Computer Science Final Exam Review (Fall)
a few seconds ago
rbreshea_59395
Save
Edit
Host a game
Live GameLive
Homework
Solo Practice
Practice
129 QuestionsShow answers
  • Question 1
    900 seconds
    Report an issue
    Q. What is the purpose of DNS?
    answer choices
    It assigns a unique address to every device on the Internet.
    It returns the IP address given the name of a website.
    It forwards a message from one machine to another.
    It has more bits so you can make a longer, unique address.
  • Question 2
    900 seconds
    Report an issue
    Q. What is the purpose of a router?
    answer choices
    It assigns a unique address to every device on the Internet.
    It returns the IP address given the name of a website.
    It forwards a message from one machine to another.
    It has more bits so you can make a longer, unique address.
  • Question 3
    900 seconds
    Report an issue
    Q. What is a major goal of a router?
    answer choices
    Instantaneous transmission
    Scalability
    Fault multiplication
    Packet quantization
  • Question 4
    900 seconds
    Report an issue
    Q. Why is IP v4 going to be replaced by IP v6?
    answer choices
    IP v6 is easier to use.
    IP v4 does not work on old hardware.
    IP v4 was not encrypted.
    We are running out of IP v4 addresses.
  • Question 5
    900 seconds
    Report an issue
    Q. Which of the following is an IP address?
    answer choices
    www.google.com
    192.168.2.25
    1024.2048.64.512.256
    A5:D4:23:56:FF:A4
  • Question 6
    900 seconds
    Report an issue
    Q.

    Which is true about a router?

    answer choices

    Protocols ensure that a single path between two computers is established before sending packets over it.

    Routers are hierarchical and the "root" router is responsible for communicating to sub-routers the best paths for them to route internet traffic.

    A packet traveling between two computers on the Internet may be rerouted many times along the way or even lost or "dropped"

  • Question 7
    900 seconds
    Report an issue
    Q.

    Which is true about a router?

    answer choices

    Protocols ensure that a single path between two computers is established before sending packets over it.

    Routers act independently and route packets as they see fit.

    Routers are hierarchical and the "root" router is responsible for communicating to sub-routers the best paths for them to route internet traffic.

  • Question 8
    900 seconds
    Report an issue
    Q.

    The various protocols in use on the internet are said to operate in layers in which the protocols at each layer solve one problem related to networked communication, and higher layers are built on top of, and rely on, the lower layers to do their jobs.


    From the list provided which internet protocol relies on the other?

    answer choices

    TCP/IP relies on HTTP

    HTTP relies on TCP/IP

    TCP/IP relies on DNS

    DNS relies on HTTP

  • Question 9
    900 seconds
    Report an issue
    Q.

    The various protocols in use on the internet are said to operate in layers in which the protocols at each layer solve one problem related to networked communication, and higher layers are built on top of, and rely on, the lower layers to do their jobs.


    From the list provided which internet protocol relies on the other?

    answer choices

    TCP/IP relies on HTTP

    DNS relies on TCP/IP

    TCP/IP relies on DNS

    DNS relies on HTTP

  • Question 10
    900 seconds
    Report an issue
    Q.

    A sample of a company's tracking information collected on their computers appears above. Which of the following is MOST likely to be answerable using all the data collected by this monitoring?

    answer choices

    Which employees are visiting social media sites from work

    Which employees are doing the most work using the computers

    Which programs employees are running on the computers

    Which websites are most frequently visited before and after work hours from a work computer

  • Question 11
    900 seconds
    Report an issue
    Q.

    Which of the following BEST describes how protocols on the Internet make use of abstraction to accomplish their respective purposes?

    answer choices

    High level protocols take into account specific implementation details of lower level protocols to ensure they are compatible.

    Low level protocols can provide functionality to high level protocols without revealing the details of how this is accomplished.

    High level protocols can take on the role of a low level protocol in the event of failure in the system.

    Low level protocols are written in binary while high level protocols are written in hexadecimal

  • Question 12
    900 seconds
    Report an issue
    Q.

    According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?

    answer choices

    about.example.com

    example.co.uk

    example.com.org

    example.org

  • Question 13
    900 seconds
    Report an issue
    Q.

    Which of the following is NOT true about TCP/IP packets?

    answer choices

    Packets are numbered so if they arrive out of order the message can be reassembled.

    TCP guarantees that no packets are ever dropped

    Packets can be routed on different paths from sender to receiver.

    Messages are broken into packets to improve reliability of the internet

  • Question 14
    30 seconds
    Report an issue
    Q.

    The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works. The members of the IETF are:

    answer choices

    An International coalition of government agencies who oversee the Internet in their countries.

    A collection of the leaders of the Tier 1 Internet service providers.

    A loosely organized collection of citizens and engineers.

    Political leaders and heads of state.

