Test 1 Study Guide Units (1,2 & 3 )

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/39

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

Which of the following is an example of a phishing attack?

Responses

A

Loading malicious software onto a user’s computer in order to secretly gain access to sensitive information

B

Flooding a user’s computer with e-mail requests in order to cause the computer to crash

C

Gaining remote access to a user’s computer in order to steal user IDs and passwords

D

Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information

Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information

2
New cards

Which of the following best explains the relationship between the Internet and the World Wide Web?

Responses

A

Both the Internet and the World Wide Web refer to the same interconnected network of devices.

B

The Internet is an interconnected network of data servers, and the World Wide Web is a network of user devices that communicates with the data servers.

C

The Internet is a local network of interconnected devices, and the World Wide Web is a global network that connects the local networks with each other.

D

The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that is accessed via the Internet.

The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that is accessed via the Internet.

3
New cards

Which of the following best exemplifies the use of multifactor authentication to protect an online banking system?

Responses

A

When a user resets a password for an online bank account, the user is required to enter the new password twice.

B

When multiple people have a shared online bank account, they are each required to have their own unique username and password.

C

After entering a password for an online bank account, a user must also enter a code that is sent to the user’s phone via text message.

D

An online bank requires users to change their account passwords multiple times per year without using the same password twice.


After entering a password for an online bank account, a user must also enter a code that is sent to the user’s phone via text message.

4
New cards

Which of the following best describes a direct benefit in using redundant routing on the Internet?

Responses

A

Redundancy enables messages to be transmitted with as few packets as possible.

B

Redundancy enables network devices to communicate with as few network connections as possible.

C

Redundancy often allows messages to be sent on the network even if some network devices or connections have failed.

D

Redundancy prevents network communications from being intercepted by unauthorized individuals.

Redundancy often allows messages to be sent on the network even if some network devices or connections have failed.

5
New cards

Which of the following best explains how an analog audio signal is typically represented by a computer?

Responses

A

An analog audio signal is measured as input parameters to a program or procedure. The inputs are represented at the lowest level as a collection of variables.

B

An analog audio signal is measured at regular intervals. Each measurement is stored as a sample, which is represented at the lowest level as a sequence of bits.

C

An analog audio signal is measured as a sequence of operations that describe how the sound can be reproduced. The operations are represented at the lowest level as programming instructions.

D

An analog audio signal is measured as text that describes the attributes of the sound. The text is represented at the lowest level as a string.

An analog audio signal is measured at regular intervals. Each measurement is stored as a sample, which is represented at the lowest level as a sequence of bits.

6
New cards

The grid below contains a robot represented as a triangle, initially facing toward the top of the grid. The robot can move into a white or gray square but cannot move into a black region.

The figure presents a robot in a grid of squares surrounded by black regions. The robot is represented by a triangle which is initially facing the top of the grid. The path that the robot can take is as follows. Note: Assume all squares are white unless otherwise indicated. The robot can move 3 squares forward, at which point it reaches an intersection of squares. It can then either move 2 squares to the right, 2 squares forward, or 3 squares to the left. If the robot moves 3 squares to the left, it can then move 3 squares downwards at which point it will reach a gray square.

The code segment below uses the procedure goalReached,which evaluates to true if the robot is in the gray square and evaluates to false otherwise.

REPEAT UNTIL(goalReached())

{

<MISSING CODE>

}

Which of the following replacements for <MISSING CODE> can be used to move the robot to the gray square?

Responses

A

IF(CAN_MOVE(left))

{

ROTATE_LEFT()

MOVE_FORWARD()

}

B

IF(CAN_MOVE(forward))

{

MOVE_FORWARD()

ROTATE_LEFT()

}

C

IF(CAN_MOVE(left))

{

ROTATE_LEFT()

}

MOVE_FORWARD()

D

IF(CAN_MOVE(forward))

{

MOVE_FORWARD()

}

ELSE

{

ROTATE_LEFT()

}

IF(CAN_MOVE(left))

{

ROTATE_LEFT()

}

MOVE_FORWARD()

7
New cards

A list of numbers is considered increasing if each value after the first is greater than or equal to the preceding value. The following procedure is intended to return true if numberList is increasing and return false otherwise. Assume that numberList contains at least two elements.

