1/68
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
A company that develops educational software wants to assemble a collaborative team of developers from a variety of professional and cultural backgrounds. Which of the following is NOT considered a benefit of assembling such a team?
Responses
A
Collaboration that includes diverse backgrounds and perspectives can eliminate the need for software testing.
B
Collaboration that includes diverse backgrounds and perspectives can help the team anticipate the needs of a variety of software users.
C
Collaboration that includes diverse backgrounds and perspectives can help the team avoid bias.
D
Collaboration that includes diverse backgrounds and perspectives can reflect the strengths of the individual team members.
A
Collaboration that includes diverse backgrounds and perspectives can eliminate the need for software testing.
Three students in different locations are collaborating on the development of an application. Which of the following strategies is LEAST likely to facilitate collaboration among the students?
Responses
A
Having all three students participate in frequent video chat sessions to discuss ideas about the project and to provide feedback on work done so far
B
Having all three students use an online shared folder to contribute and discuss components to be considered for use in the application
C
Having all three students write code independently and then having one student combine the code into a program
D
Having all three students work in a shared document that each can edit to provide comments on the work in progress
C
Having all three students write code independently and then having one student combine the code into a program
A company that develops mobile applications wants to involve users in the software development process. Which of the following best explains the benefit in having users participate?
Responses
A
Users can identify and correct errors they encounter when using released versions of the software.
B
Users can review the algorithms used in the software to help improve their efficiency.
C
Users can provide documentation for program code at the end of the software development process.
D
Users can provide feedback that can be used to incorporate a variety of perspectives into the software.
D
Users can provide feedback that can be used to incorporate a variety of perspectives into the software.
Consider the following code segment.
Which of the following best describes the behavior of the code segment?
Responses
A
The code segment displays the value of 2(5×3) by initializing result to 2 and then multiplying result by 3 a total of five times.
B
The code segment displays the value of 2(5×3) by initializing result to 2 and then multiplying result by 5 a total of three times.
C
The code segment displays the value of 2(53) by initializing result to 2 and then multiplying result by 3 a total of five times.
D
The code segment displays the value of 2(53) by initializing result to 2 and then multiplying result by 5 a total of three times.
D
The code segment displays the value of 2(53) by initializing result to 2 and then multiplying result by 5 a total of three times.
In the following procedure, assume that the parameter x is an integer.
Which of the following best describes the behavior of the procedure?
Responses
A
It displays nothing if x is negative and displays true otherwise.
B
It displays nothing if x is negative and displays false otherwise.
C
It displays true if x is negative and displays nothing otherwise.
D
It displays true if x is negative and displays false otherwise.
C
It displays true if x is negative and displays nothing otherwise.
DineOutHelper is a mobile application that people can use to select a restaurant for a group meal. Each user creates a profile with a unique username and a list of food allergies or dietary restrictions. Each user can then build a contact list of other users of the app.
A user who is organizing a meal with a group selects all the members of the group from the user’s contact list. The application then recommends one or more nearby restaurants based on whether the restaurant can accommodate all of the group members’ allergies and dietary restrictions.
Suppose that Alejandra is using DineOutHelper to organize a meal with Brandon and Cynthia.
Which of the following data are needed for DineOutHelper to recommend a restaurant for the group?
Each group member’s list of food allergies or dietary restrictions
Alejandra’s geographic location
The usernames of the people on Brandon and Cynthia’s contact lists
Responses
A
I and II only
B
I and III only
C
II and III only
D
I, II, and III
A
I and II only
DineOutHelper is a mobile application that people can use to select a restaurant for a group meal. Each user creates a profile with a unique username and a list of food allergies or dietary restrictions. Each user can then build a contact list of other users of the app.
A user who is organizing a meal with a group selects all the members of the group from the user’s contact list. The application then recommends one or more nearby restaurants based on whether the restaurant can accommodate all of the group members’ allergies and dietary restrictions.
Suppose that Alejandra is using DineOutHelper to organize a meal with Brandon and Cynthia.
Which of the following data is not provided by Alejandra but is necessary for DineOutHelper to recommend a restaurant for the group?
Brandon’s contact list
Information about which restaurants Brandon and Cynthia have visited in the past
Information about which food allergies and dietary restrictions can be accommodated at different restaurants near Alejandra
Responses
A
II only
B
III only
C
II and III only
D
I, II, and III
B
III only
A student wrote the following code segment, which displays true if the list myList contains any duplicate values and displays false otherwise.
The code segment compares pairs of list elements, setting containsDuplicates to true if any two elements are found to be equal in value. Which of the following best describes the behavior of how pairs of elements are compared?
Responses
A
The code segment iterates through myList, comparing each element to all other elements in the list.
B
The code segment iterates through myList, comparing each element to all subsequent elements in the list.
C
The code segment iterates through myList, comparing each element to the element that immediately follows it in the list.
D
The code segment iterates through myList, comparing each element to the element that immediately precedes it in the list.
B
The code segment iterates through myList, comparing each element to all subsequent elements in the list.
A student is creating an application that allows customers to order food for delivery from a local restaurant. Which of the following is LEAST likely to be an input provided by a customer using the application?
Responses
A
The address where the order should be delivered
B
The cost of a food item currently available for order
C
The credit card or payment information for the purchaser
D
The name of a food item to be included in the delivery
B
The cost of a food item currently available for order
In the following procedure, the parameter max is a positive integer.
PROCEDURE printNums(max)
{
count ← 1
REPEAT UNTIL(count > max)
{
DISPLAY(count)
count ← count + 2
}
}
Which of the following is the most appropriate documentation to appear with the printNums procedure?
