Comp Sci Flashcards
Which of the following is an example of a phishing attack?
Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information
What are the values of first and second as a result of executing the code segment?
first = 200, second = 100
Which of the following best explains the relationship between the Internet and the World Wide Web?
The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that are accessed via the Internet.
A code segment is intended to display the following output.
up down down down up down down down
Which of the following code segments can be used to display the intended output?
Repeat 2 Times
Display “up”
Repeat 3 times
Display “down”
Which of the following best exemplifies the use of multifactor authentication to protect an online banking
system?
Requiring the use of a fingerprint scan and a password.
Which of the following best describes a direct benefit in using redundant routing on the Internet?
Redundancy often allows messages to be sent on the network even if some network devices or connections have failed.
Which of the following replacements for <MISSING> can be used to move the robot to the gray
square?</MISSING>
IF (CAN_MOVE (right))
{
ROTATE_RIGHT ()
}
IF (CAN_MOVE (left))
{
ROTATE_LEFT ()
}
MOVE_FORWARD()
Which of the following is NOT a benefit of collaborating to develop a computing innovation?
Collaboration can decrease the size and complexity of tasks required of individual team membe
- The author of an e-book publishes the e-book using a no-rights-reserved Creative Commons license. Which
of the following best explains the consequences of publishing the book with this type of license?
Individuals can freely distribute or use the contents of the e-book without needing to obtain additional permissions from the author.
Which of the following best explains how devices and information can be susceptible to unauthorized access
if weak passwords are used?
Un authorized individuals can deny services to a computing system by overwhelming the system with login attempts.
At one time, the count for the most popular video was about two million. Sometime later, the same video displayed a seven-digit negative number as its count, while the counts for the other videos displayed correctly. Which of the following is the most likely explanation for the error?
The count for the video became larger than the maximum value allowed by the data type used to store the count.
Which of the following statements about the Internet is true?
The Internet requires all communications to use encryption protocols
Individuals sometimes attempt to remove personal information from the Internet. Which of the following is the LEAST likely reason the personal information is hard to remove?
All personal information is stored online using authentication measures, making the information hard to access.
A scientist wants to investigate several problems. In which of the following situations is using a simulation
LEAST suitable for solving a problem?
When the solution to the problem requires real-world data inputs that are continually measured a regular intervals.
A state government is attempting to reduce the digital divide. Which of the following activities has the
greatest potential to contribute to the digital divide rather than reducing it?
Requiring applicants for government jobs to apply using an online platform.
Which of the following code segments will move the robot to the gray square along the path indicated by the arrows?
C
Using only the information in the database, which of the following questions CANNOT be answered?
What is the average number of customer deliveries made by each truck on a particular day?
Which of the following pairs of spreadsheets
can be combined and analyzed to determine the desired information?
Spreadsheets I and II
Which of the following parallel computing solutions would minimize the amount of time it takes to execute
all four processes?
p and q on one processor and processes r and s on the other processor.
Which of the following expressions represents the value stored in the variable x as a result of executing
the program?
2 * 3 * 3 * 3 * 3
Which of the following best explains why such an approach is considered useful for this
project?
The image analysis is likely to take a longer time for the research team than for a distributed group of individuals.
red red blue red red blue red red blue
Which of the following code segments can be used to display the intended output?
C
In a certain computer program, two positive integers are added together, resulting in an overflow error.
Which of the following best explains why the error occurs?
The program cannot represent integers; the integers are converted into decimal approximations, leading to rounding errors.
For which of the following input values will the circuit have an output of true ?
A = true, B = false, C = false, D = false
Which of the following statements best describes the correctness of the program
Both program I and program II correctly move the robot to the gray square.
Flight simulation software, which imitates the experience of flying, is often used to train airline pilots.
Which of the following is LEAST likely to be an advantage of using flight simulation software for this
purpose?
Flight simulation software provides a more realistic experience for pilots than actual training flights.
Which of the following actions are generally helpful in program development?
1. Consulting potential users of the program to identify their concerns
2. Writing and testing small code segments before adding them to the program
3. Collaborating with other individuals when developing a large program
I, II, III
An Internet user has a need to send private data to another user. Which of the following provides the most
security when transmitting private data?
Sending the data using public-key encryption
Which of the following code segments correctly displays the cost of a ticket?
B cost 6
IF (age > 12)
{
cost cost + 2
}
IF (includesTour)
{
cost cost + 2
}
DISPLAY (cost)
According to information in the table, what color is represented by the binary RGB triplet (11111111,
11111111, 11110000) ?
Ivory
What is the binary RGB triplet for the color indigo?
C. (01001011, 00000000, 10000010)
Which of the following CANNOT be determined from the information collected by the system?
The total number of books that were never borrowed in a given year
Which of the following can be used as step 3 so that the algorithm works as intended?
Step 3: Display the remainder of number divided by 10 and store the integer quotient in number.
Which of the following best compares the values displayed by programs A and B?
Program A and program B display identical values in the same order.