compsci
unit 1.1 A video game character can face toward one of four directions: north, south, east, and west. Each direction is stored in memory as a sequence of four bits. A new version of the game is created in which the character can face toward one of eight directions, adding northwest, Northeast, southwest, and southeast to the original four possibilities. which of the following statement is true about how the eight directions must be stored in memory? (hint: how many bits are needed to represent 8 numbers) (A) Four bits are not enough to store the eight directions. Five bits are needed for the new version of the game. (B) Four bits are not enough to store the eight directions. Eight bits are needed for the new version of the game. (C) Four bits are not enough to store the eight directions. Sixteen bits are needed for the new version of the game. (D) Four bits are enough to store the eight directions.
D Four bits are enough to store the eight directions.
10. Which of the following activities poses the greatest personal cybersecurity (online security) risk? A Making a purchase at an online store that uses encyption to transmit credit card infomation. B Performing online banking with a Website that used the HTTPS protocol. C Withdrawing money from a bank account using an automated teller machine ATM. D Reserving a hotel room providing payment information on the hotel's Website using the HTTP protocol.
D Reserving a hotel room providing payment information on the hotel's Website using the HTTP protocol.
The va iable score is to be used to represent a person's exam score. In the exam, it is possible to get pa tial credit for some questions. Which of the following is the most approp iate data type for score ? A a list B a whole number C a sting D a decimal number
D a decimal number
Which of the following is an advantage of a lossy image compression technique over a lossless image compression technique? 2 POINTS (A) A lossy compression technique can guarantee that compressed infomation is kept secure, while a lossless compression technique cannot. (B) lossy compression technique can guarantee restoration of oiginal data, while a lossless compression technique cannot. (C) A lossy compression technique typically allows for better image quality than does a lossless compression technique . (D) A lossy compression technique typically allows for smaller file sizes for storage and/or transmission then does a lossless compression technique.
D lossy compression technique typically allows for smaller file sizes for storage and/or transmission than does a lossless compression technique
Unit 1.3 Which computer hardware component best matches the description? The devices which are often removable or otherwise not mandatory for the normal function of a computer. A Secondary Storage B Primary Storage C Data Bus D Central Processing Unit E Peripheral Device
E Peripheral Device
Which of the following best explains how data is typically assembled in packets for transmission over the Internet?
Each packet contains data to be transmitted, along with metadata containing information used to route the data to the correct destination.
Recall that logic gates have wires that ca y cu rent used as input to and output from the gate. If the cu rent is flowing on the wire we say its value is 1, but if there is no cu rent then its value is 0. The OR gate accepts 2 inputs A and B and produces 1 output. According to the tuth table for the OR gate, which of the following statements is a tue statement? In order for the output to be 1, only one of its inputs needs to be 1 B In order for the output to be 1, both of its inputs needs to be 1 C In order for the output to be 0, exactly one of its inputs needs to be 0 D In order for the output to be 0, only one of its inputs needs to be 0
In order for the output to be 1, only one of its inputs needs to be 1
Recall that logic gates have wires that carry current used as input to and output from the gate. If the current is flowing on the wire we say its value is 1, but if there is no current then its value is 0. The OR gate accepts 2 inputs (A and B) and produces 1 output. According to the truth table for the OR gate, which of the following statements is a true statement?
In order for the output to be 1, only one of its inputs needs to be 1 In order for the output to be 0, both of its inputs need to be 0
Unit 2.2 What is the purpose of a Dynamic Host Configuration Protocol DHCP server? It connects multiple computers by routing packets of information to their correct destination (A) using the best possible route at the time. (B) It translates IP addresses into domain names (like google.com). (C) It translates domain names (like google.com) to IP addresses. (D)It automatically assigns IP addresses to authorized computers when they connect to a network for the first time. (E) It directs packets of information along a predetermined route.
It automatically assigns IP addresses to authorized computers when they connect to a network
Which of the following activities poses the greatest personal cybersecurity (online security) risk?
Making a purchase at an online store that uses the HTTP protocol to transmit credit card information.
Historically, it has been observed that computer processing speeds tend to double every two years. Which of the following best describes how certain technology companies can use this observation for planning purposes?
Software development companies can predict the approximate dates when customers will be using more advanced processors
The figure attached shows two grids, each containing a robot represented as a arrow. The robot cannot move to a black square or move beyond the edge of the grid. The arrow shows the direction that the robot is facing. Which of the following 2 algorithms will allow the robot to make a single circuit around the rectangular region of black squares, finishing in the location indicated with an "X" (select 2 options)
Step 1: Keep moving forward, one square at a time, until the square to the right of the robot is white. Step 2: Turn right and move two squares forward. Step 3: Repeat step 2. Step 1: Keep moving forward, one square at a time, until the square in front of the robot is black. Step 2: Turn right and move two squares forward. Step 3: Repeat step 2
Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes the ability of the two computers to communicate with each other across the Internet?
