AP CSP COMPREHENSIVE REVIEW MASTER

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/429

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

430 Terms

1
New cards

A programmer is writing a program that is intended to be able to process large amounts of data. Which of the following considerations is LEAST likely to affect the ability of the program to process larger data sets?


A

How long the program takes to run

B

How many programming statements the program contains

C

How much memory the program requires as it runs

D

How much storage space the program requires as it runs

B

How many programming statements the program contains

2
New cards

A programmer is developing a word game. The programmer wants to create an algorithm that will take a list of words and return a list containing the first letter of all words that are palindromes (words that read the same backward or forward). The returned list should be in alphabetical order. For example, if the list contains the words , the returned list would contain (because , , and are palindromes).

The programmer knows that the following steps are necessary for t

he algorithm but is not sure in which order they should be executed.

Executing which of the following sequences of steps will enable the algorithm to work as intended?

I. First shorten, then keep palindromes, then sort

II. First keep palindromes, then shorten, then sort

III. First sort, then keep palindromes, then shorten

A

I only

B

II only

C

I and III

D

II and III

D

II and III

3
New cards

A digital photo file contains data representing the level of red, green, and blue for each pixel in the photo. The file also contains metadata that describes the date and geographic location where the photo was taken. For which of the following goals would analyzing the metadata be more appropriate than analyzing the data?

Responses

A

Determining the likelihood that the photo is a picture of the sky

B

Determining the likelihood that the photo was taken at a particular public event

C

Determining the number of people that appear in the photo

D

Determining the usability of the photo for projection onto a particular color background

B

Determining the likelihood that the photo was taken at a particular public event

4
New cards

A group of students take hundreds of digital photos for a science project about weather patterns. Each photo file contains data representing the level of red, green, and blue for each pixel in the photo. The file also contains metadata that describes the date, time, and geographic location where the photo was taken.

For which of the following goals would analyzing the metadata be more appropriate than analyzing the data?

Select two answers.

Responses

A

Determining the chronological order of the photos

B

Determining the number of clouds in a particular photo

C

Determining whether a photo is suitable for printing in black-and-white

D

Determining whether two photos were taken at the same location on different days

A

Determining the chronological order of the photos

D

Determining whether two photos were taken at the same location on different days

5
New cards
Two tables are shown with two columns and fourteen rows each. The first row of each table contains the column headers from left to right, Decimal, and ASCII Character. The table on the left contains ASCII Characters capital A through capital M, and the table on the right contains ASCII characters capital N through capital Z. The left table is as follows: Decimal sixty five, character A. Decimal sixty six, character B. Decimal sixty seven, character C. Decimal sixty eight, character D. Decimal sixty nine character E. Decimal seventy, character F. Decimal seventy one character G. Decimal seventy two, character H. Decimal seventy three character I. Decimal seventy four, character J. Decimal seventy five, character K. Decimal seventy six, character L. Decimal seventy seven, character M.  The right table is as follows: Decimal seventy eight, character N. Decimal seventy nine character O. Decimal eighty, character P. Decimal eighty one, character Q. Decimal eighty two, character R. Decimal eighty three character S. Decimal eighty four, character T.  Decimal eighty five, character U. Decimal eighty six, character V. Decimal eighty seven, character W. Decimal eighty eight, character X. Decimal eighty nine character Y. Decimal ninety, character Z.

ASCII is a character-encoding scheme that uses a numeric value to represent each character. For example, the uppercase letter “G” is represented by the decimal (base 10) value 71. A partial list of characters and their corresponding ASCII values are shown in the table below.

ASCII characters can also be represented by hexadecimal numbers. According to ASCII character encoding, which of the following letters is represented by the hexadecimal (base 16) number 56?

Responses

A) A

B) L

C) V

D)Y

C) V

6
New cards

ASCII is a character-encoding scheme that uses 7 bits to represent each character. The decimal (base 10) values 65 through 90 represent the capital letters A through Z, as shown in the table below.

Two tables are shown, each with two columns. The left column of each is titled Decimal and the right ASCII Character. The first table has values 65 through 77 in the left column and letters A through M in the right column. The second table has values 78 through 90 in the left column and letters N through Z in the right column.

What ASCII character is represented by the binary (base 2) number 1001010 ?

Responses

A) H

B) I

C) J

D) K

C) J

7
New cards

C) J A file storage application allows users to save their files on cloud servers. A group of researchers gathered user data for the first eight years of the application’s existence. Some of the data are summarized in the following graphs. The line graph on the left shows the number of registered users each year. The line graph on the right shows the total amount of data stored by all users each year. The circle graph shows the distribution of file sizes currently stored by all users.

 

The figure presents two line graphs and a circle graph titled Registered Users By Year, Total Amount of Data Stored, and File Size Distribution, respectively. The graph titled Registered Users By Year contains 8 data points. The horizontal axis is labeled Year, and the numbers 0 through 8, in increments of 1, are indicated. The vertical axis is labeled Number of Registered Users, in millions, and the numbers 0 through 800, in increments of 100, are indicated. The line begins at the point Year 1 comma 26 million users and trends upwards and to the right, passing through the following data points. Year 2 comma 53 million users; Year 3 comma 105 million users; Year 4 comma 202 million users; Year 5 comma 403 million users; Year 6 comma 504 million users; Year 7 comma 601 million users; and Year 8 comma 701 million users. The graph titled Total Amount of Data Stored contains 8 data points. The horizontal axis is labeled Year, and the numbers 0 through 8, in increments of 1, are indicated. The vertical axis is labeled Total Amount of Data Stored, in millions of gigabytes, and the numbers 0 through 8,000, in increments of 1,000, are indicated. The line begins at the point Year 1 comma 262 million gigabytes and trends upwards and to the right, passing through the following data points. Year 2 comma 505 million gigabytes; Year 3 comma 1,014 million gigabytes; Year 4 comma 2,208 million gigabytes; Year 5 comma 3,885 million gigabytes; Year 6 comma 5,110 million gigabytes; Year 7 comma 5,890 million gigabytes; and Year 8 comma 6,986 million gigabytes. The circle graph contains 6 wedges of data, as follows. Less than 10 kilobytes, 17%; 10 kilobytes to 100 kilobytes, 24%; 100 kilobytes to 1 megabyte, 25%; 1 megabyte to 10 megabytes, 10%; 10 megabytes to 100 megabytes, 22%, more than 100 megabytes, 2%.

(note: 1 MB = 1,000 KB)

Which of the following best describes the average amount of data stored per user for the first eight years of the application’s existence?

Responses

A

Across all eight years, the average amount of data stored per user was about 10 GB.

B

Across all eight years, the average amount of data stored per user was about 100 GB.

C

The average amount of data stored per user appears to increase by about 10 GB each year.

D

The average amount of data stored per user appears to increase by about 100 GB each year.

A

Across all eight years, the average amount of data stored per user was about 10 GB.

8
New cards

A color in a computing application is represented by an RGB triplet that describes the amount of red, green, and blue, respectively, used to create the desired color. A selection of colors and their corresponding RGB triplets are shown in the following table. Each value is represented in decimal (base 10).

Color Name

RGB Triplet

indigo

(75,   0, 130)

ivory

(255, 255, 240)

light pink

(255, 182, 193)

light yellow

(255, 255, 224)

magenta

(255,   0, 255)

neutral gray

(127, 127, 112)

pale yellow

(255, 255, 160)

vivid yellow

(255, 255,  14)

What is the binary RGB triplet for the color indigo?

Responses

A

(00100101, 00000000, 10000010)

B

(00100101, 00000000, 01000001)

C

(01001011, 00000000, 10000010)

D

(01001011, 00000000, 01000001)

C

(01001011, 00000000, 10000010)

9
New cards

A color in a computing application is represented by an RGB triplet that describes the amount of red, green, and blue, respectively, used to create the desired color. A selection of colors and their corresponding RGB triplets are shown in the following table. Each value is represented in decimal (base 10).

Color Name

RGB Triplet

indigo

(75,   0, 130)

ivory

(255, 255, 240)

light pink

(255, 182, 193)

light yellow

(255, 255, 224)

magenta

(255,   0, 255)

neutral gray

(127, 127, 112)

pale yellow

(255, 255, 160)

vivid yellow

(255, 255,  14)

According to information in the table, what color is represented by the binary RGB triplet (11111111, 11111111, 11110000) ?

Responses

A

Ivory

B

Light yellow

C

Neutral gray

D

Vivid yellow

A) Ivory

10
New cards

An online store uses 6-bit binary sequences to identify each unique item for sale. The store plans to increase the number of items it sells and is considering using 7-bit binary sequences. Which of the following best describes the result of using 7-bit sequences instead of 6-bit sequences?

Responses

A

2 more items can be uniquely identified.

B

10 more items can be uniquely identified.

C

2 times as many items can be uniquely identified.

D

10 times as many items can be uniquely identified.

C

2 times as many items can be uniquely identified.

11
New cards

Biologists often attach tracking collars to wild animals. For each animal, the following geolocation data is collected at frequent intervals.

  • The time

  • The date

  • The location of the animal

Which of the following questions about a particular animal could NOT be answered using only the data collected from the tracking collars?

A

Approximately how many miles did the animal travel in one week?

B

Does the animal travel in groups with other tracked animals?

C

Do the movement patterns of the animal vary according to the weather?

D

In what geographic locations does the animal typically travel?

C

Do the movement patterns of the animal vary according to the weather?

12
New cards

A bookstore has a database containing information about each book for sale in the store. A sample portion of the database is shown below.