Responses
A
Prints all positive even integers that are less than or equal to max.
B
Prints all positive odd integers that are less than or equal to max.
C
Prints all positive even integers that are greater than max.
D
Prints all positive odd integers that are greater than max.
B
Prints all positive odd integers that are less than or equal to max.
In the following procedure, the parameters x and y are integers.
Which of the following is the most appropriate documentation to appear with the calculate procedure?
Responses
A
Displays the value of x + (y / x).The value of the parameter x must not be 0.
B
Displays the value of x + (y / x).The value of the parameter y must not be 0.
C
Displays the value of (x + y) / x.The value of the parameter x must not be 0.
D
Displays the value of (x + y) / x.The sum of the parameters x and y must not be 0.
C
Displays the value of (x + y) / x.The value of the parameter x must not be 0.
In the following procedure, the parameter numList is a list of numbers and the parameters j and k are integers.
PROCEDURE swapListElements(numList, j, k)
{
newList ← numList
newList[j] ← numList[k]
newList[k] ← numList[j]
RETURN(newList)
}
Which of the following is the most appropriate documentation to appear with the swapListElements procedure?
Responses
A
Returns a copy of numList with the elements at indices j and k interchanged.The value of j must be between 0 and the value of k, inclusive.
B
Returns a copy of numList with the elements at indices j and k interchanged.The values of j and k must both be between 1 and LENGTH(numList), inclusive.
C
Interchanges the values of the parameters j and k.The value of j must be between 0 and the value of k, inclusive.
D
Interchanges the values of the parameters j and k.The values of j and k must both be between 1 and LENGTH(numList), inclusive.
B
Returns a copy of numList with the elements at indices j and k interchanged.The values of j and k must both be between 1 and LENGTH(numList), inclusive.
In the following code segment, score and penalty are initially positive integers. The code segment is intended to reduce the value of score by penalty. However, if doing so would cause score to be negative, score should be assigned the value 0.
For example, if score is 20 and penalty is 5, the code segment should set score to 15.If score is 20 and penalty is 30, score should be set to 0.
The code segment does not work as intended.
Line 1: IF(score - penalty < 0)
Line 2: {
Line 3: score ← score - penalty
Line 4: }
Line 5: ELSE
Line 6: {
Line 7: score ← 0
Line 8: }
Which of the following changes can be made so that the code segment works as intended?
Responses
A
Changing line 1 to IF(score < 0)
B
Changing line 1 to IF(score + penalty < 0)
C
Changing line 7 to score ← score + penalty
D
Interchanging lines 3 and 7
D
Interchanging lines 3 and 7
The following procedure is intended to return true if the list of numbers myList contains only positive numbers and is intended to return false otherwise. The procedure does not work as intended.
PROCEDURE allPositive(myList)
{
index ← 1
len ← LENGTH(myList)
REPEAT len TIMES
{
IF(myList[index] > 0)
{
RETURN(true)
}
index ← index + 1
}
RETURN(false)
}
For which of the following contents of myList does the procedure NOT return the intended result?
Responses
A
[-3, -2, -1]
B
[-2, -1, 0]
C
[-1, 0, 1]
D
[1, 2, 3]
C
[-1, 0, 1]
A homework assignment consists of 10 questions. The assignment is graded as follows.
Number of Correct Answers | Grade |
9–10 | check plus |
7–8 | check |
Under 7 | check minus |
Let numCorrect represent the number of correct answers for a particular student. The following code segment is intended to display the appropriate grade based on numCorrect. The code segment does not work as intended in all cases.
For which of the following values of numCorrect does the code segment NOT display the intended grade?
Select two answers.
response - correct
Responses
A
9
B
8
C
7
D
6
B
8
D
6
A certain programming language uses 4-bit binary sequences to represent nonnegative integers. For example, the binary sequence 0101 represents the corresponding decimal value 5. Using this programming language, a programmer attempts to add the decimal values 14 and 15 and assign the sum to the variable total. Which of the following best describes the result of this operation?
Responses
A
The correct sum of 29 will be assigned to the variable total.
B
An overflow error will occur because 4 bits is not large enough to represent either of the values 14 or 15.
C
An overflow error will occur because 4 bits is not large enough to represent 29, the sum of 14 and 15.
D
A round-off error will occur because the decimal values 14 and 15 are represented as approximations due to the fixed number of bits used to represent numbers.
C
An overflow error will occur because 4 bits is not large enough to represent 29, the sum of 14 and 15.
A video game character can face toward one of four directions: north, south, east, and west. Each direction is stored in memory as a sequence of four bits. A new version of the game is created in which the character can face toward one of eight directions, adding northwest, northeast, southwest, and southeast to the original four possibilities. Which of the following statements is true about how the eight directions must be stored in memory?
Responses
A
Four bits are not enough to store the eight directions. Five bits are needed for the new version of the game.
B
Four bits are not enough to store the eight directions. Eight bits are needed for the new version of the game.
C
Four bits are not enough to store the eight directions. Sixteen bits are needed for the new version of the game.
D
Four bits are enough to store the eight directions.
D
Four bits are enough to store the eight directions.
Which of the following are true statements about the data that can be represented using binary sequences?
Binary sequences can be used to represent strings of characters.
Binary sequences can be used to represent colors.
Binary sequences can be used to represent audio recordings.
Responses
A
I only
B
I and II only
C
II and III only
D
I, II, and III
D
I, II, and III
Consider the 4-bit binary numbers 0011, 0110, and 1111. Which of the following decimal values is NOT equal to one of these binary numbers?
Responses
A
3
B
6
C
9
D
15
C
9
The position of a runner in a race is a type of analog data. The runner’s position is tracked using sensors. Which of the following best describes how the position of the runner is represented digitally?
