1/34
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which of the following statements about the Internet is true?
Responses
A
The Internet is a computer network that uses proprietary communication protocols.
B
The Internet is designed to scale to support an increasing number of users.
C
The Internet requires all communications to use encryption protocols.
D
The Internet uses a centralized system to determine how packets are routed.
The Internet is designed to scale to support an increasing number of users.
In a science experiment, result X is expected to occur 25% of the time and result Y is expected to occur the remaining 75% of the time. The following code segment is intended to simulate the experiment if there are 100 trials.
Line 1: xCount ← 0
Line 2: yCount ← 0
Line 3: REPEAT 100 TIMES
Line 4: {
Line 5: IF(RANDOM(1, 4) = 1)
Line 6: {
Line 7: xCount ← xCount + 1
Line 8: }
Line 9: IF(RANDOM(1, 4) > 1)
Line 10: {
Line 11: yCount ← yCount + 1
Line 12: }
Line 13: }
Line 14: DISPLAY("Result X occurred")
Line 15: DISPLAY(xCount)
Line 16: DISPLAY("times and result Y occurred")
Line 17: DISPLAY(yCount)
Line 18: DISPLAY("times.")
A programmer runs the code segment, and the following message is displayed.
Result X occurred 24 times and result Y occurred 70 times.
The result shows that 94 trials were counted, rather than the intended 100 trials. Which of the following changes to the code segment will ensure a correct simulation of the experiment?
Replacing line 9 with ELSE
Which of the following best exemplifies the use of multifactor authentication to protect an online banking system?
Responses
A
When a user resets a password for an online bank account, the user is required to enter the new password twice.
B
When multiple people have a shared online bank account, they are each required to have their own unique username and password.
C
After entering a password for an online bank account, a user must also enter a code that is sent to the user’s phone via text message.
D
An online bank requires users to change their account passwords multiple times per year without using the same password twice.
After entering a password for an online bank account, a user must also enter a code that is sent to the user’s phone via text message.
Which of the following is NOT a benefit of collaborating to develop a computing innovation?
Responses
A
Collaboration can decrease the size and complexity of tasks required of individual team members.
B
Collaboration can make it easier to find and correct errors during the development process.
C
Collaboration eliminates the need to resolve differences of opinion.
D
Collaboration facilitates multiple perspectives in developing ideas.
Collaboration eliminates the need to resolve differences of opinion.
In the following procedure, the parameter n is an integer greater than 2.
Which of the following best describes the value returned by the procedure?
Responses
A
The procedure returns nothing because it will not terminate.
B
The procedure returns the value of 2 * n.
C
The procedure returns the value of n * n.
D
The procedure returns the sum of the integers from 1 to n.
The procedure returns the sum of the integers from 1 to n.
The player controls in a particular video game are represented by numbers. The controls and their corresponding binary values are shown in the following table.
Control | Binary Value |
← | 01000 |
↑ | 01001 |
→ | 01011 |
↓ | 01111 |
Jump | 11000 |
Run | 11001 |
Pause | 11011 |
Reset | 11111 |
The numeric values for the controls can also be represented in decimal (base 10).
What is the decimal value for the jump control?
Responses
A
3
B
12
C
24
D
48
24
The player controls in a particular video game are represented by numbers. The controls and their corresponding binary values are shown in the following table.
Control | Binary Value |
← | 01000 |
↑ | 01001 |
→ | 01011 |
↓ | 01111 |
Jump | 11000 |
Run | 11001 |
Pause | 11011 |
Reset | 11111 |
The numeric values for the controls can also be represented in decimal (base 10).
What control is represented by the decimal value 15 ?
Responses
A
←
B
↑
C
→
D
↓
D
↓
Which of the following is an example of a phishing attack?
Responses
A
Loading malicious software onto a user’s computer in order to secretly gain access to sensitive information
B
Flooding a user’s computer with e-mail requests in order to cause the computer to crash
C
Gaining remote access to a user’s computer in order to steal user IDs and passwords
D
Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information
Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information
A video-streaming Web site keeps count of the number of times each video has been played since it was first added to the site. The count is updated each time a video is played and is displayed next to each video to show its popularity.