Line 1:  PROCEDURE isIncreasing(numberList)

Line 2:  {

Line 3:     count 2

Line 4:     REPEAT UNTIL(count > LENGTH(numberList))

Line 5:     {

Line 6:        IF(numberList[count] < numberList[count - 1])

Line 7:        {

Line 8:           RETURN(true)

Line 9:        }

Line 10:       count count + 1

Line 11:    }

Line 12:    RETURN(false)

Line 13: }

Which of the following changes is needed for the program to work as intended?

Responses

A

In line 3, 2 should be changed to 1.

B

In line 6, < should be changed to .

C

Lines 8 and 12 should be interchanged.

D

Lines 10 and 11 should be interchanged.

Lines 8 and 12 should be interchanged.

8
New cards

Consider the following procedure.

Procedure Call

Explanation

drawLine(x1, y1, x2, y2)

Draws a line segment on a coordinate grid with endpoints at coordinates (x1, y1) and (x2, y2)

The drawLine procedure is to be used to draw the following figure on a coordinate grid.

The figure presents a graph with 5 line segments in a coordinate grid with the origin labeled O. The horizontal axis is labeled x, and the numbers 1 through 6 are indicated. The vertical axis is labeled y, and the numbers 1 through 5 are indicated. The coordinates of the 5 line segments are as follows. Line segment 1 has endpoints at coordinates 1 comma 0 and 1 comma 1. Line segment 2 has endpoints at coordinates 2 comma 0 and 2 comma 2. Line segment 3 has endpoints at coordinates 3 comma 0 and 3 comma 3. Line segment 4 has endpoints at coordinates 4 comma 0 and 4 comma 4. Line segment 5 has endpoints at coordinates 5 comma 0 and 5 comma 5.

Which of the following code segments can be used to draw the figure?

Responses

A

xVal 1

yVal 0

len 1

REPEAT 5 TIMES

{

drawLine(xVal, yVal, xVal, yVal + len)

xVal xVal + 1

len len + 1

}

B

xVal 1

yVal 0

len 1

REPEAT 5 TIMES

{

drawLine(xVal, yVal, xVal + len, yVal)

yVal yVal + 1

len len + 1

}

C

xVal 5

yVal 0

len 5

REPEAT 5 TIMES

{

drawLine(xVal, yVal, xVal, yVal + len)

xVal xVal - 1

}

D

xVal 5

yVal 0

len 5

REPEAT 5 TIMES

{

drawLine(xVal, yVal, xVal + len, yVal)

yVal yVal - 1

len len - 1

}

xVal 1

yVal 0

len 1

REPEAT 5 TIMES

{

drawLine(xVal, yVal, xVal, yVal + len)

xVal xVal + 1

len len + 1

}

9
New cards

The figure below represents a network of physically linked devices labeled A through I. A line between two devices indicates that the devices can communicate directly with each other.

Any information sent between two devices that are not directly connected must go through at least one other device. For example, in the network represented below, information can be sent directly between A and B, but information sent between devices A and G must go through other devices.

The figure presents a network of physically linked devices, labeled A through I. Connections are represented by lines between the devices, as follows. Device A is connected to B and C. Device B is connected to A, D, E, and G. Device C is connected to A, D, F, and I. Device D is connected to B, C, and F. Device E is connected to B, F, G, and H. Device F is connected to C, D, E, H, and I. Device G is connected to B and E. Device H is connected to E and F. Device I is connected to C and F.

What is the minimum number of connections that must be broken or removed before device B can no longer communicate with device C?

Responses

A

Three

B

Four

C

Five

D

Six

B. Four

10
New cards

The figure below represents a network of physically linked devices labeled A through I. A line between two devices indicates that the devices can communicate directly with each other.

Any information sent between two devices that are not directly connected must go through at least one other device. For example, in the network represented below, information can be sent directly between A and B, but information sent between devices A and G must go through other devices.

The figure presents a network of physically linked devices, labeled A through I. Connections are represented by lines between the devices, as follows. Device A is connected to B and C. Device B is connected to A, D, E, and G. Device C is connected to A, D, F, and I. Device D is connected to B, C, and F. Device E is connected to B, F, G, and H. Device F is connected to C, D, E, H, and I. Device G is connected to B and E. Device H is connected to E and F. Device I is connected to C and F.

Which of the following statements is true about the network?

Responses

A

Information sent from device A to device D can use at most two unique paths.

B

Information sent from device A to device I will pass through at most four other devices.

C

If devices B and F fail, then device A will not be able to communicate with device G.

D

If devices C and F fail, then device D will not be able to communicate with device H.

If devices B and F fail, then device A will not be able to communicate with device G.

11
New cards

Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are used?

