Study Guide Review 2

Ace your homework & exams now with Quizwiz!

Hong Lien is a research director for NASA. She is hoping to build a system that can process millions of images from satellites orbiting the earth and analyze them each day for signs of deforestation and ocean debris. She decides to hire an engineer specifically for the task of building the system and reviews many resumes. What would be a good example of prior experience?

"I have experience building highly scalable systems."

Corey is experimenting with assigning and displaying variables. Here's his code: test1 ← 200 DISPLAY (test1) test2 ← 100 test2 ← test1 DISPLAY (test2) test1 ← test2 DISPLAY (test1)

200 200 200

What is a sensor?

A low-power device that can detect some aspect of its environment and send the data to another device.

Aliza visited a website over HTTPS and saw a lock icon in the URL bar, indicating a secure connection with a valid digital certificate. Which of these statements describes the trust model in this scenario?

Aliza trusts the browser, the browser trusts the certificate authority, and the certificate authority trusts the website.

Spam emails are unsolicited messages sent in bulk, typically for advertising or phishing purposes. Email providers typically include a spam detection system, to automatically label and hide emails that look like spam. Which of these spam detection algorithms would benefit the most from access to a large database of emails?

An algorithm that computes the spam likelihood based on the similarity of the email to other spam emails.

Which of the following best describes symmetric encryption?

An encryption scheme where the sender and receiver use the same shared key for encrypting and decrypting data.

what is a Boolean expression?

An expression that can be evaluated as either true or false

An advertisement company builds a profile of a user based on their browsing history across many websites and uses that profile to create more targeted advertisements. Which technology enables the company to aggregate the user's browsing history across multiple sites?

Cookies

what is crowdfunding?

Crowdfunding is the practice of funding a project or venture by raising small amounts of money from a large number of people, typically via the Internet.

A company develops a mobile app designed for parents to monitor what their children are doing. The parents install the app on the phone, and it can record details like who the child is conversing with and what apps they're using. It can also record and store the geolocation of the child. Which of these questions from parents could not be answered by the recorded geolocation data?

Did my child hang out in the park in a group of more than 20 people?

Evelyn receives an email that claims to be from the IRS, the United States Internal Revenue Service. The email states that their tax refund is ready and includes an attachment labeled "taxrefund.doc". Evelyn is eager for their refund but worried the email is a phishing scam. What is the safest next step?

Evelyn can find the official IRS website by searching the Web and contact IRS through a listed email address to inquire about the email.

What is a benefit of online collaborative software?

It allows for groups to work together even if they are not in the same geographic location.

Lavanya is a startup founder who is working on the design of a smart bracelet. She needs to sketch out some ideas with a designer who lives in another country and wants to try using an online collaborative whiteboarding program for their design session. Lavanya is nervous about their design ideas being lost or getting into the wrong hands, however. Which of these is not a way that the whiteboarding data could be lost or stolen?

Lavanya could accidentally drop her laptop, resulting in a damaged hard drive and erased data.

Which statements are true about multi-factor authentication?

MFA adds an additional level of security to the authentication process. and MFA requires evidence from at least two authentication factors.

What is another way to put this: NOT (NOT isMoving AND NOT isAlive)

NOT (NOT isMoving) OR NOT (NOT isAlive)

Are emails 100 % private?

No not 100%(think about data breaches, unauthorized access to their Internet connection, and accidental or intentional email sharing)

What is PII?

Personally identifiable information

What will happen if you type pseudocode in another language's programming environment and try to run the program?

The program will not run, because programming environments only understand the language they're built for.

DreamLab is a research project with the goal of coming up with better treatments for cancer patients. How it works: -Anyone can download the DreamLab app onto their smartphone. -The app will run computer simulations while their smartphone charges at night. -The app sends results back to the research team. What is the primary benefit of enabling people to run the simulations on their smartphones?

The researchers do not have to pay for the computing power used by the smartphones.

Kira sends an email message to a teammate about a conflict she's having with their boss. They later discover that the boss found out about the contents of the message. What's the most likely way that happened?

The teammate forwarded the message to the boss.

why are loops helpful?

They remove repetitive code, and condense the code

A "red light camera" is a camera installed at street intersections that records whenever a car runs a red light. The camera records two images, one right before the car enters the intersection, and one after it's entered the intersection. In addition to the images, it records metadata about the incident: the date and time, the intersection location, the speed of the car, and the seconds elapsed past the light turning red. Which of these questions can be better answered by analyzing the metadata instead of the image data?

What is the average speed of a car when it runs a red light? and Which intersections have the greatest number of red-light runners?

what is volunteer computing?

When people donate their computer's spare resources to crunch numbers for scientific research projects.

Can every word ever spoken can fit into five billion gigabytes?

Yes!

Example of an acoustic sensor

a microphone

Other names for procedures are what?

functions

numSiblings ← 3 number or string

number

Nikki read that it's healthy to take 10,000 steps every day. She's curious how many steps that'd be per minute, walking from 10AM to 10PM, and is writing a program to figure it out. The program starts with this code: stepsPerDay ← 10000 hoursAwake ← 12 Which lines of code successfully calculate and store the steps per minute?

stepsPerMin ← stepsPerDay / hoursAwake / 60 and stepsPerMin ← (stepsPerDay / hoursAwake) / 60

Do i need square brackets for a list?

yes


Related study sets

Chapter 4- Personal Finance-Planning your Tax Strategies

View Set

Chapter 46: Physiology of the Autonomic and Central Nervous Systems and Indications for the Use of Drug Therapy

View Set

Perioperative Questions from Coursepoint #2

View Set