1/130
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Programming Statements are composed of all of the following EXCEPT
Tags
Which of the following is a valid variable name?
4thVariableNameInt
Which of the following is NOT a basic type in Python
Binary
A ______ is used to associate a value on the right with the variable name on the left
assignment statement
Which of the following arithmetic operators allows for the division of two integers and returns the remainder
%
Given the followign variables and expressions, determine the value of x. Follow the rules of operator precedence
z = 3
y = z * 2 + 3
x = y * z - 5
22
The Print Statement takes a list of elements to print, separated by commas. IF the element is a string, THEN _____________.
Print the characters inside
The Print Statement takes a list of elements to print, separated by commas. IF the element is a variable, THEN _____________.
Print the value associated
The Input Statement allows the user to enter ______ into memory.
Data
True or False: Selection is how programs make choices, and it is the process of making choices that provides a lot of the power of Computing
True
In Python, the indentation and punctuation of a program is optional
False
Which of the following is NOT an example of a relational operator?
%
Which of the following can be used in a boolean expression to determine equality?
==
Which of the following is NOT considered an Input or Output device?
Motherboard
_________ are specialized gadgets that encode or decode information between the processor and the physical world.
Peripherals
In the Fetch/Execute Cycle, the action of performing a machine instruction occurs during the _______ step.
Instruction Execute (EX)
In the Fetch/Execute Cycle, the action of gathering information needed to perform a machine instruction occurs during the _______ step.
Data Fetch (DF)
The number of instructions a computer can execute in a given time period is determined by the __________.
Computer Clock
Computers achieve success at what they can do with _______
Speed
Which of the following repeats a set of statements while some condition is True?
While
Which of the following is useful for iteration?
For
Both While and If statements rely on ________ to trigger the activation of their code.
Relational Operators
A while loop must perform some operation inside the loop which changes the state of the program.
True
A while loop must intiliaze the boolean within its code suite
False
The __________ generates a sequence of integers.
Range Function
The range function goes up to, and includes, the provided number argument. Example: range(7)
False
Iteration is a specific type of repetition, in which each element in the collection is "visited" and the program is allowed to "do something" to it.
True
________ is a phenomenon made possible by the free and easy communication enabled by the Internet.
Crowdsourcing
________'s goal is to build a database of all knowledge through a global effort.
Wikipedia
Which of the following is NOT indicative of a good password?
Single Dictionary Words
Using a core set of characters with minor changes for all of your logins is risky.
T
False
A determined professional hacker will more than likely be able to crack whatever password you use.
True
A password is transformed into a _______ that cannot be easily read
Ciphertext
The computer verifies that you know your password by encrypting what you type in, and comparing it to the unencrypted version it keeps with your account.
False
All passwords are effective at minimizing or eliminating unauthorized access to your private information.
False
Which of the following infects a system, locks the computer and all data files, then requires payment to get it unlocked?
Ransomware
Which of the following involves the social engineering process of convincing trusting people to give up personal data voluntarily?
Phishing
There is a worldwide industry of public relations and marketing firms ready to deploy fake accounts, false narratives, and pseudo news websites for the right price.
True
Videos doctored with cutting-edge artificial intelligence cannot challenge our assumptions about what is real and what is not.
False
__________ is a concept recognized in copyright law that allows for the use of copyrighted material for educational or scholarly purposes, limited quotation of copyrighted works for review or criticism, parody, and a few other uses.
Fair Use
Copyright protects the intellectual property owner’s right to do the following EXCEPT:
Copy a similar work
Purchased software is leased. You have the right to use the software, but the ownership remains with the company that sold it.
true
Which of the following is NOT a Creative Commons license option?
Fair Use
Creators who choose to use a Creative Commons license loose the copyright to their work.
False
Privacy is defined by the right of people to choose freely under what circumstances and to what extent they will reveal themselves, their attitude, and their behavior to others.
True
The privacy definition emphasizes first that it is the government who decides the circumstances and the extent to which information is revealed, not anyone else.
False
In electronic privacy, tracking is used in what two ways?
Online/Cell Phone
Most interactions over the Internet use the ________ protocol.