Responses

A

Unauthorized individuals can deny service to a computing system by overwhelming the system with login attempts.

B

Unauthorized individuals can exploit vulnerabilities in compression algorithms to determine a user’s password from their decompressed data.

C

Unauthorized individuals can exploit vulnerabilities in encryption algorithms to determine a user’s password from their encryption key.

D

Unauthorized individuals can use data mining and other techniques to guess a user’s password.

Unauthorized individuals can use data mining and other techniques to guess a user’s password.

12
New cards

A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best explains the result of this configuration as compared to a configuration in which the router does not limit the bandwidth?

Responses

A

The amount of time it takes guest users to send and receive large files is likely to decrease.

B

The number of packets required for guest users to send and receive data is likely to decrease.

C

Guest users will be prevented from having fault-tolerant routing on the Internet.

D

Guest users will be restricted in the maximum amount of data that they can send and receive per second.

Guest users will be restricted in the maximum amount of data that they can send and receive per second.

13
New cards

A video-streaming Web site keeps count of the number of times each video has been played since it was first added to the site. The count is updated each time a video is played and is displayed next to each video to show its popularity.

At one time, the count for the most popular video was about two million. Sometime later, the same video displayed a seven-digit negative number as its count, while the counts for the other videos displayed correctly.

Which of the following is the most likely explanation for the error?

Responses

A

The count for the video became larger than the maximum value allowed by the data type used to store the count.

B

The mathematical operations used to calculate the count caused a rounding error to occur.

C

The software used to update the count failed when too many videos were played simultaneously by too many users.

D

The software used to update the count contained a sampling error when using digital data to approximate the analog count.

The count for the video became larger than the maximum value allowed by the data type used to store the count.

14
New cards

The question below uses a robot in a grid of squares. The robot is represented as a triangle, which is initially in the center square and facing toward the top of the grid.

The figure presents a robot in a 5 by 5 grid of squares. The robot is represented by a triangle which is initially in the in the center (the third square from the left and third square from the bottom), and it is initially facing the top of the grid.

The following code segment is used to move the robot in the grid.

count 1

REPEAT 4 TIMES

{

REPEAT count TIMES

{

MOVE_FORWARD()

}

ROTATE_LEFT()

count count + 1

}

Which of the following code segments will move the robot from the center square along the same path as the code segment above?

Responses

A

count 0

REPEAT 4 TIMES

{

count count + 1

REPEAT count TIMES

{

MOVE_FORWARD()

}

ROTATE_LEFT()

}

B

count 0

REPEAT 4 TIMES

{

count count + 1

ROTATE_LEFT()

REPEAT count TIMES

{

MOVE_FORWARD()

}

}

C

count 0

REPEAT 4 TIMES

{

REPEAT count TIMES

{

ROTATE_LEFT()

}

MOVE_FORWARD()

count count + 1

}

D

count 0

REPEAT 4 TIMES

{

ROTATE_LEFT()

REPEAT count TIMES

{

MOVE_FORWARD()

}

count count + 1

}

count 0

REPEAT 4 TIMES

{

count count + 1

REPEAT count TIMES

{

MOVE_FORWARD()

}

ROTATE_LEFT()

}

15
New cards

Which of the following statements about the Internet is true?

Responses

A

The Internet is a computer network that uses proprietary communication protocols.

B

The Internet is designed to scale to support an increasing number of users.

C

The Internet requires all communications to use encryption protocols.

D

The Internet uses a centralized system to determine how packets are routed.

The Internet is designed to scale to support an increasing number of users.

16
New cards

In which of the following situations would it be most appropriate to choose lossy compression over lossless compression?

Responses

A

Storing digital photographs to be printed and displayed in a large format in an art gallery

B

Storing a formatted text document to be restored to its original version for a print publication

C

Storing music files on a smartphone in order to maximize the number of songs that can be stored

D

Storing a video file on an external device in order to preserve the highest possible video quality

Storing music files on a smartphone in order to maximize the number of songs that can be stored

17
New cards

In the following procedure, the parameter n is an integer greater than 2.

The figure presents a block of code that consists of 7 lines. Throughout the code there are nested blocks of code, as follows. [Begin Block] Line 1: PROCEDURE compute [begin block] n [end block] [Begin Block] Line 2: [begin block] result ← 1 [end block] Line 3: [begin block] j ← 2 [end block] [Begin Block] Line 4: REPEAT UNTIL [begin block] j ˃ 2 [end block] [Begin Block] Line 5: [begin block] result ← result + j [end block] Line 6: [begin block] j ← j + 1 [end block] [End Block] [End Block] Line 7: [begin block] RETURN [begin block] result [end block] [end block] [End Block] [End Block]

Which of the following best describes the value returned by the procedure?