At one time, the count for the most popular video was about two million. Sometime later, the same video displayed a seven-digit negative number as its count, while the counts for the other videos displayed correctly. Which of the following is the most likely explanation for the error?
Responses
A
The count for the video became larger than the maximum value allowed by the data type used to store the count.
B
The mathematical operations used to calculate the count caused a rounding error to occur.
C
The software used to update the count failed when too many videos were played simultaneously by too many users.
D
The software used to update the count contained a sampling error when using digital data to approximate the analog count.
The count for the video became larger than the maximum value allowed by the data type used to store the count.
A store uses binary numbers to assign a unique binary sequence to each item in its inventory. What is the minimum number of bits required for each binary sequence if the store has between 75 and 100 items in its inventory?
Responses
A
5
B
6
C
7
D
8
7
A code segment is intended to display the following output.
up down down down up down down down
Which of the following code segments can be used to display the intended output?
Responses
A.
Consider the following code segment.
What are the values of first and second as a result of executing the code segment?
Responses
A
first = 100, second = 100
B
first = 100, second = 200
C
first = 200, second = 100
D
first = 200, second = 200
first = 100, second = 100
he question below uses a robot in a grid of squares. The robot is represented as a triangle, which is initially in the center square and facing toward the top of the grid.
The following code segment is used to move the robot in the grid.
count ← 1
REPEAT 4 TIMES
{
REPEAT count TIMES
{
MOVE_FORWARD()
}
ROTATE_LEFT()
count ← count + 1
}
Which of the following code segments will move the robot from the center square along the same path as the code segment above?
Responses
A
count ← 0
REPEAT 4 TIMES
{
count ← count + 1
REPEAT count TIMES
{
MOVE_FORWARD()
}
ROTATE_LEFT()
}
B
count ← 0
REPEAT 4 TIMES
{
count ← count + 1
ROTATE_LEFT()
REPEAT count TIMES
{
MOVE_FORWARD()
}
}
C
count ← 0
REPEAT 4 TIMES
{
REPEAT count TIMES
{
ROTATE_LEFT()
}
MOVE_FORWARD()
count ← count + 1
}
D
count ← 0
REPEAT 4 TIMES
{
ROTATE_LEFT()
REPEAT count TIMES
{
MOVE_FORWARD()
}
count ← count + 1
}
A
count ← 0
REPEAT 4 TIMES
{
count ← count + 1
REPEAT count TIMES
{
MOVE_FORWARD()
}
ROTATE_LEFT()
}
Consider the following code segment.
What value is displayed as a result of executing the code segment?
Responses
A
3
B
4
C
9
D
12
3
In the following code segment, assume that the variable n has been initialized with an integer value.
Which of the following is NOT a possible value displayed by the program?
Responses
A
"artichoke"
B
"broccoli"
C
"carrot"
D
"daikon"
carrot
Which of the following best explains the relationship between the Internet and the World Wide Web?
Responses
A
Both the Internet and the World Wide Web refer to the same interconnected network of devices.
B
The Internet is an interconnected network of data servers, and the World Wide Web is a network of user devices that communicates with the data servers.
C
The Internet is a local network of interconnected devices, and the World Wide Web is a global network that connects the local networks with each other.
D
The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that is accessed via the Internet.
The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that is accessed via the Internet.
Which of the following is a true statement about the use of public key encryption in transmitting messages?
Responses
A
Public key encryption enables parties to initiate secure communications through an open medium, such as the Internet, in which there might be eavesdroppers.
B
Public key encryption is not considered a secure method of communication because a public key can be intercepted.
C
Public key encryption only allows the encryption of documents containing text; documents containing audio and video must use a different encryption method.
D
Public key encryption uses a single key that should be kept secure because it is used for both encryption and decryption.
Public key encryption enables parties to initiate secure communications through an open medium, such as the Internet, in which there might be eavesdroppers.
The figure below represents a network of physically linked devices labeled A through I. A line between two devices indicates that the devices can communicate directly with each other.
