No student devices needed. Know more
62 questions
An IPv4 address has 32 bits, so there are 232 (over 4 billion) possible IPv4 addresses. Since the Internet is gaining devices quickly, we will soon surpass 232 unique devices on the Internet.
In anticipation of all the new Internet devices, we are in the process of switching to IPv6, which uses 128 bits for a single address. That’s 96 extra bits to represent one address.
Which of the following statements correctly describes how many more addresses will be possible to represent by switching from IPv4 to IPv6?
96 more addresses can be represented with IPv6
296 more addresses can be represented with IPv6
96 times as many addresses can be represented with IPv6
296 times as many addresses can be represented with IPv6.
Which of the following would pose the greatest threat to a user’s personal privacy if it were to be leaked to the public?
The IP address of the user’s computer
The user’s browser cookies
The user’s email address
The user’s public key used for encryption
Which of the following is a benefit of the fault-tolerant nature of Internet routing?
The ability to use a hierarchical naming system to avoid naming conflicts
The ability to provide data transmission even when some connections between routers have failed.
The ability to resolve errors in domain name system (DNS) lookups
The ability to use multiple protocols such as hypertext transfer protocol (HTTP), Internet protocol (IP), and simple mail transfer protocol (STTP) to transfer data.
The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works. The members of the IETF are:
An international coalition of government agencies who oversees the Internet in their countries.
The worldwide leaders of the Tier 1 Internet service providers.
A loosely organized collection of citizens and engineers who communicate mostly by email.
political leaders and heads of state.
There are no members, IETF is an “organization” in name only.
What is RFC?
Restricted Fiduciary Contract
Request for Comments
Radio frequency controller
Related Fundamental Content
ReFactored Code
Which of the following is true about Domain Name System (DNS) servers?
There is only one DNS server; if it goes down, Internet traffic stops.
IP addresses are linked to domain names by DNS
They use only IPv4 format.
Cryptography attacks sometimes takes advantage of DNS to flood the target site.
What is the World Wide Web?
A collection of wires and cables to connect devices
Another name for the Internet
A way to search for and share documents and resources
A browsers
Which of the following is false about HTTPS?
HTTPS uses Certificate Authorities (CAs) to verify a site’s identity
HTTPS encrypts data before it is separated into packets
HTTPS ensures the secure sharing of data
HTTPS trades faster performance for more security
What is the name for a setup where processions is done at the sending and receiving locations?
LAN
Point-to-point environment
End-to-end architecture
Redundant organization
If the post office delivered mail exactly like routers deliver messages on the internet, which 2 of the following statements would be true?
One mail carrier would be responsible for delivering a letter from sender to receiver.
The mail carrier would sometimes take a different path to deliver each letter to your home.
Letters would be written on the outside of envelopes for all to read instead of letters put inside envelopes.
your mail could not be delivered if a road your mail carrier was planning to take were under construction
Historically it has been observed that computer processing speeds tend to double every two years. This is known as:
Boolean's Conjecture
Moore's Law
The "Big Data Effect"
Power of 2 Principle
When a computer scientist uses the term "Big Data" what do they typically mean?
That a data set is larger than 5TB which is the common "Big Data" threshold.
That there is so much data it's virtually impossible to process
There is enough data that traditional data processing applications are inadequate.
It implies that the findings from the data are potentially hugely important for society.
Above is an image from Google Trends that plots Cats and Dogs.
Choose the most accurate description of what this data is actually showing based on what you know about how Google Trends works.
People like dogs more than cats
People search for "dogs" more frequently than "cats"
There was a sharp increase in the dog population sometime between 2014 and 2015
The popularity of dogs as pets is slightly increasing over time, while the popularity of cats is relatively flat
The chart above from Google Trends shows the prevalence if some search terms in the United States between 2004 and the present. Which of the following is the most accurate statement of what this chart is showing.
Since sometime around 2009, red has become the favorite color of more people.
Generally speaking, since 2009 more people use "red" in their search terms more than they use "blue","yellow","green", or "purple"
The general decline in the search term "yellow" might be due to the decline of searches for yellow taxis, as car sharing services have become more popular
Generally speaking, the volume of internet searches is increasing over time because the number of people using the internet is also increasing.