Responses

A

The procedure returns nothing because it will not terminate.

B

The procedure returns the value of 2 * n.

C

The procedure returns the value of n * n.

D

The procedure returns the sum of the integers from 1 to n.

The procedure returns the sum of the integers from 1 to n.

18
New cards

Which of the following best describes a challenge involved in using a parallel computing solution?

Responses

A

A parallel computing solution may not be appropriate for an algorithm in which each step requires the output from the preceding step.

B

A parallel computing solution may not be appropriate for an algorithm in which the same formula is applied to many numeric data elements.

C

A parallel computing solution may not be appropriate for an algorithm that can be easily broken down into small independent tasks.

D

A parallel computing solution may not be appropriate for an algorithm that searches for occurrences of a key word in a large number of documents.

A parallel computing solution may not be appropriate for an algorithm in which each step requires the output from the preceding step.

19
New cards

A certain social media application is popular with people across the United States. The developers of the application are updating the algorithm used by the application to introduce a new feature that allows users of the application with similar interests to connect with one another.

Which of the following strategies is LEAST likely to introduce bias into the application?

Responses

A

Enticing users to spend more time using the application by providing the updated algorithm for users who use the application at least ten hours per week

B

Inviting a random sample of all users to try out the new algorithm and provide feedback before it is released to a wider audience

C

Providing the updated algorithm only to teenage users to generate excitement about the new feature

D

Testing the updated algorithm with a small number of users in the city where the developers are located so that immediate feedback can be gathered

Inviting a random sample of all users to try out the new algorithm and provide feedback before it is released to a wider audience

20
New cards

Which of the following best explains how data is transmitted on the Internet?

Responses

A

Data is broken into packets, which are all sent to the recipient in a specified order along the same path.

B

Data is broken into packets, which can be sent along different paths.

C

All data is transmitted in a single packet through a direct connection between the sender and the recipient.

D

Multiple data files are bundled together in a packet and transmitted together.

B. Data is broken into packets, which can be sent along different paths.

21
New cards

A binary number is to be transformed by appending three 0s to the end of the number. For example, 11101 is transformed to 11101000.

Which of the following correctly describes the relationship between the transformed number and the original number?

Responses

A

The transformed number is 3 times the value of the original number.

B

The transformed number is 4 times the value of the original number.

C

The transformed number is 8 times the value of the original number.

D

The transformed number is 1,000 times the value of the original number.

The transformed number is 8 times the value of the original number.

22
New cards

Which of the following is a true statement about the use of public key encryption in transmitting messages?

Responses

A

Public key encryption enables parties to initiate secure communications through an open medium, such as the Internet, in which there might be eavesdroppers.

B

Public key encryption is not considered a secure method of communication because a public key can be intercepted.

C

Public key encryption only allows the encryption of documents containing text; documents containing audio and video must use a different encryption method.

D

Public key encryption uses a single key that should be kept secure because it is used for both encryption and decryption.

Public key encryption enables parties to initiate secure communications through an open medium, such as the Internet, in which there might be eavesdroppers.

23
New cards

A company delivers packages by truck and would like to minimize the length of the route that each driver must travel in order to reach n delivery locations. The company is considering two different algorithms for determining delivery routes.

Algorithm I

Generate all possible routes, compute their lengths, and then select the shortest possible route. This algorithm does not run in reasonable time.

Algorithm II

Starting from an arbitrary delivery location, find the nearest unvisited delivery location. Continue creating the route by selecting the nearest unvisited location until all locations have been visited. This algorithm does not guarantee the shortest possible route and runs in time proportional to n2.

Which of the following best categorizes algorithm II?

Responses

A

Algorithm II attempts to use an algorithmic approach to solve an otherwise undecidable problem.

B

Algorithm II uses a heuristic approach to provide an approximate solution in reasonable time.

C

Algorithm II provides no improvement over algorithm I because neither algorithm runs in reasonable time.

D

Algorithm II requires a much faster computer in order to provide any improvement over algorithm I.


Algorithm II uses a heuristic approach to provide an approximate solution in reasonable time.

24
New cards

In a science experiment, result X is expected to occur 25% of the time and result Y is expected to occur the remaining 75% of the time. The following code segment is intended to simulate the experiment if there are 100 trials.

