Which is true about a router?
Which is true about a router?
The various protocols in use on the internet are said to operate in layers in which the protocols at each layer solve one problem related to networked communication, and higher layers are built on top of, and rely on, the lower layers to do their jobs.
From the list provided which internet protocol relies on the other?
The various protocols in use on the internet are said to operate in layers in which the protocols at each layer solve one problem related to networked communication, and higher layers are built on top of, and rely on, the lower layers to do their jobs.
From the list provided which internet protocol relies on the other?
A sample of a company's tracking information collected on their computers appears above. Which of the following is MOST likely to be answerable using all the data collected by this monitoring?
Which of the following BEST describes how protocols on the Internet make use of abstraction to accomplish their respective purposes?
According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?
Which of the following is NOT true about TCP/IP packets?
The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works. The members of the IETF are:
How does a computer resolve a domain name into an IP address?
The figure represents a network of physically linked computers labeled A through F. A line between two computers indicates that the computers can communicate directly with each other. Any information sent between two computers that are not directly connected must go through at least one other computer. The weight or cost of sending information from one computer to another is indicated by the number above the line.
For example, information can be sent directly between computers A, and B and will cost 5. Information sent between computers A and D must go through either computer C (with total cost 5), or through computer B (with total cost 8).
Computer A sends a packet intended to reach computer F. Along its path it arrives at Computer C. Which computer should Computer C forward the packet to in order to use the most cost effective path?
The world is currently in a transition to using IPv6, a newer version of the IP protocol that uses 128-bit addresses instead of 32-bit addresses used by IPv4. What is the main problem that IPv6 was created to solve?
_____ provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. It is tightly linked with IP.
______ is a simplified representation of something more complex. It allows you to hide details to help you manage complexity, focus on relevant concepts, and reason about problems at a higher level.
_____ is the principle that all Internet traffic should be treated equally by Internet Service Providers.
Which of the following is TRUE regarding lossless and lossy compressions?
All of the following would be shown in metadata except:
Which of the following is FALSE regarding file sizes?
Which of the following is FALSE regarding types of files and the file sizes they are measured in?
Your best friend has 50 small images to send to you; each of which is 500 KB. How much space do they take up overall in MB?
You have 1100 MB of data. Your best friend has 3000 MB of data. Will all of this data fit on your 4 GB thumb drive?
A problem solving approach to find a satisfactory solution where finding an optimal or exact solution is impossible (for example, with compression) is called ________________.
How many bytes are required to encode an image that is 25 pixels wide and 50 pixels tall, if you encode each pixel with 3 bytes (24 bits) of RGB data (Note: in addition, there are also 24 bits of metadata)
Which of the following is TRUE regarding data compression?
A student is transferring photos from her camera to her computer. The student notices that the saved photos on her computer are lower quality than the original raw photo on her camera.
Which of the following could be a possible explanation for the difference in image quality?
Under which of the following conditions is it most beneficial to use a heuristic approach to solve a problem?
Which of the following correctly shows the hexadecimal value for Red as a 12-bit representation.
To uncompress the data back into its original binary state, you simply reverse the process. This technique is an example of what type of compression?
In very broad terms the MP3 audio compression algorithm identifies frequencies and volume levels - low and high - that are outside the range of human hearing and removes the data representing these frequencies from the original.
This technique results in a smaller audio file that sounds exactly the same to the human ear. This technique is an example of what type of compression?
Approximately how much bigger (how many more bytes) is a megabyte than a kilobyte?
The term that defines data about the data is called _____.
Programming languages have some similarities and differences to the "natural" language you use in everyday speech. Select the two true statements about programming languages:
Which of the following images shows the path and ending location of the robot that will result from executing the code above. The starting location of the robot is shown as dotted triangle for cases where the robot does not start and end at the same location.
REPEAT 4 TIMES {
MOVE_FORWARD()
MOVE_FORWARD()
MOVE_FORWARD()
ROTATE_RIGHT(90)
MOVE_FORWARD()
ROTATE_RIGHT(90)
MOVE_FORWARD()
ROTATE_RIGHT(90)
}
Consider the following incorrect program, which is intended to move the robot around the perimeter of a grid, as indicated by the drawing below. The starting position and direction of the robot is indicated in the diagram.