Author

Title

Selling Price

Genre

Quantity Available

J. M. Barrie

Peter and Wendy

$6.99

Fantasy

3

L. Frank Baum

The Wonderful Wizard of Oz

$7.99

Fantasy

2

Arthur Conan Doyle

The Hound of the Baskervilles

$7.49

Mystery

4

Mary Shelley

Frankenstein

$7.99

Horror

4

Jules Verne

Twenty Thousand Leagues Under the Sea

$6.99

Science Fiction

3

H. G. Wells

The War of the Worlds

$4.99

Science Fiction

3

A store employee wants to calculate the total amount of money the store will receive if they sell all of the available science fiction books. Which columns in the database can be ignored and still allow the employee to perform this calculation?

Select two answers.

A

Author

B

Title

C

Genre

D

Quantity Available

A

Author

B

Title

13
New cards

A large spreadsheet contains the following information about the books at a bookstore. A sample portion of the spreadsheet is shown below.

 

A

Book Title

B

Author

C

Genre

D

Number of

Copies in Stock

E

Cost

(in dollars)

1

Little Women

Louisa May Alcott

Fiction

3

13.95

2

The Secret Adversary

Agatha Christie

Mystery

2

12.95

3

A Study in Scarlet

Arthur Conan Doyle

Mystery

0

8.99

4

The Hound of the Baskervilles

Arthur Conan Doyle

Mystery

1

8.95

5

Les Misérables

Victor Hugo

Fiction

1

12.99

6

Frankenstein

Mary Shelley

Horror

2

11.95

An employee wants to count the number of books that meet all of the following criteria.

  • Is a mystery book

  • Costs less than $10.00

  • Has at least one copy in stock

For a given row in the spreadsheet, suppose genre contains the genre as a string, num contains the number of copies in stock as a number, and cost contains the cost as a number. Which of the following expressions will evaluate to true if the book should be counted and evaluates to false otherwise?

Responses

A

(genre = "mystery") AND ((1 ≤ num) AND (cost < 10.00))

B

(genre = "mystery") AND ((1 < num) AND (cost < 10.00))

C

(genre = "mystery") OR ((1 ≤ num) OR (cost < 10.00))

D

(genre = "mystery") OR ((1 < num) OR (cost < 10.00))

A

(genre = "mystery") AND ((1 ≤ num) AND (cost < 10.00))

14
New cards

A cable television company stores information about movie purchases made by subscribers. Each day, the following information is summarized and stored in a publicly available database.

  • The day and date each movie was purchased

  • The title of each movie purchased

  • The cities where subscribers purchased each movie

  • The number of times each movie was purchased by subscribers in a given city

A sample portion of the database is shown below. The database is sorted by date and movie title.

A table is shown with four columns titled Day and Date, Movie Title, City, and Number of Times Purchased. The first row reads Saturday 1/5/2014, Movie A, Houston Texas, and 1. The second row reads Saturday 1/5/2014, Movie A, Detroit Michigan, and 2. The third row reads Saturday 1/5/2015, Movie B, Houston Texas, and 1. The fourth row reads Saturday 1/5/2014, Movie C, Anchorage Alaska, and 1. The fifth row reads Sunday 1/6/2014, Movie A, Wichita Kansas, and 3.

Which of the following CANNOT be determined using only the information in the database?

Responses

A

The date when a certain movie was purchased the greatest number of times

B

The number of movies purchased by an individual subscriber for a particular month

C

The total number of cities in which a certain movie was purchased

D

The total number of movies purchased in a certain city during a particular month

B

The number of movies purchased by an individual subscriber for a particular month

15
New cards

A video-streaming Web site keeps count of the number of times each video has been played since it was first added to the site. The count is updated each time a video is played and is displayed next to each video to show its popularity.

At one time, the count for the most popular video was about two million. Sometime later, the same video displayed a seven-digit negative number as its count, while the counts for the other videos displayed correctly.

Which of the following is the most likely explanation for the error?

Responses

A

The count for the video became larger than the maximum value allowed by the data type used to store the count.

B

The mathematical operations used to calculate the count caused a rounding error to occur.

C

The software used to update the count failed when too many videos were played simultaneously by too many users.

D

The software used to update the count contained a sampling error when using digital data to approximate the analog count.

A

The count for the video became larger than the maximum value allowed by the data type used to store the count.

16
New cards

A researcher is analyzing data about students in a school district to determine whether there is a relationship between grade point average and number of absences. The researcher plans on compiling data from several sources to create a record for each student.

The researcher has access to a database with the following information about each student.

  • Last name

  • First name

  • Grade level (9, 10, 11, or 12)

  • Grade point average (on a 0.0 to 4.0 scale)

The researcher also has access to another database with the following information about each student.

  • First name

  • Last name

  • Number of absences from school

  • Number of late arrivals to school

Upon compiling the data, the researcher identifies a problem due to the fact that neither data source uses a unique ID number for each student. Which of the following best describes the problem caused by the lack of unique ID numbers?

Responses

A

Students who have the same name may be confused with each other.

B

Students who have the same grade point average may be confused with each other.

C

Students who have the same grade level may be confused with each other.

D

Students who have the same number of absences may be confused with each other.

A

Students who have the same name may be confused with each other.

17
New cards

A team of researchers wants to create a program to analyze the amount of pollution reported in roughly 3,000 counties across the United States. The program is intended to combine county data sets and then process the data. Which of the following is most likely to be a challenge in creating the program?

Responses

A

A computer program cannot combine data from different files.

B

Different counties may organize data in different ways.

C

The number of counties is too large for the program to process.

D

The total number of rows of data is too large for the program to process

B

Different counties may organize data in different ways.

18
New cards

A student is creating a Web site that is intended to display information about a city based on a city name that a user enters in a text field. Which of the following are likely to be challenges associated with processing city names that users might provide as input?

Select two answers.

Responses

A

Users might attempt to use the Web site to search for multiple cities.

B

Users might enter abbreviations for the names of cities.

C

Users might misspell the name of the city.

D

Users might be slow at typing a city name in the text field.

B

Users might enter abbreviations for the names of cities.

C

Users might misspell the name of the city.

19
New cards

The owner of a clothing store records the following information for each transaction made at the store during a 7-day period.

  • The date of the transaction

  • The method of payment used in the transaction

  • The number of items purchased in the transaction

  • The total amount of the transaction, in dollars

Customers can pay for purchases using cash, check, a debit card, or a credit card.

Using only the data collected during the 7-day period, which of the following statements is true?

Responses

A

The average amount spent per day during the 7-day period can be determined by sorting the data by the total transaction amount, then adding the 7 greatest amounts, and then dividing the sum by 7.

B

The method of payment that was used in the greatest number of transactions during the 7-day period can be determined by sorting the data by the method of payment, then adding the number of items purchased for each type of payment method, and then finding the maximum sum.

C

The most expensive item purchased on a given date can be determined by searching the data for all items purchased on the given date and then sorting the matching items by item price.

D

The total number of items purchased on a given date can be determined by searching the data for all transactions that occurred on the given date and then adding the number of items purchased for each matching transaction.

D

The total number of items purchased on a given date can be determined by searching the data for all transactions that occurred on the given date and then adding the number of items purchased for each matching transaction.

20
New cards

Each student at a school has a unique student ID number. A teacher has the following spreadsheets available.

  • Spreadsheet I contains information on all students at the school. For each entry in this spreadsheet, the student name, the student ID, and the student’s grade point average are included.

  • Spreadsheet II contains information on only students who play at least one sport. For each entry in this spreadsheet, the student ID and the names of the sports the student plays are included.

  • Spreadsheet III contains information on only students whose grade point average is greater than 3.5. For each entry in this spreadsheet, the student name and the student ID are included.

  • Spreadsheet IV contains information on only students who play more than one sport. For each entry in this spreadsheet, the student name and the student ID are included.

The teacher wants to determine whether students who play a sport are more or less likely to have higher grade point averages than students who do not play any sports.

Which of the following pairs of spreadsheets can be combined and analyzed to determine the desired information?

Responses

A

Spreadsheets I and II

B

Spreadsheets I and IV

C

Spreadsheets II and III

D

Spreadsheets III and IV

A

Spreadsheets I and II

21
New cards
<p>Participants in a survey were asked how many hours per day they spend reading, how many hours per day they spend using a smartphone, and whether or not they would be interested in a smartphone application that lets users share book reviews.</p><p>The data from the survey are represented in the graph below. Each&nbsp; represents a survey participant who said he or she was interested in the&nbsp; application, and each&nbsp;&nbsp;<span>represents a participant who said he or she was not interested.</span></p><p style="text-align: center"></p><p>Which of the following hypotheses is most consistent with the data in the graph?</p><p>Responses</p><p><strong>A</strong></p><p>Participants who read more were generally more likely to say they are interested in the application.</p><p><strong>B</strong></p><p>Participants who read more were generally less likely to say they are interested in the application.</p><p><strong>C</strong></p><p>Participants who use a smartphone more were generally more likely to say they read more.</p><p><strong>D</strong></p><p>Participants who use a smartphone more were generally less likely to say they read more.</p>

Participants in a survey were asked how many hours per day they spend reading, how many hours per day they spend using a smartphone, and whether or not they would be interested in a smartphone application that lets users share book reviews.

The data from the survey are represented in the graph below. Each  represents a survey participant who said he or she was interested in the  application, and each  represents a participant who said he or she was not interested.

Which of the following hypotheses is most consistent with the data in the graph?

Responses

A

Participants who read more were generally more likely to say they are interested in the application.

B

Participants who read more were generally less likely to say they are interested in the application.

C

Participants who use a smartphone more were generally more likely to say they read more.

D

Participants who use a smartphone more were generally less likely to say they read more.

A) Participants who read more were generally more likely to say they are interested in the application.

22
New cards

Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string more than once and replaces each instance of that pair with a corresponding character that does not appear in the string. The algorithm saves a list containing the mapping of character pairs to their corresponding replacement characters.

For example, the string “THIS_IS_THE_BEST_WISH” can be encoded as  “%#_#%E_BEST_W#H” by replacing all instances of “TH” with % and replacing all instances of “IS” with “#”

Which of the following statements about byte pair encoding is true?

