Comp Sci Flashcards

1
Q

Which of the following is an example of a phishing attack?

A

Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the values of first and second as a result of executing the code segment?

A

first = 200, second = 100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following best explains the relationship between the Internet and the World Wide Web?

A

The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that are accessed via the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A code segment is intended to display the following output.
up down down down up down down down
Which of the following code segments can be used to display the intended output?

A

Repeat 2 Times
Display “up”
Repeat 3 times
Display “down”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following best exemplifies the use of multifactor authentication to protect an online banking
system?

A

Requiring the use of a fingerprint scan and a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following best describes a direct benefit in using redundant routing on the Internet?

A

Redundancy often allows messages to be sent on the network even if some network devices or connections have failed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following replacements for <MISSING> can be used to move the robot to the gray
square?</MISSING>

A

IF (CAN_MOVE (right))
{
ROTATE_RIGHT ()
}
IF (CAN_MOVE (left))
{
ROTATE_LEFT ()
}
MOVE_FORWARD()

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is NOT a benefit of collaborating to develop a computing innovation?

A

Collaboration can decrease the size and complexity of tasks required of individual team membe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. The author of an e-book publishes the e-book using a no-rights-reserved Creative Commons license. Which
    of the following best explains the consequences of publishing the book with this type of license?
A

Individuals can freely distribute or use the contents of the e-book without needing to obtain additional permissions from the author.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following best explains how devices and information can be susceptible to unauthorized access
if weak passwords are used?

A

Un authorized individuals can deny services to a computing system by overwhelming the system with login attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

At one time, the count for the most popular video was about two million. Sometime later, the same video displayed a seven-digit negative number as its count, while the counts for the other videos displayed correctly. Which of the following is the most likely explanation for the error?

A

The count for the video became larger than the maximum value allowed by the data type used to store the count.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following statements about the Internet is true?

A

The Internet requires all communications to use encryption protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Individuals sometimes attempt to remove personal information from the Internet. Which of the following is the LEAST likely reason the personal information is hard to remove?

A

All personal information is stored online using authentication measures, making the information hard to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A scientist wants to investigate several problems. In which of the following situations is using a simulation
LEAST suitable for solving a problem?

A

When the solution to the problem requires real-world data inputs that are continually measured a regular intervals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A state government is attempting to reduce the digital divide. Which of the following activities has the
greatest potential to contribute to the digital divide rather than reducing it?

A

Requiring applicants for government jobs to apply using an online platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following code segments will move the robot to the gray square along the path indicated by the arrows?

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Using only the information in the database, which of the following questions CANNOT be answered?

A

What is the average number of customer deliveries made by each truck on a particular day?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following pairs of spreadsheets
can be combined and analyzed to determine the desired information?

A

Spreadsheets I and II

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following parallel computing solutions would minimize the amount of time it takes to execute
all four processes?

A

p and q on one processor and processes r and s on the other processor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following expressions represents the value stored in the variable x as a result of executing
the program?

A

2 * 3 * 3 * 3 * 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following best explains why such an approach is considered useful for this
project?

A

The image analysis is likely to take a longer time for the research team than for a distributed group of individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

red red blue red red blue red red blue
Which of the following code segments can be used to display the intended output?

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In a certain computer program, two positive integers are added together, resulting in an overflow error.
Which of the following best explains why the error occurs?

A

The program cannot represent integers; the integers are converted into decimal approximations, leading to rounding errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

For which of the following input values will the circuit have an output of true ?

A

A = true, B = false, C = false, D = false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following statements best describes the correctness of the program

A

Both program I and program II correctly move the robot to the gray square.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Flight simulation software, which imitates the experience of flying, is often used to train airline pilots.
Which of the following is LEAST likely to be an advantage of using flight simulation software for this
purpose?

A

Flight simulation software provides a more realistic experience for pilots than actual training flights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following actions are generally helpful in program development?
1. Consulting potential users of the program to identify their concerns
2. Writing and testing small code segments before adding them to the program
3. Collaborating with other individuals when developing a large program

A

I, II, III

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

An Internet user has a need to send private data to another user. Which of the following provides the most
security when transmitting private data?

A

Sending the data using public-key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following code segments correctly displays the cost of a ticket?

A

B cost 6
IF (age > 12)
{
cost cost + 2
}
IF (includesTour)
{
cost cost + 2
}
DISPLAY (cost)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

According to information in the table, what color is represented by the binary RGB triplet (11111111,
11111111, 11110000) ?