The computers can communicate directly because Internet communication uses standard protocols.
Recall that image files contain data about the pixels within the image. Which of the following is likely to be stored as metadata associated with the image file (select 2 options)?
The date and time the image was created The file size (in bytes) of the image
The variable score is to be used to represent a person's exam score. In the exam, it is possible to get partial credit for some questions. Which of the following is the most appropriate data type for score ?
a decimal number
Unit 2.5 Which of the following is LEAST likely to be a contributing factor to the digital divide? (A) Some individuals and groups are economically disadvantaged and cannot afford to compute devices or Internet service. (B) Some individuals and groups do not have the necessary experience or education to use computing devices or the Internet effectively. (C) Some parents prefer to limit the amount of time their children spend using computing devices or the Internet. (D) Some residents in remote regions of the world do not have access to the infrastructurenecessary to support reliable Internet connectivity.
c Some parents prefer to limit the amount of time their children spend using computing devices
Which of the following binary numbers represents the octal value 268?
10110
Given the hexadecimal (base 16) number 19916, what is the next hexadecimal number in the sequence? (In other words, what is 19916 + 116?)
19A16
Crayola produces a mega box of crayons with 240 distinct colors. If we needed a color system that could represent all of those colors, what is the minimum number of bits that would be needed?
8-bits
8. Which of the following is not a reason why we would want to use a bitmap (raster) image fomat rather than vector graphic image fomat. A Bitmaps are scalable without a loss of quality. B Bitmaps are generally easier to share or distibute. C Bitmaps can represent more realistic images than vector graphics D Bitmaps files can be created directly using a digital camera.
A Bitmaps are scalable without a loss of quality.
Unit 1.6 Consider the following secondary storage devices which can be found at a retailer for the same price: I. A 360 GB solid-state drive SSD II. A 1.6 TB hard-disk dive HDD Why might a consumer choose to purchase dive II instead of dive I. A Dive II has fewer wite limitations than dive I. B Dive II has faster reading and writing capabilities than dive I. C Dive II has greater storage capacity than dive I. D Dive II is less prone to mechanical failure than dive I. E Dive II contains more cloud storage than dive I.
A Dive II has fewer wite limitations than dive I. or C Dive II has greater storage capacity than dive I.
Unit 1.3 The CPU performs the instructions in programs by continuously following the CPU Instruction Cycle. Which is the first step in this instruction cycle? A Fetch instruction from memory B Decode an instruction C Fetch data D Execute an instruction
A Fetch instruction from memory
Unit 2.4 When comparing different Intenet Sevice Provider connection speeds, we generally focus on which three measures? A Latency, upload bandwidth, and download bandwidth. B Latency, upload frequency, and download frequency. C Upload latency, download latency, and wireless frequency. D Larceny, broadband, and flow. E TCP, UDP, and HTTP.
A Latency, upload bandwidth, and download bandwidth.
Unit 1.3 Which computer hardware component best matches the description? The semi-permanent memory of a computer that stores programs so that they may be executed by a computer in the future. A Secondary Storage B Primary Storage C Data Bus D Central Processing Unit E Peripheral Device
A Secondary Storage
In which of the following situations would it be most appropriate to choose lossless compression over lossy compression? A Storing digital photographs to be printed and displayed in a large format in an at gallery. B Sharing a digital photograph on social media. C Storing music files on a smartphone in order to maximize the number of songs that can be stored. D Stoing several video files on a potable device which has a small storage capacity.
A Storing digital photographs to be printed and displayed in a large format in an at gallery.
11. Which of the following describes user data that is not likely stored by a Web browser? 2 POINTS A The browser may store your IP address so that it can be identified on the Intenet. B The browser may store tracking cookies from Google, Facebook, and other advertisers which provide personalized advertisement experiences. C The browser may store Web fom infomation that has been entered by the user. D The browser may store a use's browsing histoy.
A The browser may store your IP address so that it can be identified on the Intenet.
12. Which of the following descibes a benefit of using a Vitual Pivate Network VPN? 2 POINTS (A) The use's Intenet Sevice Provider will not be able to know which Websites the person is visiting. (B) The use's Internet Service Provider will not be able to know that they are using a VPN. (C) The user's data will be encrypted from the use's computer to the final destination (the Website they are visiting) on the Intenet. (D) The use's browser histoy will not record the Websites the person is visiting.
A The use's Intenet Sevice Provider will not be able to know which Websites the person is visiting.