Line 1:  xCount 0

Line 2:  yCount 0

Line 3:  REPEAT 100 TIMES

Line 4:  {

Line 5:     IF(RANDOM(1, 4) = 1)

Line 6:     {

Line 7:        xCount xCount + 1

Line 8:     }

Line 9:     IF(RANDOM(1, 4) > 1)

Line 10:    {

Line 11:       yCount yCount + 1

Line 12:    }

Line 13: }

Line 14: DISPLAY("Result X occurred")

Line 15: DISPLAY(xCount)

Line 16: DISPLAY("times and result Y occurred")

Line 17: DISPLAY(yCount)

Line 18: DISPLAY("times.")

A programmer runs the code segment, and the following message is displayed.

Result X occurred 24 times and result Y occurred 70 times.

The result shows that 94 trials were counted, rather than the intended 100 trials.

Which of the following changes to the code segment will ensure a correct simulation of the experiment?

Responses

A

Replacing line 9 with IF(RANDOM(1, 4) ≥ 2)

B

Replacing line 9 with ELSE

C

Interchanging lines 5 and 9

D

Interchanging lines 7 and 11

Replacing line 9 with ELSE

25
New cards

A city maintains a database of all traffic tickets that were issued over the past ten years. The tickets are divided into the following two categories.

  • Moving violations

  • Nonmoving violations

The data recorded for each ticket include only the following information.

  • The month and year in which the ticket was issued

  • The category of the ticket

Which of the following questions CANNOT be answered using only the information in the database?

Responses

A

Have the total number of traffic tickets per year increased each year over the past ten years?

B

In the past ten years, were nonmoving violations more likely to occur on a weekend than on a weekday?

C

In the past ten years, were there any months when moving violations occurred more often than nonmoving violations?

D

In how many of the past ten years were there more than one million moving violations?

In the past ten years, were nonmoving violations more likely to occur on a weekend than on a weekday?

26
New cards

Individuals sometimes attempt to remove personal information from the Internet. Which of the following is the LEAST likely reason the personal information is hard to remove?

Responses

A

Internet users with a copy of the information might redistribute the personal information without first seeking permission.

B

There are potentially an extremely large number of devices on the Internet that may contain the information.

C

Automated technologies collect information about Internet users without their knowledge.

D

All personal information is stored online using authentication measures, making the information hard to access.

All personal information is stored online using authentication measures, making the information hard to access.

27
New cards

Consider the following code segment.

The figure presents 5 lines of code. Throughout the code there are nested blocks of code, as follows. Line 1: [begin block] integerList ← [begin block] 4, 2, 5, 4, 2, 3, 1 [end block] [end block] Line 2: [begin block] result ← 0 [end block] [Begin Block] Line 3: FOR EACH item IN integerList [Begin Block] Line 4: [begin block] result ← result + (item MOD 2) [end block] [End block] [End Block] [begin block] Line 5: DISPLAY [begin block] result [end block] [end block]

What value is displayed as a result of executing the code segment?

Responses

A

3

B

4

C

9

D

12

A. 3

28
New cards

Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system?

Responses

A

A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user’s computer using the recorded data.

B

A user has a very common password for an online banking account. Someone else guesses the password after a few attempts and gains access to the user’s account.

C

A user logs into an unsecure Web site. Someone else is able to view unencrypted log-in information as it is transmitted over the Internet. The user has the same username and password for multiple accounts, so the user’s log-in information for multiple systems may be compromised.

D

A user receives an e-mail that claims to be from the user’s bank. The e-mail instructs the user to click on a link to a Web site and enter a username and password to verify an account. Shortly after following the steps, the user discovers that the Web site is fraudulent and that the user’s username and password were stolen.

A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user’s computer using the recorded data.

29
New cards

The following question uses a robot in a grid of squares. The robot is represented by a triangle, which is initially facing right.

The figure presents a robot in a grid of squares with 7 columns and 6 rows. The robot is represented by a triangle, which is initially in the bottom left square of the grid, facing rightwards. A path of arrows shows the robot’s movement from its initial location to a gray square in the top right square of the grid. The path the robot takes is as follows. The robot moves 2 squares to the right, turns upwards, moves 2 squares upwards, turns rightwards, moves 4 squares to the right, turns upwards, moves 3 squares upwards where it turns rightwards and ends.

Consider the following procedure.