Responses
A
The position of the runner is determined by calculating the time difference between the start and the end of the race and making an estimation based on the runner’s average speed.
B
The position of the runner is measured and rounded to either 0 or 1 depending on whether the runner is closer to the starting line or closer to the finish line.
C
The position of the runner is predicted using a model based on performance data captured from previous races.
D
The position of the runner is sampled at regular intervals to approximate the real-word position, and a sequence of bits is used to represent each sample.
D
The position of the runner is sampled at regular intervals to approximate the real-word position, and a sequence of bits is used to represent each sample.
Consider the following numeric values.
Binary 1011
Binary 1101
Decimal 5
Decimal 12
Which of the following lists the values in order from least to greatest?
Responses
A
Decimal 5, binary 1011, decimal 12, binary 1101
B
Decimal 5, decimal 12, binary 1011, binary 1101
C
Decimal 5, binary 1011, binary 1101, decimal 12
D
Binary 1011, binary 1101, decimal 5, decimal 12
A
Decimal 5, binary 1011, decimal 12, binary 1101
Which of the following is an advantage of a lossless compression algorithm over a lossy compression algorithm?
Responses
A
A lossless compression algorithm can guarantee that compressed information is kept secure, while a lossy compression algorithm cannot.
B
A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot.
C
A lossless compression algorithm typically allows for faster transmission speeds than does a lossy compression algorithm.
D
A lossless compression algorithm typically provides a greater reduction in the number of bits stored or transmitted than does a lossy compression algorithm.
B
A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot.
A user wants to save a data file on an online storage site. The user wants to reduce the size of the file, if possible, and wants to be able to completely restore the file to its original version. Which of the following actions best supports the user’s needs?
Responses
A
Compressing the file using a lossless compression algorithm before uploading it
B
Compressing the file using a lossy compression algorithm before uploading it
C
Compressing the file using both lossy and lossless compression algorithms before uploading it
D
Uploading the original file without using any compression algorithm
A
Compressing the file using a lossless compression algorithm before uploading it
A programmer is developing software for a social media platform. The programmer is planning to use compression when users send attachments to other users. Which of the following is a true statement about the use of compression?
Responses
A
Lossless compression of video files will generally save more space than lossy compression of video files.
B
Lossless compression of an image file will generally result in a file that is equal in size to the original file.
C
Lossy compression of an image file generally provides a greater reduction in transmission time than lossless compression does.
D
Sound clips compressed with lossy compression for storage on the platform can be restored to their original quality when they are played.
C
Lossy compression of an image file generally provides a greater reduction in transmission time than lossless compression does.
A researcher is analyzing data about students in a school district to determine whether there is a relationship between grade point average and number of absences. The researcher plans on compiling data from several sources to create a record for each student.
The researcher has access to a database with the following information about each student.
Last name
First name
Grade level (9, 10, 11, or 12)
Grade point average (on a 0.0 to 4.0 scale)
The researcher also has access to another database with the following information about each student.
First name
Last name
Number of absences from school
Number of late arrivals to school
Upon compiling the data, the researcher identifies a problem due to the fact that neither data source uses a unique ID number for each student. Which of the following best describes the problem caused by the lack of unique ID numbers?
Responses
A
Students who have the same name may be confused with each other.
B
Students who have the same grade point average may be confused with each other.
C
Students who have the same grade level may be confused with each other.
D
Students who have the same number of absences may be confused with each other.
A
Students who have the same name may be confused with each other.
A team of researchers wants to create a program to analyze the amount of pollution reported in roughly 3,000 counties across the United States. The program is intended to combine county data sets and then process the data. Which of the following is most likely to be a challenge in creating the program?
Responses
A
A computer program cannot combine data from different files.
B
Different counties may organize data in different ways.
C
The number of counties is too large for the program to process.
D
The total number of rows of data is too large for the program to process.
B
Different counties may organize data in different ways.
A student is creating a Web site that is intended to display information about a city based on a city name that a user enters in a text field. Which of the following are likely to be challenges associated with processing city names that users might provide as input?
Select two answers.
response - correct
Responses
A
Users might attempt to use the Web site to search for multiple cities.
B
Users might enter abbreviations for the names of cities.
C
Users might misspell the name of the city.
D
Users might be slow at typing a city name in the text field.
B
Users might enter abbreviations for the names of cities.
C
Users might misspell the name of the city.
A database of information about shows at a concert venue contains the following information.
Name of artist performing at the show
Date of show
Total dollar amount of all tickets sold
Which of the following additional pieces of information would be most useful in determining the artist with the greatest attendance during a particular month?
Responses
A
Average ticket price
B
Length of the show in minutes
C
Start time of the show
D
Total dollar amount of food and drinks sold during the show
A
Average ticket price
A camera mounted on the dashboard of a car captures an image of the view from the driver’s seat every second. Each image is stored as data. Along with each image, the camera also captures and stores the car’s speed, the date and time, and the car’s GPS location as metadata. Which of the following can best be determined using only the data and none of the metadata?
Responses
A
The average number of hours per day that the car is in use
B
The car’s average speed on a particular day
C
The distance the car traveled on a particular day
D
The number of bicycles the car passed on a particular day
D
The number of bicycles the car passed on a particular day
A teacher sends students an anonymous survey in order to learn more about the students’ work habits. The survey contains the following questions.
On average, how long does homework take you each night (in minutes) ?
On average, how long do you study for each test (in minutes) ?
Do you enjoy the subject material of this class (yes or no) ?