The AP CS Principles framework contains the following statement:
7.1.1G Search trends are predictors.
Which of the following is the most accurate statement about using search trends as predictors of future events?
Search trends are imperfect predictors of future events that fully represent society at large.
Search trends are accurate and reliable predictors of future events that fully represent society at large.
Search trends are imperfect predictors of future events that may not fully represent society at large
Search trends are accurate and reliable predictors of future events that may not fully represent society at large.
Which of the following is the most accurate description if what is known as the "digital divide".
The digital divide is about how...
...people's access to computing and digital technology increases over time through a process of dividing and growing quickly - it is often likened to the biological processes of cell growth
...people's access to computing and the Internet differs based on socioeconomic or geographic characteristics.
...people's access to computing technology is affected by the fact that newer devices that use new protocols makes it more difficult for them to communicate with older devices and technology
...the amount of data on the Internet is growing so fast that the amount computing power and time we have to process it is lagging behind.
On a survey of high school seniors they are asked:
A student, Amara, plans to use the survey data to create a visualization and short summary of students' plans for college. First she wants to learn about the survey, which are the most likely sources of bias in the results based how it was collected?
Choose two answers.
She learns that the survey administrators only asked a representative sample of students, rather than every student in each states
She learns that responses were collected only by mobile app.
She learns that the survey was only available to students who scored at the top 10% on the PSAT.
She learns the survey was available to complete in both digital and paper form.
Which of the following statements is the LEAST TRUE about personal data that technology companies potentially collect about their users?
Companies frequently offer services free of charge in exchange for access to data about their users
Personal data about users may be saved by a company permanently, never to be deleted.
Companies can sell the personal information of users to advertisers or other businesses
Companies are required by law to give users options to personalize what data they collect about them
What is the "key" to Caesar Cipher that someone needs to know (or discover) to decrypt the message?
A secret word only know by Caesar.
The number of characters to shift each letter in the alphabet.
The letter that occurs most often in the encrypted message.
the day of the month that the encrypted message was sent.
The Caesar Cipher has 25 different shifts to try. How many possibilities are there to try in a random substitution cipher?
26
26x25
26x25x24x***x3x2x1
26^26
Why is the Vigenere cipher hard to crack? (select 2)
One cannot solve using frequency analysis directly.
The key length is variable and potentially very long
the key is always secret to both the sender and receiver of the message.
A Vigenere cipher relies upon an "alphabet shift" algorithm
Which of the following are true statements about digital certificates in Web browsers?
1 only
2 only
1 and 2
neither 1 nor 2
What is 20 MOD 15?
0
1.5
5
15
20
What is 13 MOD 17
0
1 4/13
4
13
17
Choose the two (2) statements that are true about functions
Meaningful function names help people better understand programs.
Meaningful function names help computers better understand programs.
Functions in programming are useful mathematical tools for doing complex computations.
Functions in programming are named groupings of programming instructions.
Which of the following is NOT a true statement about functions?
Functions are reusable programming abstractions.
Functions help reduce the complexity of writing and maintaining programs.
Functions help break a problem into logical chunks.
Once defined, a function can be called many times from different parts of a program.
Functions cannot make calls to other functions written by the same programmer.
A binary question is defined as:
A piece of information that is sent in pairs
Two questions which share the same answer
A message which has two possible states
A question which can be answered in only one of two possible ways
A binary message consisting of four bits was sent to you by a friend. The message was supposed to be ABAB. Unfortunately, your friend set the bit on the wire once every 2 seconds, but you read the wire once every second. Assuming that the first bit was sent and read at the same time, what message did you receive instead?
ABAB
AABB
AAAA
BBBB
ABBB
When responding to a question with 4 choices, the most efficient method will require _____ number of bits.
5 bits
4 bits
3 bits
2 bits
1 bit
If you just had two shapes (say, circle and a square), how many 3-place patterns could you make?
4
6
8
10
12
You have a coordinate grid that is 96 x 96. Assuming that you encode the x and y coordinate as separate numbers, what is the minimum number of bits that you will need to encode a coordinate in that space?
