exam 2 Flashcards

1
Q

I understand that this is a closed book, closed notes test and I will not give nor receive unauthorized aid on this test.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A microprocessor is a special-purpose computer that is used to conduct scientific experiments.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Moore’s Law states that the number of transistors that can be manufactured on a computer chip doubles every 1 to 2 years.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The steps of the scientific method are Decomposition, Pattern Recognition, Abstraction, and Algorithms.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Greek natural philosophy is often referred to as “pre-scientific”, since it relied on contemplation or observation, but not experimentation.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Suppose you have been given a sorted list of 100 names and need to find a particular name in that list. Using sequential search, it is possible that you might have to look at every location in the list before finding the desired name.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Binary search is an example of an O(log N) algorithm, where the number of items in the list to be searched is N.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Private-key encryption algorithms require the sender and recipient of a message to agree upon a secret key (or password) for encoding and decoding the message.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following statements about transistors is FALSE?

A

They tended to burn out more frequently than the switching technology they replaced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is NOT one of the key characteristics in computational thinking (as discussed in class)?

A

Incorporating experimental data to justify theoretical hypotheses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Consider the following chain letter scheme.

In round 1, the person initiating the chain letter sends a copy to 2 people (resulting in 3 people now having a copy).
In round 2, the 2 people receiving the letter each send copies to 2 other people (resulting in 7 people now having a copy).
This process continues in subsequent rounds, that is: in round N, each person who received the letter in round (N-1) sends a copy to 2 new people.
How many rounds would it take before 200 people have a copy of the chain letter?

A

7
200
no-10
100
50

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Suppose Adam conducts three different experiments with coin flips, flipping a fair coin 10 times each experiment. He obtains 8, 9, and 7 heads, respectively. Similarly, Bev conducts three experiments but flips the fair coin 20 times each experiment. She obtains 13, 10, and 7 heads, respectively. Using the same measures for consistency (the relative difference between lowest and highest value) and accuracy (closeness of average to expected) as in Lab 3, which of the following is TRUE?

A

Adam’s results are more consistent, but Bev’s are more accurate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Suppose a text span with ID numSpan contains a number. Which of the following JavaScript statements would increase the number in the span by one?

A

numSpan.innerHTML = Number(numSpan.innerHTML) + 1;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

There is debate among the scientific community whether computer science is really a “science”.

Describe one characteristic that computer science has in common with disciplines such as physics, biology, and chemistry, that justifies calling it a science?
Describe one characteristic that distinguishes computer science from the natural sciences?

A

One characteristic that makes computer science similar to the other disciplines mentioned, is that the scientific method is commonly used within the field. The scientific method can be applied in many situation, and can help computer scientists find solutions to problems that they face. The main characteristic that distinguishes computer science from the natural sciences is the fact that it is not centered around the understanding and exploration of natural phenomons ( I am horrible at spelling sorry), but instead it focuses on understanding what computation can accomplish and expanding that (and more).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When you purchase something over the Internet/Web, public-key encryption is used to secure the transmission of your sensitive information (e.g., credit card number). How is this accomplished? In particular, how can the sender, using only publicly available information, encode a message that can be decoded only by the intended recipient?

A

When you go to purchase something online you are given a public key which basically means that you now have the ability to send an encrypted message to the website or provider that you are using to make the purchase. This message can only be decrypted though by a private key that only the provider has access to. So once the message is sent over they decrypt it, and use the information, then usually they will get rid of the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Computers are radically changing the way that scientists conduct research. This especially true in the biological sciences. Describe two (2) important ways, that were discussed in class, in which computer technology has impacted research in biology, enabling biologists to do things they couldn’t have done before.

A

Computers are used in microscopes and with microscopes! That can help scientists display their findings better and increase the abilities of microscopes. (I think) Another way that we experienced first hand was the way that computers can help with mapping DNA I think the name of the major database is the Human Genome Project. This database helps create a massive area in which information can be shared about DNA.