Which of the following questions about the students who responded to the survey can the teacher answer by analyzing the survey results?
Do students who enjoy the subject material tend to spend more time on homework each night than the other students do?
Do students who spend more time on homework each night tend to spend less time studying for tests than the other students do?
Do students who spend more time studying for tests tend to earn higher grades in the class than the other students do?
Responses
A
I only
B
III only
C
I and II
D
I and III
C
I and II
A large spreadsheet contains the following information about the books at a bookstore. A sample portion of the spreadsheet is shown below.
| A Book Title | B Author | C Genre | D Number of Copies in Stock | E Cost (in dollars) |
1 | Little Women | Louisa May Alcott | Fiction | 3 | 13.95 |
2 | The Secret Adversary | Agatha Christie | Mystery | 2 | 12.95 |
3 | A Study in Scarlet | Arthur Conan Doyle | Mystery | 0 | 8.99 |
4 | The Hound of the Baskervilles | Arthur Conan Doyle | Mystery | 1 | 8.95 |
5 | Les Misérables | Victor Hugo | Fiction | 1 | 12.99 |
6 | Frankenstein | Mary Shelley | Horror | 2 | 11.95 |
An employee wants to count the number of books that meet all of the following criteria.
Is a mystery book
Costs less than $10.00
Has at least one copy in stock
For a given row in the spreadsheet, suppose genre contains the genre as a string, num contains the number of copies in stock as a number, and cost contains the cost as a number. Which of the following expressions will evaluate to true if the book should be counted and evaluates to false otherwise?
Responses
A
(genre = "mystery") AND ((1 ≤ num) AND (cost < 10.00))
B
(genre = "mystery") AND ((1 < num) AND (cost < 10.00))
C
(genre = "mystery") OR ((1 ≤ num) OR (cost < 10.00))
D
(genre = "mystery") OR ((1 < num) OR (cost < 10.00))
A
(genre = "mystery") AND ((1 ≤ num) AND (cost < 10.00))
The owner of a clothing store records the following information for each transaction made at the store during a 7-day period.
The date of the transaction
The method of payment used in the transaction
The number of items purchased in the transaction
The total amount of the transaction, in dollars
Customers can pay for purchases using cash, check, a debit card, or a credit card.
Using only the data collected during the 7-day period, which of the following statements is true?
Responses
A
The average amount spent per day during the 7-day period can be determined by sorting the data by the total transaction amount, then adding the 7 greatest amounts, and then dividing the sum by 7.
B
The method of payment that was used in the greatest number of transactions during the 7-day period can be determined by sorting the data by the method of payment, then adding the number of items purchased for each type of payment method, and then finding the maximum sum.
C
The most expensive item purchased on a given date can be determined by searching the data for all items purchased on the given date and then sorting the matching items by item price.
D
The total number of items purchased on a given date can be determined by searching the data for all transactions that occurred on the given date and then adding the number of items purchased for each matching transaction.
D
The total number of items purchased on a given date can be determined by searching the data for all transactions that occurred on the given date and then adding the number of items purchased for each matching transaction.
A company uses the following data files.
File Name | Description | Contents |
---|---|---|
Customers | A list of customers | Customer IDCustomer addressCustomer e-mail addressCustomer phone number |
Products | A list of products available for purchase from the company | Product IDProduct nameType of battery used by the product, if any |
Purchases | A list of customer purchases | Product IDProduct serial numberCustomer ID |
A new rechargeable battery pack is available for products that use AA batteries. Which of the following best explains how the data files in the table can be used to send a targeted e-mail to only those customers who have purchased products that use AA batteries to let them know about the new accessory?
Responses
A
Use the customer IDs in the purchases file to search the customers file to generate a list of e-mail addresses
B
Use the product IDs in the purchases file to search the products file to generate a list of product names that use AA batteries
C
Use the customers file to generate a list of customer IDs, then use the list of customer IDs to search the products file to generate a list of product names that use AA batteries
D
Use the products file to generate a list of product IDs that use AA batteries, then use the list of product IDs to search the purchases file to generate a list of customer IDs, then use the list of customer IDs to search the customers file to generate a list of e-mail addresses
D
Use the products file to generate a list of product IDs that use AA batteries, then use the list of product IDs to search the purchases file to generate a list of customer IDs, then use the list of customer IDs to search the customers file to generate a list of e-mail addresses
A large spreadsheet contains information about the photographs in a museum’s collection. A sample portion of the spreadsheet is shown below.
| A Photographer | B Subject | C Year | D Publicly Available |
1 | Steven Greene | Geyser Eruption | 2004 | true |
2 | Linda James | Giant Sloth Fossil | -1 | true |
3 | Yajaira Lopez | Diplodocus Skull | 1997 | false |
4 | Masahiro Higashi | Sea Turtle | 1989 | true |
5 | (unknown) | Solar Eclipse | 2011 | false |
6 | (unknown) | Giant Sequoia | -1 | true |
In column A, each unknown photographer is set to "(unknown)".
In column C, each unknown year is set to -1.
A student is developing an algorithm to determine the name of the photographer who took the oldest photograph in the collection. Photographs whose photographer or year are unknown are to be ignored.
Once the algorithm is complete, the desired entry will appear in the first row of the spreadsheet. If there are multiple entries that meet the desired criteria, then any of them can appear in the first row.
The student has the following actions available.
Action | Explanation |
Filter by photographer | Removes entries whose photographer is "(unknown)" |
Filter by year | Removes entries whose year is -1 |
Sort by subject | Sorts the rows in the spreadsheet on column B alphabetically from A to Z |
Sort by year | Sorts the rows in the spreadsheet on column C from least to greatest |
Assume that applying either of the filters will not change the relative order of the rows remaining in the spreadsheet.
