Apple Developer Academy Exam Prep Flashcards

1
Q

To limit hops _____ is a mechanism that limits the lifespan or lifetime of data in a computer or network

A

TTL (Time To Live)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A _____ network is a network topology in which each node relays data and all nodes cooperate in the distribution of data in the network.

A

Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The File Transfer Protocol (FTP) is a standard network protocol used for the _____ of computer files from a server to a client using the _____ model on a computer network.

A

Transfer, client-server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_____ is used to obtain Network Layer addresses (for example, IP addresses) of other nodes from Data Link Layer (Layer 2) addresses.

A

Reverse Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The IPv4 header _____ is a simple _____ used in version 4 of the Internet Protocol (IPv4) to protect the header of IPv4 data packets against data corruption. This _____ is calculated only for the header bytes (with the checksum bytes set to 0), is 16 bits long and is a part of the IP packet header.

A

checksum, checksum, checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A cloud service provider wants to provide storage as a service to users. The company is based in Italy and operates its data center there. What would the company do in order to ensure <b> high availability </b> for the storage services they provide?

A

Build a data center in US and backup user data there

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the components of a cloud computing environment?

A

Client, application, platform, infrastructure, server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In cloud computing, which term is used to describe the nature of IT infrastructure and allows dynamic scaling depending on the demand for resources?

A

Elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the role of virtualization in cloud computing?

A

It optimizes the utilization of computing resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which term usually presents a single point of failure in regard to cloud computing?

A

Network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The manipulation of people to disclose confidential information defines what type of risk?

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A _____ denial-of-service attack occurs when a denial-of-service attack is orchestrated among multiple remote computers or devices.

A

Distributed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In computing, the term “spam” refers to _____

A

Unsolicited bulk e-mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ is a class of malware designed specifically to automate cybercrime.

A

Crimeware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Firewall is a set of related programs, located at a network gateway server that protects the resources of a private network from users from other networks. A firewall examines all traffic routed between the two networks to see if it meets certain criteria.
Packet filter is one fo the categories of firewall.
Packet filtering firewall works at which of these layers of the OSI model?

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A UNION query _____

A

Must include the same number of columns of the two tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The SQL ALTER statement can be used to _____

A

Change the table structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You can add a row using SQL in a database with the command _____

A

INSERT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What SQL statement would correctly insert data into a table called “Projects”?

A

INSERT INTO Projects (ProjectName, ProjectDescription) VALUES (‘Content Development’, ‘Website content development project’)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What statements defines what SQL’s can be used for?

A

Only to create database structure.
Only to query database data.
Only to modify database data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

iOS Human Interface Guidelines: Interface Essentials. Most iOS apps are built using components from UIKit, a programming framework that defines common interface elements. Which of the following is not a native component in iOS user interface design?

A

Hamburger Menus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In UI design the term “white space” is commonly referring to _____

A

The empty space between the visual elements of a layout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

According to the Apple Human Interface Guidelines the Tab Bar is _____

A

A component that appears at the bottom of an app screen and provides the ability to quickly switch between different sections of an app.

24
Q

One of the fundamental principles described in the Apple HIG is “consistency”.
What is this principle about?

A

Implementing familiar standards and paradigms by using system-provided interface elements.

25
Q

One of the main themes of the Apple HIG is “deference”.

What is this theme about?

A

Interface elements will never compete with content.

26
Q

What is Auto Layout?

A

A development tool for constructing adaptive interfaces.

27
Q

According to the Apple Human Interface Guideline a picker is _____

A

A component that shows one or more scrollable lists of distinct values, each of which has a single selected value.

28
Q

What is the system typeface in iOS?

A

San Francisco

29
Q

In UI/UX design visual hierarchy is _____

A

The arrangement of elements in a way that implies relative importance.

30
Q

According to Apple Human Interface Guidelines color is a great way to impart vitality, provide visual continuity, communicate status information, give feedback in response to user actions, and help people visualize data. What should be avoided?

A

Using the same color for interactive and non interactive elements.

31
Q

Var c = 0
Var b = 1
Var a = 2
C = a + b + 5

What is the value of var “c”?

A

8

32
Q

Let valore = “That’s the second biggest monkey head I’ve ever seen!”
What is the right Swift type of “valore”?

A

String

33
Q

In the following Swift code:
Let a = 10
Let b = 5
Let c = a == a + b

What is the value of “c”?

A

False

34
Q

In the Swift programming language what is a “Protocol”?

A

The function that your app must include or may include if some functions are optional.

35
Q

In the Swift programming language what is an extension?

A

A method to add some functions to an existing class.

36
Q

In the Swift programming language what is an “optional”?

A

A value which can have a value or not(nil).

37
Q

What is the type of output of func “test”?

Func test() -> [Int]

A

Array of Int

38
Q

What is the output of the following snippet of code?
Let a = 3
A += 1
Print(a)

A

Compile error

39
Q

Var str = “I wanna be a pirate”
Str = str + “!”

What is the final value of the variable “str”?

A

I wanna be a pirate!

40
Q

What does the following code mean?

+= 3

A

Add 3 to an existing numerical value

41
Q

In the OOP paradigm, how do we call the property of having the same operation (method) behaving differently (override) in each descendant class OR having the same operation/method with different signatures (overload)?

A

Polymorphism

42
Q

Inheritance allows sharing attributes and methods by classes and they are used mainly with the goal of reusing code or to define a general behavior for an object of this class and descendants. Given the OOP paradigm, can we say the previous sentence is CORRECT?

A

Yes

43
Q

In the OOP paradigm, the “overload” of a method is related to the OOP property called _____

A

Polymorphism

44
Q

In the OOP paradigm, the definitions which are the base to create objects are called _____

A

Classes

45
Q

In the OOP paradigm, it is true that _____

A

By applying the OOP concept, it makes possible for a program to access areas or partitions of memory where it can find objects (data + procedures) representing each reality

46
Q

In the OOP paradigm, attributes define _____

A

The properties of an object

47
Q

What is the difference between a class and a object?

A

An object is an instance of a Class

48
Q

What is a class method?

A

A chunk of code in the form of a procedure.

49
Q

What is the initializer function?

A

A function that provides an initial value to the stored properties.

50
Q

What is a computed property?

A

A calculated property that has an associated value computed based on some form of calculation

51
Q

Consider the series of numbers:
8, 6, 9, 23, 87, _____

What number should come next in the series?

A

429

It is 81 - 2, 62 - 3, 9*3 - 4, …

52
Q

If I throw a 6 faced die what is the probability of obtaining 5 or 6?

A

33.3%

53
Q

Six foxes catch six hens in six minutes. How many foxes will be needed to catch sixty hens in sixty minutes?

A

6

54
Q

Look at your hands: you have 10 fingers!

How many fingers do 10 hands have?

A

50

55
Q

Which number is missing from this sequence?

32, 31, 32, 29, 32, 27, 32, _____, 32

A

25

56
Q

In the systems of equations below, what is the value of x?

2x + 2y = -4
4x + y = 1

A

1, solve both equations for x or y and set them equal to each other

57
Q

If Luisa was 32 years old 8 years ago, how old was she x years ago?

A

40 - x