  • Question 15
    30 seconds
    Report an issue
    Q.

    How does a computer resolve a domain name into an IP address?

    answer choices

    It asks a DNS server for the corresponding IP address

    It scans addresses until it finds the one it's looking for

    It uses a Border Gateway Protocol to get the address from a nearby computer.

    It creates an IP address for the domain, and shares it with the closest DNS.

  • Question 16
    900 seconds
    Report an issue
    Q.

    The figure represents a network of physically linked computers labeled A through F. A line between two computers indicates that the computers can communicate directly with each other. Any information sent between two computers that are not directly connected must go through at least one other computer. The weight or cost of sending information from one computer to another is indicated by the number above the line.


    For example, information can be sent directly between computers A, and B and will cost 5. Information sent between computers A and D must go through either computer C (with total cost 5), or through computer B (with total cost 8).


    Computer A sends a packet intended to reach computer F. Along its path it arrives at Computer C. Which computer should Computer C forward the packet to in order to use the most cost effective path?

    answer choices

    Computer A

    Computer B

    Computer D

    Computer F

  • Question 17
    900 seconds
    Report an issue
    Q.

    The world is currently in a transition to using IPv6, a newer version of the IP protocol that uses 128-bit addresses instead of 32-bit addresses used by IPv4. What is the main problem that IPv6 was created to solve?

    answer choices

    32-bit addresses could not accommodate the increased size and amount of data traveling on the Internet as it has grown in popularity

    IPv6 will allow problems with IPv4's address hierarchy to be resolved

    IPv4 proved unreliable in some cases where network redundancy could not be ensured

    32-bit addresses could not ensure that every internet-connected device can receive a unique IP address

  • Question 18
    900 seconds
    Report an issue
    Q.

    _____ provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. It is tightly linked with IP.

    answer choices

    TCP

    DNS

    HTTP

    URL

  • Question 19
    900 seconds
    Report an issue
    Q.

    ______ is a simplified representation of something more complex. It allows you to hide details to help you manage complexity, focus on relevant concepts, and reason about problems at a higher level.

    answer choices

    Net Neutrality

    Protocol

    Abstraction

    Latency

  • Question 20
    900 seconds
    Report an issue
    Q.

    _____ is the principle that all Internet traffic should be treated equally by Internet Service Providers.

    answer choices

    Abstraction

    Net Neutrality

    Protocol

    Latency

  • Question 21
    900 seconds
    Report an issue
    Q. This number system has a symbol to represent each of the values 0-15?
    answer choices
    Binary Number System
    Decimal Number System
    Hexadecimal Number System

    Octal Number System

  • Question 22
    900 seconds
    Report an issue
    Q.

    Which of the following is TRUE regarding lossless and lossy compressions?

    answer choices

    An example of lossless compression is a .jpg file

    Lossless uses inexact approximations while lossy does not·

    You can completely reconstruct lossless but not lossy compression ·

    You can completely reconstruct lossy but not lossless compression

  • Question 23
    900 seconds
    Report an issue
    Q. What color is 00FF00?
    answer choices
    Green
    Red
    Blue
    Yellow
  • Question 24
    900 seconds
    Report an issue
    Q. What is lossless compression?   
    answer choices
    A) Shrinking data and losing some of it
    B) Making the code less efficient
    C) Shrinking data without losing any of it
     D) Expanding a set of data via aggregation
  • Question 25
    900 seconds
    Report an issue
    Q. Which of the following image files is compressed and lossless? 
    answer choices
    A. BMP
    B. JPEG
    C. PNG
    D. GIF
  • Question 26
    900 seconds
    Report an issue
    Q. Which compression technique allows for the full reconstruction of the original data?
    answer choices
    Lossy Compression
    Multi-Band Compression
    Lossless Compression
    Parallel Compression
  • Question 27
    900 seconds
    Report an issue
    Q.

    All of the following would be shown in metadata except:

    answer choices

    Width and Height of an Image

    Type of Compression

    Number of Colors

    Resolution

  • Question 28
    900 seconds
    Report an issue
    Q. How many bits are in a byte?
    answer choices
    2
    8
    16
    128
  • Question 29
    900 seconds
    Report an issue
    Q.

    Which of the following is FALSE regarding file sizes?

    answer choices

    1 Terabyte = 1,000 kilobytes

    1 Petabyte = 1,000 Terabytes

    1 Megabyte = 1,000 bytes

    1 Terabyte = 1,000 gigabytes

  • Question 30
    900 seconds
    Report an issue
    Q.

    Which of the following is FALSE regarding types of files and the file sizes they are measured in?

    answer choices

    A .jpg (JPEG) file is typically measured in megabytes

    The entire amount of information transferred over the entire Internet is typically measured in terabytes

    A .txt file is typically measured in kilobytes

    An .mov file is typically measured in gigabytes

  • Question 31
    900 seconds
    Report an issue
    Q.