Responses

A

Byte pair encoding is an example of a lossy transformation because it discards some of the data in the original string.

B

Byte pair encoding is an example of a lossy transformation because some pairs of characters are replaced by a single character.

C

Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.

D

Byte pair encoding is an example of a lossless transformation because it can be used to transmit messages securely.

C

Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.

23
New cards
<p>Grades in a computer science course are based on total points earned on a midterm exam and a final exam. The teacher provides a way for students to improve their course grades if they receive high scores on the final exam: if a student’s final exam score is greater than the student’s midterm exam score, the final exam score replaces the midterm exam score in the calculation of total points.</p><p>The table below shows two students’ scores on the midterm and final exams and the calculated total points each student earns.</p><p style="text-align: center"></p><ul><li><p>Khalil does better on the midterm exam than on the final exam, so his original midterm and final exam scores are added to compute his total points.</p></li><li><p>Josefina does better on the final exam than on the midterm exam, so her final exam score replaces her midterm exam score in the total points calculation.</p></li></ul><p>The teacher has data representing the scores of thousands of students. For each student, the data contain the student name, the midterm exam score, the final exam score, and the result of the total points calculation.</p><p>Which of the following could be determined from the data?</p><p>I. The average total points earned per student<br>II. The average increase in total points per student as a result of the score replacement policy<br>III. The proportion of students who improved their total points as a result of the score replacement policy</p><p>Responses</p><p><strong>A</strong></p><p>III only</p><p><strong>B</strong></p><p>I and II only</p><p><strong>C</strong></p><p>I and III only</p><p><strong>D</strong></p><p>I, II, and III</p>

Grades in a computer science course are based on total points earned on a midterm exam and a final exam. The teacher provides a way for students to improve their course grades if they receive high scores on the final exam: if a student’s final exam score is greater than the student’s midterm exam score, the final exam score replaces the midterm exam score in the calculation of total points.

The table below shows two students’ scores on the midterm and final exams and the calculated total points each student earns.

  • Khalil does better on the midterm exam than on the final exam, so his original midterm and final exam scores are added to compute his total points.

  • Josefina does better on the final exam than on the midterm exam, so her final exam score replaces her midterm exam score in the total points calculation.

The teacher has data representing the scores of thousands of students. For each student, the data contain the student name, the midterm exam score, the final exam score, and the result of the total points calculation.

Which of the following could be determined from the data?

I. The average total points earned per student
II. The average increase in total points per student as a result of the score replacement policy
III. The proportion of students who improved their total points as a result of the score replacement policy

Responses

A

III only

B

I and II only

C

I and III only

D

I, II, and III

D) I, II, and III

24
New cards

The player controls in a particular video game are represented by numbers. The controls and their corresponding binary values are shown in the following table.

Control

Binary Value

01000

01001

01011

01111

Jump

11000

Run

11001

Pause

11011

Reset

11111

The numeric values for the controls can also be represented in decimal (base 10).

What control is represented by the decimal value 15 ?

Responses

A

B

C

D

D) ↓

25
New cards

A certain social media Web site allows users to post messages and to comment on other messages that have been posted. When a user posts a message, the message itself is considered data. In addition to the data, the site stores the following metadata.

  • The time the message was posted

  • The name of the user who posted the message

  • The names of any users who comment on the message and the times the comments were made

For which of the following goals would it be more useful to analyze the data instead of the metadata?

Responses

A

To determine the users who post messages most frequently

B

To determine the time of day that the site is most active

C

To determine the topics that many users are posting about

D

To determine which posts from a particular user have received the greatest number of comments

C

To determine the topics that many users are posting about

26
New cards
<p><br></p><p><strong>A</strong></p><p>The schools can create a single list of student names, sorted by last name.</p><p><strong>B</strong></p><p>The schools can determine the average number of days students are absent.</p><p><strong>C</strong></p><p>The schools can determine which ZIP code is represented by the most students.</p><p><strong>D</strong></p><p>The schools can determine the student ID of the student with the greatest number of absences</p>


A

The schools can create a single list of student names, sorted by last name.

B

The schools can determine the average number of days students are absent.

C

The schools can determine which ZIP code is represented by the most students.

D

The schools can determine the student ID of the student with the greatest number of absences

A

The schools can create a single list of student names, sorted by last name.

B

The schools can determine the average number of days students are absent.

27
New cards

A large data set contains information about all students majoring in computer science in colleges across the United States. The data set contains the following information about each student.

  • The student’s gender

  • The state in which the student attends college

  • The student’s grade point average on a 4.0 scale

Which of the following questions could be answered by analyzing only information in the data set?

Responses

A

Do students majoring in computer science tend to have higher grade point averages than students majoring in other subjects?

B

How many states have a higher percentage of female computer science majors than male computer science majors attending college in that state?

C

What percent of students attending college in a certain state are majoring in computer science?

D

Which college has the highest number of students majoring in computer science?

B

How many states have a higher percentage of female computer science majors than male computer science majors attending college in that state?

28
New cards

Which of the following is a true statement about data compression?

Responses

A

Data compression is only useful for files being transmitted over the Internet.

B

Regardless of the compression technique used, once a data file is compressed, it cannot be restored to its original state.

C

Sending a compressed version of a file ensures that the contents of the file cannot be intercepted by an unauthorized user.

D

There are trade-offs involved in choosing a compression technique for storing and transmitting data.

D) There are trade-offs involved in choosing a compression technique for storing and transmitting data.

29
New cards

A company uses the following data files.

File Name

Description

Contents

Customers

A list of customers

Customer IDCustomer addressCustomer e-mail addressCustomer phone number

Products

A list of products available for purchase from the company

Product IDProduct nameType of battery used by the product, if any

Purchases

A list of customer purchases

Product IDProduct serial numberCustomer ID

A new rechargeable battery pack is available for products that use AA batteries. Which of the following best explains how the data files in the table can be used to send a targeted e-mail to only those customers who have purchased products that use AA batteries to let them know about the new accessory?

Responses

A

Use the customer IDs in the purchases file to search the customers file to generate a list of e-mail addresses

B

Use the product IDs in the purchases file to search the products file to generate a list of product names that use AA batteries

C

Use the customers file to generate a list of customer IDs, then use the list of customer IDs to search the products file to generate a list of product names that use AA batteries

D

Use the products file to generate a list of product IDs that use AA batteries, then use the list of product IDs to search the purchases file to generate a list of customer IDs, then use the list of customer IDs to search the customers file to generate a list of e-mail addresses.

D

Use the products file to generate a list of product IDs that use AA batteries, then use the list of product IDs to search the purchases file to generate a list of customer IDs, then use the list of customer IDs to search the customers file to generate a list of e-mail addresses.

30
New cards

Which of the following can be represented by a sequence of bits?

  1. An integer

  2. An alphanumeric character

  3. A machine language instruction

Responses

A

I only

B

III only

C

I and II only

D

I, II, and III

D

I, II, and III

31
New cards
<p><strong>A</strong></p><img src="https://assets.learnosity.com/organisations/537/af5243ec-a579-4dfe-9bc9-06223713c5a0.jpg" data-width="100%" data-align="center" alt="One word, adjusted Total, left arrow, Max, open parenthesis, one word midterm Exam, comma, one word final Exam, close parenthesis"><p><strong>B</strong></p><img src="https://assets.learnosity.com/organisations/537/d1775d65-a2f2-44ba-a06d-b8820ac72fa7.jpg" data-width="100%" data-align="center" alt="One word, adjusted Total, left arrow, Max, open parenthesis, one word midterm Exam, comma, one word final Exam, close parenthesis, plus one word final Exam"><p><strong>C</strong></p><img src="https://assets.learnosity.com/organisations/537/8ca08527-9ff9-4478-86ed-5581f473d803.jpg" data-width="100%" data-align="center" alt="One word, adjusted Total, left arrow, Max, open parenthesis, one word midterm Exam, comma, one word final Exam, close parenthesis, plus one word midterm Exam"><p><strong>D</strong></p><img src="https://assets.learnosity.com/organisations/537/a7cbe0a6-7d42-4197-aad8-064e87a94cba.jpg" data-width="100%" data-align="center" alt="One word, adjusted Total, left arrow, 2 times Max, open parenthesis, one word midterm Exam, comma, one word final Exam, close parenthesis"><p></p>

A

One word, adjusted Total, left arrow, Max, open parenthesis, one word midterm Exam, comma, one word final Exam, close parenthesis

B

One word, adjusted Total, left arrow, Max, open parenthesis, one word midterm Exam, comma, one word final Exam, close parenthesis, plus one word final Exam

C

One word, adjusted Total, left arrow, Max, open parenthesis, one word midterm Exam, comma, one word final Exam, close parenthesis, plus one word midterm Exam

D

One word, adjusted Total, left arrow, 2 times Max, open parenthesis, one word midterm Exam, comma, one word final Exam, close parenthesis

B

One word, adjusted Total, left arrow, Max, open parenthesis, one word midterm Exam, comma, one word final Exam, close parenthesis, plus one word final Exam

32
New cards

Which of the following are true statements about the data that can be represented using binary sequences?

  1. Binary sequences can be used to represent strings of characters.

  2. Binary sequences can be used to represent colors.

  3. Binary sequences can be used to represent audio recordings.

Responses

A

I only

B

I and II only

C

II and III only

D

I, II, and III

D

I, II, and III

33
New cards

The player controls in a particular video game are represented by numbers. The controls and their corresponding binary values are shown in the following table.

Control

Binary Value

01000

01001

01011

01111

Jump

11000

Run

11001

Pause

11011

Reset

11111

The numeric values for the controls can also be represented in decimal (base 10).

What is the decimal value for the jump control?

Responses

A

  3

B

12

C

24

D

48

C) 24

34
New cards

Consider the 4-bit binary numbers 0011, 0110, and 1111. Which of the following decimal values is NOT equal to one of these binary numbers?