Any information sent between two devices that are not directly connected must go through at least one other device. For example, in the network represented below, information can be sent directly between A and B, but information sent between devices A and G must go through other devices.
What is the minimum number of connections that must be broken or removed before device B can no longer communicate with device C?
Responses
A
Three
B
Four
C
Five
D
Six
Four
The figure below represents a network of physically linked devices labeled A through I. A line between two devices indicates that the devices can communicate directly with each other.
Any information sent between two devices that are not directly connected must go through at least one other device. For example, in the network represented below, information can be sent directly between A and B, but information sent between devices A and G must go through other devices.
Which of the following statements is true about the network?
Responses
A
Information sent from device A to device D can use at most two unique paths.
B
Information sent from device A to device I will pass through at most four other devices.
C
If devices B and F fail, then device A will not be able to communicate with device G.
D
If devices C and F fail, then device D will not be able to communicate with device H.
If devices B and F fail, then device A will not be able to communicate with device G.
Which of the following best explains how an analog audio signal is typically represented by a computer?
Responses
A
An analog audio signal is measured as input parameters to a program or procedure. The inputs are represented at the lowest level as a collection of variables.
B
An analog audio signal is measured at regular intervals. Each measurement is stored as a sample, which is represented at the lowest level as a sequence of bits.
C
An analog audio signal is measured as a sequence of operations that describe how the sound can be reproduced. The operations are represented at the lowest level as programming instructions.
D
An analog audio signal is measured as text that describes the attributes of the sound. The text is represented at the lowest level as a string.
An analog audio signal is measured at regular intervals. Each measurement is stored as a sample, which is represented at the lowest level as a sequence of bits.
A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best explains the result of this configuration as compared to a configuration in which the router does not limit the bandwidth?
Responses
A
The amount of time it takes guest users to send and receive large files is likely to decrease.
B
The number of packets required for guest users to send and receive data is likely to decrease.
C
Guest users will be prevented from having fault-tolerant routing on the Internet.
D
Guest users will be restricted in the maximum amount of data that they can send and receive per second.
Guest users will be restricted in the maximum amount of data that they can send and receive per second.
A list of numbers is considered increasing if each value after the first is greater than or equal to the preceding value. The following procedure is intended to return true if numberList is increasing and return false otherwise. Assume that numberList contains at least two elements.
Line 1: PROCEDURE isIncreasing(numberList)
Line 2: {
Line 3: count ← 2
Line 4: REPEAT UNTIL(count > LENGTH(numberList))
Line 5: {
Line 6: IF(numberList[count] < numberList[count - 1])
Line 7: {
Line 8: RETURN(true)
Line 9: }
Line 10: count ← count + 1
Line 11: }
Line 12: RETURN(false)
Line 13: }
Which of the following changes is needed for the program to work as intended?
Responses
A
In line 3, 2 should be changed to 1.
B
In line 6, < should be changed to ≥.
C
Lines 8 and 12 should be interchanged.
D
Lines 10 and 11 should be interchanged.
Lines 8 and 12 should be interchanged.
Which of the following best describes a challenge involved in using a parallel computing solution?
Responses
A
A parallel computing solution may not be appropriate for an algorithm in which each step requires the output from the preceding step.
B
A parallel computing solution may not be appropriate for an algorithm in which the same formula is applied to many numeric data elements.
C
A parallel computing solution may not be appropriate for an algorithm that can be easily broken down into small independent tasks.
D
A parallel computing solution may not be appropriate for an algorithm that searches for occurrences of a key word in a large number of documents.
A parallel computing solution may not be appropriate for an algorithm in which each step requires the output from the preceding step.
Which of the following best describes a direct benefit in using redundant routing on the Internet?
Responses
A
Redundancy enables messages to be transmitted with as few packets as possible.
B
Redundancy enables network devices to communicate with as few network connections as possible.
C
Redundancy often allows messages to be sent on the network even if some network devices or connections have failed.
D
Redundancy prevents network communications from being intercepted by unauthorized individuals.