Client/Server
Which of the following is a record containing information that uniquely identifies a customer's session on a website?
Cookies
Which of the following is NOT call information cell phone providers typically log?
None of the above
Cell Phones contain such a vast amount of data that their search without a warrant is considered “an unrestrained search for evidence of criminal activity”.
True
Cell Phones contain such a vast amount of data that their search without a warrant is considered “an unrestrained search for evidence of criminal activity
True
Cell Phone carriers know the locations where cell phones are used based on the proximity to cell phone towers, only if location services (GPS) are turned on.
False
Courts have held that while law enforcement officials can force you to enter a passcode, they can’t demand that you show your face or touch a fingertip.
False
Devices like StingRay provide detailed information about a phone's location, down to an apartment within a building
True
Choose the correct OECD Fair Practice based off of the following definition:
"Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, complete and kept up-to-date."
Quality
Choose the correct OECD Fair Practice based off of the following definition:
"There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject."
Limited Collection
______ means your information ought to be deleted when a company is finished with it.
No uses
The U.S. default is opt-in; the European default is opt-out.
False
The FTC operates on the assumption that U.S. companies will "comply voluntarily" as a result of "market pressure".
True
The sectoral approach provides very strong privacy protections in specific cases.
True
If a citizen of the EU accesses a website, the website must ensure that individual's GDPR rights, unless it is hosted elsewhere.
False
_____ is a software that harms computers.
Malware
________ is a standalone program often embedded in an email attachment. It reproduces itself and sends a copy to everyone on your contact list.
Worm
________ is used to keep your messages hidden.
Encryption
There are two encryption techniques: private key and public key.
True
Which of the following is NOT a reason to use a database instead of a spreadsheet?
Your data mostly consists of numbers
Excel does not provide techniques for you to isolate required records
False
Normalized in the term normalized data refers to "a place for everything and everything in its place".
True
Primary and Foreign Keys are central to the concept of Referential Integrity.
True
A Cascading Update deletes the referencing rows in the child table when the referenced row is deleted in the parent table which has a primary key.
False
A database is defined by all of the following EXCEPT:
Ensures Relational Integrity
A database cannot be used to extract data that meets certain criteria.
False
A query is a request for data or information from a database table or combination of tables.
True
A ______ can hold one binary value (0 or 1).
Bit
A ______ can hold eight binary values (0 or 1).
Byte
Arranging bits into n-length sequences, we can create ________ symbols.
2n
The basic component of most digital circuitry in a computer is nothing more complicated than a simple _______.
Switch
What is the largest decimal number that can be represented in 2 digits?
99
What is the largest binary number that can be represented in 2 digits?
11
When converting from binary to decimal, multiply the digit times the place value and add the results.
True
When converting from decimal to binary, write the values of all the remainders from the top to the bottom.
False
Hexadecimal means these are base-____ numbers.
16
Decimal means these are base-____ numbers.
10
Binary means these are base-____ numbers.
2
ASCII stands for American Standard Code for Information Interchange.
True
Unicode allows all modern scripts (Kanji, Arabic, Cyrillic, Hebrew, etc.).
True
What form must always be followed in regards to every web page?
<html> <head> <body>
The __________ section contains the beginning material like the title and other information that applies to the whole page.
<head>
The __________ section contains the content of the page.
<body>
HTML source markup tells the browser how to produce the formatted page based on the meanings of the tags.
True
In anchor tags for absolute references, the hyperlink reference (href) is the name of a file as it appears on your device
False
The same principles used with letters and numbers to encode information into bits are used with multimedia.
True
Pixels are small points of colored lights arranged in a grid
True
Representing the color of a single pixel requires how many bytes?
3
Which of the following RGB bit assignments would give a full intensity green value?
0000 0000 1111 1111 0000 0000
______ refers to how close to white the pixels are.
Brightness
Cascading Style Sheets (CSS) can be used to control the layout and styling of web pages.
True
You can make a styling specification that applies to a tag in only one place by using the style attribute inside that tag.
True
By default, images are inserted on a page at the point in the text layout where the <img> tag is specified in the HTML, and text lines up with the top of the image.
False