1/23
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which of the following is a true statement about the use of compression?
Lossy compression of an image file generally provides a greater reduction in transmission time than lossless compression does.
Which of the following are true statements about the digital certificates in Web browsers?
I only: Digital certificates are used to verify the ownership of encrypted keys used in secured communication.
Which of the following best describes the relationship between the World Wide Web and the Internet?
The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.
A user wants to save a data file on an online storage site. The user wants to reduce the size of the file, and wants to be able to completely restore the file to its original version. Which of the following actions best supports the user's needs.
Compressing the file using a lossless compression algorithm before uploading it.
A video game character can face toward one of four directions: north, south, east, and west. Each direction is stored in memory as a sequence of four bits. A new version of the game is created in which the character can face toward one of eight directions, adding northwest, northeast, southwest, and southeast to the original four possibilities. Which of the following statements is true about how the either directions must be stored in memory ?
Four bits are enough to store the eight directions.
Which of the following best explains how data is typically assembled in packets for transmission over the Internet?
Each packet contains data to be transmitted, along with metadata containing information used for routing the data.
Which of the following is a primary reason for the use of open protocols on the Internet?
Open protocols provide a way to standardize data transmission between different devices.
Which of the following is an advantage of a lossless compression algorithm over a lossy compression algorithm?
A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot.
Which of the following statements describes a limitation of using a computer simulation to model a real-world object or system?
Computer simulations usually make some simplifying assumptions about the real-world object or system being modeled.
Researchers have developed a simulation of packets traveling between server computers and client computers in a network. Of the following, which two outcomes are most likely to be results of the simulation?
A: Better understanding of the effect of temporarily unavailable network connections.
B: Better understanding of the impact of increased connection speeds for frequently visited servers.
Which of the following are true statements about the data that can be represented using binary sequences?
(all) Binary sequences can be used to represent (I) strings of characters, (II) colors, and (III) audio recordings.
A programmer has a need to round many numeric values to the nearest integer. Which of the following best explains the benefit of using a list as a data abstraction in this situation?
Keeping the numeric values in a list makes it easier to apply the same computation to every data element.
Which of the following is a benefit of using a list as a data abstraction in a program?
Lists often allow their size to be easily updated to hold as many data values as needed.
For which of the following situations would it be best to use a heuristic in order to find a solution that runs in a reasonable amount of time?
Finding the fastest route that visits every location among n locations, which requires n! possible routes be examined.
Which of the following conditions is the most beneficial to use a heuristic approach to solve a problem?
When the problem cannot be solved in a reasonable time and an approximate solution is acceptable.
Which of the following best describes the ability of parallel computing solutions to improve efficiency?
The efficiency of a solution that can be broken down into parallel portions is a still limited by a sequential portion.
Which of the following best describes the result of using 64-bit integers instead of 32-bit integers?
2^32 times as many values can be represented (because base of 2, and each base is 2^n)
analog data
Continuous data which can be measured, such as the temperature in the room.
digital data
A discrete representation of data
phishing attack
cyber criminals pose as a legit institution to lure individual into providing sensitive data
ex. a malicious link in a website or email that directs the user to a fraudulent site where it gets users to download things or input personal info
rogue access point
a wireless access point that gives unauthorized access to secure networks
(data sent over public networks can be intercepted, analyzed, and modified)
keylogging
A method of capturing and recording user keystrokes, providing a means to obtain
passwords or encryption keys.
Which of the following programs is most likely to benefit from the heuristic?
A program that finds the shortest driving route between two locations on a map.
The program is intended to combine count data in roughly 3,000 counties across the US and then process the data, Which of the following is most likely to be a challenge in creating the program?
Different counties may organize data in different ways.