    Your best friend has 50 small images to send to you; each of which is 500 KB. How much space do they take up overall in MB?

    answer choices

    25 MB

    250 MB

    2.5 MB

    25,000 MB

  • Question 32
    900 seconds
    Report an issue
    Q.

    You have 1100 MB of data. Your best friend has 3000 MB of data. Will all of this data fit on your 4 GB thumb drive?

    answer choices

    Yes, all this data will fit on the thumb drive

    No, The data will not fit on the thumb drive

  • Question 33
    900 seconds
    Report an issue
    Q.

    A problem solving approach to find a satisfactory solution where finding an optimal or exact solution is impossible (for example, with compression) is called ________________.

    answer choices

    simplistic

    heuristic

    abstraction

  • Question 34
    900 seconds
    Report an issue
    Q.

    How many bytes are required to encode an image that is 25 pixels wide and 50 pixels tall, if you encode each pixel with 3 bytes (24 bits) of RGB data (Note: in addition, there are also 24 bits of metadata)

    answer choices

    1,250 bytes

    3,774 bytes

    3,750 bytes

    249 bytes

  • Question 35
    900 seconds
    Report an issue
    Q. One terabyte of data is most likely be the size of
    answer choices
    a 3 minute music file
    the 7 Harry Potter novels
    10 images
    1 hard drive
  • Question 36
    900 seconds
    Report an issue
    Q.

    Which of the following is TRUE regarding data compression?

    answer choices

    Data compression is only useful for files being transmitted over the Internet

    Regardless of the compression technique used, once a data file is compressed, it cannot be restored to its original size.

    Sending a compressed version of a file ensures that the contents of the file cannot be intercepted by an unauthorized user.

    There are trade-offs involved in choosing a compression technique for storing and transmitting data.

  • Question 37
    900 seconds
    Report an issue
    Q. Select the answer that lists the units of bytes in ascending order (from smallest to largest)
    answer choices
    gigabyte, megabyte, terabyte
    megabyte, terabyte, kilobyte
    gigabyte, terabyte, megabyte
    kilobyte, gigabyte, terabyte
  • Question 38
    900 seconds
    Report an issue
    Q. How you would alter the RGB settings to brighten it?
    answer choices
    increase the RGB values
    decrease the RGB values
  • Question 39
    900 seconds
    Report an issue
    Q. For black and white images, a pixel is represented by
    answer choices
    one bit
    one byte
    12 bits
    8 bits
  • Question 40
    900 seconds
    Report an issue
    Q. If 12 bits are used to represent one pixel of a color image, how many bits are used to represent each color channel?
    answer choices
    2
    3
    8
    4
  • Question 41
    900 seconds
    Report an issue
    Q. How many more values can be represented by a 64 bit integer than a 32 bit integer?
    answer choices
    2 times as many values 
    32 times as many values 
    2^32 times as many values
    32^2 times as many values
  • Question 42
    900 seconds
    Report an issue
    Q. An image compression technique removes pixels with color differences that are difficult for the human eye to detect. This type of compression is
    answer choices
    lossless
    lossy
    brute force
    computationally hard
  • Question 43
    900 seconds
    Report an issue
    Q.

    A student is transferring photos from her camera to her computer. The student notices that the saved photos on her computer are lower quality than the original raw photo on her camera.

    Which of the following could be a possible explanation for the difference in image quality?

    answer choices

    The saved image files were compressed with a lossy compression technique.

    The saved image files were compressed with a lossless compression technique.

    The saved image files were not compressed properly.

    Some information is lost every time a file is saved on a computer.

  • Question 44
    900 seconds
    Report an issue
    Q.

    Under which of the following conditions is it most beneficial to use a heuristic approach to solve a problem?

    answer choices

    When the problem can be solved in a reasonable time and an approximate solution is acceptable

    When the problem can be solved in a reasonable time and an exact solution is needed

    When the problem cannot be solved in a reasonable time and an approximate solution is acceptable

    When the problem cannot be solved in a reasonable time and an exact solution is needed

  • Question 45
    900 seconds
    Report an issue
    Q. A photographer is manipulating a digital image to lighten it because all of the RGB values in the image are less than 100, making it very dark. He does this by adding 20 to the R, G, and B values of each pixel, then overwriting the original image. What type of transformation is the photographer using on the digital image?
    answer choices
    Lossless transformation
    Lossy transformation
    multiband transformation
    Chrome Sampling transformation
  • Question 46
    900 seconds
    Report an issue
    Q.

    Which of the following correctly shows the hexadecimal value for Red as a 12-bit representation.

    answer choices

    F00

    00F

    FF00

    FF0001

  • Question 47
    900 seconds
    Report an issue
    Q.