16
14
13
10
What is the minimum number of bits you need to encode that 26 letters of the alphabet plus a space?
2 bits
3 bits
4 bits
5 bits
6 bits
The standard QWERTY keyboard has 47 keys that can place characters on the screen. Each of these keys can also display a second character by holding the "Shift" key at the same time. How many bits would you need to encode everything that could be typed on this keyboard?
3 bits
4 bits
5 bits
6 bits
7 bits
How many bits?
ASCII has an encoding for every character of the alphabet as well as encodings for numbers -- that is, encodings for the symbols of the digits 0-9. So here is a trick question: How many bits are required to store the text of the number "150" in ASCII?'
3 bits
8 bits
16 bits
24 bits
32 bits
The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works. The members of the IETF are:
An International coalition of government agencies who oversee the Internet in their countries.
A loosely organized collection of citizens and engineers who communicate mostly by email.
There are no members. IETF is an "organization" in name only.
The worldwide leaders of the Tier 1 Internet service providers.
Political leaders and heads of state.
What is an RFC?
Restricted Fiduciary Contract
Request for Comments
Radio Frequency Controller
Related Fundamental Content
ReFactored Code
Choose the two best answers to complete the sentence: If I understand how the internet works then I will be able to:
make informed choices to support or oppose decisions my government makes about access to the internet.
connect the latest devices to the internet
make informed choices about my privacy on the internet.
get the best price for my cell phone plan
speed up my downloads of movies I purchase
To improve communication in playing battleship on the Internet Simulator your group invented a (n):
heuristic
algorithm
protocol
encoding
Which of the following information is not necessary in your protocol to play battleship?
Grid Coordinates
From
To
Time of Day
How many unique IP addresses could be made in a fixed-length IP address system using 6 bits?
6 users
12 users
32 users
64 users
In the Internet Simulator, your router knows to send your message to a different router because:
You set the "other router" bit in the message.
Everyone is on the same router
The first 4 bits of the address specify the router number that your friend is on
Messages are routed over different paths
If the post office delivered mail exactly like routers deliver messages on the internet, which 2 of the following statements would be true?
One mailman would be responsible for delivering a letter from sender to receiver.
The mailman would sometimes take a different path to deliver each letter to your home.
Letters would be written on the outside of envelopes for all to read instead of letters put inside envelopes
Your mail could not be delivered if a road your mailman was planning to take were under construction.
Which two of the following statements are true about routing on the Internet.
Information travelling between two computers over the Internet will always take the same path.
Your router receives all the traffic of the Internet and delivers to your computer only the messages intended for you.
There is one router which receives and redirects all the traffic of the Internet
A packet traveling between two computers on the Internet may be rerouted many times along the way.
A packet contains addressing information to allow routers to decide how best to forward along that packet towards its destination
The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works. The members of the IETF are:
An International coalition of government agencies who oversee the Internet in their countries.
The worldwide leaders of the Tier 1 Internet service providers
A loosely organized collection of citizens and engineers who communicate mostly by email.
Political leaders and heads of state
There are no members. IETF is an "organization" in name only
What is an RFC?
Restricted Fiduciary Contract
Request For Comments
Radio Frequency Controlller
Related Fundamental Content
ReFactored Code
Choose the two best answers to complete the sentence: If I understand how the internet works then I will be able to:
make informed choices to support or oppose decisions my government makes about access to the internet.
connect the latest devices to the internet
make informed choices about my privacy on the internet
get the best price for my cell phone plan
speed up my downloads of movies I purchase
To improve communication in playing battleship on the Internet Simulator your group invented a(n):
heuristic
algorithm
protocol
encoding
Which of the following information is not necessary in your protocol to play battleship?
Grid Coordinates
From
To
Time of Day
How many unique IP addresses could be made in a fized-length IP address system using 6 bits?
6 users
12 users
32 users
64 users
In the Internet Simulator, your router knows to send your message to a different router because:
You set the "other router" bit in the message.