Responses

A

3

B

6

C

9

D

15

C) 9

35
New cards

A database of information about shows at a concert venue contains the following information.

  • Name of artist performing at the show

  • Date of show

  • Total dollar amount of all tickets sold

Which of the following additional pieces of information would be most useful in determining the artist with the greatest attendance during a particular month?

Responses

A

Average ticket price

B

Length of the show in minutes

C

Start time of the show

D

Total dollar amount of food and drinks sold during the show

A) Average Ticket Price

36
New cards

Which of the following best explains how an analog audio signal is typically represented by a computer?

Responses

A

An analog audio signal is measured as input parameters to a program or procedure. The inputs are represented at the lowest level as a collection of variables.

B

An analog audio signal is measured at regular intervals. Each measurement is stored as a sample, which is represented at the lowest level as a sequence of bits.

C

An analog audio signal is measured as a sequence of operations that describe how the sound can be reproduced. The operations are represented at the lowest level as programming instructions.

D

An analog audio signal is measured as text that describes the attributes of the sound. The text is represented at the lowest level as a string.

B

An analog audio signal is measured at regular intervals. Each measurement is stored as a sample, which is represented at the lowest level as a sequence of bits.

37
New cards

The position of a runner in a race is a type of analog data. The runner’s position is tracked using sensors. Which of the following best describes how the position of the runner is represented digitally?

Responses

A

The position of the runner is determined by calculating the time difference between the start and the end of the race and making an estimation based on the runner’s average speed.

B

The position of the runner is measured and rounded to either 0 or 1 depending on whether the runner is closer to the starting line or closer to the finish line.

C

The position of the runner is predicted using a model based on performance data captured from previous races.

D

The position of the runner is sampled at regular intervals to approximate the real-word position, and a sequence of bits is used to represent each sample.

D

The position of the runner is sampled at regular intervals to approximate the real-word position, and a sequence of bits is used to represent each sample.

38
New cards

Historically, it has been observed that computer processing speeds tend to double every two years. Which of the following best describes how technology companies can use this observation for planning purposes?

Responses

A

Technology companies can accurately predict the dates when new computing innovations will be available to use.

B

Technology companies can plan to double the costs of new products each time advances in processing speed occur.

C

Technology companies can set research and development goals based on anticipated processing speeds.

D

Technology companies can spend less effort developing new processors because processing speed will always improve at the observed rate.

C

Technology companies can set research and development goals based on anticipated processing speeds.

39
New cards

A binary number is to be transformed by appending three 0s to the end of the number. For example, 11101 is transformed to 11101000.

Which of the following correctly describes the relationship between the transformed number and the original number?

Responses

A

The transformed number is 3 times the value of the original number.

B

The transformed number is 4 times the value of the original number.

C

The transformed number is 8 times the value of the original number.

D

The transformed number is 1,000 times the value of the original number.

C

The transformed number is 8 times the value of the original number.

40
New cards

The following code segment is intended to remove all duplicate elements in the list myList. The procedure does not work as intended.

j ← LENGTH(myList)

REPEAT UNTIL(j = 1)

{

IF(myList[j] = myList[j - 1])

{

REMOVE(myList, j)

}

j ← j - 1

}

For which of the following contents of myList will the procedure NOT produce the intended results?

Select two answers.

response - correct

Responses

A

[10, 10, 20, 20, 10, 10]

B

[30, 30, 30, 10, 20, 20]

C

[30, 50, 40, 10, 20, 40]

D

[50, 50, 50, 50, 50, 50]

A

[10, 10, 20, 20, 10, 10]

C

[30, 50, 40, 10, 20, 40]

41
New cards

A large spreadsheet contains the following information about local restaurants. A sample portion of the spreadsheet is shown below.

ARestaurant Name

BPrice Range

CNumber ofCustomer Ratings

DAverageCustomer Rating

EAcceptsCredit Cards

1

Joey Calzone’s Pizzeria

lo

182

3.5

false

2

78th Street Bistro

med

41

4.5

false

3

Seaside Taqueria

med

214

4.5

true

4

Delicious Sub Shop II

lo

202

4.0

false

5

Rustic Farm Tavern

hi

116

4.5

true

6

ABC Downtown Diner

med

0

-1.0

true

  • In column B, the price range represents the typical cost of a meal, where "lo" indicates under $10, "med" indicates $11 to $30, and "hi" indicates over $30.

  • In column D, the average customer rating is set to -1.0 for restaurants that have no customer ratings.

A student wants to count the number of restaurants in the spreadsheet whose price range is $30 or less and whose average customer rating is at least 4.0.For a given row in the spreadsheet, suppose prcRange contains the price range as a string and avgRating contains the average customer rating as a decimal number.

Which of the following expressions will evaluate to true if the restaurant should be counted and evaluates to false otherwise?

Responses

A

(avgRating ≥ 4.0) AND ((prcRange = "lo") AND (prcRange = "med"))

B

(avgRating ≥ 4.0) AND ((prcRange = "lo") OR (prcRange = "med"))

C

(avgRating ≥ 4.0) OR ((prcRange = "lo") AND (prcRange = "med"))

D

(avgRating ≥ 4.0) OR ((prcRange = "lo") OR (prcRange = "med"))

B

(avgRating ≥ 4.0) AND ((prcRange = "lo") OR (prcRange = "med"))

42
New cards

A large spreadsheet contains the following information about local restaurants. A sample portion of the spreadsheet is shown below.

ARestaurant Name

BPrice Range

CNumber ofCustomer Ratings

DAverageCustomer Rating

EAcceptsCredit Cards

1

Joey Calzone’s Pizzeria

lo

182

3.5

false

2

78th Street Bistro

med

41

4.5

false

3

Seaside Taqueria

med

214

4.5

true

4

Delicious Sub Shop II

lo

202

4.0

false

5

Rustic Farm Tavern

hi

116

4.5

true

6

ABC Downtown Diner

med

0

-1.0

true

  • In column B, the price range represents the typical cost of a meal, where "lo" indicates under $10, "med" indicates $11 to $30, and "hi" indicates over $30.

  • In column D, the average customer rating is set to -1.0 for restaurants that have no customer ratings.

A student is developing an algorithm to determine which of the restaurants that accept credit cards has the greatest average customer rating. Restaurants that have not yet received any customer ratings and restaurants that do not accept credit card are to be ignored.

Once the algorithm is complete, the desired restaurant will appear in the first row of the spreadsheet. If there are multiple entries that fit the desired criteria, it does not matter which of them appears in the first row.

The student has the following actions available but is not sure of the order in which they should be executed.

Action

Explanation

Filter by number of ratings

Remove entries for restaurants with no customer ratings

Filter by payment type

Remove entries for restaurants that do not accept credit cards

Sort by rating

Sort the rows in the spreadsheet on column D from greatest to least

Assume that applying either of the filters will not change the relative order of the rows remaining in the spreadsheet.

Which of the following sequences of steps can be used to identify the desired restaurant?

  1. Filter by number of ratings, then filter by payment type, then sort by rating

  2. Filter by number of ratings, then sort by rating, then filter by payment type

  3. Sort by rating, then filter by number of ratings, then filter by payment type

Responses

A

I and II only

B

I and III only

C

II and III only

D

I, II, and III

D

I, II, and III

43
New cards

Internet protocol version 4 (IPv4) represents each IP address as a 32-bit binary number. Internet protocol version 6 (IPv6) represents each IP address as a 128-bit binary number.

Which of the following best describes the result of using 128-bit addresses instead of 32-bit addresses?

Responses

A

4 times as many addresses are available.

B

96 times as many addresses are available.

C

 2^4 times as many addresses are available.

D

 2^96 times as many addresses are available.

D

 2^96 times as many addresses are available.

44
New cards

A person wants to transmit an audio file from a device to a second device. Which of the following scenarios best demonstrates the use of lossless compression of the original file?

Responses

A

A device compresses the audio file before transmitting it to a second device. The second device restores the compressed file to its original version before playing it.

B

A device compresses the audio file by removing details that are not easily perceived by the human ear. The compressed file is transmitted to a second device, which plays it.

C

A device transmits the original audio file to a second device. The second device removes metadata from the file before playing it.

D

A device transmits the original audio file to a second device. The second device plays the transmitted file as is.

A

A device compresses the audio file before transmitting it to a second device. The second device restores the compressed file to its original version before playing it.

45
New cards

In which of the following situations would it be most appropriate to choose lossy compression over lossless compression?

Responses

A

Storing digital photographs to be printed and displayed in a large format in an art gallery

B

Storing a formatted text document to be restored to its original version for a print publication

C

Storing music files on a smartphone in order to maximize the number of songs that can be stored

D

Storing a video file on an external device in order to preserve the highest possible video quality

C) Storing music files on a smartphone in order to maximize the number of songs that can be stored

46
New cards

Which of the following best explains how data is transmitted on the Internet?

Responses

A

Data is broken into packets, which are all sent to the recipient in a specified order along the same path.

B

Data is broken into packets, which can be sent along different paths.

C

All data is transmitted in a single packet through a direct connection between the sender and the recipient.

D

Multiple data files are bundled together in a packet and transmitted together.

C

All data is transmitted in a single packet through a direct connection between the sender and the recipient.

47
New cards

A computer program uses 3 bits to represent integers. When the program adds the decimal (base 10) numbers 5 and 3, the result is 0. Which of the following is the best explanation for the result?

Responses

A

An overflow error occurred.

B

A round-off error occurred.

C

The result was affected by lossy data compression.

D

The result was approximated by a floating-point representation.

A

An overflow error occurred.

48
New cards

In a certain computer program, two positive integers are added together, resulting in an overflow error. Which of the following best explains why the error occurs?

Responses

A

The program attempted to perform an operation that is considered an undecidable problem.