The figure presents a block of code that consists of 7 lines. Throughout the code there are nested blocks of code, as follows. [Begin Block] Line 1: PROCEDURE botStepper [begin block] n [end block] [Begin Block] Line 2: [Begin Block] REPEAT n TIMES [Begin Block] Line 3: [begin block] MOVE_FORWARD [end block] [End Block] [End Block] Line 4: [begin block] ROTATE_LEFT [end block] [Begin Block] Line 5: REPEAT n TIMES [Begin Block] Line 6: [begin block] MOVE_FORWARD [end block] [End block] [End Block] Line 7: [begin block] ROTATE_RIGHT [end block] [End Block] [End Block]

Which of the following code segments will move the robot to the gray square along the path indicated by the arrows?

Responses

A

The figure presents two lines of code. Throughout the code there are nested blocks of code, as follows. Line 1: [begin block] botStepper [begin block] 2 [end block] [end block] Line 2: [begin block] botStepper [begin block] 3 [end block] [end block]

B

C

D

The figure presents three lines of code. Throughout the code there are nested blocks of code, as follows. Line 1: [begin block] botStepper [begin block] 2 [end block] [end block] Line 2: [begin block] MOVE_FORWARD [end block] Line 3: [begin block] botStepper [begin block] 3 [end block] [end block]

30
New cards

Which of the following is an example of an attack using a rogue access point?

Responses

A

An unauthorized individual gains the ability to view network traffic by connecting to a network router that uses weak or no security measures.

B

An unauthorized individual physically disconnects an exposed network router, making the network unavailable to some users.

C

An unauthorized individual poses as a network administrator and attempts to trick a user into providing personal information.

D

A group of unauthorized individuals overwhelms a network router with traffic, making it unavailable to some users.

An unauthorized individual gains the ability to view network traffic by connecting to a network router that uses weak or no security measures.

31
New cards

Which of the following best explains how symmetric encryption algorithms are typically used?

Responses

A

Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

B

Symmetric encryption uses a single key that should be made public. The same key is used for both encryption and decryption of data.

C

Symmetric encryption uses two keys that should both be kept secret. One key is used for encryption, and the other is used for decryption.

D

Symmetric encryption uses two keys. The key used for encryption should be made public, but the key used for decryption should be kept secret.

A. Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

32
New cards

A list of numbers has n elements, indexed from 1 to n.The following algorithm is intended to display true if the value target appears in the list more than once and to display false otherwise. The algorithm uses the variables position and count.Steps 4 and 5 are missing.

Step 1:

Set count to 0 and position to 1.

Step 2:

If the value of the element at index position is equal to target,increase the value of count by 1.

Step 3:

Increase the value of position by 1.

Step 4:

(missing step)

Step 5:

(missing step)

Which of the following could be used to replace steps 4 and 5 so that the algorithm works as intended?

Responses

A

Step 4

Repeat steps 2 and 3 until the value of position is greater than n.

Step 5

If count is greater than or equal to 2,display true.Otherwise, display false.

B

Step 4

Repeat steps 2 and 3 until the value of position is greater than n.

Step 5

If count is greater than or equal to position,display true. Otherwise, display false.

C

Step 4

Repeat steps 2 and 3 until the value of count is greater than 2.

Step 5

If position is greater than or equal to n,display true.Otherwise, display false.

D

Step 4

Repeat steps 2 and 3 until the value of count is greater than n.

Step 5

If count is greater than or equal to 2,display true.Otherwise, display false.

Step 4

Repeat steps 2 and 3 until the value of position is greater than n.

Step 5

If count is greater than or equal to 2,display true.Otherwise, display false.

33
New cards

Delivery trucks enter and leave a depot through a controlled gate. At the depot, each truck is loaded with packages, which will then be delivered to one or more customers. As each truck enters and leaves the depot, the following information is recorded and uploaded to a database.

  • The truck’s identification number

  • The truck’s weight

  • The date and time the truck passes through the gate

  • Whether the truck is entering or leaving the depot

Using only the information in the database, which of the following questions CANNOT be answered?

Responses

A

On which day in a particular range of dates did the greatest number of trucks enter and leave the depot?

B

What is the average number of customer deliveries made by each truck on a particular day?

C

What is the change in weight of a particular truck between when it entered and left the depot?

D

Which truck has the shortest average time spent at the depot on a particular day?


What is the average number of customer deliveries made by each truck on a particular day?

34
New cards

A code segment is intended to transform the list utensils so that the last element of the list is moved to the beginning of the list.