Everyone is in the same router
the first 4 bits of the address specify the router number that your friend is on.
messages are routed over different paths
If the post office delivered mail exactly like routers deliver messages on the internet, which 2 of the following statements would be true?
One mailman would be responsible for delivering a letter from sender to receiver
The mailman would sometimes take a different path to deliver each letter to your home.
Letters would be written on the outside of envelopes for all to read instead of letters put inside envelopes
Your mail could not be delivered if a road your mailman was planning to take were under construction
Which two of the following statements are true about routing on the Internet.
Information traveling between two computers over the Internet will always take the same path.
Your router receives all the traffic of the Internet and delivers to your computer only the messages intended for you.
There is one router which receives and redirects all the traffic of the Internet.
A packet travelling between two computers on the Internet may be rerouted many times along the way.
A packet contains addressing information to allow routers to decide how best to forward along that packet towards its destination
Pick Two: Pick the two statements about packets and routing on the Internet which are true.
Packets travelling across the Internet take a standardized amount of time and so can be counted on to arrive in the order they were sent
TCP ensures messages can be reliably transmitted across the Internet
TCP depends on the infrastructure of the Internet to be reliable enough to ensure no packets are lost in transmission
TCP must account for the fact that packets may not arrive at a destination computer in the intended order
Which of the following is NOT true about packets?
Packets are numbered so if they arrive out of order the message can be reassembled
A message sent across the Internet can always be contained in single packet
Packets are routed on different paths from sender to receiver.
The receiver computer must confirm to the sending computer that each packet was received.
A single central register of IP addresses and names (a DNS style system) is an efficent means of translating human readable names to IP addresses. Which of the following is NOT solved by DNS?
A. It is inefficient to have everyone on the Internet maintain their own list of IP addresses.
B. There are too few IP addresses to meet the current demand.
C. When someone new joins the Internet they must inform everyone else of the new IP address
D. When an IP address changes, it is impossible to locate a computer until the owner announces the change
What feature of DNS and IP allow the internet to scale
A. Redundancy
B. Hierarchy
C. Multiple servers
D. Government control
HTTP is considered to be high level protocol because:
HTTP requests are given higher priority for fast delivery when being routed on the Internet
HTTP requests are encoded using higher frequency radio waves
HTTP messages can be either requests or responses
HTTP requests make use of abstractions provided by lower level protocols
Choose Two: Identify the two true statements about HTTP.
An HTTP request is sent from a client to request access to data stored on a server.
HTTP requests and responses have identical formats
Displaying a web page will often require multiple HTTP requests in order to acquire all the necessary data
An HTTP response code is only used when a server could not fulfill a request.
How many bytes does it take...?
How many bytes (or bits) are required to encode an image that is 25 pixels wide and 50 pixels tall, if you encode each pixel with 3 bytes (24 bits) of RGB data.
(Don't forget to add in the metadata! -- you should assume that we are using the file format used in this lesson with metadata that had 1 byte each for width, height and bits-per-pixel.)
1,250 bytes (10,000 bits)
1,253 bytes (10,024 bits)
3,750 bytes (30,000 bits)
3,753 bytes (30,024 bits)
30,003 bytes (240,024 bits)
Which of the following is true of lossy and lossless compression techniques?
Lossless compression throws away unimportant details that a human being will likely be unable to detect.
Lossy compression is only possible on files that are at least one gigabyte in size before compression.
Lossy compression is only possible on files that are at least one gigabyte in size before compression.
Lossy compression techniques are no longer commonly used
Lossless compression is fully reversible, meaning the original file can be recreated bit for bit.
Which of the following is true of lossy and lossless compression techniques?
Lossless compression is only used in situations where lossy compression techniques can't be used.
Lossy compression is best suited for situations where some loss of detail is tolerable, especially if it will not be detectable by a human.
Both lossy and lossless compression techniques will result in some information being lost from the original file
Neither lossy nor lossless compression can actually reduce the number of bits needed to represent a file.
With Boolean, what does "A AND B" mean?
Neither A or B can be true for the condition to be true.
If A is true, then the condition is true.
If B is true, then the condition is true.
Both A and B must be true for the condition to be true
Explore all questions with a free account