    To uncompress the data back into its original binary state, you simply reverse the process. This technique is an example of what type of compression?

    answer choices

    Lossy Compression

    Lossless Compression

    FFT Compression

    Tailored Compression

  • Question 48
    900 seconds
    Report an issue
    Q.

    In very broad terms the MP3 audio compression algorithm identifies frequencies and volume levels - low and high - that are outside the range of human hearing and removes the data representing these frequencies from the original.

    This technique results in a smaller audio file that sounds exactly the same to the human ear. This technique is an example of what type of compression?

    answer choices

    Lossy Compression

    Lossless Compression

    FFT Compression

    Tailored Compression

  • Question 49
    60 seconds
    Report an issue
    Q.

    Approximately how much bigger (how many more bytes) is a megabyte than a kilobyte?

    answer choices

    1,000 times bigger

    10,000 times bigger

    100,000 times bigger

    1,000,000 times bigger

  • Question 50
    30 seconds
    Report an issue
    Q.

    The term that defines data about the data is called _____.

    answer choices

    megadata

    superdata

    metadata

    predata

  • Question 51
    900 seconds
    Report an issue
    Q.

    Programming languages have some similarities and differences to the "natural" language you use in everyday speech. Select the two true statements about programming languages:

    answer choices

    Ambiguities in natural language necessitate the creation of programming languages for controlling a computer

    Compared to the number of words in a natural language, the number of defined words in a programming language is very small.

    The number of defined words in a programming language is about the same as the number of words in a natural language.

    There are typically many possible ways to interpret an instruction written in a programming language.

  • Question 52
    900 seconds
    Report an issue
    Q.

    Which of the following images shows the path and ending location of the robot that will result from executing the code above. The starting location of the robot is shown as dotted triangle for cases where the robot does not start and end at the same location.


    REPEAT 4 TIMES {

    MOVE_FORWARD()

    MOVE_FORWARD()

    MOVE_FORWARD()

    ROTATE_RIGHT(90)

    MOVE_FORWARD()

    ROTATE_RIGHT(90)

    MOVE_FORWARD()

    ROTATE_RIGHT(90)

    }

    answer choices
  • Question 53
    900 seconds
    Report an issue
    Q.

    Consider the following incorrect program, which is intended to move the robot around the perimeter of a grid, as indicated by the drawing below. The starting position and direction of the robot is indicated in the diagram.


    Line 1: 4 TIMES

    Line 2: {

    Line 3: MOVE_FORWARD()

    Line 4: ROTATE_RIGHT()

    Line 5: MOVE_FORWARD()

    Line 6: MOVE_FORWARD()

    Line 7: MOVE_FORWARD()

    Line 8: MOVE_FORWARD()

    Line 9: ROTATE_RIGHT()

    Line 10: }


    Given the options below, which lines should be removed so the program will work as intended?

    answer choices

    Line 3 and Line 4

    Lines 5, 6, 7, 8 and 9

    Line 8 and Line 9

    Line 9

  • Question 54
    900 seconds
    Report an issue
    Q.

    Which of the following is NOT true about functions in programming?

    answer choices

    Functions are reusable programming abstractions.

    Functions help reduce the complexity of writing and maintaining programs.

    Functions cannot make calls to other functions within the same program.

    Once defined, a function can be called many times from different parts of a program.

    Functions help break a problem into logical chunks.

  • Question 55
    900 seconds
    Report an issue
    Q.

    What is one important naming convention of functions?

    answer choices

    A function name should indicate how long the function takes to run.

    Two functions with similar behavior should be given identical names to indicate the relationship between them.

    A function name should be as descriptive as possible to indicate what the function does.

    Function names should be organized alphabetically.

    The function name should begin with a number that indicates the order in which it should be executed.

  • Question 56
    900 seconds
    Report an issue
    Q.

    Which one of the following statements about functions is TRUE?

    answer choices

    A function can change names over the course of a program.

    Code can be added or removed dynamically from a function while the program is running.

    Functions can be called using different names depending on where in the program they are called.

    Two functions can be given identical names as long as their code is identical.

    Two functions in a single program can have different names but contain identical code.

  • Question 57
    900 seconds
    Report an issue
    Q. A piece of code you can use over and over again
    answer choices
    Function
    Abstraction
    Non-Function
  • Question 58
    900 seconds
    Report an issue
    Q. Know how to drive a car without knowing how the engine works is an example of abstraction 
    answer choices
    True
    False
  • Question 59
    900 seconds
    Report an issue
    Q.  Pulling out specific differences to make one solution work for multiple problems.
    answer choices
    Top Down Design
    Abstraction
    variable
    none of the above
  • Question 60
    900 seconds
    Report an issue
    Q.

    A problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.

    answer choices

    Top Down Design

    Function

    Variable

  • Question 61
    900 seconds
    Report an issue
    Q. Top Down Design is when you take a problem and break it down into smaller sub problems or smaller pieces
    answer choices
    True
    False
  • Question 62
    900 seconds
    Report an issue
    Q.