B

The precision of the result is limited due to the constraints of using a floating-point representation.

C

The program can only use a fixed number of bits to represent integers; the computed sum is greater than the maximum representable value.

D

The program cannot represent integers; the integers are converted into decimal approximations, leading to rounding errors.

C

The program can only use a fixed number of bits to represent integers; the computed sum is greater than the maximum representable value.

49
New cards

Each student that enrolls at a school is assigned a unique ID number, which is stored as a binary number. The ID numbers increase sequentially by 1 with each newly enrolled student. If the ID number assigned to the last student who enrolled was the binary number 1001 0011, what binary number will be assigned to the next student who enrolls?

Responses

A

1001 0100

B

1001 0111

C

1101 0100

D

1101 0111

A

1001 0100

50
New cards

A store uses binary numbers to assign a unique binary sequence to each item in its inventory. What is the minimum number of bits required for each binary sequence if the store has between 75 and 100 items in its inventory?

Responses

A

5

B

6

C

7

D

8

C) 7

51
New cards

Consider the following numeric values.

  • Binary 1011

  • Binary 1101

  • Decimal 5

  • Decimal 12

Which of the following lists the values in order from least to greatest?

Responses

A

Decimal 5, binary 1011, decimal 12, binary 1101

B

Decimal 5, decimal 12, binary 1011, binary 1101

C

Decimal 5, binary 1011, binary 1101, decimal 12

D

Binary 1011, binary 1101, decimal 5, decimal 12

A

Decimal 5, binary 1011, decimal 12, binary 1101

52
New cards

A computer program performs the operation 2/3 and represents the result as the value 0.6666667. Which of the following best explains this result?

Responses

A

An overflow error occurred.

B

The precision of the result is limited due to the constraints of using a floating-point representation.

C

The program attempted to execute the operation with the arguments in reverse order.

D

The program attempted to represent a floating-point number as an integer

B

The precision of the result is limited due to the constraints of using a floating-point representation.

53
New cards

A student is recording a song on her computer. When the recording is finished, she saves a copy on her computer. The student notices that the saved copy is of lower sound quality than the original recording. Which of the following could be a possible explanation for the difference in sound quality?

Responses

A

The song was saved using fewer bits per second than the original song.

B

The song was saved using more bits per second than the original song.

C

The song was saved using a lossless compression technique.

D

Some information is lost every time a file is saved from one location on a computer to another location.

A

The song was saved using fewer bits per second than the original song.

54
New cards

A program developed for a Web store represents customer account balances using a format that approximates real numbers. While testing the program, a software developer discovers that some values appear to be mathematically imprecise.

Which of the following is the most likely cause of the imprecision?

Responses

A

The account balances are represented using a fixed number of bits, resulting in overflow errors.

B

The account balances are represented using a fixed number of bits, resulting in round-off errors.

C

The account balances are represented using an unlimited number of bits, resulting in overflow errors.

D

The account balances are represented using an unlimited number of bits, resulting in round-off errors.

B

The account balances are represented using a fixed number of bits, resulting in round-off errors.

55
New cards

A text-editing application uses binary sequences to represent each of 200 different characters. What is the minimum number of bits needed to assign a unique bit sequence to each of the possible characters?

Responses

A

4

B

6

C

7

D

8

D) 8

56
New cards

An office uses an application to assign work to its staff members. The application uses a binary sequence to represent each of 100 staff members.

What is the minimum number of bits needed to assign a unique bit sequence to each staff member?

Responses

A

5

B

6

C

7

D

8

C) 7

57
New cards

Some programming languages use constants, which are variables that are initialized at the beginning of a program and never changed. Which of the following are good uses for a constant?

I. To represent the mathematical value π (pi) as 3.14
II. To represent the current score in a game
III. To represent a known value such as the number of days in a week

Responses

A

I and II only

B

I and III only

C

II and III only

D

I, II, and III

B

I and III only

58
New cards

A computer program uses 4 bits to represent nonnegative integers. Which of the following statements describe a possible result when the program uses this number representation?

I. The operation  4+8 will result in an overflow error.

II. The operation  7+10 will result in an overflow error.

III. The operation  12+ 3 will result in an overflow error.

Responses

A

I only

B

II only

C

II and III only

D

I, II, and III

B) II only

59
New cards

Which of the following can be represented by a single binary digit?

Select two answers.

response - correct

Responses

A

The position of the minute hand of a clock

B

The remainder when dividing a whole number by 2

C

The value of a Boolean variable

D

The volume of a car radio

B

The remainder when dividing a whole number by 2

C

The value of a Boolean variable

60
New cards

A media librarian at a movie studio is planning to save digital video files for archival purposes. The movie studio would like to be able to access full-quality videos if they are needed for future projects.

Which of the following actions is LEAST likely to support the studio’s goal?

Responses

A

Using video file formats that conform to published standards and are supported across many different devices

B

Using lossy compression software to reduce the size requirements of the data being stored

C

Using storage media that can be expanded for additional data capacity

D

Using a system that incorporates redundancy to handle disk failure

B

Using lossy compression software to reduce the size requirements of the data being stored

61
New cards

Digital images are often represented by the red, green, and blue values (an RGB triplet) of each individual pixel in the image. A photographer is manipulating a digital image and overwriting the original image. Which of the following describes a lossless transformation of the digital image?

Responses

A

Compressing the image in a way that may lose information but will suffer only a small loss of image quality.

B

Creating the gray scale of an image by averaging the amounts of red, green, and blue in each pixel and assigning this new value to the corresponding pixel in the new image. The new value of each pixel represents a shade of gray, ranging from white to black.

C

Creating the negative of an image by creating a new RGB triplet for each pixel in which each value is calculated by subtracting the original value from 255. The negative of an image is reversed from the original; light areas appear dark, and colors are reversed.

D

Modifying part of the image by taking the pixels in one part of the picture and copying them to the pixels in another part of the picture.

C

Creating the negative of an image by creating a new RGB triplet for each pixel in which each value is calculated by subtracting the original value from 255. The negative of an image is reversed from the original; light areas appear dark, and colors are reversed.

62
New cards

Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string more than once and replaces each instance of that pair with a corresponding character that does not appear in the string. The algorithm saves a list containing the mapping of character pairs to their corresponding replacement characters.

For example, the string  can be encoded as  by replacing all instances of  with and replacing all instances of   with .

For which of the following strings is it NOT possible to use byte pair encoding to shorten the string’s length?

Responses

A

Open quotation, BANANA, close quotation

B

Open quotation, LEVEL, underscore, UP, close quotation

C

Open quotation, MEET, underscore, ME, underscore, LATER, close quotation

D

Open quotation, NEITHER, underscore, HERE, underscore, NOR, underscore, THERE, close quotation

B) “LEVEL_UP”

63
New cards

A video-streaming Web site uses 32-bit integers to count the number of times each video has been played. In anticipation of some videos being played more times than can be represented with 32 bits, the Web site is planning to change to 64-bit integers for the counter. Which of the following best describes the result of using 64-bit integers instead of 32-bit integers?

Responses

A

2 times as many values can be represented.

B

32 times as many values can be represented.

C

232 times as many values can be represented.

D

322 times as many values can be represented.

C

232 times as many values can be represented.

64
New cards

A file storage application allows users to save their files on cloud servers. A group of researchers gathered user data for the first eight years of the application’s existence. Some of the data are summarized in the following graphs. The line graph on the left shows the number of registered users each year. The line graph on the right shows the total amount of data stored by all users each year. The circle graph shows the distribution of file sizes currently stored by all users.

 

The figure presents two line graphs and a circle graph titled Registered Users By Year, Total Amount of Data Stored, and File Size Distribution, respectively. The graph titled Registered Users By Year contains 8 data points. The horizontal axis is labeled Year, and the numbers 0 through 8, in increments of 1, are indicated. The vertical axis is labeled Number of Registered Users, in millions, and the numbers 0 through 800, in increments of 100, are indicated. The line begins at the point Year 1 comma 26 million users and trends upwards and to the right, passing through the following data points. Year 2 comma 53 million users; Year 3 comma 105 million users; Year 4 comma 202 million users; Year 5 comma 403 million users; Year 6 comma 504 million users; Year 7 comma 601 million users; and Year 8 comma 701 million users. The graph titled Total Amount of Data Stored contains 8 data points. The horizontal axis is labeled Year, and the numbers 0 through 8, in increments of 1, are indicated. The vertical axis is labeled Total Amount of Data Stored, in millions of gigabytes, and the numbers 0 through 8,000, in increments of 1,000, are indicated. The line begins at the point Year 1 comma 262 million gigabytes and trends upwards and to the right, passing through the following data points. Year 2 comma 505 million gigabytes; Year 3 comma 1,014 million gigabytes; Year 4 comma 2,208 million gigabytes; Year 5 comma 3,885 million gigabytes; Year 6 comma 5,110 million gigabytes; Year 7 comma 5,890 million gigabytes; and Year 8 comma 6,986 million gigabytes. The circle graph contains 6 wedges of data, as follows. Less than 10 kilobytes, 17%; 10 kilobytes to 100 kilobytes, 24%; 100 kilobytes to 1 megabyte, 25%; 1 megabyte to 10 megabytes, 10%; 10 megabytes to 100 megabytes, 22%, more than 100 megabytes, 2%.

(note: 1 MB = 1,000 KB)

Which of the following observations is most consistent with the information in the circle graph?

Responses

A

Over 75% of the files stored are 1 MB in size or less.

B

Over 75% of the files stored are 10 MB in size or less.

C

Over 75% of the files stored are at least 100 KB in size.

D

Over 75% of the files stored are at least 1 MB in size.

B

Over 75% of the files stored are 10 MB in size or less.

