Computer Science Final

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/130

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

131 Terms

1
New cards

Programming Statements are composed of all of the following EXCEPT

Tags

2
New cards

Which of the following is a valid variable name?

4thVariableNameInt

3
New cards

Which of the following is NOT a basic type in Python

Binary

4
New cards

A ______ is used to associate a value on the right with the variable name on the left

assignment statement

5
New cards

Which of the following arithmetic operators allows for the division of two integers and returns the remainder

%

6
New cards

Given the followign variables and expressions, determine the value of x. Follow the rules of operator precedence

z = 3

y = z * 2 + 3

x = y * z - 5

22

7
New cards

The Print Statement takes a list of elements to print, separated by commas. IF the element is a string, THEN _____________.

Print the characters inside

8
New cards

The Print Statement takes a list of elements to print, separated by commas. IF the element is a variable, THEN _____________.

Print the value associated

9
New cards

The Input Statement allows the user to enter ______ into memory. 

Data

10
New cards

True or False: Selection is how programs make choices, and it is the process of making choices that provides a lot of the power of Computing

True

11
New cards

In Python, the indentation and punctuation of a program is optional

False

12
New cards

Which of the following is NOT an example of a relational operator?

%

13
New cards

Which of the following can be used in a boolean expression to determine equality?

==

14
New cards

Which of the following is NOT considered an Input or Output device?

Motherboard

15
New cards

_________ are specialized gadgets that encode or decode information between the processor and the physical world.

Peripherals

16
New cards

 In the Fetch/Execute Cycle, the action of performing a machine instruction occurs during the _______ step.

Instruction Execute (EX)

17
New cards

In the Fetch/Execute Cycle, the action of gathering information needed to perform a machine instruction occurs during the _______ step.

Data Fetch (DF)

18
New cards

The number of instructions a computer can execute in a given time period is determined by the __________. 

Computer Clock

19
New cards

Computers achieve success at what they can do with _______

Speed

20
New cards

Which of the following repeats a set of statements while some condition is True?

While

21
New cards

Which of the following is useful for iteration?

For

22
New cards

Both While and If statements rely on ________ to trigger the activation of their code.

Relational Operators

23
New cards

A while loop must perform some operation inside the loop which changes the state of the program.

True

24
New cards

A while loop must intiliaze the boolean within its code suite

False

25
New cards

The __________ generates a sequence of integers.

Range Function

26
New cards

The range function goes up to, and includes, the provided number argument. Example: range(7)

False

27
New cards

Iteration is a specific type of repetition, in which each element in the collection is "visited" and the program is allowed to "do something" to it.

True

28
New cards

________ is a phenomenon made possible by the free and easy communication enabled by the Internet.

Crowdsourcing

29
New cards

________'s goal is to build a database of all knowledge through a global effort.

Wikipedia

30
New cards

Which of the following is NOT indicative of a good password?

Single Dictionary Words

31
New cards

Using a core set of characters with minor changes for all of your logins is risky.

  1. T

False

32
New cards

A determined professional hacker will more than likely be able to crack whatever password you use.

True

33
New cards

A password is transformed into a _______ that cannot be easily read

Ciphertext

34
New cards

The computer verifies that you know your password by encrypting what you type in, and comparing it to the unencrypted version it keeps with your account.

False

35
New cards

All passwords are effective at minimizing or eliminating unauthorized access to your private information.

False

36
New cards

Which of the following infects a system, locks the computer and all data files, then requires payment to get it unlocked?

Ransomware

37
New cards

Which of the following involves the social engineering process of convincing trusting people to give up personal data voluntarily?

Phishing

38
New cards

There is a worldwide industry of public relations and marketing firms ready to deploy fake accounts, false narratives, and pseudo news websites for the right price.

True

39
New cards

Videos doctored with cutting-edge artificial intelligence cannot challenge our assumptions about what is real and what is not.

False

40
New cards

__________ is a concept recognized in copyright law that allows for the use of copyrighted material for educational or scholarly purposes, limited quotation of copyrighted works for review or criticism, parody, and a few other uses.

Fair Use

41
New cards

Copyright protects the intellectual property owner’s right to do the following EXCEPT:

Copy a similar work

42
New cards

Purchased software is leased. You have the right to use the software, but the ownership remains with the company that sold it.

true

43
New cards

Which of the following is NOT a Creative Commons license option?

Fair Use

44
New cards

Creators who choose to use a Creative Commons license loose the copyright to their work.

False

45
New cards

Privacy is defined by the right of people to choose freely under what circumstances and to what extent they will reveal themselves, their attitude, and their behavior to others.

True

46
New cards

The privacy definition emphasizes first that it is the government who decides the circumstances and the extent to which information is revealed, not anyone else.

False

47
New cards

In electronic privacy, tracking is used in what two ways?

Online/Cell Phone

48
New cards

Most interactions over the Internet use the ________ protocol.

