1/39
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What is meant by a Carbon Footprint?
Environmental impact of computing devices.
What are components of the Digital Divide?
Internet speeds, Digital Proficiency, Affordability of broadband and equity of broadband access across income groups.
What is Open Source Software?
Software that is created collaboratively, with programmers improving the code and sharing changes within the community.
For which reasons can cloud computing save a business money?
Consolidate application needs into one cloud service, Reduce system hardware costs, Avoid purchasing software, Quickly scale business operations.
The term [____] refers to how well a hardware or software system can adapt to increased demands.
Scalability.
List the following from MOST abstract to LEAST abstract: Software Application, Microsoft Excel, Spreadsheet software.
Software Application, Spreadsheet Software, Microsoft Excel.
Which of the following is NOT an operating system?
Java, Scratch, Python.
A computer's performance can be affected positively by:
Increasing amount of RAM.
What acts as a translator between hardware and software?
Device driver.
Which of the following are tasks of an operating system?
Controls peripheral devices (e.g., printers), Organizes and controls hardware and software, Manages the computer's memory, Recognizes input from the keyboard.
What distinguishes low-level programming languages from high-level languages?
Low-level languages interact more closely with hardware.
What is an algorithm?
A step-by-step list of instructions that, if followed exactly, will solve the problem under consideration.
What is the main advantage of using high-level programming languages like Python?
Easier to read, write, and maintain.
What is a variable?
A memory location that holds a value.
Which of the following statements is true about high-level programming languages?
They are easy for humans to read, write, and modify.
Evaluate: 1.5 * 3 > 10 and 4 + 6 == 11
False.
Consider the following code segment: print(rand). Possible outputs?
import random
rand = random.randrange(1, 10)
1-9
What is the correct way to reference the value of pi within the math module?
math.pi.
What is the result of "Python".upper()?
PYTHON.
What is printed by the following code segment?
str1 = "hello"
str2 = "world"
print(str1 + str2)
helloworld
What does the len() function return when used with a list?
The number of items in the list.
What will be the output of the following code?
list1 = [1, 2, 6]
list1.append(3)
print(list1)
[1, 2, 6, 3].
What is the result of the following operation?
list1 = [1, 2, 3, 4, 5]
list1.pop(2)
[1, 2, 4, 5].
Why can't "class" be used as a variable name in Python?
It is a reserved keyword.
What will be the output of the following code?"
a = 5
b = 2
c = a / b
print(c)
2.5.
What type of error is likely to occur if the user enters a non-numeric value when prompted?
user_input = input("Enter a number: ")
result = int(user_input) * 2
ValueError.
Which of the following is NOT a turtle method in Python?
turnLeft().
How is the turtle's drawing speed changed?
turtle.speed(5).
What does the line "import turtle" in Python do?
It defines the module, turtle, which allows you to create a Turtle object and draw with it.
Which of the following binary numbers are multiples of 4?
11100, 10100.
How can the base ten number 192 be represented in binary?
11000000.
In which scenarios is LOSSLESS compression more appropriate than LOSSY compression?
An image used by a radiologist to diagnose injuries, A .zip file containing your assignments.
What is a benefit of using hexadecimal numbers instead of binary numbers?
A hexadecimal representation generally requires fewer digits than a binary representation of the same value.
Which of the following binary values is twice the value of the binary number 1010?
10100.
What is packet switching?
A method where a message is broken down into multiple parts, each sent independently, and reassembled at the destination.
Which of the following are examples of Asynchronous Communication?
Text messaging, Email.
How does Public Key Encryption work?
The sender of the encrypted message uses the receiver’s public key to encrypt the message.
Who is the design of the Internet basically influenced by?
Paul Baran.
Which tool allows you to extract significant information from a large, detailed data set?
Pivot Table.
What is printed when the following statements are executed?
course = "CS"
course = 110
course = "Python"
print(course)
Python