A raw digital video file can be compressed by detemining the best way of reducing the video frames, recording changes pixels between frames, and reducing audio tracks while still syncing them with frames. What is used to pefom this compression and the decompression when the video is played? A A codec. B A modem. C A compressor. D A pixelator.
A codec.
Unit 2.1 Which of the following definitions best describes a computer network? (A) A collection of interconnected computers that share a common set of resources (data, devices, etc.). (B) A collection of independent computers that use a similar set of resources (data, devices, etc.). (C) A device that connects multiple computers by routing packets of information to their correct destination using the best possible route at the time. (D) A device that is actually 2 devices in one: a modulator to convert digital signals into analog signals (audio, radio, coaxial, etc.) and a demodulator to convert analog signals to digital signals. (E) A device that directs packets of information along a predete mined route.
A collection of interconnected computers that share a common set of resources (data, devices, etc.).
Which of the following best describes an algorithm?
A set of instructions written in human language that describes the action performed by a computer to complete some task or calculation
Unit 1.7 Consider the given truth table for the AND logic gate. The gate accepts 2 inputs A and B and produces 1 output. There are 2 values missing from the truth table shown with question marks ?. What are the 2 missing values (in order from top to bottom)? A 0 0 B 0 1 C 1 0 D 1 1 E 0 2
B 0 1
Unit 1.5 The player controls in a particular video game are represented by numbers. The controls and their corresponding binary values are shown in the table. The numeric values for the controls can also be represented in octal (base 8.) What is the octal value for the run control? A 12 B 31 C 16 D 24 E 32
B 31
Encrypting data refers to obscuring the binary data in some way to make it harder to recognize the information. Which of the following features are needed for effective encryption? I. The encrypted data must be able to be decrypted losslessly (the original data is able to be fully restored). II. The encryption must result in a compression of the data (fewer bits are needed to store the encrypted result). III. The encryption must be able to be repeated (the same result must be reproduced using the same data). 2 POINTS A II only. B Either I or III. C Both I and II. D Both II and III.
B Either I or III.
. Unit 1.5 ASCII is a character-encoding scheme that uses a numeric value to represent each character. For example, the uppercase letter "G" is represented by the decimal (base 10 value 7110. A partial list of characters and their corresponding ASCII values are shown in the table. ASCII characters can also be represented by hexadecimal numbers. According to ASCII character encoding, which of the following letters is represented by the hexadecimal (base 16 number 4C16? A A B L C R D V E Z
B L
Unit 1.3 Which computer hardware component best matches the description? The volatile memory of a computer that stores programs that are currently being executed. A Seconday Storage B Primary Storage C Data Bus D Central Processing Unit E Peipheral Device
B Primary Storage
Consider an image file fomat that also contains metadata that descibes the date created and file size. For which of the following goals would analyzing the metadata be more appropiate than analyzing the pixel data? 2 POINTS A Detemining the likelihood that the photo is a picture taken on the Scheck Hillel campus. B Sorting the files so that the newest files are displayed first in an album. C Counting the number of people that appear in the photo. D Detemining what is the most dominant (the most used) color in the image.
B Sorting the files so that the newest files are displayed first in an album.
Unit 1.6 Consider the scenario involving the following processors: I. A 486 MHz single-core processor. II. A 2.3 GHz single-core processor. Assuming that there are no other programs running on the CPU and identical program stats at exactly the same time on each of the processors, which of the following statements is true? A The program will finish executing first on processor I. B The program will finish executing first on processor II. C The program will finish executing at the same time on both processors. D There is not enough information to determine which finishes first. E The program will never finish executing on either processor.
B The program will finish executing first on processor II.
16. Unit 2.2 Which network communication protocol uses a "handshake" between 2 computers to establish a connection that allows for retransmission of lost data packets? A User Datagram Protocol UDP B Transmission Control Protocol TCP C Intenet Protocol IP D Dynamic Host Configuration Protocol DHCP E Completely Fake Protocol CFP
B Transmission Control Protocol TCP
Given the hexadecimal (base 16 number 19916, what is the next hexadecimal number in the sequence? In other words, what is 19916 + 116? A 19816 B 20016 C 19A16 D 1AA16
C 19A16
A digital photo file contains data representing the level of red, green, and blue for each pixel in the photo as a decimal value from 0 to 255 for each of the three colors. How many total bits are used to represent the combination of all three colors per pixel in moden bitmap file formats? A 8 bits B 16 bits C 24 bits D 32 bits
C 24 bits
Crayola produces a jumbo box of crayons with 120 distinct colors. If we needed a color system that could represent all of those colors, how many bits per pixel would be needed? A 2 bits. B 4 bits. C 7 bits. D 120 bits.
C 7 bits.
