comp sci

Ace your homework & exams now with Quizwiz!

To be eligible for a particular ride at an amusement park, a person must be at least 12 years old and must be between 50 and 80 inches tall, inclusive. Let age represent a person's age, in years, and let height represent the person's height, in inches. Which of the following expressions evaluates to true if and only if the person is eligible for the ride?

(age ≥ 12) AND ((height ≥ 50) AND (height ≤ 80))

A store uses binary numbers to assign a unique binary sequence to each item in its inventory. What is the minimum number of bits required for each binary sequence if the store has between 75 and 100 items in its inventory?

7

Which of the following best describes a challenge involved in using a parallel computing solution?

A parallel computing solution may not be appropriate for an algorithm in which each step requires the output from the preceding step.

Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system?

A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user's computer using the recorded data.

Which of the following best exemplifies the use of multifactor authentication to protect an online banking system?

After entering a password for an online bank account, a user must also enter a code that is sent to the user's phone via text message

Individuals sometimes attempt to remove personal information from the Internet. Which of the following is the LEAST likely reason the personal information is hard to remove?

All personal information is stored online using authentication measures, making the information hard to access.

Which of the following best explains how an analog audio signal is typically represented by a computer?

An analog audio signal is measured at regular intervals. Each measurement is stored as a sample, which is represented at the lowest level as a sequence of bits.

Which of the following is an example of an attack using a rogue access point?

An unauthorized individual gains the ability to view network traffic by connecting to a network router that uses weak or no security measures.

Which of the following is NOT a benefit of collaborating to develop a computing innovation?

Collaboration eliminates the need to resolve differences of opinion.

Which of the following research proposals is most likely to be successful as a citizen science project?

Collecting pictures of birds from around the world that can then be analyzed to determine how location affects bird size

Which of the following best explains how data is transmitted on the Internet?

Data is broken into packets, which can be sent along different paths.

A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best explains the result of this configuration as compared to a configuration in which the router does not limit the bandwidth?

Guest users will be restricted in the maximum amount of data that they can send and receive per second.

The author of an e-book publishes the e-book using a no-rights-reserved Creative Commons license. Which of the following best explains the consequences of publishing the book with this type of license?

Individuals can freely distribute or use the contents of the e-book without needing to obtain additional permissions from the author.

A list of numbers is considered increasing if each value after the first is greater than or equal to the preceding value. The following procedure is intended to return true if numberList is increasing and return false otherwise. Assume that numberList contains at least two elements. Line 1: PROCEDURE isIncreasing(numberList) Line 2: { Line 3: count ←← 2 Line 4: REPEAT UNTIL(count > LENGTH(numberList)) Line 5: { Line 6: IF(numberList[count] < numberList[count - 1]) Line 7: { Line 8: RETURN(true) Line 9: } Line 10: count ←← count + 1 Line 11: } Line 12: RETURN(false) Line 13: } Which of the following changes is needed for the program to work as intended?

Lines 8 and 12 should be interchanged

Which of the following is a true statement about the use of public key encryption in transmitting messages?

Public key encryption enables parties to initiate secure communications through an open medium, such as the Internet, in which there might be eavesdroppers.

A code segment is intended to display the following output. up down down down up down down down Which of the following code segments can be used to display the intended output?

REPEAT 2 TIMES: [DISPLAY UP (REPEAT 3 TIMES: DISPLAY DOWN)]

Which of the following best describes a direct benefit in using redundant routing on the Internet?

Redundancy often allows messages to be sent on the network even if some network devices or connections have failed.

A state government is attempting to reduce the digital divide. Which of the following activities has the greatest potential to contribute to the digital divide rather than reducing it?

Requiring applicants for government jobs to apply using an online platform.

In which of the following situations would it be most appropriate to choose lossy compression over lossless compression?

Storing music files on a smartphone in order to maximize the number of songs that can be stored

Which of the following best explains how symmetric encryption algorithms are typically used?

Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

Which of the following best explains the relationship between the Internet and the World Wide Web?

The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that is accessed via the Internet.

Which of the following statements about the Internet is true?

The Internet is designed to scale to support an increasing number of users.

A program developed for a Web store represents customer account balances using a format that approximates real numbers. While testing the program, a software developer discovers that some values appear to be mathematically imprecise. Which of the following is the most likely cause of the imprecision?

The account balances are represented using a fixed number of bits, resulting in round-off errors.

An online gaming company is introducing several new initiatives to encourage respectful communication between players of online games. Which of the following best describes a solution that uses crowdsourcing?

The company allows individual players to endorse fellow players based on courteous interactions. Once a player receives enough endorsements, the player is given free rewards that can be used during gameplay.

A video-streaming Web site keeps count of the number of times each video has been played since it was first added to the site. The count is updated each time a video is played and is displayed next to each video to show its popularity. At one time, the count for the most popular video was about two million. Sometime later, the same video displayed a seven-digit negative number as its count, while the counts for the other videos displayed correctly. Which of the following is the most likely explanation for the error?

The count for the video became larger than the maximum value allowed by the data type used to store the count.

Which of the following best explains the ability to solve problems algorithmically?

There exist some problems that cannot be solved algorithmically using any computer.

Individuals can freely distribute or use the contents of the e-book without needing to obtain additional permissions from the author.

Unauthorized individuals can use data mining and other techniques to guess a user's password.

What is a phishing attack?

Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information

A scientist wants to investigate several problems. In which of the following situations is using a simulation LEAST suitable for solving a problem?

When the solution to the problem requires real-world data inputs that are continually measured at regular intervals.

What are the values of first and second as a result of executing the code segment?

first = 100, second = 100


Related study sets

Philosophy Final Review: Ethical Issues in Business

View Set

Chapter 29. Integumentary Disorders

View Set

8.4 - Six types of synovial joint shapes determine the movements that can occur at a joint

View Set

Scarcity, Choice and Resource allocation

View Set

NCLEX Thermoregulation Questions

View Set

Chapter 6 - Periosteum and Endosteum

View Set