Which of the following sequences of steps can be used to identify the desired entry?
Select two answers.
response - incorrect
Responses
A
Filter by photographer, then filter by year, then sort by subject
B
Filter by photographer, then filter by year, then sort by year
C
Sort by subject, then sort by year, then filter by photographer
D
Sort by year, then filter by year, then filter by photographer
B
Filter by photographer, then filter by year, then sort by year
D
Sort by year, then filter by year, then filter by photographer
A large spreadsheet contains information about the schedule for a college radio station. A sample portion of the spreadsheet is shown below.
AShow Name | BGenre | CDay | DStart Time | EEnd Time | |
1 | Dot Dot Dash | rock | Sunday | 11:00 A.M. | 1:00 P.M. |
2 | New Afternoon Show | talk | Sunday | 1:00 P.M. | 3:00 P.M. |
3 | Thursday Beats | hip-hop | Thursday | 7:00 P.M. | 9:00 P.M. |
4 | Gossip Time | talk | Friday | 4:00 P.M. | 6:00 P.M. |
5 | Campus Chat | talk | Saturday | 6:00 P.M. | 8:00 P.M. |
6 | Jazz Brunch | jazz | Saturday | 12:00 P.M. | 3:00 P.M. |
A student wants to count the number of shows that meet both of the following criteria.
Is a talk show
Is on Saturday or Sunday
For a given row in the spreadsheet, suppose genre contains the genre as a string and day contains the day as a string. Which of the following expressions will evaluate to true if the show should be counted and evaluates to false otherwise?
Responses
A
(genre = "talk") AND ((day = "Saturday") AND (day = "Sunday"))
B
(genre = "talk") AND ((day = "Saturday") OR (day = "Sunday"))
C
(genre = "talk") OR ((day = "Saturday") AND (day = "Sunday"))
D
(genre = "talk") OR ((day = "Saturday") OR (day = "Sunday"))
B
(genre = "talk") AND ((day = "Saturday") OR (day = "Sunday"))
A wildlife preserve is developing an interactive exhibit for its guests. The exhibit is intended to allow guests to select the name of an animal on a touch screen and display various facts about the selected animal.
For example, if a guest selects the animal name “wolf,” the exhibit is intended to display the following information.
Classification: mammal
Skin type: fur
Thermoregulation: warm-blooded
Lifestyle: pack
Average life span: 10–12 years
Top speed: 75 kilometers/hour
The preserve has two databases of information available to use for the exhibit. The first database contains information for each animal’s name, classification, skin type, and thermoregulation. The second database contains information for each animal’s name, lifestyle, average life span, and top speed.
Which of the following explains how the two databases can be used to develop the interactive exhibit?
Responses
A
Only the first database is needed. It can be searched by animal name to find all the information to be displayed.
B
Only the second database is needed. It can be searched by animal name to find all the information to be displayed.
C
Both databases are needed. Each database can be searched by animal name to find all information to be displayed.
D
The two databases are not sufficient to display all the necessary information because the intended display information does not include the animal name.
C
Both databases are needed. Each database can be searched by animal name to find all information to be displayed.
Which of the following best explains how messages are typically transmitted over the Internet?
Responses
A
The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient’s device.
B
The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device.
C
The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient’s device.
D
The message is transmitted as a single file and received in whole by the recipient’s device.
B
The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device.
Which of the following is a primary reason for the use of open protocols on the Internet?
Responses
A
Open protocols allow devices to specify how data packets are to be routed on the Internet in advance.
B
Open protocols ensure that all data transmission on the Internet is kept secure.
C
Open protocols ensure that all Internet users are provided connections with equal bandwidth.
D
Open protocols provide a way to standardize data transmission between different devices.
D
Open protocols provide a way to standardize data transmission between different devices.
Which of the following best describes the relationship between the World Wide Web and the Internet?
Responses
A
The World Wide Web is a protocol that is accessed using a data stream called the Internet.
B
The World Wide Web is a system of linked pages, programs, and files that is accessed using a data stream called the Internet.
C
The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.
D
The World Wide Web is a Web site that is accessed using a protocol called the Internet.
C
The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.
The following figure represents a network of physically linked devices labeled P through S. A line between two devices indicates a connection. Devices can communicate only through the connections shown.
Which of the following statements best explains the ability of the network to provide fault tolerance?
Responses
A
The network is considered fault-tolerant because there are redundant paths between each pair of devices.
B
The network is considered fault-tolerant because it guarantees that no individual component will fail.
C
The network is not considered fault-tolerant because it relies on physical connections.
D
The network is not considered fault-tolerant because it provides more paths than are needed.
A
The network is considered fault-tolerant because there are redundant paths between each pair of devices.
Which of the following best explains how fault tolerance in a network is achieved?
Responses
A
By providing high-bandwidth connections between devices, enabling data packets to be transmitted as quickly as possible
B
By providing multiple paths between devices, enabling routing to occur even in the presence of a failed component
C
By providing open network protocols, ensuring that all devices on the network are interacting in a standard way
D
By providing software to monitor all network traffic, ensuring that data packets are sent and received in the proper order
B
By providing multiple paths between devices, enabling routing to occur even in the presence of a failed component
Which of the following best explains how the Internet is a fault-tolerant system?
Responses
A
The Internet is fault-tolerant because cybercriminals can conceal their actions, allowing them the ability to carry out faulty actions without leaving a trace.
B
The Internet is fault-tolerant because there are usually multiple paths between devices, allowing messages to sometimes be sent even when parts of the network fail.
