Computers finals

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/44

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

45 Terms

1
New cards

What type of program statement is this an example of?    (You want another enemy to appear when the player reaches a certain level)

conditional

2
New cards

When creating an image, what item below, is used to allow for easier manipulation of the picture?

layers

3
New cards

Which of these naming conventions is the correct one for variables?

namelist

4
New cards

What numbers represent a bit?

0,1

5
New cards

When many systems work together to bombard a particular system with fake messages, this is said to be a distributive denial of services or DDOS?

True

6
New cards

One way a computer system can get hacked is to overwhelm a system with so many messages that it gets overloaded and therefore, you may see a message that the site you are trying to visit is unavailable.

True

7
New cards

What allows computers to store and change data by using switches which can be turned on and off?

Byte

8
New cards

When using an AI generator, if you put in the exact description of your wanted image, it will always produce your wanted results?

False

9
New cards

DOS stands for:

denial of service

10
New cards

denial of service…….. to create a website within the Google Platform.

Sites

11
New cards

What makes a system be protected from being hacked?

encryption, multi-tiered authorization, DDOS

12
New cards

Select the problem(s) below that can occur when the internet tries to send and receive messages.  

the message doesn't get delivered, part of the message doesn't get delivered, the message needs to be resent.

13
New cards

What are some things that are safe to share online?

general interests, bitmojis, artwork, grade level

14
New cards

What are some things that are NOT same to share online?

name of school, address, picture of house, date of birth

15
New cards

What are some of the ways that computers train to machine learn information?

recognize patterns to make decisions, practice tasks repeatedly, trial and error.

16
New cards

what is the number 8 represented in binary?

1000

17
New cards

what is the number 0 represented in binary?

0

18
New cards

what is the number 2 represented in binary?

10

19
New cards

what is the number 5 represented in binary?

101

20
New cards

which of these real-life scenarios would be a good use of variables.

Today’s temperature, The number of sneakers, How much money in your bank account

21
New cards

When a programmer wants to make their code reusable, they publish it online under an Blank license.

Open source

22
New cards

In the world of internet, what does PII stand for?

Personally Identifiable Information

23
New cards

What is the main purpose of having variables in a program?

store and manipulate data

24
New cards

The DMCA criminalizes circumventing copyright protection?

True

25
New cards

What are the drawbacks of using LLMS, Large Language Models, on the internet?

bias, privacy, interpretation

26
New cards

If using colors in a picture BLANK pixel format would be needed in order to generate that image?

rgb

27
New cards

DDOS stands for distributed denial of service

True

28
New cards

What program element do programmers use to help save space and time when developing a program that will repeat?

Loops

29
New cards

What types of societal bias's can be reflected in LLM, machine learning?

race, gender, socioeconomic

30
New cards

What are some outcomes of good data storytelling?

taking action after review of data presented, improved decision-making

31
New cards

The word pixel is derived from the words pictures and elements?

true

32
New cards

What type of statement is the following:  If it is raining, use an umbrella; else, put your sunglasses on.

If/Else

33
New cards

CC-BY-SA

Attribution and Same License Needed if Used

34
New cards

CC-BY

Attribution Only

35
New cards

CC-ND

Unable to make changes

36
New cards

CC-BY-NC

Attribution and Not Allowed to Make Money

37
New cards

CC0

Free to Use

38
New cards

Explain your favorite learning technique

Short Answerv

39
New cards

What are your favorite hobbies?

Multiple Answer

40
New cards

What is your age?

Multiple choice

41
New cards

Rate how well you like school from 1 to 5

Linear Scale

42
New cards

What are ways to protect your device form hackers?

multi-authorization, keep operating system up to date with latest patches, create different passwords often, 2 factor authorization, unplug broken devices until repairperson fixes them

43
New cards

What are ways that do NOT protect your device from hackers?

backup data, print all photos and keep physical copies, research how new devices work, single authorization

44
New cards

What is the purpose of DRM?

copyright protection

45
New cards

What makes up an image?

pixels