27 questions
Which of the following activities poses the greatest personal cybersecurity risk?
Making a purchase at an online store that uses public key encryption to transmit credit card information.
Paying a bill using a secure electronic payment system.
Reserving a hotel room by emailing credit card information to the hotel.
Withdrawing money from a bank using an automated teller machine.
Which of the following is true about cloud computing?
Could computing is convenient to implement but has a negative effect on the scalability of systems.
Cloud computing is useful for large businesses but not useful for individuals.
Storing data using cloud computing can help ensure that data are not lost if a user's computer stops functioning.
Storing data using cloud computing improves security over storing data on a personal computer.
Which of the following is least likely to indicate a phishing attack?
An email from your bank asks you to call the number on your card to verify a transaction.
An email from a merchant asks that you click on a link to reset your password.
An email from a utility company asks you to enter your date of birth and social security number for verification purposes.
An email that indicates you have won a large sum of money and asks you to enter your bank account number so that money can be transferred to you.
A certain computer game is played between a human player and a computer-controlled player. Every time the
computer-controlled player has a turn, the game runs slowly because the computer evaluates all potential moves
and selects the best one. Which of the following best describes the possibility of improving the running speed of
the game?
The game’s running speed can only be improved if the game is played between two human players instead of
with the computer-controlled player.
The game’s running speed might be improved by using a process that finds approximate solutions every time
the computer-controlled player has a turn.
The game’s running speed cannot be improved because computers can only be programmed to find the best
possible solution.
The game’s running speed cannot be improved because the game is an example of an algorithm that does not
run in a reasonable time.
A city government is attempting to reduce the digital divide between groups with differing access to computing and
the Internet. Which of the following activities is LEAST likely to be effective in this purpose?
Holding basic computer classes at community centers
Providing free wireless Internet connections at locations in low-income neighborhoods
Putting all government forms on the city Web site
Requiring that every city school has computers that meet a minimum hardware and software standard
An online store uses 6-bit binary sequences to identify each unique item for sale. The store plans to increase the
number of items it sells and is considering using 7-bit binary sequences. Which of the following best describes the
result of using 7-bit sequences instead of 6-bit sequences?
10 more items can be uniquely identified.
2 more items can be uniquely identified.
2 times as many items can be uniquely identified.
10 times as many items can be uniquely identified.
Both online newspapers and social media sites are used to distribute information on the Internet. Which of the
following best describes an advantage that online newspapers have over social media sites?
The ability to distribute information instantaneously
The ability to provide credibility to the information distributed
The ability to provide information that is widely accessible
The ability to provide media-rich content for low cost
When a cellular telephone user places a call, the carrier transmits the caller’s voice as well as the voice of the
person who is called. The encoded voices are the data of the call. In addition to transmitting the data, the carrier
also stores metadata. The metadata of the call include information such as the time the call is placed and the phone
numbers of both participants. For which of the following goals would it be more useful to computationally analyze
the metadata instead of the data?
I. To determine if a caller frequently uses a specific word
II. To estimate the number of phone calls that will be placed next Monday between 10:30 A.M. and noon.
III. To generate a list of criminal suspects when given the telephone number of a known criminal
I only
II only
I and III only
II and III only
I , II and III
Digital images are often represented by the red, green, and blue values (an RGB triplet) of each individual pixel in
the image. A photographer is manipulating a digital image and overwriting the original image. Which of the
following describes a lossless transformation of the digital image?
Compressing the image in a way that may lose information but will suffer only a small loss of image quality.
Creating the gray scale of an image by averaging the amounts of red, green, and blue in each pixel and
assigning this new value to the corresponding pixel in the new image. The new value of each pixel represents
a shade of gray, ranging from white to black.
Creating the negative of an image by creating a new RGB triplet for each pixel in which each value is calculated by subtracting the original value from 255. The negative of an image is reversed from the original; light areas appear dark, and colors are reversed.
Modifying part of the image by taking the pixels in one part of the picture and copying them to the pixels in
another part of the picture.
What is the best explanation for why digital data is represented in computers in binary?
The binary number system is the only system flexible enough to allow for representing data other than numbers.
It's easier, cheaper, and more reliable to build machines and devices that only have to distinguish between binary states.
It typically takes fewer digits to represent a number in binary when compared to other number systems (for example, the decimal number system)
It's impossible to build a computing machine that uses anything but binary to represent numbers
Which of the following statements are true about routers and routing on the Internet. Choose two answers.
Protocols ensure that a single path between two computers is established before sending packets over it.