C
The Internet is fault-tolerant because users can transmit messages using a variety of different protocols, allowing them to use devices from any manufacturer.
D
The Internet is fault-tolerant because users usually understand and accept the fact that servers sometimes fail, allowing network engineers to repair faulty devices as quickly as possible.
B
The Internet is fault-tolerant because there are usually multiple paths between devices, allowing messages to sometimes be sent even when parts of the network fail.
Which of the following is a primary benefit of making a computing system fault-tolerant?
Responses
A
If one component of the system fails, users of the system can often still access it.
B
If one component of the system is hacked, no information will be stolen.
C
If the system becomes too expensive, making it fault-tolerant will save money.
D
If the system cannot operate efficiently, making it fault-tolerant will speed up its operation.
A
If one component of the system fails, users of the system can often still access it.
The figure below represents a network of physically linked devices, labeled A through F. A line between two devices indicates a connection. Devices can communicate only through the connections shown.
Which of the following statements are true about the ability for devices A and C to communicate?
Select two answers.
response - correct
Responses
A
If devices B and D were to fail, then information sent from device A could not reach device C.
B
If devices B and F were to fail, then information sent from device A could not reach device C.
C
If devices D and F were to fail, then information sent from device A could not reach device C.
D
If devices E and F were to fail, then information sent from device A could not reach device C.
A
If devices B and D were to fail, then information sent from device A could not reach device C.
C
If devices D and F were to fail, then information sent from device A could not reach device C.
The figure below represents a network of physically linked devices, labeled A through H. A line between two devices indicates a connection. Devices can communicate only through the connections shown.
What is the minimum number of connections that would need to be removed from the network in order for device A to not be able to communicate with device F?
Responses
A
2
B
3
C
4
D
5
A
2
Which of the following best describes the ability of parallel computing solutions to improve efficiency?
Responses
A
Any problem that can be solved sequentially can be solved using a parallel solution in approximately half the time.
B
Any solution can be broken down into smaller and smaller parallel portions, making the improvement in efficiency theoretically limitless as long as there are enough processors available.
C
The efficiency of parallel computing solutions is rarely improved over the efficiency of sequential computing solutions.
D
The efficiency of a solution that can be broken down into parallel portions is still limited by a sequential portion.
D
The efficiency of a solution that can be broken down into parallel portions is still limited by a sequential portion.
A computer has two processors that are able to run in parallel. The table below indicates the amount of time it takes either processor to execute four different processes. Assume that none of the processes is dependent on any of the other processes.
Process | Execution Time |
W | 20 seconds |
X | 30 seconds |
Y | 45 seconds |
Z | 50 seconds |
A program is used to assign processes to each of the processors. Which of the following describes how the program should assign the four processes to optimize execution time?
Responses
A
Processes W and X should be assigned to one processor, and processes Y and Z should be assigned to the other processor.
B
Processes W and Y should be assigned to one processor, and processes X and Z should be assigned to the other processor.
C
Processes W and Z should be assigned to one processor, and processes X and Y should be assigned to the other processor.
D
Process Z should be assigned to one processor, and processes W, X, and Y should be assigned to the other processor.
C
Processes W and Z should be assigned to one processor, and processes X and Y should be assigned to the other processor.
A certain computer has two identical processors that are able to run in parallel. The table below indicates the amount of time it takes each processor to execute each of two processes. Assume that neither process is dependent on the other.
Process | Execution Time on Either Processor |
P | 30 seconds |
Q | 45 seconds |
Which of the following best approximates the difference in execution time between running the two processes in parallel instead of running them one after the other on a single processor?
Responses
A
15 seconds
B
30 seconds
C
45 seconds
D
75 seconds
B
30 seconds
MeeReader is an e-reading application that allows users to download and read books and articles on a device. Each user creates a profile with the following personal preferences.
Screen brightness and contrast
Choice of typeface and font size
Amount of spacing between lines of text
Activation of a text-to-speech feature that reads the text out loud
When the user launches the application, the application scans the user’s face and uses facial recognition software to determine the user’s identity. Once the user has been identified, the user’s personal preferences are applied to whatever book or article the user chooses to read.
The application stores all user information in a database, including personal preferences and a record of previously read books and articles.
Which of the following is most likely to be a beneficial effect of using MeeReader?
Responses
A
Users may have a reduced risk of the application being used in unintended ways.
B
Users may have a reduced risk of their biometric data being misused.
C
Users with limited Internet access may be able to more easily obtain books and articles.
D
Users with visual impairments may be able to more easily read or listen to books and articles.
D
Users with visual impairments may be able to more easily read or listen to books and articles.
MeeReader is an e-reading application that allows users to download and read books and articles on a device. Each user creates a profile with the following personal preferences.
Screen brightness and contrast
Choice of typeface and font size
Amount of spacing between lines of text
Activation of a text-to-speech feature that reads the text out loud
When the user launches the application, the application scans the user’s face and uses facial recognition software to determine the user’s identity. Once the user has been identified, the user’s personal preferences are applied to whatever book or article the user chooses to read.
The application stores all user information in a database, including personal preferences and a record of previously read books and articles.
From the perspective of the application’s developers, which of the following is most likely to be a benefit of storing all user data in a database?
Responses
A
The developers can analyze the data to make improvements to the application based on user behavior.
B
The developers can analyze the data to ensure that no patterns emerge in the data.
C
The developers can reduce the amount of data storage required to support the application.
D
The developers can reduce the need for data encryption.
A
The developers can analyze the data to make improvements to the application based on user behavior.