For example, if utensils initially contains  ["fork", "spoon", "tongs", "spatula", "whisk"],it should contain ["whisk", "fork", "spoon", "tongs", "spatula"] after executing the code segment.

Which of the following code segments transforms the list as intended?

Responses

A

len LENGTH(utensils)

temp utensils[len]

REMOVE(utensils, len)

APPEND(utensils, temp)

B

len LENGTH(utensils)

REMOVE(utensils, len)

temp utensils[len]

APPEND(utensils, temp)

C

len LENGTH(utensils)

temp utensils[len]

REMOVE(utensils, len)

INSERT(utensils, 1, temp)

D

len LENGTH(utensils)

REMOVE(utensils, len)

temp utensils[len]

INSERT(utensils, 1, temp)

len LENGTH(utensils)

temp utensils[len]

REMOVE(utensils, len)

INSERT(utensils, 1, temp)

35
New cards

Each student at a school has a unique student ID number. A teacher has the following spreadsheets available.

  • Spreadsheet I contains information on all students at the school. For each entry in this spreadsheet, the student name, the student ID, and the student’s grade point average are included.

  • Spreadsheet II contains information on only students who play at least one sport. For each entry in this spreadsheet, the student ID and the names of the sports the student plays are included.

  • Spreadsheet III contains information on only students whose grade point average is greater than 3.5. For each entry in this spreadsheet, the student name and the student ID are included.

  • Spreadsheet IV contains information on only students who play more than one sport. For each entry in this spreadsheet, the student name and the student ID are included.

The teacher wants to determine whether students who play a sport are more or less likely to have higher grade point averages than students who do not play any sports.

Which of the following pairs of spreadsheets can be combined and analyzed to determine the desired information?

Responses

A

Spreadsheets I and II

B

Spreadsheets I and IV

C

Spreadsheets II and III

D

Spreadsheets III and IV

A. Spreadsheets I and II

36
New cards

In the following procedure, the parameter age represents a person’s age. The procedure is intended to return the name of the age group associated with age.People who are under 18 are considered minors, people who are 65 and older are considered senior citizens, and all other people are considered adults. The procedure does not work as intended.

Line 1:  PROCEDURE ageGroup(age)

Line 2:  {

Line 3:     result "adult"

Line 4:     IF(age ≥ 65)

Line 5:     {

Line 6:        result "senior citizen"

Line 7:     }

Line 8:     RETURN(result)

Line 9:

Line 10:    result "adult"

Line 11:    IF(age < 18)

Line 12:    {

Line 13:       result "minor"

Line 14:    }

Line 15:    RETURN(result)

Line 16: }

Removing which two lines of code will cause the procedure to work as intended?

Select two answers.

response - correct

Responses

A

Line 3

B

Line 8

C

Line 10

D

Line 15


Line 8, Line 10

37
New cards

In a certain video game, players are awarded bonus points at the end of a level based on the value of the integer variable timer.The bonus points are awarded as follows.

  • If timer is less than 30,then 500 bonus points are awarded.

  • If timer is between 30 and 60 inclusive, then 1000 bonus points are awarded.

  • If timer is greater than 60,then 1500 bonus points are awarded.

Which of the following code segments assigns the correct number of bonus points to bonus for all possible values of timer ?

Select two answers.

response - correct

Responses

A

B

C

D

The figure presents three blocks of code that consist of 5 lines. Throughout the second and third blocks of code are nested blocks of code, as follows. Line 1: [begin block] bonus ← 500 [end block] [Begin Block] Line 2: IF [begin block] timer ≥ 30 [end block] [Begin Block] Line 3: [begin block] bonus ← bonus + 500 [end block] [End Block] [End Block] [Begin Block] Line 4: IF [begin block] timer > 60 [end block] [Begin Block] Line 5: [begin block] bonus ← bonus + 500 [end block] [End Block] [End Block]The figure presents three blocks of code that consist of 6 lines. Throughout the blocks of code are nested blocks of code, as follows. [Begin Block] Line 1: IF [begin block] timer > 60 [end block] [Begin Block] Line 2: [begin block] bonus ← 1500 [end block] [End Block] [End Block] [Begin Block] Line 3: IF [Begin Block] [begin block] timer ≥ 30 [end block] AND [begin block] timer ≤ 60 [end block] [End Block] [Begin Block] Line 4: [begin block] bonus ← 1000 [end block] [End Block] [End Block] [Begin Block] Line 5: IF [begin block] timer < 30 [end block] [Begin Block] Line 6: [begin block] bonus ← 500 [end block] [End Block] [End Block]

38
New cards

The following spinner is used in a game. The region labeled "blue" represents 14 of the spinner. The regions labeled "orange" and "purple" are equal in size.

