No student devices needed. Know more
16 questions
A certain programming language uses 4-bit binary sequences to represent nonnegative integers. For example, the binary sequence 0101 represents the corresponding decimal value 5. Using this programming language, a programmer attempts to add the decimal values 14 and 15 and assign the sum to the variable total. Which of the following best describes the result of this operation
The correct sum of 29 will be assigned to the variable total.
An overflow error will occur because 4 bits is not large enough to represent either of the values 14 or 15.
An overflow error will occur because 4 bits is not large enough to represent 29, the sum of 14 and 15.
A round-off error will occur because the decimal values 14 and 15 are represented as approximations due to the fixed number of bits used to represent numbers.
Which of the following are true statements about the data that can be represented using binary sequences?
I. Binary sequences can be used to represent strings of characters.
II. Binary sequences can be used to represent colors.
III. Binary sequences can be used to represent audio recordings.
I only
I and II only
II and III only
I, II, and III
Consider the 4-bit binary numbers 0011, 0110, and 1111. Which of the following decimal values is NOT equal to one of these binary numbers?
3
6
9
15
The position of a runner in a race is a type of analog data. The runner’s position is tracked using sensors. Which of the following best describes how the position of the runner is represented digitally?
The position of the runner is determined by calculating the time difference between the start and the end of the race and making an estimation based on the runner’s average speed.
The position of the runner is measured and rounded to either 0 or 1 depending on whether the runner is closer to the starting line or closer to the finish line.
The position of the runner is predicted using a model based on performance data captured from previous races.
The position of the runner is sampled at regular intervals to approximate the real-word position, and a sequence of bits is used to represent each sample.
Which of the following is an advantage of a lossless compression algorithm over a lossy compression algorithm?
A lossless compression algorithm can guarantee that compressed information is kept secure, while a lossy compression algorithm cannot.
A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot.
A lossless compression algorithm typically allows for faster transmission speeds than does a lossy compression algorithm.
A lossless compression algorithm typically provides a greater reduction in the number of bits stored or transmitted than does a lossy compression algorithm.
A user wants to save a data file on an online storage site. The user wants to reduce the size of the file, if possible, and wants to be able to completely restore the file to its original version. Which of the following actions best supports the user’s needs?
Compressing the file using a lossless compression algorithm before uploading it
Answer A: Compressing the file using a lossless compression algorithm before uploading it
Compressing the file using a lossy compression algorithm before uploading it
Compressing the file using both lossy and lossless compression algorithms before uploading it
Uploading the original file without using any compression algorithm
A programmer is developing software for a social media platform. The programmer is planning to use compression when users send attachments to other users. Which of the following is a true statement about the use of compression?
Lossless compression of video files will generally save more space than lossy compression of video files.
Lossless compression of an image file will generally result in a file that is equal in size to the original file.
Lossy compression of an image file generally provides a greater reduction in transmission time than lossless compression does.
Sound clips compressed with lossy compression for storage on the platform can be restored to their original quality when they are played.
A user wants to save a data file on an online storage site. The user wants to reduce the size of the file, if possible, and wants to be able to completely restore the file to its original version. Which of the following actions best supports the user’s needs?
Compressing the file using a lossless compression algorithm before uploading it
Compressing the file using a lossy compression algorithm before uploading it
Compressing the file using both lossy and lossless compression algorithms before uploading it
Uploading the original file without using any compression algorithm
Which of the following actions is most likely to raise legal or ethical concerns?
An analyst writes a program that scans through a database of open-access scientific journals and creates a document with links to articles written on a particular topic.
A computer scientist adds several features to an open-source software program that was designed by another individual.
A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song.
A public interest group alerts people to a scam that involves charging them for a program that is available for free under a Creative Commons license.
Consider the following numeric values.
Binary 1011
Binary 1101
Decimal 5
Decimal 12
Which of the following lists the values in order from least to greatest?
Decimal 5, binary 1011, decimal 12, binary 1101
Decimal 5, decimal 12, binary 1011, binary 1101
Decimal 5, binary 1011, binary 1101, decimal 12
Binary 1011, binary 1101, decimal 5, decimal 12
A programmer created a piece of software and wants to publish it using a Creative Commons license. Which of the following is a direct benefit of publishing the software with this type of license?
The programmer can ensure that the algorithms used in the software are free from bias.
The programmer can ensure that the source code for the software is backed up for archival purposes.
The programmer can include code that was written by other people in the software without needing to obtain permission.
The programmer can specify the ways that other people are legally allowed to use and distribute the software.
A video-streaming Web site uses 32-bit integers to count the number of times each video has been played. In anticipation of some videos being played more times than can be represented with 32 bits, the Web site is planning to change to 64-bit integers for the counter. Which of the following best describes the result of using 64-bit integers instead of 32-bit integers?
2 times as many values can be represented.
32 times as many values can be represented.
232 times as many values can be represented.
322 times as many values can be represented.
Which of the following is a true statement about data compression?
Data compression is only useful for files being transmitted over the Internet.
Regardless of the compression technique used, once a data file is compressed, it cannot be restored to its original state.
Sending a compressed version of a file ensures that the contents of the file cannot be intercepted by an unauthorized user.
There are trade-offs involved in choosing a compression technique for storing and transmitting data.
An online store uses 6-bit binary sequences to identify each unique item for sale. The store plans to increase the number of items it sells and is considering using 7-bit binary sequences. Which of the following best describes the result of using 7-bit sequences instead of 6-bit sequences?
2 more items can be uniquely identified.
10 more items can be uniquely identified.
2 times as many items can be uniquely identified.
10 times as many items can be uniquely identified.
A media librarian at a movie studio is planning to save digital video files for archival purposes. The movie studio would like to be able to access full-quality videos if they are needed for future projects. Which of the following actions is LEAST likely to support the studio’s goal?
Using video file formats that conform to published standards and are supported across many different devices
Using lossy compression software to reduce the size requirements of the data being stored
Using storage media that can be expanded for additional data capacity
Using a system that incorporates redundancy to handle disk failure
A binary number is to be transformed by appending three 0s to the end of the number. For example, 11101 is transformed to 11101000. Which of the following correctly describes the relationship between the transformed number and the original number?
The transformed number is 3 times the value of the original number.
The transformed number is 4 times the value of the original number.
The transformed number is 8 times the value of the original number.
The transformed number is 1,000 times the value of the original number.
Explore all questions with a free account