv4) represents each IP address as a 32-bit binary number. Internet protocol version 6 (IPv6) represents each IP address as a 128-bit binary number. Which of the following best describes the result of using 128-bit addresses instead of 32-bit addresses?

296 times as many addresses are available.

Which of the following best describes the result of using 64-bit integers instead of 32 ?

2^32 times as many values can be represented

The world is currently in a transition to using IPv6, a newer version of the IP protocol that uses 128-bit addresses instead of 32-bit addresses used by IPv4. What is the main problem that IPv6 was created to solve?

32-bit addresses could not ensure that every internet-connected device can receive a unique IP address

RGB color values represent colors using three values of how many bits each?

8

The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works. The members of the IETF are:

A loosely organized collection of citizens and engineers.

Which of the following statements are true about routers and routing on the Internet?Choose two answers.

A packet traveling between two computers on the Internet may be rerouted many times along the way or even lost or "dropped". Routers act independently and route packets as they see fit.

Which program is most likely to benefit from the use of a heuristic?

A program that find the shortest driving route between two locations on a map

Hexadecimal that represents color with the greatest amount of blue?

A100B0

Identify the two true statements about HTTP.

An HTTP request is sent from a client to request access to data stored on a server. Displaying a web page will often require multiple HTTP requests in order to acquire all the necessary data.

Which of the following best describes a Distributed Denial of Service (DDoS) attack?

An attempt to deny users access to a Web site's resources by flooding the Web site with requests from multiple systems.

Which of the following is least likely to be in the metadata of each ebook?

Archive containing previous versions of the ebook

Why do computers need to periodically check the DNS for websites you have already visited?

Because IP address associated with a given URL is not static; it can change.

Which of the following describes how a distributed denial-of-service (DDoS) attack is most likely to compromise an online store's Web site?

By preventing customers from placing orders

Which of the following is a true statement about Internet communication?

Every device connected to the Internet is assigned an Internet protocol (IP) address.

Hexadecimal value for Ref

F00

The various protocols in use on the internet are said to operate in layers in which the protocol(s) at each layer solve one problem related to networked communication, and higher layers are built on top of, and rely on, the lower layers to do their jobs. From the list provided choose the two (2) answers that correctly describe which internet protocol relies on the other. For example: if protocol A relies on protocol B, it means that A is a higher level protocol than B, and thus protocol B must exist and work properly in order for protocol A to do its job.

HTTP relies on TCP/IP DNS relies on TCP/IP

Best to use in order to choose the best alternative among 3 possible routes...

Heuristic

Benefit of using hexadecimal?

Hexadecimal representation of a value generally requires fewer digits than binary

What feature of DNS and IP allow the internet to scale?

Hierarchy

For which goal would it be more useful to analyze metadata instead of the data?

II and III only

How does a computer resolve a domain name into an IP address?

It asks a DNS server for the corresponding IP address

Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?

Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer.

Which of the following protocol standardization is NOT a function of the IETF (Internet Engineering Task Force)?

JavaScript Coding protocol

Bytes in ascending order

Kilo, giga, tera

This technique is an example of what type of compression?

Lossless

What transformation is the photographer using on the digital image?

Lossless treansformation

A raw digital sound file samples a sound wave at some interval and measures the height of the wave at each point. Example of what technique?

Lossy

Likely cause of Sarah's video quality?

Lossy compression

Which of the following BEST describes how protocols on the Internet (e.g. IP, TCP, HTTP) make use of abstraction to accomplish their respective purposes?

Low level protocols can provide functionality to high level protocols without revealing the details of how this is accomplished.

Best term for "data about the data"?

Metadata

Which of the following explains a benefit of using open standards and protocols for Internet communication?

Open standards and protocols allow different manufacturers and developers to build hardware and software that can communicate with hardware and software on the rest of the network.

Which of the following is NOT true about TCP/IP packets?

TCP guarantees that no packets are ever dropped

Which two statements about packets and routing on the internet are true?

TCP must account for the fact that packets may not arrive at a destination computer in the intended order. TCP ensures messages can be reliably transmitted across the Internet.

Which of the following is a characteristic of the fault-tolerant nature of routing on the Internet?

The ability to provide data transmission even when some connections have failed.

A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent to the user?

The file is broken into packets for transmission. The packets must be reassembled upon receipt.

If the post office delivered mail exactly like routers deliver messages on the internet, which 2 statements would be true?

The mailman would sometimes take a different path to deliver each letter to your home. Letters would be written on the outside of envelopes for all to read instead of letters put inside envelopes.

Which do the following could be a possible explanation for the difference in sound quality?

The song was saved using fewer bits per second than the original song

Why is this statement true and what problem solving approach is the most applicable to compression?

There are too many possible ways to compress

True statement about data compression?

Trade offs involved

Which is least likely to support the studios goal?

Using lossy compression software to reduce the size requirements of the data being stored

An Internet Service Provider (ISP) is considering an update to its servers that would save copies of the Web pages most frequently visited by each user. Which of the following is LEAST likely to occur as a result of the update?

Web sites that are not visited frequently might no longer be accessible to users.

When is it most beneficial to use a heuristic approach?

When the problem cannot be solved in a reasonable time and an approximate solution is acceptable

A school starts tracking which websites each computer in the school is visiting by monitoring the packets leaving the school. A sample of the information they have collected appears below: Which of the following is MOST likely to be answerable using all the data collected by this monitoring?

Which websites are most frequently visited before and after school hours from a school computer

According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?

about.example.com

Sam needs to send a picture, which lossless compression image format?

png


Related study sets

Biology unit 4 - lesson 1; cell division

View Set

Women & Sport Midterm Ch. 1, 3, 4, & 5

View Set

Earth/Space Science - Earth's Climate History

View Set

nur 116 - Davis Advantage / Edge - Kidney Stones

View Set

Chapter 15: The Autonomic Nervous System

View Set