65
New cards

A file storage application allows users to save their files on cloud servers. A group of researchers gathered user data for the first eight years of the application’s existence. Some of the data are summarized in the following graphs. The line graph on the left shows the number of registered users each year. The line graph on the right shows the total amount of data stored by all users each year. The circle graph shows the distribution of file sizes currently stored by all users.

 

The figure presents two line graphs and a circle graph titled Registered Users By Year, Total Amount of Data Stored, and File Size Distribution, respectively. The graph titled Registered Users By Year contains 8 data points. The horizontal axis is labeled Year, and the numbers 0 through 8, in increments of 1, are indicated. The vertical axis is labeled Number of Registered Users, in millions, and the numbers 0 through 800, in increments of 100, are indicated. The line begins at the point Year 1 comma 26 million users and trends upwards and to the right, passing through the following data points. Year 2 comma 53 million users; Year 3 comma 105 million users; Year 4 comma 202 million users; Year 5 comma 403 million users; Year 6 comma 504 million users; Year 7 comma 601 million users; and Year 8 comma 701 million users. The graph titled Total Amount of Data Stored contains 8 data points. The horizontal axis is labeled Year, and the numbers 0 through 8, in increments of 1, are indicated. The vertical axis is labeled Total Amount of Data Stored, in millions of gigabytes, and the numbers 0 through 8,000, in increments of 1,000, are indicated. The line begins at the point Year 1 comma 262 million gigabytes and trends upwards and to the right, passing through the following data points. Year 2 comma 505 million gigabytes; Year 3 comma 1,014 million gigabytes; Year 4 comma 2,208 million gigabytes; Year 5 comma 3,885 million gigabytes; Year 6 comma 5,110 million gigabytes; Year 7 comma 5,890 million gigabytes; and Year 8 comma 6,986 million gigabytes. The circle graph contains 6 wedges of data, as follows. Less than 10 kilobytes, 17%; 10 kilobytes to 100 kilobytes, 24%; 100 kilobytes to 1 megabyte, 25%; 1 megabyte to 10 megabytes, 10%; 10 megabytes to 100 megabytes, 22%, more than 100 megabytes, 2%.

(note: 1 MB = 1,000 KB)

Which of the following best describes the growth in the number of registered users for the first eight years of the application’s existence?

Responses

A

The number of registered users increased at about a constant rate each year for all eight years.

B

The number of registered users increased at about a constant rate for years 1 to 5 and then about doubled each year after that.

C

The number of registered users about doubled each year for years 1 to 5 and then increased at about a constant rate after that.

D

The number of registered users about doubled each year for all eight years.

C

The number of registered users about doubled each year for years 1 to 5 and then increased at about a constant rate after that.

66
New cards

A retailer that sells footwear maintains a single database containing records with the following information about each item for sale in the retailer’s store.

  • Item identification number

  • Footwear type (sneakers, boots, sandals, etc.)

  • Selling price (in dollars)

  • Size

  • Color

  • Quantity available

Using only the database, which of the following can be determined?

Responses

A

Which items listed in the database are not currently in the store

B

Which colors are more popular among men than women

C

Which type of footwear is most popular among adults

D

The total number of shoes sold in a particular month

A

Which items listed in the database are not currently in the store

67
New cards

Delivery trucks enter and leave a depot through a controlled gate. At the depot, each truck is loaded with packages, which will then be delivered to one or more customers. As each truck enters and leaves the depot, the following information is recorded and uploaded to a database.

  • The truck’s identification number

  • The truck’s weight

  • The date and time the truck passes through the gate

  • Whether the truck is entering or leaving the depot

Using only the information in the database, which of the following questions CANNOT be answered?

Responses

A

On which day in a particular range of dates did the greatest number of trucks enter and leave the depot?

B

What is the average number of customer deliveries made by each truck on a particular day?

C

What is the change in weight of a particular truck between when it entered and left the depot?

D

Which truck has the shortest average time spent at the depot on a particular day?

B

What is the average number of customer deliveries made by each truck on a particular day?

68
New cards

A library system contains information for each book that was borrowed. Each time a person borrows or returns a book from the library, the following information is recorded in a database.

  • Name and the unique ID number of the person who was borrowing the book

  • Author, title, and the unique ID number of the book that was borrowed

  • Date that the book was borrowed

  • Date that the book was due to be returned

  • Date that the book was returned (or 0 if the book has not been returned yet)

Which of the following CANNOT be determined from the information collected by the system?

Responses

A

The total number of books borrowed in a given year

B

The total number of books that were never borrowed in a given year

C

The total number of books that were returned past their due date in a given year

D

The total number of people who borrowed at least one book in a given year

B

The total number of books that were never borrowed in a given year

69
New cards

A camera mounted on the dashboard of a car captures an image of the view from the driver’s seat every second. Each image is stored as data. Along with each image, the camera also captures and stores the car’s speed, the date and time, and the car’s GPS location as metadata. Which of the following can best be determined using only the data and none of the metadata?

Responses

A

The average number of hours per day that the car is in use

B

The car’s average speed on a particular day

C

The distance the car traveled on a particular day

D

The number of bicycles the car passed on a particular day

D

The number of bicycles the car passed on a particular day

70
New cards

A teacher sends students an anonymous survey in order to learn more about the students’ work habits. The survey contains the following questions.

  • On average, how long does homework take you each night (in minutes) ?

  • On average, how long do you study for each test (in minutes) ?

  • Do you enjoy the subject material of this class (yes or no) ?

Which of the following questions about the students who responded to the survey can the teacher answer by analyzing the survey results?

  1. Do students who enjoy the subject material tend to spend more time on homework each night than the other students do?

  2. Do students who spend more time on homework each night tend to spend less time studying for tests than the other students do?

  3. Do students who spend more time studying for tests tend to earn higher grades in the class than the other students do?

Responses

A

I only

B

III only

C

I and II

D

I and III

C

I and II

71
New cards

A library of e-books contains metadata for each book. The metadata are intended to help a search feature find books that users are interested in. Which of the following is LEAST likely to be contained in the metadata of each e-book?

Responses

A

An archive containing previous versions of the e-book

B

The author and title of the e-book

C

The date the e-book was first published

D

The genre of the e-book (e.g., comedy, fantasy, romance, etc.)

A

An archive containing previous versions of the e-book

72
New cards

A smartphone stores the following data for each photo that is taken using the phone.

  • The file name of the photo

  • The date and time the photo was taken

  • The geographic location where the photo was taken

Assume that all of the photos that have been taken on the phone are accessible.

Which of the following can be determined using the photo data described?

      I. The number of photos that were taken at a particular geographic location
     II. The number of photos that were taken in the last year
    III. The name of the person who took the most recent photo

Responses

A

III only

B

I and II only

C

I and III only

D

I, II, and III

B

I and II only

73
New cards

When a cellular telephone user places a call, the carrier transmits the caller’s voice as well as the voice of the person who is called. The encoded voices are the data of the call. In addition to transmitting the data, the carrier also stores metadata. The metadata of the call include information such as the time the call is placed and the phone numbers of both participants. For which of the following goals would it be more useful to computationally analyze the metadata instead of the data?

  1. To determine if a caller frequently uses a specific word

  2. To estimate the number of phone calls that will be placed next Monday between 10:30 A.M. and noon.

  3. To generate a list of criminal suspects when given the telephone number of a known criminal

Responses

A

I only

B

II only

C

II and III only

D

I, II, and III

C

II and III only

74
New cards

A list of binary values (0 or 1) is used to represent a black-and-white image. Which of the following is LEAST likely to be stored as metadata associated with the image?

Responses

A

Copyright information for the image

B

The date and time the image was created

C

The dimensions (number of rows and columns of pixels) of the image

D

A duplicate copy of the data

D

A duplicate copy of the data

75
New cards

A search engine has a trend-tracking feature that provides information on how popular a search term is. The data can be filtered by geographic region, date, and category. Categories include arts and entertainment, computers and electronics, games, news, people and society, shopping, sports, and travel. Which of the following questions is LEAST likely to be answerable using the trends feature?

Responses

A

In what month does a particular sport receive the most searches?

B

In which political candidates are people interested?

C

What is the cost of a certain electronics product?

D

Which region of the country has the greatest number of people searching for opera performances?

C

What is the cost of a certain electronics product?

76
New cards

An Internet service provider (ISP) is considering an update to its servers that would save copies of the Web pages most frequently visited by each user.

Which of the following is LEAST likely to occur as a result of the update?

Responses

A

Average response time for user requests might decrease.

B

Privacy of users might be negatively affected.

C

Storage requirements for the servers might increase.

D

Web sites that are not visited frequently might no longer be accessible to users.

D

Web sites that are not visited frequently might no longer be accessible to users.

77
New cards

Computers are often used to search through large sets of data to find useful patterns in the data. Which of the following tasks is NOT an example where searching for patterns is needed to produce useful information?

Responses

A

A credit card company analyzing credit card purchases to identify potential fraudulent charges

B

A grocery store analyzing customers’ past purchases to suggest new products the customer may be interested in

C

A high school analyzing student grades to identify the students with the top ten highest grade point averages

D

An online retailer analyzing customers’ viewing habits to suggest other products based on the purchasing history of other customers

C

A high school analyzing student grades to identify the students with the top ten highest grade point averages

78
New cards

A social media site allows users to send messages to each other. A group of researchers gathered user data for the first 10 years of the site’s existence. Some of the data are summarized in the table below, along with some of the company milestones.

The researchers noticed that the total number of registered users appears to be increasing at about a constant rate. If this pattern continues, which of the following best approximates the total number of registered users, in millions, in year 12 (two years after the last entry in the table) ?

Responses

A

30.6

B

31.2

C

31.8

D

32.4

B

31.2

79
New cards

A social media site allows users to send messages to each other. A group of researchers gathered user data for the first 10 years of the site’s existence. Some of the data are summarized in the table below, along with some of the company milestones.

Which of the following hypotheses is most consistent with the data in the table?