A

Ivory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the binary RGB triplet for the color indigo?

A

C. (01001011, 00000000, 10000010)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following CANNOT be determined from the information collected by the system?

A

The total number of books that were never borrowed in a given year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following can be used as step 3 so that the algorithm works as intended?

A

Step 3: Display the remainder of number divided by 10 and store the integer quotient in number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following best compares the values displayed by programs A and B?

A

Program A and program B display identical values in the same order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

While debugging the program, the student realizes that the loop never terminates. Which of the following
changes can be made so that the program works as intended?

A

Inserting index ← index - 1 between lines 7 and 8

36
Q

Which of the following can be represented by a sequence of bits?
1. An integer
2. An alphanumeric character
3. A machine language instruction

A

I, II, and III

37
Q

Which of the following replacements for <MISSING> can be used to move the robot to the gray
square?</MISSING>

A

B REPEAT UNTIL (CAN_MOVE (forward) = false)
{
MOVE_FORWARD ()
}
ROTATE_RIGHT ()

REPEAT UNTIL (CAN_MOVE (right))
{

38
Q

Which of the following best describes the growth in the number of registered users for the first eight years
of the application’s existence?

A

The number of registered users about doubled each year for years 1 to 5 and then increased at about a constant rate after that.

39
Q

Which of the following best describes the average amount of data stored per user for the first eight years of the application’s existence?

A

Across all eight years, the average amount of data stored per user was about 10 GB.

40
Q

Which of the following observations is most consistent with the information in the circle graph?

A

Over 75% of the files stored are 10 MB in size or less.

41
Q

Which of the following code segments can be used to simulate the behavior of the spinner?

A

D

42
Q

Which of the following statements is equivalent to the algorithm in the flowchart?

A

B

43
Q

Which of the following describes the result of executing the program?

A

The program displays the sum of odd integers from 1 to 19.

44
Q

Which of the following statements correctly explain how the Internet is able to facilitate communication at a large scale?
1. A central monitoring computer is used to track and maintain the connections of the Internet.
2. Data is routed between points in multiple ways so that if a connection fails, the data can be rerouted
around the inoperative connections.
3. Protocols for packets and routing are used so that computers from different manufacturers can
communicate in a standard way

A

II and III only

45
Q

Which of the following is LEAST likely to be stored as metadata associated with the image?

A

A duplicate copy of the data

46
Q

Which of the following best explains why it is not possible to use computers to solve every problem?

A

There exist some problems that cannot be solved using any algorithm.

47
Q

Which of the following code segments can be
used to interchange the values of alpha and beta using the temporary variable temp ?

A

I and III only

48
Q

A person wants to transmit an audio file from a device to a second device. Which of the following scenarios
best demonstrates the use of lossless compression of the original file?

A

A device compresses the audio file before transmitting it to a second device. The second device restores the compressed file to its original version before playing it.

49
Q

Which of the following is NOT a possible value displayed by the program?

A

out of range

50
Q

Under which of the following conditions is it considered acceptable for the student to share the application?

A

When the student gets permission from the copyright owner of the application.

51
Q

The student’s individual assignment scores are stored in the list scores. Which of the following can be used to calculate a student’s course grade and store the result in the variable finalGrade?

A

finalGrade ←← Sum (scores) - Min (scores)

finalGrade ←← finalGrade / (LENGTH (scores) - 1)

52
Q

Which of the following CANNOT be determined from this data alone?

A

For a given student, the value of the highest assignment score

53
Q

Which of the following code segments will move the robot to the gray square along the path indicated by the arrows?

A

C 303

54
Q

Which of the following procedures is a generalization of the MaxTwo and MaxThree procedures?

A

Procedure Max (numList), which returns the maximum value in the list of integers numList

55
Q

Of the following, which is the most likely effect the
updated model will have on the simulation?

A

The updated model is likely to decrease the runtime of the simulation because the time required for simulations generally depends on the complexity of the model used.

56
Q

The DrawLine procedure is to be used to draw the following figure on a coordinate grid.
Which of the following can be used to replace <MISSING> so that the figure is drawn correctly?</MISSING>

A

DrawLine (startX, startY, endX, endY)
endY ←← endY - 2

57
Q

Internet protocol version 6 (IPv6) has been introduced to replace the previous version (IPv4). Which of the
following best describes a benefit of IPv6 over IPv4?

A

IPv6 allows for a greater number of addresses than IPv4, which allows more devices to be
connected to the Internet.

58
Q

Which change, if any, is needed for the program to work as intended?

