Unit 1 Test Flashcards
Which of the following actions is most likely to raise legal or ethical concerns?
A
An analyst writes a program that scans through a database of open-access scientific journals and creates a document with links to articles written on a particular topic.
B
A computer scientist adds several features to an open-source software program that was designed by another individual.
C
A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song.
D
A public interest group alerts people to a scam that involves charging them for a program that is available for free under a Creative Commons license.
C.
A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song.
Keyword: If copyright it is OWNED by someone else. The Musician needs permission before using.
Open- Source, Open- Access…anything open if for Anyone to use.
A researcher wants to publish the results of a study in an open access journal. Which of the following is a direct benefit of publishing the results in this type of publication?
Responses
A
The researcher can allow the results to be easily obtained by other researchers and members of the general public.
B
The researcher can better anticipate the effect of the results and ensure that they are used responsibly.
C
The researcher can ensure that any personal information contained in the journal is kept private and secure.
D
The researcher can prevent copies of the research from being accessed by academic rivals.
A. The researcher can allow the results to be easily obtained by other researchers and members of the general public.
The Open-Access allows the journals to be easily obtained.
Note from Mom: Don’t predict the future. Only go with what you know in the present. You have no idea if people will use the research ‘responsibly’ you only know that its openly available for them to use it how ever they use it.
A programmer created a piece of software and wants to publish it using a Creative Commons license. Which of the following is a direct benefit of publishing the software with this type of license?
Responses
A
The programmer can ensure that the algorithms used in the software are free from bias.
B
The programmer can ensure that the source code for the software is backed up for archival purposes.
C
The programmer can include code that was written by other people in the software without needing to obtain permission.
D
The programmer can specify the ways that other people are legally allowed to use and distribute the software.
D. The programmer can specify the ways that other people are legally allowed to use and distribute the software.
What is a Creative Commons license?
A free license. The creator tells users what they can and can’t do with their creation.
What is Open-Source mean?
Programs free for anyone to use. Can be modified and redistributed without issue.
Which of the following are true statements about the data that can be represented using binary sequences?
Binary sequences can be used to represent strings of characters.
Binary sequences can be used to represent colors.
Binary sequences can be used to represent audio recordings.
Responses
A
I only
B
I and II only
C
II and III only
D
I, II, and III
D.
I, II, and III
Note: Statement III is true because sequences of bits can be used to represent sound.
A certain programming language uses 4-bit binary sequences to represent nonnegative integers. For example, the binary sequence 0101 represents the corresponding decimal value 5. Using this programming language, a programmer attempts to add the decimal values 14 and 15 and assign the sum to the variable total. Which of the following best describes the result of this operation?
Responses
A
The correct sum of 29 will be assigned to the variable total.
B
An overflow error will occur because 4 bits is not large enough to represent either of the values 14 or 15.
C
An overflow error will occur because 4 bits is not large enough to represent 29, the sum of 14 and 15.
D
A round-off error will occur because the decimal values 14 and 15 are represented as approximations due to the fixed number of bits used to represent numbers.
C
An overflow error will occur because 4 bits is not large enough to represent 29, the sum of 14 and 15.
Note: The largest binary value that can be represented using 4 bits is 1111, which is equal to the decimal value 15. Since the sum is larger than the largest representable value, an overflow error will occur.
Consider the 4-bit binary numbers 0011, 0110, and 1111. Which of the following decimal values is NOT equal to one of these binary numbers?
Responses
A. 3
B. 6
C.9
D.15
C. 9
A video game character can face toward one of four directions: north, south, east, and west. Each direction is stored in memory as a sequence of four bits. A new version of the game is created in which the character can face toward one of eight directions, adding northwest, northeast, southwest, and southeast to the original four possibilities. Which of the following statements is true about how the eight directions must be stored in memory?
Responses
A
Four bits are not enough to store the eight directions. Five bits are needed for the new version of the game.
B
Four bits are not enough to store the eight directions. Eight bits are needed for the new version of the game.
C
Four bits are not enough to store the eight directions. Sixteen bits are needed for the new version of the game.
D
Four bits are enough to store the eight directions.
D
Four bits are enough to store the eight directions.
Note:Answer D
Correct. Four bits can represent
, or 16 pieces of information.
The position of a runner in a race is a type of analog data. The runner’s position is tracked using sensors. Which of the following best describes how the position of the runner is represented digitally?
Responses
A
The position of the runner is determined by calculating the time difference between the start and the end of the race and making an estimation based on the runner’s average speed.
B
The position of the runner is measured and rounded to either 0 or 1 depending on whether the runner is closer to the starting line or closer to the finish line.