Line 1: 4 TIMES
Line 2: {
Line 3: MOVE_FORWARD()
Line 4: ROTATE_RIGHT()
Line 5: MOVE_FORWARD()
Line 6: MOVE_FORWARD()
Line 7: MOVE_FORWARD()
Line 8: MOVE_FORWARD()
Line 9: ROTATE_RIGHT()
Line 10: }
Given the options below, which lines should be removed so the program will work as intended?
Which of the following is NOT true about functions in programming?
What is one important naming convention of functions?
Which one of the following statements about functions is TRUE?
A problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.
You will need to use the Top-Down Design Strategy to create a program to design a snowflake. Make sure you a using logical chunks and have reasonable names for your chunks of programming.
Which of the following will call the function drawStar?
For this scenario related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions) to handle the task:
Drawing out the letters of a word "HELLO"
For this scenario related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions) to handle the task:
Drawing a hexagon (six-sided shape)
For this scenario related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions) to handle the task:
Drawing 100 tiny dots in a line.
For this scenario related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions) to handle the task:
Drawing a circle of any size at any point on the screen.
Why are parameters useful when programming?
What is the most likely outcome of running the code shown at right?
When programmers work together, what is an example of how abstraction in programming can promote collaboration?
Which of the following images represents the most likely output produced by the code segment given below?
Explain how abstraction allows for the creation of increasingly complex systems. Reference top-down design strategy in your response.
Why are these icons a good use of abstraction?
What is the point of binary?
Why do computers use binary to represent digital data?
What is the minimum number of bits you would need to encode the 26 letters of the alphabet plus a space - a total of 27 characters
Which of the following is NOT true about representing digital data?
A company database has each customer's unique ID number stored as an 10-bit number called customerID. The company is expanding and most of the their 10-bit number has already been assigned to a student. Of the options below which is the smallest change to the way customerID is represented necessary to ensure each new customer receives a uniqueID?
Which of the following is true about the way digital data is transmitted on the Internet?
Two students have developed a protocol in which they send 4-bit messages to each other. They decide to modify their protocol to start sending 8-bit messages instead. How many more values can be represented in an 8-bit message than a 4-bit message?
______ encryption is a method of encryption involving one key for both encryption and decryption
Which of the following most accurately describes Moore's Law?
In public key cryptography, the sender uses the recipient's public key to encrypt a message. Which of the following is needed to decrypt the message?
How do Internet packets travel to their destination?
What are brute-force attacks?
What is a symmetric key used for?
What is the definition of bandwidth?
What is the purpose of DNS? (Domain Name System)
What is the most common way computer viruses are spread?
The protocol used for transmitting web pages over the Internet is called ...
What does the s in https refer to?
When someone tries to get you to give up personal information through email or a bogus website it is called a: *
How is the Internet scalable?
What is 20 MOD 15?
What is the "key" to a Caesar Cipher that someone needs to know (or discover) to decrypt the message?
Which of the following is the most accurate description of what is known as the "digital divide". The digital divide is about how...
Which of the following statements best describes the properties of public key encryption?
When a computer scientist uses the term "Big Data" what do they typically mean?
How can financial transactions safely occur on the Internet?
A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption to encrypt their customers' credit card information. Is this a secure form of payment?
Pick the two expressions involving the Modulo operation that compute to the exact same value (choose 2)
Choose the answer that is NOT a feature of Public Key Cryptography:
A programmer is writing a system that is intended to be able to store large amounts of personal data. As the programmer develops the data system, which of the following is LEAST likely to impact the programmer's choices in designing the structure of the system?
What is a Distributed Denial of Service (DDoS) attack?
Which of the following scenarios is most characteristic of a phishing attack.
Which of the following are true statements about digital certificates in Web browsers?
I. Digital certificates are used to verify the ownership of encrypted keys used in secured communication
II. Digital certificates are used to verify that the connection to a Web site is fault tolerant.