Unit 2 Part 1 Study Guide

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

Which of the following is a true statement about data compression?

A) Data compression is only useful for files being transmitted over the Internet.

B) Regardless of the compression technique used, once a data file is compressed, it cannot be restored to its original state.

C) Sending a compressed version of a file ensures that the contents of the file cannot be
intercepted by an unauthorized user.

D) There are trade-offs involved in choosing a compression technique for storing and transmitting data.

D) There are trade-offs involved in choosing a compression technique for storing and transmitting data.

2
New cards

Which of the following best explains how data is typically assembled in packets for transmission over the Internet?

Each packet contains data to be transmitted, along with metadata containing information used for routing the data.

3
New cards

A user wants to save a data file on an online storage site. The user wants to reduce the size of the file, if possible, and wants to be able to completely restore the file to its original version. Which of the following actions best supports the user's needs?

Compressing the file using a lossless compression algorithm before uploading it

4
New cards

A color in a computing application is represented by an RGB triplet that describes the amount of red, green, and blue, respectively, used to create the desired color. A selection of colors and their corresponding RGB triplets are shown in the following table. Each value is represented in decimal (base 10).

Color NameRGB Triplet

indigo (75, 0, 130)

ivory(255, 255, 240)

light pink(255, 182, 193)

​light yellow(255, 255, 224)

magenta(255, 0, 255)

neutral gray(127, 127, 112)

pale yellow(255, 255, 160)

vivid yellow(255, 255, 14)

According to information in the table, what color is represented by the binary RGB triplet (11111111, 11111111, 11110000)?

ivory(255, 255, 240)

5
New cards

Which of the following best describes a direct benefit in using redundant routing on the Internet?

Redundancy often allows messages to be sent on the network even if some network devices or connections have failed

6
New cards

Internet protocol version 6 (IPv6) has been introduced to replace the previous version (IPv4). Which of the following best describes a benefit of IPv6 over IPv4?

IPv6 allows for a greater number of addresses than IPv4, which allows more devices to be connected to the Internet.

7
New cards

ASCII is a character-encoding scheme that uses a numeric value to represent each character. For example, the uppercase letter "G" is represented by the decimal (base 10) value 71. A partial list of characters and their corresponding ASCII values are shown in the table below.

ASCII characters can also be represented by hexadecimal numbers. According to ASCII character encoding, which of the following letters is represented by the hexadecimal (base 16) number 56?

V

8
New cards

Which of the following is an advantage of a lossless compression algorithm over a lossy compression algorithm?

A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot.

9
New cards

A certain programming language uses 4-bit binary sequences to represent non negative integers. For example, the binary sequence 0101 represents the corresponding decimal value 5. Using this programming language, a programmer attempts to add the decimal value 14 and 15 and assign the sum to the variable total. Which of the following best describes the result of the operation?

A. The correct sum of 29 will be assigned to the variable total.

B. An overflow error will occur because 4 bits is not large enough to represent either of the values 14 or 15

C. An overflow error will occur because 4 bits is not large enough to represent 29, the sum of 14 and 15

D. A round-off error will occur because the decimal values 14 and 15 are represented as approximation due to the fixed number of bits used to represent numbers.

C. An overflow error will occur because 4 bits is not large enough to represent 29, the sum of 14 and 15

10
New cards

According to the domain name system (dns) what is a subdomain of the domain example.com

about.example.com

11
New cards

The following figure represents a network of physically linked devices labeled P through S. A line between two devices indicates a connection. Devices can communicate only through the connections shown.


Which of the following statements best explains the ability of the network to provide fault tolerance?

The network is considered fault-tolerant because there are redundant paths between each pair of devices.

12
New cards

Which of the following best describes the ability of parallel computing solutions to improve efficiency?

The efficiency of a solution that can be broken down into parallel portions is still limited by a sequential portion.

13
New cards

which of the following best explains how ip addresses are assigned

As a new device is connected to the internet, it is assigned an IP address to enable communication on the network.

14
New cards

A person wants to transmit an audio file from a device to a second device. Which of the following scenarios best demonstrates the use of lossless compression of the original file?

A device compresses the audio file before transmitting it to a second device. The second device restores the compressed file to its original version before playing it.

15
New cards

In which of the following situations would it be most appropriate to choose lossy compression over lossless compression?

Storing music files on a smartphone in order to maximize the number of songs that can be stored

16
New cards

The figure below represents a network of physically linked computers labeled A through G. A line between two computers indicates that the computers can communicate directly with each other. Any information sent between two computers that are not directly connected must go through at least one other computer. For example, information can be sent directly between computers A and B, but information sent between computers A and C must go through other computers.

What is the minimum number of connections that must be broken or removed in the network before computer E can no longer communicate with computer F?

3

17
New cards

Each student that enrolls at a school is assigned a unique ID number, which is stored as a binary number. The ID numbers increase sequentially by 1 with each newly enrolled student. If the ID number assigned to the last student who enrolled was the binary number 1001 0011, what binary number will be assigned to the next student who enrolls?

1001 0100

18
New cards

A store uses binary numbers to assign a unique binary sequence to each item in its inventory. What is the minimum number of bits required for each binary sequence if the store has between 75 and 100 items in its inventory?

7

19
New cards

which of the following is a primary benefit of making a computing system fault-tolerant?

If one component of the system fails, users of the system can often still access it.

20
New cards

The transmission control protocol (TCP) and Internet protocol (IP) are used in Internet communication. Which of the following best describes the purpose of these protocols?

To establish a common standard for sending messages between devices on the Internet

21
New cards

which of the following is a primary reason for the use of open protocols on the internet?

Open protocols provide a way to standardize data transmission between different devices.

22
New cards

Consider the following numeric values.
Binary 1011
Binary 1101
Decimal 5
Decimal 12
Which of the following lists the values in order from least to greatest?

Decimal 5, binary 1011, decimal 12, binary 1101

23
New cards

In which of the configurations is it possible to have redundant routing between devices Q and V?

Both configuration I and configuration II

24
New cards

In configuration I, what is the minimum number of connections that must be broken or removed before device T can no longer communicate with device U?

two

25
New cards

Which of the following best describes the relationship between the World Wide Web and the Internet?

The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.

26
New cards

Which of the following best explains the relationship between the Internet and the World Wide Web?

The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that is accessed via the Internet.

27
New cards

A certain computer has two identical processors that are able to run in parallel. Each processor can run only one process at a time, and each process must be executed on a single processor. The following table indicates the amount of time it takes to execute each of three processes on a single processor. Assume that none of the processes are dependent on any of the other processes. Which of the following best approximates the minimum possible time to execute all three processes when the two processors are run in parallel?

80 seconds

28
New cards

Which of the following parallel computing solutions would minimize the amount of time it takes to execute all four processes?

Running processes P and Q on one processor and processes R and S on the other processor

29
New cards

A program developed for a Web store represents customer account balances using a format that approximates real numbers. While testing the program, a software developer discovers that some values appear to be mathematically imprecise. Which of the following is the most likely cause of the imprecision?

The account balances are represented using a fixed number of bits, resulting in round-off errors.

30
New cards

ASCII is a character-encoding scheme that uses 7 bits to represent each character. The decimal (base 10) values 65 through 90 represent the capital letters A through Z, as shown in the table below.

What ASCII character is represented by the binary (base 2) number 1001010?

J