C
The position of the runner is predicted using a model based on performance data captured from previous races.
D
The position of the runner is sampled at regular intervals to approximate the real-word position, and a sequence of bits is used to represent each sample.
Answer D:The position of the runner is sampled at regular intervals to approximate the real-word position, and a sequence of bits is used to represent each sample.
Correct. Analog data, like the runner’s position, have values that change smoothly, rather than in discrete intervals. Analog data can be approximated digitally by measuring values of the analog signal at regular intervals called samples. The samples are represented digitally as sequences of bits.
Consider the following numeric values.
Binary 1011
Binary 1101
Decimal 5
Decimal 12
Which of the following lists the values in order from least to greatest?
Responses
A
Decimal 5, binary 1011, decimal 12, binary 1101
B
Decimal 5, decimal 12, binary 1011, binary 1101
C
Decimal 5, binary 1011, binary 1101, decimal 12
D
Binary 1011, binary 1101, decimal 5, decimal 12
A. Decimal 5, binary 1011, decimal 12, binary 1101
Note: Binary 1101 is equivalent to decimal 13 and should be placed after decimal 12.
MeeReader is an e-reading application that allows users to download and read books and articles on a device. Each user creates a profile with the following personal preferences.
Screen brightness and contrast
Choice of typeface and font size
Amount of spacing between lines of text
Activation of a text-to-speech feature that reads the text out loud
When the user launches the application, the application scans the user’s face and uses facial recognition software to determine the user’s identity. Once the user has been identified, the user’s personal preferences are applied to whatever book or article the user chooses to read.
The application stores all user information in a database, including personal preferences and a record of previously read books and articles.
Which of the following is most likely to be a beneficial effect of using MeeReader?
Responses
A
Users may have a reduced risk of the application being used in unintended ways.
B
Users may have a reduced risk of their biometric data being misused.
C
Users with limited Internet access may be able to more easily obtain books and articles.
D
Users with visual impairments may be able to more easily read or listen to books and articles.
D:
Users with visual impairments may be able to more easily read or listen to books and articles.
Note: Users with visual impairments can set their personal preferences to make text easier for them to read. These users can also enable text-to-speech to allow them to listen to text.
MeeReader is an e-reading application that allows users to download and read books and articles on a device. Each user creates a profile with the following personal preferences.
Screen brightness and contrast
Choice of typeface and font size
Amount of spacing between lines of text
Activation of a text-to-speech feature that reads the text out loud
When the user launches the application, the application scans the user’s face and uses facial recognition software to determine the user’s identity. Once the user has been identified, the user’s personal preferences are applied to whatever book or article the user chooses to read.
The application stores all user information in a database, including personal preferences and a record of previously read books and articles.
From the perspective of the application’s developers, which of the following is most likely to be a benefit of storing all user data in a database?
Responses
A
The developers can analyze the data to make improvements to the application based on user behavior.
B
The developers can analyze the data to ensure that no patterns emerge in the data.
C
The developers can reduce the amount of data storage required to support the application.
D
The developers can reduce the need for data encryption.
A
The developers can analyze the data to make improvements to the application based on user behavior.
Note: Storing personal data will increase the amount of personal information stored, which is likely to increase the need for encryption.
A software development company has created an application called FileCleanUp. When the application is run on a user device, it searches for all files (including pictures, videos, and documents) that have not been accessed in the past month, stores them on the company’s Web server, and deletes them from the user device. The application runs once each day. Users have the ability to manually retrieve files from the server if they are needed.
Which of the following is most likely to be a harmful effect of using FileCleanUp?
Responses
A
It prevents users from accessing frequently used files when there is no Internet connectivity.
B
It prevents users from accessing infrequently used files when there is no Internet connectivity.
C
It prevents users from accessing frequently used files when there is reliable Internet connectivity.
D
It prevents users from accessing infrequently used files when there is reliable Internet connectivity.
B.
It prevents users from accessing infrequently used files when there is no Internet connectivity.
Note: Infrequently used files are removed from user devices and stored on a Web server. If a user has no Internet connection, the user will be unable to access these files.
A user wants to save a data file on an online storage site. The user wants to reduce the size of the file, if possible, and wants to be able to completely restore the file to its original version. Which of the following actions best supports the user’s needs?
Responses
A
Compressing the file using a lossless compression algorithm before uploading it
B
Compressing the file using a lossy compression algorithm before uploading it
C
Compressing the file using both lossy and lossless compression algorithms before uploading it
D
Uploading the original file without using any compression algorithm
A.
Compressing the file using a lossless compression algorithm before uploading it
Correct. Lossless compression algorithms allow for complete reconstruction of the original data and typically reduce the size of the data.