Redundancy often allows messages to be sent on the network even if some network devices or connections have failed.
In which of the following situations would it be most appropriate to choose lossy compression over lossless compression?
Responses
A
Storing digital photographs to be printed and displayed in a large format in an art gallery
B
Storing a formatted text document to be restored to its original version for a print publication
C
Storing music files on a smartphone in order to maximize the number of songs that can be stored
D
Storing a video file on an external device in order to preserve the highest possible video quality
Storing music files on a smartphone in order to maximize the number of songs that can be stored
A company delivers packages by truck and would like to minimize the length of the route that each driver must travel in order to reach n delivery locations. The company is considering two different algorithms for determining delivery routes.
Algorithm I
Generate all possible routes, compute their lengths, and then select the shortest possible route. This algorithm does not run in reasonable time.
Algorithm II
Starting from an arbitrary delivery location, find the nearest unvisited delivery location. Continue creating the route by selecting the nearest unvisited location until all locations have been visited. This algorithm does not guarantee the shortest possible route and runs in time proportional to n2.
Which of the following best categorizes algorithm II?
Responses
A
Algorithm II attempts to use an algorithmic approach to solve an otherwise undecidable problem.
B
Algorithm II uses a heuristic approach to provide an approximate solution in reasonable time.
C
Algorithm II provides no improvement over algorithm I because neither algorithm runs in reasonable time.
D
Algorithm II requires a much faster computer in order to provide any improvement over algorithm I.
Algorithm II uses a heuristic approach to provide an approximate solution in reasonable time.
Consider the following procedure.
Procedure Call | Explanation |
drawLine(x1, y1, x2, y2) | Draws a line segment on a coordinate grid with endpoints at coordinates (x1, y1) and (x2, y2) |
The drawLine procedure is to be used to draw the following figure on a coordinate grid.
Which of the following code segments can be used to draw the figure?
Responses
A
xVal ← 1
yVal ← 0
len ← 1
REPEAT 5 TIMES
{
drawLine(xVal, yVal, xVal, yVal + len)
xVal ← xVal + 1
len ← len + 1
}
B
xVal ← 1
yVal ← 0
len ← 1
REPEAT 5 TIMES
{
drawLine(xVal, yVal, xVal + len, yVal)
yVal ← yVal + 1
len ← len + 1
}
C
xVal ← 5
yVal ← 0
len ← 5
REPEAT 5 TIMES
{
drawLine(xVal, yVal, xVal, yVal + len)
xVal ← xVal - 1
}
D
xVal ← 5
yVal ← 0
len ← 5
REPEAT 5 TIMES
{
drawLine(xVal, yVal, xVal + len, yVal)
yVal ← yVal - 1
len ← len - 1
}
xVal ← 1
yVal ← 0
len ← 1
REPEAT 5 TIMES
{
drawLine(xVal, yVal, xVal, yVal + len)
xVal ← xVal + 1
len ← len + 1
}
Individuals sometimes attempt to remove personal information from the Internet. Which of the following is the LEAST likely reason the personal information is hard to remove?
Responses
A
Internet users with a copy of the information might redistribute the personal information without first seeking permission.
B
There are potentially an extremely large number of devices on the Internet that may contain the information.
C
Automated technologies collect information about Internet users without their knowledge.
D
All personal information is stored online using authentication measures, making the information hard to access.
All personal information is stored online using authentication measures, making the information hard to access.
A binary number is to be transformed by appending three 0s to the end of the number. For example, 11101 is transformed to 11101000. Which of the following correctly describes the relationship between the transformed number and the original number?
Responses
A
The transformed number is 3 times the value of the original number.
B
The transformed number is 4 times the value of the original number.
C
The transformed number is 8 times the value of the original number.
D
The transformed number is 1,000 times the value of the original number.
The transformed number is 8 times the value of the original number.
Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are used?
Responses
A
Unauthorized individuals can deny service to a computing system by overwhelming the system with login attempts.
B
Unauthorized individuals can exploit vulnerabilities in compression algorithms to determine a user’s password from their decompressed data.