Malicious software (malware) refers to applications which may be hamful to the secuity and/or pivacy of the computer user. Which of the following does not descibe a fom of malware? 2 POINTS (A) A user installs a Web browser extension that contains a key logger that records everything the user types while the browser is open. (B) user downloads a video game from the Internet that contains a trojan which allows an adversary to gain control of the user's computer. (C) A user receives an email containing a virus which causes the user to be infected with the flu when the file is opened. (D) The user logs onto their computer to find only a screen with a message telling them to transfer $250 dollars to a specific bank account to unlock access to their files and applications.
C A user receives an email containing a virus which causes the user to be infected with the flu when the file is opened.
Most operating systems allow a user to delete a file from the computer by dragging it to the trash or recycle bin. Which of the following best descibes what happens to the file on the seconday storage device when this trash is emptied? A All the 1s and 0s that make up the file are erased from the dive. B All the 1s and 0s that make up the file are reset to be all 0s on the dive. CAll the 1s and 0s that make up the file remain on the dive, but the file is removed from the file table. D All the 1s and 0s that make up the file are reset to be all 1s on the dive.
C All the 1s and 0s that make up the file remain on the dive, but the file is removed from the filetable.
Unit 1.3 Which computer hardware component best matches the description? The component of a computer that allows for data to be transmitted between other computer components. A Seconday Storage B Pimay Storage C Data Bus D Central Processing Unit E Peipheral Device
C Data Bus
Unit 2.2 Which of the following is a true statement about Intenet communication? (A) Devices from different manufacturers are required to run the same operating system to communicate over the Internet. (B) Every device connected to the Internet is assigned a digital certificate by the Universal Regulation Licensing Board URLB. ( C) Every device connected to the Intenet is assigned an Intenet protocol IP address. (D) Every device connected to the Intenet requires a high-speed connection to enable redundantly routing to each device. (E) Every device connected to the Intenet is assigned an Unifom Resource Locator URL address.
C Every device connected to the Intenet is assigned an Intenet protocol IP address.
Unit 1.1 The player controls in a particular video game are represented by numbers. The controls and their corresponding binary values are shown in the table. The numeric values for the controls can also be represented in decimal (base 10. What is the decimal value for the jump control? A 3 B 12 C 16 D 24 E 32
D 24
8. Unit 1.5 Given the hexadecimal number 8916, what is the next hexadecimal number? In other words, what is 8916 + 116? A 90 B 91 C 9A D 8A E A9
D 8A
Recall that image files contain data about the pixels within the image. Which of the following is least likely to be stored as metadata associated with the image file? A The file size (in bytes) of the image B The date and time the image was created C The dimensions (number of rows and columns of pixels) of the image D A duplicate copy of the pixel data
D A duplicate copy of the pixel data
RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone's Global Positioning System (GPS) unit to track a user's location, running speed, and distance traveled. Users' data is transmitted to a secure server using an HTTPS connection. Users can use the application to review information and statistics about their previous runs. Since the data is stored on the server, they can access their information from multiple devices. At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application shares the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other's contact lists or if they typically run at similar speeds. A basic RunRoutr account is free, but it displays advertisements that are targeted to individual users based on data collected by the application. For example, if a user's running route begins or ends near a particular store, the application may display an advertisement for that store. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application. Which of the following is most likely to be a privacy concern for RunRoutr users? Which of the following is NOT a bias of the RunRoutr application?
Users of the app will be able to see when and where other users in their contacts list run.
RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone's Global Positioning System (GPS) unit to track a user's location, running speed, and distance traveled. Users' data is transmitted to a secure server using an HTTPS connection. Users can use the application to review information and statistics about their previous runs. Since the data is stored on the server, they can access their information from multiple devices. At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application shares the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other's contact lists or if they typically run at similar speeds. A basic RunRoutr account is free, but it displays advertisements that are targeted to individual users based on data collected by the application. For example, if a user's running route begins or ends near a particular store, the application may display an advertisement for that store. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application. Which of the following is most likely to be a privacy concern for RunRoutr users?
Users of the application may have the ability to determine information about the locations of users that are not on their contact lists
RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone's Global Positioning System (GPS) unit to track a user's location, running speed, and distance traveled. Users' data is transmitted to a secure server using an HTTPS connection. Users can use the application to review information and statistics about their previous runs. Since the data is stored on the server, they can access their information from multiple devices. At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application shares the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other's contact lists or if they typically run at similar speeds. A basic RunRoutr account is free, but it displays advertisements that are targeted to individual users based on data collected by the application. For example, if a user's running route begins or ends near a particular store, the application may display an advertisement for that store. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application. Which of the following is most likely to be a privacy concern for RunRoutr users? Which of the following is a security advantage of the RunRoutr application?
Users' data is encrypted when transmitted to the server and is unlikely to be collected without their knowledge.