The figure presents a spinner that is divided into 3 sections, which are labeled blue, orange, and purple. The blue section represents one fourth of the spinner. The orange and purple sections represent the rest of the spinner and are equal in size.

Which of the following code segments can be used to simulate the behavior of the spinner?

Select two answers.

response - correct

Responses

A

B

C

D

The figure presents one block of code that consists of 7 lines. Throughout the code there are nested blocks of code, as follows. [Begin Block] Line 1: IF [begin block] RANDOM [begin block] 1, 4 [end block] = 1 [end block] [Begin Block] Line 2: [begin block] DISPLAY [begin block] “blue” [end block] [end block] [End Block] Line 3: ELSE [Begin Block] [Begin Block] Line 4: IF [begin block] RANDOM [begin block] 1, 2 [end block] = 1 [end block] [Begin Block] Line 5: [begin block] DISPLAY [begin block] “orange” [end block] [end block] [End Block] Line 6: ELSE [Begin Block] Line 7: [begin block] DISPLAY [begin block] “purple” [end block] [end block] [End Block] [End Block] [End Block] [End Block]The figure presents 2 blocks of code that consists of 9 lines. Throughout the code there are nested blocks of code, as follows. Line 1: [begin block] spin ← [begin block] RANDOM [begin block] 1, 4 [end block] [end block] [end block] [Begin Block] Line 2: IF [begin block] spin = 1 [end block] [Begin Block] Line 3: [begin block] DISPLAY [begin block] “blue” [end block] [end block] [End Block] Line 4: ELSE [Begin Block] Line 5: [begin block] spin ← [begin block] RANDOM [begin block] 1, 2 [end block] [end block] [end block] [Begin Block] Line 6: IF [begin block] spin = 2 [end block] [Begin Block] Line 7: [begin block] DISPLAY [begin block] “orange” [end block] [end block] [End Block] Line 8: ELSE [Begin Block] Line 9: [begin block] DISPLAY [begin block] “purple” [end block] [end block] [End Block] [End Block] [End Block] [End Block]

39
New cards

A group of students take hundreds of digital photos for a science project about weather patterns. Each photo file contains data representing the level of red, green, and blue for each pixel in the photo. The file also contains metadata that describes the date, time, and geographic location where the photo was taken.

For which of the following goals would analyzing the metadata be more appropriate than analyzing the data?

Select two answers.

response - correct

Responses

A

Determining the chronological order of the photos

B

Determining the number of clouds in a particular photo

C

Determining whether a photo is suitable for printing in black-and-white

D

Determining whether two photos were taken at the same location on different days

A. Determining the chronological order of the photos

D. Determining whether two photos were taken at the same location on different days

40
New cards

The following procedures are available for string manipulation.

Procedure Call

Explanation

substring(str, start, end)

Returns a substring of consecutive characters of str starting with the character at position start and ending with the character at position end. The first character of str is considered position 1. For example, substring("delivery", 3, 6) returns "live".

concat(str1, str2)

Returns a single string consisting of str1 followed by str2. For example, concat("key", "board") returns "keyboard".

len(str)

Returns the number of characters in str.For example, len("key") returns 3.

A programmer wants to create a new string by removing the character in position n of the string oldStr. For example, if oldStr is "best" and n is 3,then the new string should be "bet".Assume that 1 < n < len(oldStr).

Which of the following code segments can be used to create the desired new string and store it in newStr ?

Select two answers.

response - correct

Responses

A

left substring(oldStr, 1, n - 1)

right substring(oldStr, n + 1, len(oldStr))

newStr concat(left, right)

B

left substring(oldStr, 1, n + 1)

right substring(oldStr, n - 1, len(oldStr))

newStr concat(left, right)

C

newStr substring(oldStr, 1, n - 1)

newStr concat(newStr, substring(oldStr, n + 1, len(oldStr)))

D

newStr substring(oldStr, n + 1, len(oldStr))

newStr concat(newStr, substring(oldStr, 1, n - 1))

A. left substring(oldStr, 1, n - 1)

right substring(oldStr, n + 1, len(oldStr))

newStr concat(left, right)

C. newStr substring(oldStr, 1, n - 1)

newStr concat(newStr, substring(oldStr, n + 1, len(oldStr)))