Routers are hierarchical and the "root" router is responsible for communicating to sub-routers the best paths for them to route internet traffic.
A packet traveling between two computers on the Internet may be rerouted many times along the way or even lost or "dropped".
Routers act independently and route packets as they see fit.
The various protocols in use on the internet are said to operate in layers in which the protocol(s) at each layer solve one problem related to networked communication, and higher layers are built on top of, and rely on, the lower layers to do their jobs.
From the list provided choose the two (2) answers that correctly describe which internet protocol relies on the other. For example: if protocol A relies on protocol B, it means that A is a higher level protocol than B, and thus protocol B must exist and work properly in order for protocol A to do its job.
Select two answers.
TCP/IP relies on HTTP
HTTP relies on TCP/IP
DNS relies on TCP/IP
TCP/IP relies on DNS
A school starts tracking which websites each computer in the school is visiting by monitoring the packets leaving the school. A sample of the information they have collected appears in this chart.
Which of the following is MOST likely to be answerable using all the data collected by this monitoring?
Which students are visiting social media sites from school
Which classes are assigning the most homework using the computers
Which programs students are running on the lab computers
Which websites are most frequently visited before and after school hours from a school computer
Which of the following BEST describes how protocols on the Internet (e.g. IP, TCP, HTTP) make use of abstraction to accomplish their respective purposes?
High level protocols take into account specific implementation details of lower level protocols to ensure they are compatible.
Low level protocols can provide functionality to high level protocols without revealing the details of how this is accomplished.
Low level protocols are written in binary while high level protocols are written in hexadecimal.
High level protocols can take on the role of a low level protocol in the event of failure in the system.
According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?
About.example.com
Example.co.uk
Example.com.org
Example.org
Which of the following is NOT true about TCP/IP packets?
Packets are numbered so if they arrive out of order the message can be reassembled.
TCP guarantees that no packets are ever dropped
Packets can be routed on different paths from sender to receiver.
Messages are broken into packets to improve reliability of the internet
How does a computer resolve a domain name into an IP address?
It asks a DNS server for the corresponding IP address
It scans addresses until it finds the one it's looking for
It uses a Border Gateway Protocol to get the address from a nearby computer.
It creates an IP address for the domain, and shares it with the closest DNS.
The colors of the pixels in a digital image are often represented by red, green, and blue values between 0 and 255 (an RGB triplet). A photographer is manipulating a digital image to lighten it because all of the RGB values in the image are less than 100, making it very dark. He does this by adding 20 to the R, G, and B values of each pixel, then overwriting the original image. What type of transformation is the photographer using on the digital image?
Lossless transformation
Lossy transformation
Multiband transformation
Chrome Sampling transformation
Under which of the following conditions is it most beneficial to use a heuristic approach to solve a problem?
When the problem can be solved in a reasonable time and an approximate solution is acceptable
When the problem can be solved in a reasonable time and an exact solution is needed
When the problem cannot be solved in a reasonable time and an approximate solution is acceptable
When the problem cannot be solved in a reasonable time and an exact solution is needed
Which of the following is a true statement about data compression?
Data compression is only useful for files being transmitted over the Internet.
Regardless of the compression technique used, once a data file is compressed, it cannot be restored to its original state.
Sending a compressed version of a file ensures that the contents of the file cannot be intercepted by an unauthorized user.
There are trade-offs involved in choosing a compression technique for storing and transmitting data.
A video-streaming Web site uses 32-bit integers to count the number of times each video has been played. In anticipation of some videos being played more times than can be represented with 32 bits, the Web site is planning to change to 64-bit integers for the counter. Which of the following best describes the result of using 64-bit integers instead of 32-bit integers?
2 times as many values can be represented.
32 times as many values can be represented.
2^32 times as many values can be represented.
32^2 times as many values can be represented.
A raw digital sound file samples a sound wave at some interval and measures the height of the wave at each point. Thus, raw sound is recorded as a list of numbers.
In very broad terms the MP3 audio compression algorithm identifies frequencies and volume levels - low and high - that are outside the range of human hearing and removes the data representing these frequencies from the original. This technique results in a smaller audio file that sounds exactly the same to the human ear.
This technique is an example of what type of compression?
Lossy compression
Lossless compression
Fast Fourier Transform compression
Tailored compression
The image below shows an encoding for a black and white pixel image. The first two bytes of the data (circled in red) are used to encode the width and height of the image.
What is the best term for this type of "data about the data"?
Megadata
Superdata
Metadata
Predata