    You will need to use the Top-Down Design Strategy to create a program to design a snowflake. Make sure you a using logical chunks and have reasonable names for your chunks of programming.

    answer choices

    Review Lesson 6 on Code.org

    Review Lesson 6 on Code.org

  • Question 63
    900 seconds
    Report an issue
    Q.

    Which of the following will call the function drawStar?

    answer choices

    drawStar

    drawStar();

    function drawStar (){

    for(var i=0; i <5; i++) {moveForward(100); turnLeft(36):}}

    function drawStar;

    function drawStar();

  • Question 64
    900 seconds
    Report an issue
    Q.

    For this scenario related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions) to handle the task:


    Drawing out the letters of a word "HELLO"

    answer choices

    Loop

    Function

  • Question 65
    900 seconds
    Report an issue
    Q.

    For this scenario related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions) to handle the task:


    Drawing a hexagon (six-sided shape)

    answer choices

    Loop

    Function

  • Question 66
    900 seconds
    Report an issue
    Q.

    For this scenario related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions) to handle the task:


    Drawing 100 tiny dots in a line.

    answer choices

    Loop

    Function

  • Question 67
    900 seconds
    Report an issue
    Q.

    For this scenario related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions) to handle the task:


    Drawing a circle of any size at any point on the screen.

    answer choices

    Loop

    Function

  • Question 68
    900 seconds
    Report an issue
    Q.

    Why are parameters useful when programming?

    answer choices

    Parameters determine the number of times the function will run.

    Parameters allow for more flexible, generalized behaviors in functions.

    Parameters are useful for teams of programmers because they help define the boundaries of the problem they are trying to solve.

    Parameters change the order of operations within a function.

  • Question 69
    900 seconds
    Report an issue
    Q.

    What is the most likely outcome of running the code shown at right?

    answer choices

    It will draw a star with each side 150 pixels long.

    The program will stop with an error at line 3 because parameters may not be used in for loops.

    The program will stop with an error at line 5 because it is dividing by 0.

    The program will run without error, but will not draw anything.

  • Question 70
    900 seconds
    Report an issue
    Q.

    When programmers work together, what is an example of how abstraction in programming can promote collaboration?

    answer choices

    Team members can rely on one another to explain their code.

    Programmers can write functions without needing to know what they do or how they should work.

    Programmers can use functions created by their partners, relying on the functionality without needing to know the specific details of how the function is implemented.

    In order for programmers to work together, they must work in the same room.

    Abstraction allows programmers to brainstorm more creative solutions to problems.

  • Question 71
    900 seconds
    Report an issue
    Q.

    Which of the following images represents the most likely output produced by the code segment given below?

    answer choices
  • Question 72
    900 seconds
    Report an issue
    Q.

    Explain how abstraction allows for the creation of increasingly complex systems. Reference top-down design strategy in your response.

    answer choices

    You need to know how to do this. Review Lesson 9

    You need to know how to do this.Review Lesson 9

  • Question 73
    900 seconds
    Report an issue
    Q. What is Abstraction?
    answer choices
    •– the use of computers to solve problems.
    representing 'real world' problems in a computer using variables and symbols and removing unnecessary elements from the problem
    •breaking down a large problem into smaller sub-problems.
    •identifying the steps involved in solving a problem.
  • Question 74
    900 seconds
    Report an issue
    Q. What is abstraction?
    answer choices
    The process of filtering out unnecessary detail.
    The process of filtering out irrelevant characteristics
    The process of filtering out irrelevant characteristics and unnecessary detail.
  • Question 75
    900 seconds
    Report an issue
    Q.

    Why are these icons a good use of abstraction?

