Apple Developer Academy Exam Prep Flashcards
To limit hops _____ is a mechanism that limits the lifespan or lifetime of data in a computer or network
TTL (Time To Live)
A _____ network is a network topology in which each node relays data and all nodes cooperate in the distribution of data in the network.
Mesh
The File Transfer Protocol (FTP) is a standard network protocol used for the _____ of computer files from a server to a client using the _____ model on a computer network.
Transfer, client-server
_____ is used to obtain Network Layer addresses (for example, IP addresses) of other nodes from Data Link Layer (Layer 2) addresses.
Reverse Address Resolution Protocol
The IPv4 header _____ is a simple _____ used in version 4 of the Internet Protocol (IPv4) to protect the header of IPv4 data packets against data corruption. This _____ is calculated only for the header bytes (with the checksum bytes set to 0), is 16 bits long and is a part of the IP packet header.
checksum, checksum, checksum
A cloud service provider wants to provide storage as a service to users. The company is based in Italy and operates its data center there. What would the company do in order to ensure <b> high availability </b> for the storage services they provide?
Build a data center in US and backup user data there
What are the components of a cloud computing environment?
Client, application, platform, infrastructure, server
In cloud computing, which term is used to describe the nature of IT infrastructure and allows dynamic scaling depending on the demand for resources?
Elasticity
What is the role of virtualization in cloud computing?
It optimizes the utilization of computing resources
Which term usually presents a single point of failure in regard to cloud computing?
Network connection
The manipulation of people to disclose confidential information defines what type of risk?
Social Engineering
A _____ denial-of-service attack occurs when a denial-of-service attack is orchestrated among multiple remote computers or devices.
Distributed
In computing, the term “spam” refers to _____
Unsolicited bulk e-mail
_____ is a class of malware designed specifically to automate cybercrime.
Crimeware
Firewall is a set of related programs, located at a network gateway server that protects the resources of a private network from users from other networks. A firewall examines all traffic routed between the two networks to see if it meets certain criteria.
Packet filter is one fo the categories of firewall.
Packet filtering firewall works at which of these layers of the OSI model?
Network Layer
A UNION query _____
Must include the same number of columns of the two tables.
The SQL ALTER statement can be used to _____
Change the table structure.
You can add a row using SQL in a database with the command _____
INSERT
What SQL statement would correctly insert data into a table called “Projects”?
INSERT INTO Projects (ProjectName, ProjectDescription) VALUES (‘Content Development’, ‘Website content development project’)
What statements defines what SQL’s can be used for?
Only to create database structure.
Only to query database data.
Only to modify database data.
iOS Human Interface Guidelines: Interface Essentials. Most iOS apps are built using components from UIKit, a programming framework that defines common interface elements. Which of the following is not a native component in iOS user interface design?
Hamburger Menus
In UI design the term “white space” is commonly referring to _____
The empty space between the visual elements of a layout
According to the Apple Human Interface Guidelines the Tab Bar is _____
A component that appears at the bottom of an app screen and provides the ability to quickly switch between different sections of an app.
One of the fundamental principles described in the Apple HIG is “consistency”.
What is this principle about?
Implementing familiar standards and paradigms by using system-provided interface elements.
One of the main themes of the Apple HIG is “deference”.
What is this theme about?
Interface elements will never compete with content.
What is Auto Layout?
A development tool for constructing adaptive interfaces.
According to the Apple Human Interface Guideline a picker is _____
A component that shows one or more scrollable lists of distinct values, each of which has a single selected value.
What is the system typeface in iOS?
San Francisco
In UI/UX design visual hierarchy is _____
The arrangement of elements in a way that implies relative importance.
According to Apple Human Interface Guidelines color is a great way to impart vitality, provide visual continuity, communicate status information, give feedback in response to user actions, and help people visualize data. What should be avoided?
Using the same color for interactive and non interactive elements.
Var c = 0
Var b = 1
Var a = 2
C = a + b + 5
What is the value of var “c”?
8
Let valore = “That’s the second biggest monkey head I’ve ever seen!”
What is the right Swift type of “valore”?
String
In the following Swift code:
Let a = 10
Let b = 5
Let c = a == a + b
What is the value of “c”?
False
In the Swift programming language what is a “Protocol”?
The function that your app must include or may include if some functions are optional.
In the Swift programming language what is an extension?
A method to add some functions to an existing class.
In the Swift programming language what is an “optional”?
A value which can have a value or not(nil).
What is the type of output of func “test”?
Func test() -> [Int]
Array of Int
What is the output of the following snippet of code?
Let a = 3
A += 1
Print(a)
Compile error
Var str = “I wanna be a pirate”
Str = str + “!”
What is the final value of the variable “str”?
I wanna be a pirate!
What does the following code mean?
+= 3
Add 3 to an existing numerical value
In the OOP paradigm, how do we call the property of having the same operation (method) behaving differently (override) in each descendant class OR having the same operation/method with different signatures (overload)?
Polymorphism
Inheritance allows sharing attributes and methods by classes and they are used mainly with the goal of reusing code or to define a general behavior for an object of this class and descendants. Given the OOP paradigm, can we say the previous sentence is CORRECT?
Yes
In the OOP paradigm, the “overload” of a method is related to the OOP property called _____
Polymorphism
In the OOP paradigm, the definitions which are the base to create objects are called _____
Classes
In the OOP paradigm, it is true that _____
By applying the OOP concept, it makes possible for a program to access areas or partitions of memory where it can find objects (data + procedures) representing each reality
In the OOP paradigm, attributes define _____
The properties of an object
What is the difference between a class and a object?
An object is an instance of a Class
What is a class method?
A chunk of code in the form of a procedure.
What is the initializer function?
A function that provides an initial value to the stored properties.
What is a computed property?
A calculated property that has an associated value computed based on some form of calculation
Consider the series of numbers:
8, 6, 9, 23, 87, _____
What number should come next in the series?
429
It is 81 - 2, 62 - 3, 9*3 - 4, …
If I throw a 6 faced die what is the probability of obtaining 5 or 6?
33.3%
Six foxes catch six hens in six minutes. How many foxes will be needed to catch sixty hens in sixty minutes?
6
Look at your hands: you have 10 fingers!
How many fingers do 10 hands have?
50
Which number is missing from this sequence?
32, 31, 32, 29, 32, 27, 32, _____, 32
25
In the systems of equations below, what is the value of x?
2x + 2y = -4
4x + y = 1
1, solve both equations for x or y and set them equal to each other
If Luisa was 32 years old 8 years ago, how old was she x years ago?
40 - x