A software development company has created an application called FileCleanUp. When the application is run on a user device, it searches for all files (including pictures, videos, and documents) that have not been accessed in the past month, stores them on the company’s Web server, and deletes them from the user device. The application runs once each day. Users have the ability to manually retrieve files from the server if they are needed.
Which of the following is most likely to be a harmful effect of using FileCleanUp?
Responses
A
It prevents users from accessing frequently used files when there is no Internet connectivity.
B
It prevents users from accessing infrequently used files when there is no Internet connectivity.
C
It prevents users from accessing frequently used files when there is reliable Internet connectivity.
D
It prevents users from accessing infrequently used files when there is reliable Internet connectivity.
B
It prevents users from accessing infrequently used files when there is no Internet connectivity.
Which of the following actions is most likely to help reduce the digital divide?
Responses
A
Adding a requirement that all users of a popular social media site link their accounts with a phone number.
B
Deploying satellites and other infrastructure to provide inexpensive Internet access to remote areas of Earth
C
Digitizing millions of books from university libraries, making their full text available online
D
Offering improved Internet connections to Internet users who are willing to pay a premium fee for more bandwidth
B
Deploying satellites and other infrastructure to provide inexpensive Internet access to remote areas of Earth
Which of the following is LEAST likely to be a contributing factor to the digital divide?
Responses
A
Some individuals and groups are economically disadvantaged and cannot afford computing devices or Internet connectivity.
B
Some individuals and groups do not have the necessary experience or education to use computing devices or the Internet effectively.
C
Some parents prefer to limit the amount of time their children spend using computing devices or the Internet.
D
Some residents in remote regions of the world do not have access to the infrastructure necessary to support reliable Internet connectivity.
C
Some parents prefer to limit the amount of time their children spend using computing devices or the Internet.
Which of the following actions is most likely to be effective in reducing the digital divide at a local level?
Responses
A
Creating an application that offers coupons and discounts for local businesses
B
Offering a discount to utility customers who pay their bills online instead of by mail
C
Providing free community access to computers at schools, libraries, and community centers
D
Requiring applicants for local government jobs to complete an online application
C
Providing free community access to computers at schools, libraries, and community centers
The developers of a music-streaming application are updating the algorithm they use to recommend music to listeners. Which of the following strategies is LEAST likely to introduce bias into the application?
Responses
A
Making recommendations based on listening data gathered from a random sample of users of the application
B
Making recommendations based on the most frequently played songs on a local radio station
C
Making recommendations based on the music tastes of the developers of the application
D
Making recommendations based on a survey that is sent out to the 1,000 most active users of the application
A
Making recommendations based on listening data gathered from a random sample of users of the application
A mobile game tracks players’ locations using GPS. The game offers special in-game items to players when they visit real-world points of interest. Which of the following best explains how bias could occur in the game?
Responses
A
Points of interest may be more densely located in cities, favoring players in urban areas over players in rural areas.
B
Some players may engage in trespassing, favoring players in urban areas over players in rural areas.
C
Special items may not be useful to all players, favoring players in urban areas over players in rural areas.
D
Weather conditions may be unpredictable, favoring players in urban areas over players in rural areas.
A
Points of interest may be more densely located in cities, favoring players in urban areas over players in rural areas.
A software company is designing a mobile game system that should be able to recognize the faces of people who are playing the game and automatically load their profiles. Which of the following actions is most likely to reduce the possibility of bias in the system?
Responses
A
Testing the system with members of the software company’s staff
B
Testing the system with people of different ages, genders, and ethnicities
C
Testing the system to make sure that the rules of the game are clearly explained
D
Testing the system to make sure that players cannot create multiple profiles
B
Testing the system with people of different ages, genders, and ethnicities
Which of the following activities is most likely to be successful as a citizen science project?
Responses
A
Collecting pictures of plants from around the world that can be analyzed to look for regional differences in plant growth.
B
Designing and building a robot to help with tasks in a medical laboratory.
C
Sorting scientific records and removing duplicate entries in a database with a large number of entries.
D
Using a simulation to predict the impact of a construction project on local animal populations.
A
Collecting pictures of plants from around the world that can be analyzed to look for regional differences in plant growth.
Which of the following applications is most likely to benefit from the use of crowdsourcing?
Responses
A
An application that allows users to convert measurement units (e.g., inches to centimeters, ounces to liters)
B
An application that allows users to purchase tickets for a local museum
C
An application that allows users to compress the pictures on their devices to optimize storage space
D
An application that allows users to view descriptions and photographs of local landmarks
D
An application that allows users to view descriptions and photographs of local landmarks
A mobile application is used to display local traffic conditions. Which of the following features of the application best exemplifies the use of crowdsourcing?
Responses
A
Users can save an address to be used at a later time.
B
Users can turn on alerts to be notified about traffic accidents.
C
Users can submit updates on local traffic conditions in real time.
D
Users can use the application to avoid heavily congested areas.
C
Users can submit updates on local traffic conditions in real time.
Which of the following actions is most likely to raise legal or ethical concerns?
Responses
A
An analyst writes a program that scans through a database of open-access scientific journals and creates a document with links to articles written on a particular topic.
B
A computer scientist adds several features to an open-source software program that was designed by another individual.
C
A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song.
D
A public interest group alerts people to a scam that involves charging them for a program that is available for free under a Creative Commons license.
C
A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song.
A researcher wants to publish the results of a study in an open access journal. Which of the following is a direct benefit of publishing the results in this type of publication?
Responses
A
The researcher can allow the results to be easily obtained by other researchers and members of the general public.
B
The researcher can better anticipate the effect of the results and ensure that they are used responsibly.
C
The researcher can ensure that any personal information contained in the journal is kept private and secure.