A

Lines 5 and 6 should be interchanged.

59
Q

Which of the following best explains how a certificate authority is used in protecting data?

A

A certificate authority verifies the authenticity of encryption keys used in secured communications.

60
Q

A photographer has a collection of digital pictures, each using the same file-naming format: a date tag, followed by a description, followed by the file extension “.jpg”. The photographer
wants to write a code segment to extract the description from each file name, as shown in the following table

A

1 & III

61
Q

Which of the following Boolean expressions will evaluate to true if and only if score is within 10
points of target ?

A

(target - 10 ≤ score) AND (score ≤ target + 10)

62
Q

In which of the configurations is it possible to have redundant routing between devices Q and V?

A

Both configuration I and configuration II

63
Q

In configuration I, what is the minimum number of connections that must be broken or removed before
device T can no longer communicate with device U?

A

Two

64
Q

Which of the following code segments best simulates the behavior of the game?

A

D sum 0 OR

65
Q

Which of the following best explains how IP addresses are assigned?

A

As a new device is connected to the Internet, it is assigned an IP address to enable communication on the network.

66
Q

numList. Which of the following conditions must be
met in order for the procedure to work as intended?

A

The values in numList must be in sorted order

67
Q

Which of the following scenarios best exemplifies a phishing attack?

A

A user receives an e-mail from a sender offering technical help with the user’s computer. The e-mail prompts the user to start a help session by clicking a provided link and entering the username and password associated with the user’s computer.

68
Q

What is the minimum number of bits needed to assign a unique bit sequence to each staff member?

A

7

69
Q

Which of the algorithms run in reasonable time?

A

I, II, and III

70
Q

Which of the following best describes the impact of Creative Commons?

A

Creative Commons gives creators of digital content the ability to indicate how their works can be legally used and distributed, enabling broad access to digital information.

71
Q

Which of the following are true statements about the simulation?

A

I only

72
Q

A system is being developed to help pet owners locate lost pets. Which of the following best describes a system that uses crowdsourcing?

A

A mobile application that allows users to report the location of a pet that appears to be lost and upload a photo that is made available to other users of the application

73
Q

Which of the following changes, if any, can be made so that the code segment works as intended?

A

Changing line 5 to APPEND (newList, number)

74
Q

Which of the following can be used as step 2 so that the algorithm works as intended?

A

Step 2: Each person writes their height, in centimeters, at the top of the card and writes the number 1 at the
bottom of the card.

75
Q

Which of the following best compares the execution times of the two versions of the program?

A

Version II requires approximately 5 more minutes to execute than version I.

76
Q

Which of the following best describes the purpose of these protocols?

A

To establish a common standard for sending messages between devices on the Internet

77
Q

For which of the following procedure calls does the procedure NOT return the intended value?

A

AnyPairs (“bat”, “cat”, “bat”)

78
Q

Which of the following is NOT an advantage of using open-source software?

A

The original developer of open-source software provides free or low-cost support for users installing and running the software.

79
Q

Which of the following can be used to assign the intended value to count ?

A

D
newList1 ←← RemoveAllDups (list1)
newList2 ←← RemoveAllDups (list2)
bothList ←← Combine (newList1, newList2)
uniqueList ←← RemoveAllDups (bothList)
count ←← LENGTH (bothList) - LENGTH (uniqueList)

80
Q

Which of the following will display the value true?

A

x or y display x
x display x or y

81
Q

Which of the following actions are likely to be helpful in reducing the digital divide?

A

B
Designing new technologies to be accessible to individuals with different physical abilities
D
Having world governments support the construction of network infrastructure

82
Q

Which columns in the database can be ignored and still allow the employee to perform this calculation?

A

A Author
B Title

83
Q

For which of the following procedure calls does the procedure NOT return the intended value?

A

B Multiply 2, -5
D Multiply -2, -5

84
Q

Which of the following can be used to store the string “jackalope” in the string variable animal ?
Select two answers.

A

B
animal ←← Substring (“antelope”, 5, 4)
animal ←← Concat (“a”, animal)
animal ←← Concat (Substring (“jackrabbit”, 1, 4), animal)
C
animal ←← Substring (“jackrabbit”, 1, 4)
animal ←← Concat (animal, “a”)
animal ←← Concat (animal, Substring (“antelope”, 5, 4))

85
Q

Which two lines of code should be removed so that the program will work as intended?
Select two answers.

A

A Line 5
C Line 9

86
Q

For which of the following code segments will the call to NumOccurrences NOT return the intended
value?

A

A and B