Responses

A

The mobile app release did not have any effect on the average number of daily messages sent per user.

B

The mobile app release discouraged new user registration on the site.

C

The mobile app release led to users being less frequently active on the site.

D

The mobile app release led to users tending to write shorter messages.

D

The mobile app release led to users tending to write shorter messages.

80
New cards

The table below shows the time a computer system takes to complete a specified task on the customer data of different-sized companies.

Based on the information in the table, which of the following tasks is likely to take the longest amount of time when scaled up for a very large company of approximately 100,000 customers?

Responses

A

Backing up data

B

Deleting entries from data

C

Searching through data

D

Sorting data

D

Sorting data

81
New cards

A city maintains a database of all traffic tickets that were issued over the past ten years. The tickets are divided into the following two categories.

  • Moving violations

  • Nonmoving violations

The data recorded for each ticket include only the following information.

  • The month and year in which the ticket was issued

  • The category of the ticket

Which of the following questions CANNOT be answered using only the information in the database?

Responses

A

Have the total number of traffic tickets per year increased each year over the past ten years?

B

In the past ten years, were nonmoving violations more likely to occur on a weekend than on a weekday?

C

In the past ten years, were there any months when moving violations occurred more often than nonmoving violations?

D

In how many of the past ten years were there more than one million moving violations?

B

In the past ten years, were nonmoving violations more likely to occur on a weekend than on a weekday?

82
New cards

A student’s overall course grade in a certain class is based on the student’s scores on individual assignments. The course grade is calculated by dropping the student’s lowest individual assignment score and averaging the remaining scores.

For example, if a particular student has individual assignment scores of 85, 75, 90, and 95, the lowest score (75) is dropped. The calculated course grade is (85+90+95)/3=90.

An administrator at the school has data about hundreds of students in a particular course. While the administrator does not know the values of each student’s individual assignment scores, the administrator does have the following information for each student.

  • The student name

  • A unique student ID number

  • The number of assignments for the course

  • The average assignment score before the lowest score was dropped

  • The course grade after the lowest score was dropped

Which of the following CANNOT be determined from this data alone?

Responses

A

For a given student, the value of the highest assignment score

B

For a given student, the value of the lowest assignment score

C

For a given student, the change in course grade as a result of dropping the lowest score

D

The proportion of students who improved their course grade as a result of dropping the lowest score

A

For a given student, the value of the highest assignment score

83
New cards

Two lists, list1 and list2, contain the names of books found in two different collections. A librarian wants to create newList, which will contain the names of all books found in either list, in alphabetical order, with duplicate entries removed.


For example, if list1 contains

["Macbeth", "Frankenstein", "Jane Eyre"]

and list2 contains

["Frankenstein", "Dracula", "Macbeth", "Hamlet"],

then newList will contain

["Dracula", "Frankenstein", "Hamlet", "Jane Eyre", "Macbeth"].


The following procedures are available to create newList.

Which of the following code segments will correctly create newList ?

Responses

A

newList ← Combine (list1, list2)

newList ← Sort (newList)

newList ← RemoveDuplicates (newList)

B

list1 ← Sort (list1)

list2 ← Sort (list2)

newList ← Combine (list1, list2)

newList ← RemoveDuplicates (newList)

C

list1 ← RemoveDuplicates (list1)

list2 ← RemoveDuplicates (list2)

newList ← Combine (list1, list2)

newList ← Sort (newList)

D

list1 ← RemoveDuplicates (list1)

list1 ← Sort (list1)

list2 ← RemoveDuplicates (list2)

list2 ← Sort (list2)

newList ← Combine (list1, list2)

A

newList ← Combine (list1, list2)

newList ← Sort (newList)

newList ← RemoveDuplicates (newList)

84
New cards

A code segment is intended to transform the list utensils so that the last element of the list is moved to the beginning of the list.

For example, if utensils initially contains  ["fork", "spoon", "tongs", "spatula", "whisk"],it should contain ["whisk", "fork", "spoon", "tongs", "spatula"] after executing the code segment.

Which of the following code segments transforms the list as intended?

Responses

A

len LENGTH(utensils)

temp utensils[len]

REMOVE(utensils, len)

APPEND(utensils, temp)

B

len LENGTH(utensils)

REMOVE(utensils, len)

temp utensils[len]

APPEND(utensils, temp)

C

len LENGTH(utensils)

temp utensils[len]

REMOVE(utensils, len)

INSERT(utensils, 1, temp)

D

len LENGTH(utensils)

REMOVE(utensils, len)

temp utensils[len]

INSERT(utensils, 1, temp)

C

len ← LENGTH(utensils)

temp ← utensils[len]

REMOVE(utensils, len)

INSERT(utensils, 1, temp)

85
New cards

Which of the following statements about the Internet is true?

Responses

A

The Internet is a computer network that uses proprietary communication protocols.

B

The Internet is designed to scale to support an increasing number of users.

C

The Internet requires all communications to use encryption protocols.

D

The Internet uses a centralized system to determine how packets are routed.

B

The Internet is designed to scale to support an increasing number of users.

86
New cards

Which of the following best describes a direct benefit in using redundant routing on the Internet?

Responses

A

Redundancy enables messages to be transmitted with as few packets as possible.

B

Redundancy enables network devices to communicate with as few network connections as possible.

C

Redundancy often allows messages to be sent on the network even if some network devices or connections have failed.

D

Redundancy prevents network communications from being intercepted by unauthorized individuals.

C

Redundancy often allows messages to be sent on the network even if some network devices or connections have failed.

87
New cards

Consider the following code segment.

The figure presents three blocks of code that consists of 4 lines. Throughout the blocks of code there are nested blocks of code, as follows. Line 1: [Begin Block] result ← 2 [End Block] [Begin Block] Line 2: REPEAT 3 TIMES [Begin Block] Line 3: [Begin Block] result ← result * 5 [End Block] [End Block] [End Block] Line 4: [Begin Block] DISPLAY [Begin Block] result [End Block] [End Block]

Which of the following best describes the behavior of the code segment?

Responses

A

The code segment displays the value of 2(5×3) by initializing result to 2 and then multiplying result by 3 a total of five times.

B

The code segment displays the value of 2(5×3) by initializing result to 2 and then multiplying result by 5 a total of three times.

C

The code segment displays the value of 2(53) by initializing result to 2 and then multiplying result by 3 a total of five times.

D

The code segment displays the value of 2(53) by initializing result to 2 and then multiplying result by 5 a total of three times.

D

The code segment displays the value of 2(53) by initializing result to 2 and then multiplying result by 5 a total of three times.

88
New cards

In the following procedure, assume that the parameter x is an integer.

The figure presents one block of code that consists of 4 lines. Throughout the block of code there are nested blocks of code, as follows. [Begin Block] Line 1: PROCEDURE mystery [Begin Block] x [ End Block] [Begin Block] Line 2: [Begin Block] y ← [Begin Block] x less than 0 [End Block] [End Block] [Begin Block] Line 3: IF [Begin Block] y [End Block] [Begin Block] Line 4: [Begin Block] DISPLAY [Begin Block] y [End Block] [End Block] [End Block] [End Block] [End Block] [End Block]

Which of the following best describes the behavior of the procedure?

Responses

A

It displays nothing if x is negative and displays true otherwise.

B

It displays nothing if x is negative and displays false otherwise.

C

It displays true if x is negative and displays nothing otherwise.

D

It displays true if x is negative and displays false otherwise.

C

It displays true if x is negative and displays nothing otherwise.

89
New cards

Which of the following best describes one of the benefits of using an iterative and incremental process of program development?

Responses

A

It allows programmers to implement algorithmic solutions to otherwise unsolvable problems.

B

It eliminates the need for programmers to test completed programs.

C

It enables programmers to create programs that use the lowest-level abstractions available.

D

It helps programmers identify errors as components are added to a working program.

D

It helps programmers identify errors as components are added to a working program.

90
New cards

Which of the following actions are generally helpful in program development?

  1. Consulting potential users of the program to identify their concerns

  2. Writing and testing small code segments before adding them to the program

  3. Collaborating with other individuals when developing a large program

Responses

A

I and II only

B

I and III only

C

II and III only

D

I, II, and III

D

I, II, and III

91
New cards

Central High School keeps a database of information about each student, including the numeric variables numberOfAbsences and gradePointAverage. The expression below is used to determine whether a student is eligible to receive an academic award.


(numberOfAbsences ≤ 5) AND (gradePointAverage > 3.5)

Which of the following pairs of values indicates that a student is eligible to receive an academic award?

Responses

A

numberOfAbsences = 3, gradePointAverage = 3.5

B

numberOfAbsences = 5, gradePointAverage = 3.8

C

numberOfAbsences = 6, gradePointAverage = 3.4

D

numberOfAbsences = 6, gradePointAverage = 3.6

B

numberOfAbsences = 5, gradePointAverage = 3.8

92
New cards

Assume that the list originalList contains integer values and that the list newList is initially empty. The following code segment is intended to copy all even numbers from originalList to newList so that the numbers in newList appear in the same relative order as in originalList. The code segment may or may not work as intended.

Line 1: FOR EACH number IN originalList

Line 2: {

Line 3:    IF (number MOD 2 = 0)

Line 4:    {

Line 5:       INSERT (newList, 1, number)

Line 6:    }

Line 7: }

Which of the following changes, if any, can be made so that the code segment works as intended?

Responses

A

Changing line 1 to FOR EACH number IN newList

B

Changing line 3 to IF (number MOD 2 = 1)

C

Changing line 5 to APPEND (newList, number)

D

No change is needed; the code segment is correct as is.

C

Changing line 5 to APPEND (newList, number)

93
New cards

A program is created to perform arithmetic operations on positive and negative integers. The program contains the following incorrect procedure, which is intended to return the product of the integers  X and Y.

A programmer suspects that an error in the program is caused by this procedure.