    answer choices

    They tell us what they mean without needing to use the name

    They are difficult to understand

    They don't explain what they are

  • Question 76
    900 seconds
    Report an issue
    Q. Convert 128 to binary
    answer choices
    10000000
    01111110
    10000001
    11001100
  • Question 77
    900 seconds
    Report an issue
    Q. Convert 65 to binary
    answer choices
    01100001
    00100001
    01000001
    00100101
  • Question 78
    900 seconds
    Report an issue
    Q. Convert 254 to binary
    answer choices
    11110000
    11111100
    11111111
    11111110
  • Question 79
    900 seconds
    Report an issue
    Q. Convert 37 to binary
    answer choices
    00100101
    00100011
    00100111
    01000101
  • Question 80
    900 seconds
    Report an issue
    Q. Convert 196 to binary
    answer choices
    11000110
    11100100
    11000100
    11010100
  • Question 81
    900 seconds
    Report an issue
    Q. Convert 00010001 to decimal
    answer choices
    17
    27
    37
    47
  • Question 82
    900 seconds
    Report an issue
    Q. Convert 11001100 to decimal
    answer choices
    224
    134
    104
    204
  • Question 83
    900 seconds
    Report an issue
    Q. Convert 11111111 to decimal
    answer choices
    255
    245
    235
    225
  • Question 84
    900 seconds
    Report an issue
    Q. Convert 00100100 to decimal
    answer choices
    26
    36
    46
    56
  • Question 85
    900 seconds
    Report an issue
    Q. Convert 01000100 to decimal
    answer choices
    58
    68
    78
    88
  • Question 86
    900 seconds
    Report an issue
    Q. If a binary number ends with a 1, it must be...
    answer choices
    An odd number
    An even number
    A prime number
    The number 12
  • Question 87
    900 seconds
    Report an issue
    Q. What are the only two numbers you can use in binary?
    answer choices
    0 and 1
    1 and 2
    1, 2, 3, 4, 5, 6, 7, 8, 9, 10
    1, 2, 4, 8, 16
  • Question 88
    900 seconds
    Report an issue
    Q. Which of these is the correct sequence for the place values for binary numbers?
    answer choices
    1, 2, 4, 8, 16, 32, 64, 128
    1, 2, 4, 6, 8, 10, 12, 14, 16
    1, 2, 3, 4, 5, 6, 7, 8
    0, 1
  • Question 89
    900 seconds
    Report an issue
    Q.

    What is the point of binary?

    answer choices

    It represents how computers interpret electrical signals

    Because we like to make you do extra maths ;-D

    It takes fewer digits to represent a number

    Because it describes star systems

  • Question 90
    900 seconds
    Report an issue
    Q. A bit is 
    answer choices
    a numerical label assigned to each device.
    the smallest unit of data in a computer.
    a keyboarding term for typing.
    is a numeral system made up of 16 symbols.
  • Question 91
    900 seconds
    Report an issue
    Q. What is binary?
    answer choices
    A part of a computer
    The way computers talk to each other
    A computer program
    Software for a computer
  • Question 92
    900 seconds
    Report an issue
    Q. If 1 and 0 mean on and off. Is the number 1 on or off?
    answer choices
    ON
    OFF
  • Question 93
    900 seconds
    Report an issue
    Q. What is the sum of this binary number?
    01000010
    answer choices
    62
    66
    68
    64
  • Question 94
    900 seconds
    Report an issue
    Q. What is the sum of this binary number?
    00100101
    answer choices
    29
    37
    38
    36
  • Question 95
    900 seconds
    Report an issue
    Q. How is our number system different from the binary system?
    answer choices
    Our number system is base-5; the binary system is base-3
    Our number system is base-10; the binary system is base-2
    Our number system is base-10; the binary system is base-1
    Our number system is base 100; the binary system is base-2
  • Question 96
    900 seconds
    Report an issue
    Q.

    Why do computers use binary to represent digital data?

    answer choices

    Binary is more flexible than other number systems and allows better representations.

    It's easier, cheaper and more reliable to distinguish between 2 states of data.

    It typically takes less digits to represent data in binary than other number systems.

    Binary is the only way to build a machine.

  • Question 97
    900 seconds
    Report an issue
    Q.

    What is the minimum number of bits you would need to encode the 26 letters of the alphabet plus a space - a total of 27 characters

    answer choices

    2 bits

    3 bits

    5 bits

    6 bits

  • Question 98
    900 seconds
    Report an issue
    Q.

    Which of the following is NOT true about representing digital data?

    answer choices

    At one of the lowest levels of abstraction, all digital data can be represented in binary using only combinations of the digits zero and one.

    Some large numbers cannot be represented in binary and can only be represented in decimal.

    Groups of bits can be used to represent abstractions, including but not limited to numbers and characters.

    The same value (number) can have a different representation depending on the number system used to represent it.

  • Question 99
    900 seconds
    Report an issue
    Q.

    A company database has each customer's unique ID number stored as an 10-bit number called customerID. The company is expanding and most of the their 10-bit number has already been assigned to a student. Of the options below which is the smallest change to the way customerID is represented necessary to ensure each new customer receives a uniqueID?

    answer choices

    Remove a bit from customerID to make room for incoming customers.

    Double the number of bits in customerID to double the number IDs that the database can represent.

    Add a bit to customerID to double the number of IDs that the database can represent.

    Keep using the 10-bit number for customerID but reserve the first bit to indicate old or new customers.

  • Question 100
    900 seconds
    Report an issue
    Q.

    Which of the following is true about the way digital data is transmitted on the Internet?

    answer choices

    Bit-rate (bandwidth) is the time elapsed between the transmission and receipt of a piece of digital data.

    Digital data can only be transmitted between two devices when they are physically connected to one another (for example by a copper wire)

    Latency is the amount of data (measured in bits) that can be sent in a fixed amount of time.

    Two devices must communicate using the same bit-rate to successfully send and receive digital data.