C
Unauthorized individuals can exploit vulnerabilities in encryption algorithms to determine a user’s password from their encryption key.
D
Unauthorized individuals can use data mining and other techniques to guess a user’s password.
Unauthorized individuals can use data mining and other techniques to guess a user’s password.
A game is played by moving a game piece left or right along a horizontal game board. The board consists of spaces of various colors, as shown. The circle represents the initial location of the game piece.
Yellow | Black | Green | Green | Red | Yellow | Black | Black | Yellow | Black |
|
|
|
|
|
|
|
|
| ● |
The following algorithm indicates how the game is played. The game continues until the game is either won by landing on the red space or lost when the piece moves off either end of the board.
Step 1:
Place a game piece on a space that is not red and set a counter to 0.
Step 2:
If the game piece is on a yellow space, move the game piece 3 positions to the left and go to step 3. Otherwise, if the game piece is on a black space, move the game piece 1 position to the left and go to step 3. Otherwise, if the game piece is on a green space, move the game piece 2 positions to the right and go to step 3.
Step 3:
Increase the value of the counter by 1.
Step 4:
If game piece is on the red space or moved off the end of the game board, the game is complete. Otherwise, go back to step 2.
If a game is begun by placing the game piece on the rightmost black space for step 1, what will be the value of the counter at the end of the game?
Responses
A
2
B
3
C
4
D
5
4
The grid below contains a robot represented as a triangle, initially facing toward the top of the grid. The robot can move into a white or gray square but cannot move into a black region.
The code segment below uses the procedure goalReached, which evaluates to true if the robot is in the gray square and evaluates to false otherwise.
REPEAT UNTIL(goalReached())
{
<MISSING CODE>
}
Which of the following replacements for <MISSING CODE> can be used to move the robot to the gray square?
Responses
A
IF(CAN_MOVE(left))
{
ROTATE_LEFT()
MOVE_FORWARD()
}
B
IF(CAN_MOVE(forward))
{
MOVE_FORWARD()
ROTATE_LEFT()
}
C
IF(CAN_MOVE(left))
{
ROTATE_LEFT()
}
MOVE_FORWARD()
D
IF(CAN_MOVE(forward))
{
MOVE_FORWARD()
}
ELSE
{
ROTATE_LEFT()
}
IF(CAN_MOVE(left))
{
ROTATE_LEFT()
}
MOVE_FORWARD()
A flowchart provides a way to visually represent an algorithm and uses the following building blocks.
Block | Explanation |
Oval | The start or end of the algorithm |
Rectangle | One or more processing steps, such as a statement that assigns a value to a variable |
Diamond | A conditional or decision step, where execution proceeds to the side labeled true if the condition is true and to the side labeled false otherwise |
Parallelogram | Displays a message |
In the flowchart below, assume that j and k are assigned integer values.
Which of the following initial values of j and k will cause the algorithm represented in the flowchart to result in an infinite loop?
Responses
A
j = -5, k = 5
B
j = 0, k = 5
C
j = 5, k = 0
D
j = 5, k = -5
j = 5, k = -5
A flowchart provides a way to visually represent an algorithm and uses the following building blocks.
Block | Explanation |
Oval | The start or end of the algorithm |
Rectangle | One or more processing steps, such as a statement that assigns a value to a variable |
Diamond | A conditional or decision step, where execution proceeds to the side labeled true if the condition is true and to the side labeled false otherwise |
Parallelogram | Displays a message |
In the flowchart below, assume that j and k are assigned integer values.
Based on the algorithm represented in the flowchart, what value is displayed if j has the initial value 3 and k has the initial value 4 ?
Responses
A
7
B
9
C
10
D
12
12
Which of the following best explains how data is transmitted on the Internet?
Responses
A
Data is broken into packets, which are all sent to the recipient in a specified order along the same path.
B
Data is broken into packets, which can be sent along different paths.
C
All data is transmitted in a single packet through a direct connection between the sender and the recipient.
D
Multiple data files are bundled together in a packet and transmitted together.
Data is broken into packets, which can be sent along different paths.