D
The researcher can prevent copies of the research from being accessed by academic rivals
A
The researcher can allow the results to be easily obtained by other researchers and members of the general public.
A programmer created a piece of software and wants to publish it using a Creative Commons license. Which of the following is a direct benefit of publishing the software with this type of license?
Responses
A
The programmer can ensure that the algorithms used in the software are free from bias.
B
The programmer can ensure that the source code for the software is backed up for archival purposes.
C
The programmer can include code that was written by other people in the software without needing to obtain permission.
D
The programmer can specify the ways that other people are legally allowed to use and distribute the software.
D
The programmer can specify the ways that other people are legally allowed to use and distribute the software.
StreamPal is an audio-streaming application for mobile devices that allows users to listen to streaming music and connect with other users who have similar taste in music. After downloading the application, each user creates a username, personal profile, and contact list of friends who also use the application.
The application uses the device’s GPS unit to track a user’s location. Each time a user listens to a song, the user can give it a rating from 0 to 5 stars. The user can access the following features for each song that the user has rated.
A list of users on the contact list who have given the song the same rating, with links to those users’ profiles
A map showing all other users in the area who have given the song the same rating, with links to those users’ profiles
A basic StreamPal account is free, but it displays advertisements that are based on data collected by the application. For example, if a user listens to a particular artist, the application may display an advertisement for concert tickets the next time the artist comes to the user’s city. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application.
Which of the following is most likely to be a data privacy concern for StreamPal users?
Responses
A
Users of the application are required to rate songs in order to enable all of the application’s features.
B
Users of the application may have the ability to determine information about the locations of users that are not on their contact list.
C
Users of the application may not be able to use the application if they are located in an area with a poor Internet connection.
D
Users of the application may not have similar music taste to any other users on their contact list.
B
Users of the application may have the ability to determine information about the locations of users that are not on their contact list.
StreamPal is an audio-streaming application for mobile devices that allows users to listen to streaming music and connect with other users who have similar taste in music. After downloading the application, each user creates a username, personal profile, and contact list of friends who also use the application.
The application uses the device’s GPS unit to track a user’s location. Each time a user listens to a song, the user can give it a rating from 0 to 5 stars. The user can access the following features for each song that the user has rated.
A list of users on the contact list who have given the song the same rating, with links to those users’ profiles
A map showing all other users in the area who have given the song the same rating, with links to those users’ profiles
A basic StreamPal account is free, but it displays advertisements that are based on data collected by the application. For example, if a user listens to a particular artist, the application may display an advertisement for concert tickets the next time the artist comes to the user’s city. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application.
Which of the following statements is most likely true about the differences between the basic version and the premium version of StreamPal?
Responses
A
Users of the basic version of StreamPal are more likely to give songs higher ratings than are users of the premium version of StreamPal.
B
Users of the basic version of StreamPal indirectly support StreamPal by allowing themselves to receive advertisements.
C
Users of the basic version of StreamPal spend more on monthly fees than do users of the premium version of StreamPal.
D
Users of the basic version of StreamPal use less data storage space on their devices than do users of the premium version of StreamPal.
B
Users of the basic version of StreamPal indirectly support StreamPal by allowing themselves to receive advertisements.
A user unintentionally installs keylogging software on a computer. Which of the following is an example of how the keylogging software can be used by an unauthorized individual to gain access to computing resources?
Responses
A
The software gives an unauthorized individual remote access to the computer, allowing the individual to search the computer for personal information.
B
The software installs a virus on the computer and prompts the user to make a payment to the unauthorized individual to remove the virus.
C
The software prompts the user to enter personal information to verify the user’s identity. This personal information is recorded and transmitted to an unauthorized individual.
D
The software records all user input on the computer. The recorded information is transmitted to an unauthorized individual, who analyzes it to determine the user’s login passwords.
D
The software records all user input on the computer. The recorded information is transmitted to an unauthorized individual, who analyzes it to determine the user’s login passwords.
An individual receives an e-mail that appears to be from an insurance company. The message offers a low insurance rate, and prompts the recipient to click a link to learn more. Which of the following is most indicative that the e-mail is part of a phishing attempt?
Responses
A
After clicking the link, a browser cookie is downloaded to the recipient’s computer.
B
After clicking the link, a Web page opens that prompts the recipient for personal information.
C
After clicking the link, the recipient’s private network becomes publicly visible via a rogue access point.
D
After clicking the link, software is installed on the recipient’s computer that records every keystroke made on the computer.
B
After clicking the link, a Web page opens that prompts the recipient for personal information.
A city’s police department has installed cameras throughout city streets. The cameras capture and store license plate data from cars driven and parked throughout the city. The authorities use recorded license plate data to identify stolen cars and to enforce parking regulations.
Which of the following best describes a privacy risk that could occur if this method of data collection is misused?
Responses
A
The cameras may not be able to read license plates in poor weather conditions.
B
Local business owners could lose customers who are unwilling to park in the city.
C
Traffic personnel who work for the city could lose their jobs if their services are no longer needed.
D
The vehicle location data could be used to monitor the movements of city residents.
D
The vehicle location data could be used to monitor the movements of city residents.
Which of the following best exemplifies the use of multifactor authentication?
Responses
A
A computing device enables users to input information using multiple interfaces, including a keyboard, a mouse, and a touch pad.
B
A user employs a public key encryption method that uses one key to encrypt information and a different key to decrypt information.
C
A Web site requires a user to enter a password as well as a numeric code received via text message before the user can log in to an account.
D
Multiple users share an account to a Web-based software program, and each user has an individual username and password.
C
A Web site requires a user to enter a password as well as a numeric code received via text message before the user can log in to an account.