1/29
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which of the following is a true statement about data compression?
A) Data compression is only useful for files being transmitted over the Internet.
B) Regardless of the compression technique used, once a data file is compressed, it cannot be restored to its original state.
C) Sending a compressed version of a file ensures that the contents of the file cannot be
intercepted by an unauthorized user.
D) There are trade-offs involved in choosing a compression technique for storing and transmitting data.
D) There are trade-offs involved in choosing a compression technique for storing and transmitting data.
Which of the following best explains how data is typically assembled in packets for transmission over the Internet?
Each packet contains data to be transmitted, along with metadata containing information used for routing the data.
A user wants to save a data file on an online storage site. The user wants to reduce the size of the file, if possible, and wants to be able to completely restore the file to its original version. Which of the following actions best supports the user's needs?
Compressing the file using a lossless compression algorithm before uploading it
A color in a computing application is represented by an RGB triplet that describes the amount of red, green, and blue, respectively, used to create the desired color. A selection of colors and their corresponding RGB triplets are shown in the following table. Each value is represented in decimal (base 10).
Color NameRGB Triplet
indigo (75, 0, 130)
ivory(255, 255, 240)
light pink(255, 182, 193)
light yellow(255, 255, 224)
magenta(255, 0, 255)
neutral gray(127, 127, 112)
pale yellow(255, 255, 160)
vivid yellow(255, 255, 14)
According to information in the table, what color is represented by the binary RGB triplet (11111111, 11111111, 11110000)?
ivory(255, 255, 240)
Which of the following best describes a direct benefit in using redundant routing on the Internet?
Redundancy often allows messages to be sent on the network even if some network devices or connections have failed
Internet protocol version 6 (IPv6) has been introduced to replace the previous version (IPv4). Which of the following best describes a benefit of IPv6 over IPv4?
IPv6 allows for a greater number of addresses than IPv4, which allows more devices to be connected to the Internet.
ASCII is a character-encoding scheme that uses a numeric value to represent each character. For example, the uppercase letter "G" is represented by the decimal (base 10) value 71. A partial list of characters and their corresponding ASCII values are shown in the table below.
ASCII characters can also be represented by hexadecimal numbers. According to ASCII character encoding, which of the following letters is represented by the hexadecimal (base 16) number 56?
V
Which of the following is an advantage of a lossless compression algorithm over a lossy compression algorithm?
A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot.
A certain programming language uses 4-bit binary sequences to represent non negative integers. For example, the binary sequence 0101 represents the corresponding decimal value 5. Using this programming language, a programmer attempts to add the decimal value 14 and 15 and assign the sum to the variable total. Which of the following best describes the result of the operation?
A. The correct sum of 29 will be assigned to the variable total.
B. An overflow error will occur because 4 bits is not large enough to represent either of the values 14 or 15
C. An overflow error will occur because 4 bits is not large enough to represent 29, the sum of 14 and 15
D. A round-off error will occur because the decimal values 14 and 15 are represented as approximation due to the fixed number of bits used to represent numbers.
C. An overflow error will occur because 4 bits is not large enough to represent 29, the sum of 14 and 15
According to the domain name system (dns) what is a subdomain of the domain example.com
about.example.com
The following figure represents a network of physically linked devices labeled P through S. A line between two devices indicates a connection. Devices can communicate only through the connections shown.
Which of the following statements best explains the ability of the network to provide fault tolerance?
The network is considered fault-tolerant because there are redundant paths between each pair of devices.
Which of the following best describes the ability of parallel computing solutions to improve efficiency?
The efficiency of a solution that can be broken down into parallel portions is still limited by a sequential portion.
which of the following best explains how ip addresses are assigned
As a new device is connected to the internet, it is assigned an IP address to enable communication on the network.
A person wants to transmit an audio file from a device to a second device. Which of the following scenarios best demonstrates the use of lossless compression of the original file?
A device compresses the audio file before transmitting it to a second device. The second device restores the compressed file to its original version before playing it.
In which of the following situations would it be most appropriate to choose lossy compression over lossless compression?
Storing music files on a smartphone in order to maximize the number of songs that can be stored
The figure below represents a network of physically linked computers labeled A through G. A line between two computers indicates that the computers can communicate directly with each other. Any information sent between two computers that are not directly connected must go through at least one other computer. For example, information can be sent directly between computers A and B, but information sent between computers A and C must go through other computers.
What is the minimum number of connections that must be broken or removed in the network before computer E can no longer communicate with computer F?
3
Each student that enrolls at a school is assigned a unique ID number, which is stored as a binary number. The ID numbers increase sequentially by 1 with each newly enrolled student. If the ID number assigned to the last student who enrolled was the binary number 1001 0011, what binary number will be assigned to the next student who enrolls?
1001 0100
A store uses binary numbers to assign a unique binary sequence to each item in its inventory. What is the minimum number of bits required for each binary sequence if the store has between 75 and 100 items in its inventory?
7
which of the following is a primary benefit of making a computing system fault-tolerant?
If one component of the system fails, users of the system can often still access it.
The transmission control protocol (TCP) and Internet protocol (IP) are used in Internet communication. Which of the following best describes the purpose of these protocols?
To establish a common standard for sending messages between devices on the Internet
which of the following is a primary reason for the use of open protocols on the internet?
Open protocols provide a way to standardize data transmission between different devices.
Consider the following numeric values.
Binary 1011
Binary 1101
Decimal 5
Decimal 12
Which of the following lists the values in order from least to greatest?
Decimal 5, binary 1011, decimal 12, binary 1101
In which of the configurations is it possible to have redundant routing between devices Q and V?
Both configuration I and configuration II
In configuration I, what is the minimum number of connections that must be broken or removed before device T can no longer communicate with device U?
two
Which of the following best describes the relationship between the World Wide Web and the Internet?
The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.
Which of the following best explains the relationship between the Internet and the World Wide Web?
The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that is accessed via the Internet.
A certain computer has two identical processors that are able to run in parallel. Each processor can run only one process at a time, and each process must be executed on a single processor. The following table indicates the amount of time it takes to execute each of three processes on a single processor. Assume that none of the processes are dependent on any of the other processes. Which of the following best approximates the minimum possible time to execute all three processes when the two processors are run in parallel?
80 seconds
Which of the following parallel computing solutions would minimize the amount of time it takes to execute all four processes?
Running processes P and Q on one processor and processes R and S on the other processor
A program developed for a Web store represents customer account balances using a format that approximates real numbers. While testing the program, a software developer discovers that some values appear to be mathematically imprecise. Which of the following is the most likely cause of the imprecision?
The account balances are represented using a fixed number of bits, resulting in round-off errors.
ASCII is a character-encoding scheme that uses 7 bits to represent each character. The decimal (base 10) values 65 through 90 represent the capital letters A through Z, as shown in the table below.
What ASCII character is represented by the binary (base 2) number 1001010?
J