  • Question 101
    900 seconds
    Report an issue
    Q.

    Two students have developed a protocol in which they send 4-bit messages to each other. They decide to modify their protocol to start sending 8-bit messages instead. How many more values can be represented in an 8-bit message than a 4-bit message?

    answer choices

    21 = 2 times as many values

    22 = 4 times as many values

    23 = 8 times as many values

    24 = 16 times as many values

  • Question 102
    900 seconds
    Report an issue
    Q.

    ______ encryption is a method of encryption involving one key for both encryption and decryption

    answer choices

    Symmetric

    Asymmetric

    Public key

    SSL

  • Question 103
    900 seconds
    Report an issue
    Q.

    Which of the following most accurately describes Moore's Law?

    answer choices

    Moore's Law describes a relationship of boolean logic statements involving AND and OR

    Moore's Law is the principle that one should assume that any traffic on the Internet is insecure

    Moore's Law is the observation that computing power tends to double every two years

    Moore's Law explains why cracking modern cryptography is a "computationally hard" problem

  • Question 104
    900 seconds
    Report an issue
    Q.

    In public key cryptography, the sender uses the recipient's public key to encrypt a message. Which of the following is needed to decrypt the message?

    answer choices

    The sender's public key

    The sender's private key

    The recipient's public key

    The recipient's private key

  • Question 105
    900 seconds
    Report an issue
    Q.

    How do Internet packets travel to their destination?

    answer choices

    Router to router based on the Travelling Salesman algorithm

    Along the same path to stay in order

    Timed to arrive at the destination in their correct order

    Along a variety of different paths

  • Question 106
    900 seconds
    Report an issue
    Q.

    What are brute-force attacks?

    answer choices

    Attacks that use frequency analysis to break passwords

    Attacks that check each possible solution to break encrypted data

    Attacks against DNS servers to enable DDOS attacks

    Attacks on firewalls to gain access to a company's sensitive data

  • Question 107
    900 seconds
    Report an issue
    Q.

    What is a symmetric key used for?

    answer choices

    Sending and receiving information from the web

    Encrypting data

    Decrypting data

    Encrypting and decrypting data

  • Question 108
    900 seconds
    Report an issue
    Q.

    What is the definition of bandwidth?

    answer choices

    The frequency that data can be transmitted across the Internet

    The speed that data can be sent through the Internet

    The amount of data that can be transmitted in a fixed amount of time

    The delay between the request and the receipt of information on the Internet

  • Question 109
    900 seconds
    Report an issue
    Q.

    What is the purpose of DNS? (Domain Name System)

    answer choices

    To translate natural language website names to their IP address.

    To create a new IP address for a website each time it is requested.

    To position the packets in the correct order.

    To route the Internet request on the way to its destination.

  • Question 110
    900 seconds
    Report an issue
    Q.

    What is the most common way computer viruses are spread?

    answer choices

    By people clicking on an infected file

    From pop up ads

    Through network worms

    From random botnet attacks

  • Question 111
    900 seconds
    Report an issue
    Q.

    The protocol used for transmitting web pages over the Internet is called ...

    answer choices

    HTML.

    HTTP.

    DNS.

    TCP/IP.

  • Question 112
    900 seconds
    Report an issue
    Q.

    What does the s in https refer to?

    answer choices

    It's the plural of http - a more robust version of http that runs on multiple channels.

    s is for "secure" - a version of http that is encrypted.

    s is for "simple" - a simplified version of http that runs faster on modern computers

    s is for "standard" - to distinguish the original http from non-standard versions like httpv and httpx

  • Question 113
    900 seconds
    Report an issue
    Q.

    When someone tries to get you to give up personal information through email or a bogus website it is called a: *

    answer choices

    DDoS Attack

    Phishing Scam

    Virus

    SSL/TLS layer

  • Question 114
    900 seconds
    Report an issue
    Q.

    How is the Internet scalable?

    answer choices

    Through the ability for additional networks and routers to be added without impacting service.

    Through the ability to add longer public keys to keep data secure

    Through the ability to add additional authentication for users

    Through the ability to add additional latency to requests

  • Question 115
    900 seconds
    Report an issue
    Q.

    What is 20 MOD 15?

    answer choices

    0

    5

    15

    20

  • Question 116
    900 seconds
    Report an issue
    Q.

    What is the "key" to a Caesar Cipher that someone needs to know (or discover) to decrypt the message?

    answer choices

    A secret word only know by Caesar.

    The number of characters to shift each letter in the alphabet.

    The letter that occurs most often in the encrypted message.

    The day of the month that the encrypted message was sent

  • Question 117
    900 seconds
    Report an issue
    Q.