Client/Server

49
New cards

Which of the following is a record containing information that uniquely identifies a customer's session on a website?

Cookies

50
New cards

Which of the following is NOT call information cell phone providers typically log?

None of the above

51
New cards

Cell Phones contain such a vast amount of data that their search without a warrant is considered “an unrestrained search for evidence of criminal activity”.

True

52
New cards

Cell Phones contain such a vast amount of data that their search without a warrant is considered “an unrestrained search for evidence of criminal activity

True

53
New cards

Cell Phone carriers know the locations where cell phones are used based on the proximity to cell phone towers, only if location services (GPS) are turned on.

False

54
New cards

Courts have held that while law enforcement officials can force you to enter a passcode, they can’t demand that you show your face or touch a fingertip.

False

55
New cards

Devices like StingRay provide detailed information about a phone's location, down to an apartment within a building

True

56
New cards

Choose the correct OECD Fair Practice based off of the following definition: 

"Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, complete and kept up-to-date."

Quality

57
New cards

Choose the correct OECD Fair Practice based off of the following definition: 

"There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject."

Limited Collection

58
New cards

______ means your information ought to be deleted when a company is finished with it.

No uses

59
New cards

The U.S. default is opt-in; the European default is opt-out.

False

60
New cards

The FTC operates on the assumption that U.S. companies will "comply voluntarily" as a result of "market pressure".

True

61
New cards

The sectoral approach provides very strong privacy protections in specific cases.

True

62
New cards

If a citizen of the EU accesses a website, the website must ensure that individual's GDPR rights, unless it is hosted elsewhere.

False

63
New cards

_____ is a software that harms computers.

Malware

64
New cards

________ is a standalone program often embedded in an email attachment. It reproduces itself and sends a copy to everyone on your contact list.

Worm

65
New cards

________ is used to keep your messages hidden.

Encryption

66
New cards

There are two encryption techniques: private key and public key.

True

67
New cards

Which of the following is NOT a reason to use a database instead of a spreadsheet? 

Your data mostly consists of numbers

68
New cards

Excel does not provide techniques for you to isolate required records

False

69
New cards

Normalized in the term normalized data refers to "a place for everything and everything in its place". 

True

70
New cards

Primary and Foreign Keys are central to the concept of Referential Integrity.

True

71
New cards

A Cascading Update deletes the referencing rows in the child table when the referenced row is deleted in the parent table which has a primary key.

False

72
New cards

A database is defined by all of the following EXCEPT:

Ensures Relational Integrity

73
New cards

A database cannot be used to extract data that meets certain criteria.

False

74
New cards

A query is a request for data or information from a database table or combination of tables.

True

75
New cards

A ______ can hold one binary value (0 or 1).

Bit

76
New cards

A ______ can hold eight binary values (0 or 1).

Byte

77
New cards

Arranging bits into n-length sequences, we can create ________ symbols.

2n

78
New cards

The basic component of most digital circuitry in a computer is nothing more complicated than a simple _______.

Switch

79
New cards

What is the largest decimal number that can be represented in 2 digits?

99

80
New cards

What is the largest binary number that can be represented in 2 digits?

11

81
New cards

When converting from binary to decimal, multiply the digit times the place value and add the results.

True

82
New cards

When converting from decimal to binary, write the values of all the remainders from the top to the bottom.

False

83
New cards

Hexadecimal means these are base-____ numbers. 

16

84
New cards

Decimal means these are base-____ numbers.

10

85
New cards

Binary means these are base-____ numbers. 

2

86
New cards

ASCII stands for American Standard Code for Information Interchange.

True

87
New cards

Unicode allows all modern scripts (Kanji, Arabic, Cyrillic, Hebrew, etc.).

True

88
New cards

What form must always be followed in regards to every web page?

<html> <head> <body>

89
New cards

The __________ section contains the beginning material like the title and other information that applies to the whole page.

<head>

90
New cards

The __________ section contains the content of the page.

<body>

91
New cards

HTML source markup tells the browser how to produce the formatted page based on the meanings of the tags.

True

92
New cards

In anchor tags for absolute references, the hyperlink reference (href) is the name of a file as it appears on your device

False

93
New cards

The same principles used with letters and numbers to encode information into bits are used with multimedia.

True

94
New cards

Pixels are small points of colored lights arranged in a grid

True

95
New cards

Representing the color of a single pixel requires how many bytes?

3

96
New cards

Which of the following RGB bit assignments would give a full intensity green value?

0000 0000 1111 1111 0000 0000

97
New cards

______ refers to how close to white the pixels are.

Brightness

98
New cards

Cascading Style Sheets (CSS) can be used to control the layout and styling of web pages.

True

99
New cards

You can make a styling specification that applies to a tag in only one place by using the style attribute inside that tag.

True

100
New cards

By default, images are inserted on a page at the point in the text layout where the <img> tag is specified in the HTML, and text lines up with the top of the image.

False