Under which of the following conditions will the procedure NOT return the correct product?

Select two answers.

A

When the values of X and Y are both positive.

B

When the values of X is positive and the value of Y is negative.

C

When the values of X is negative and the value of Y is positive.

D

When the values of X and Y are both negative.

B

When the values of X is positive and the value of Y is negative.

94
New cards

DineOutHelper is a mobile application that people can use to select a restaurant for a group meal. Each user creates a profile with a unique username and a list of food allergies or dietary restrictions. Each user can then build a contact list of other users of the app.

A user who is organizing a meal with a group selects all the members of the group from the user’s contact list. The application then recommends one or more nearby restaurants based on whether the restaurant can accommodate all of the group members’ allergies and dietary restrictions.

Suppose that Alejandra is using DineOutHelper to organize a meal with Brandon and Cynthia.

Which of the following data are needed for DineOutHelper to recommend a restaurant for the group?

  1. Each group member’s list of food allergies or dietary restrictions

  2. Alejandra’s geographic location

  3. The usernames of the people on Brandon and Cynthia’s contact lists

A

I and II only

B

I and III only

C

II and III only

D

I, II, and III

A

I and II only

95
New cards

DineOutHelper is a mobile application that people can use to select a restaurant for a group meal. Each user creates a profile with a unique username and a list of food allergies or dietary restrictions. Each user can then build a contact list of other users of the app.

A user who is organizing a meal with a group selects all the members of the group from the user’s contact list. The application then recommends one or more nearby restaurants based on whether the restaurant can accommodate all of the group members’ allergies and dietary restrictions.

Suppose that Alejandra is using DineOutHelper to organize a meal with Brandon and Cynthia.

Which of the following data is not provided by Alejandra but is necessary for DineOutHelper to recommend a restaurant for the group?

  1. Brandon’s contact list

  2. Information about which restaurants Brandon and Cynthia have visited in the past

  3. Information about which food allergies and dietary restrictions can be accommodated at different restaurants near Alejandra

Responses

A

II only

B

III only

C

II and III only

D

I, II, and III

B

III only

96
New cards

RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone’s GPS unit to track a user’s location, running speed, and distance traveled. Users can use the application to review information and statistics about their previous runs.

At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application shares the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other’s contact lists or if they typically run at similar speeds.

A basic RunRoutr account is free, but it displays advertisements that are targeted to individual users based on data collected by the application. For example, if a user’s running route begins or ends near a particular store, the application may display an advertisement for that store. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application.

Which of the following data must be collected from a user’s smartphone in order for RunRoutr to suggest a running route?

A

Available running routes near the user’s home

B

The current time

C

The starting location of the user’s previous run

D

The user’s geographic position

D

The user’s geographic position

97
New cards

RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone’s GPS unit to track a user’s location, running speed, and distance traveled. Users can use the application to review information and statistics about their previous runs.

At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application shares the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other’s contact lists or if they typically run at similar speeds.

A basic RunRoutr account is free, but it displays advertisements that are targeted to individual users based on data collected by the application. For example, if a user’s running route begins or ends near a particular store, the application may display an advertisement for that store. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application.

Adrianna uses RunRoutr to suggest a running route. All compatible users near Adrianna receive a notification that shows her running route. Which of the following data is not obtained using data collected from Adrianna’s smartphone but necessary for RunRoutr to share Adrianna’s running route?

Responses

A

Adrianna’s average running speed

B

Adrianna’s preferred running distance

C

The current locations of other RunRoutr users

D

The usernames on Adrianna’s contact list

C

The current locations of other RunRoutr users

98
New cards

A programmer wrote the program below. The program uses a list of numbers called numList. The program is intended to display the sum of the numbers in the list.

In order to test the program, the programmer initializes numList to [0, 1, 4, 5]. The program displays 10, and the programmer concludes that the program works as intended.

Which of the following is true?

Responses

A

The conclusion is correct; the program works as intended.

B

The conclusion is incorrect; the program does not display the correct value for the test case [0, 1, 4, 5].

C

The conclusion is incorrect; using the test case [0, 1, 4, 5] is not sufficient to conclude the program is correct.

D

The conclusion is incorrect; using the test case [0, 1, 4, 5] only confirms that the program works for lists in increasing order.

C

The conclusion is incorrect; using the test case [0, 1, 4, 5] is not sufficient to conclude the program is correct.

99
New cards

A chain of retail stores uses software to manage telephone calls from customers. The system was recently upgraded. Customers interacted with the original system using their phone keypad. Customers interact with the upgraded system using their voice.

The upgraded system (but not the original system) stores all information from the calling session in a database for future reference. This includes the customer’s telephone number and any information provided by the customer (name, address, order number, credit card number, etc.).

The original system and the upgraded system are described in the following flowcharts. Each flowchart uses the following blocks.

Block

Explanation

Oval

The start of the algorithm

Parallelogram

An input or output step

Diamond

A conditional or decision step, where execution proceeds to the side labeled “Yes” if the answer to the question is yes and to the side labeled “No” if the answer to the question is no

Rectangle

The result of the algorithm

 

The figure presents a flow chart of a system titled “Original System.” Beginning at the top of the flow chart, the system begins with a step labeled “Start,” which flows into a step labeled “Customer hears prerecorded message with answers to common questions (for example, store hours).” The process flows into another step labeled “Customer hears list of departments and selects one using a phone keypad.” The process flows into a conditional step labeled “Call is during business hours?” If the condition is Yes, the process flows into a result labeled “Customer is transferred to a representative from the department they selected.” If the condition is No, the process flows into a result labeled “Customer is prompted to leave a message for the representative of the department they selected.”The figure presents a flow chart of a system titled “Upgraded System.” Beginning at the top of the flow chart, the system begins with a step labeled “Start,” which flows into a step labeled “Customer prompted to describe the issue.” The process flows into another step labeled “Customer describes the issue by voice.” The process flows into a conditional step labeled “System can identify customer’s issue?” If the condition is Yes, the process flows into another conditional step labeled “Issue requires human response?” If the condition is Yes, the process flows into another conditional step labeled “Call is during business hours?” If the condition is Yes, the process flows into a result labeled “Customer is transferred to a representative from a relevant department.” If the condition is No, the process flows into a result labeled “Customer is prompted to leave a message, which is then routed to a representative from a relevant department.” If the condition to the step labeled “Issue requires human response?” is No, the process flows into a result labeled “System plays an appropriate recording to the customer.” If the condition to the step labeled “System can identify customer’s issue?” is No, the process flows into another conditional step labeled “Call is during business hours?” If the condition is Yes, the process flows into a result labeled “Customer is transferred to a human operator.” If the condition is No, the process flows into a result labeled “Customer is asked to call back during business hours.”

The upgraded system uses a directory containing additional information not supplied by the customer. The directory is used to help direct calls effectively. Which of the following is LEAST likely to be included in the directory?

Responses

A

A list of common issues and whether each issue requires a human representative

B

A list of common keywords or phrases and a corresponding issue for each keyword or phrase

C

A list of computers the company owns and the computers’ corresponding IP addresses

D

A list of human representatives and the corresponding department for each representative

C

A list of computers the company owns and the computers’ corresponding IP addresses

100
New cards

A chain of retail stores uses software to manage telephone calls from customers. The system was recently upgraded. Customers interacted with the original system using their phone keypad. Customers interact with the upgraded system using their voice.

The upgraded system (but not the original system) stores all information from the calling session in a database for future reference. This includes the customer’s telephone number and any information provided by the customer (name, address, order number, credit card number, etc.).

The original system and the upgraded system are described in the following flowcharts. Each flowchart uses the following blocks.

Block

Explanation

Oval

The start of the algorithm

Parallelogram

An input or output step

Diamond

A conditional or decision step, where execution proceeds to the side labeled “Yes” if the answer to the question is yes and to the side labeled “No” if the answer to the question is no

Rectangle

The result of the algorithm

 

The figure presents a flow chart of a system titled “Original System.” Beginning at the top of the flow chart, the system begins with a step labeled “Start,” which flows into a step labeled “Customer hears prerecorded message with answers to common questions (for example, store hours).” The process flows into another step labeled “Customer hears list of departments and selects one using a phone keypad.” The process flows into a conditional step labeled “Call is during business hours?” If the condition is Yes, the process flows into a result labeled “Customer is transferred to a representative from the department they selected.” If the condition is No, the process flows into a result labeled “Customer is prompted to leave a message for the representative of the department they selected.”The figure presents a flow chart of a system titled “Upgraded System.” Beginning at the top of the flow chart, the system begins with a step labeled “Start,” which flows into a step labeled “Customer prompted to describe the issue.” The process flows into another step labeled “Customer describes the issue by voice.” The process flows into a conditional step labeled “System can identify customer’s issue?” If the condition is Yes, the process flows into another conditional step labeled “Issue requires human response?” If the condition is Yes, the process flows into another conditional step labeled “Call is during business hours?” If the condition is Yes, the process flows into a result labeled “Customer is transferred to a representative from a relevant department.” If the condition is No, the process flows into a result labeled “Customer is prompted to leave a message, which is then routed to a representative from a relevant department.” If the condition to the step labeled “Issue requires human response?” is No, the process flows into a result labeled “System plays an appropriate recording to the customer.” If the condition to the step labeled “System can identify customer’s issue?” is No, the process flows into another conditional step labeled “Call is during business hours?” If the condition is Yes, the process flows into a result labeled “Customer is transferred to a human operator.” If the condition is No, the process flows into a result labeled “Customer is asked to call back during business hours.”

To direct a call to the appropriate destination, which of the following input data is needed by the upgraded system that was NOT needed by the original system?

  1. Audio signal of the customer’s voice

  2. The customer’s keypad selection

  3. The customer’s phone number

Responses

A

I only

B

II only

C

I and III only

D

I, II, and III

A

I only