    Which of the following is the most accurate description of what is known as the "digital divide". The digital divide is about how...

    answer choices

    ...people's access to computing and digital technology increases over time through a process of dividing and growing quickly - it is often likened to the biological processes of cell growth

    ...people's access to computing and the Internet differs based on socioeconomic or geographic characteristics.

    ...people's access to computing technology is affected by the fact that newer devices that use new protocols makes it more difficult for them to communicate with older devices and technology

    ...the amount of data on the Internet is growing so fast that the amount computing power and time we have to process it is lagging behind

  • Question 118
    900 seconds
    Report an issue
    Q.

    Which of the following statements best describes the properties of public key encryption?

    answer choices

    Public key encryption is an encryption method which relies on separate keys for encrypting and decrypting information.

    Public key encryption is a highly secure encryption scheme that in which a single shared key is used by both the sender and receiver of the message.

    Public key encryption makes use of certain types of problems which are easier for humans to solve than computers.

    Public key encryption makes use of mathematical problems which no algorithm can be used to solve.

  • Question 119
    900 seconds
    Report an issue
    Q.

    When a computer scientist uses the term "Big Data" what do they typically mean?

    answer choices

    That a dataset is larger than 5TB which is the common "Big Data" threshold.

    That there is so much data it's virtually impossible to process.

    There is enough data that traditional data processing applications are inadequate.

    It implies that the findings from the data are potentially hugely important for society.

  • Question 120
    900 seconds
    Report an issue
    Q.

    How can financial transactions safely occur on the Internet?

    answer choices

    Through the use of symmetric keys

    Through certificates issued by Certificate Authorities (CAs) that validate the keys used

    Through the use of double authentication methods

    The the use of frequency analysis

  • Question 121
    900 seconds
    Report an issue
    Q. a "hard' problem for a computer is one in which it cannot arrive at a solution in a reasonable amount of time
    answer choices
    Random Substitution Cipher
    Bug
    Computationally Hard
    Trouble Shoot
  • Question 122
    900 seconds
    Report an issue
    Q. used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt
    answer choices
    asymmetric encryption
    modulo
    Private Key
    Public Key Encryption
  • Question 123
    900 seconds
    Report an issue
    Q.

    A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption to encrypt their customers' credit card information. Is this a secure form of payment?

    answer choices

    No, public key encryption allows the credit card information to be read by the public.

    No, the internet protocols are open standards and thus everything sent over the internet is sent "in the clear".

    Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve.

    Yes, public key encryption is secure because it transmits credit card information in binary.

  • Question 124
    900 seconds
    Report an issue
    Q.

    Pick the two expressions involving the Modulo operation that compute to the exact same value (choose 2)

    answer choices

    9 MOD 8

    1 MOD 16

    52 MOD 32

    9 MOD 64

  • Question 125
    900 seconds
    Report an issue
    Q.

    Choose the answer that is NOT a feature of Public Key Cryptography:

    answer choices

    A key for decrypting is never made public

    Using public key guarantees that only the intended recipient can decrypt the message

    A Public Key database ensures 3rd party accountability of security

    Allows secure communication without establishing a *shared* encryption key ahead of time.

  • Question 126
    900 seconds
    Report an issue
    Q.

    A programmer is writing a system that is intended to be able to store large amounts of personal data. As the programmer develops the data system, which of the following is LEAST likely to impact the programmer's choices in designing the structure of the system?

    answer choices

    Maintaining privacy of the information stored in the data set.

    Scalability of the system.

    Structuring the metadata of the information for analysis.

    The frequency of a particular item occurring in a data set.

  • Question 127
    900 seconds
    Report an issue
    Q.

    What is a Distributed Denial of Service (DDoS) attack?

    answer choices

    A coordinated effort by a group to simultaneously attempt to gain entry to foreign government's servers or systems

    An effort by network engineers to focus all systems on catching a user or computer that has illegally gained access.

    An attempt to compromise a single target by flooding it with requests from multiple systems.

    An attempt to harass or extort all customers of one or more Internet Service Providers (ISPs).

  • Question 128
    900 seconds
    Report an issue
    Q.

    Which of the following scenarios is most characteristic of a phishing attack.

    answer choices

    You accidentally run a piece of code that automatically spreads from one computer to another, exploiting a common vulnerability

    You get an email from the IT support desk that asks you to send a reply email with your username and password to verify your account

    You get an unwanted email trying to sell you a low quality product or service that seems "fishy."

    You accidentally install a piece of software that monitors your activity to steal personal information like your passwords, date of birth, social security number, etc.

  • Question 129
    900 seconds
    Report an issue
    Q.

    Which of the following are true statements about digital certificates in Web browsers?

    I. Digital certificates are used to verify the ownership of encrypted keys used in secured communication

    II. Digital certificates are used to verify that the connection to a Web site is fault tolerant.

    answer choices

    I only

    II only

    I and II

    Neither I nor II

Report an issue
Why show ads?
Report Ad
Join a game