Abstractions
Data & Information
Pseudo-Code
Algoritms
The Internet
100

If decimal number 89 represents ASCII character Y, what binary number is used to store ASCII character Q?

a) 1100101

b) 1010001

c) 101001

d) 0101001

What is 1010001?

100

How is it possible to reduce data file size for compression and then restore it to its original format without any loss of information?

Reparative data, like a color on an image, can be stored with a formula.

100

Consider the following code, What is the output of the program?


a = (12 + 13) / 5

b = 14 - 5 * 2 + 6

c = b / a

DISPLAY (c)

2.0

100

Programs and algorithms have similar goals, such as using a sequence of steps to reach a specified goal. What is a difference between a program and an algorithm?

A. Programs are shorter

B. Programs are in human language. Algorithms are written in computer language such as Java or Python.

C. Programs are written in machine language. Algorithms are written in computer language such as Java or Python.

D. Programs are written in computer language such as Java or Python. Algorithms are written in human language.


D

100

What does a router transmits?

packets on the internet

200
Suppose a computer program needs to sort a list of student recording ascending order according to last name. The program language determines sort order by using the individual ASCII number representations of characters in each a name.


If the initial list contains the following names. What will the list look like after executing the sorting procedure?

["Tom Smith","Joe Schnook,"Kathy Bones", "Jill Brewer"]

["Kathy Bones","Jill Brewer", "Joe Schnook","Tom Smith"]

200

What is metadata?

It is data about data, such as file size, data format, creation date etc.

200

Consider the following code segment. How many different numbers can be displayed during program execution?


x = random(1, 5)

IF x MOD 2 = 0

     y = RANDOM(6, 8)

ELSE

     y = RANDOM(1, 3)

DISPLAY y


6

200

Consider the adjacent procedure. What is the result of calling the procedures?(Parameters a, b are integers.)

PROCEDURE mystery (a, b)

    temp = 0

    REPEAT b TIMES

         temp = temp + a

    RETURN temp

mystery returns a * b

200

A person at a home computer tries to browse several new locations on the Web. Initially, websites appear, like Google search and other commonly used websites, but there are difficulties reaching many other web sites?


What may explain this problem?

The Internet is probably down The reason you can see some websites is because your local computer's cache memory is storing frequently visited web sites

300

Consider the following four hexadecimal numbers.

7b3d2a fedcb 11a2b a7bc26

Display the numbers in descending order?

a7bc26, 7b3d2a, fedcb, 11a2b

300

A high resolution picture is taken of an eagle flying in the sky. Is this picture a goos candidate for lossless data compression or should lossy data compression be used?

This picture is a candidate for lossless data compression. Much of the picture will include sky pixels of the same color that can be stored in a formula and restored to its original image quality.

300

Consider the following code segment. What is the output of the program?


str = "RACECAR"

n = length (str)

s1 = substring (str, 5, n+1)

s2 = substring (str, 1, 5)

DISPLAY (s1, s2)

CAR RACE

300

Consider the following procedure. What values are displayed by executing the following statements?

PRINT (isPerfect(6))

PRINT(isPerfect(10)

PROCEDURE isPerfect (n)

     k = 2

     sum = 1

     REPEAT UNTIL (k = n)

          if (n MOD k = 0)

               sum = sum + k

          k = k + 1

     RETURN sum = n



true false

300

Pirating software and other intellectual property rights are challenging issues with a technological world. Which of the following are techniques that companies use to prevent software pirating?


I. Sell software and software activation keys separately.

II. Require online software verification, before software is activated.

III. Sell cloud-based software applications that require "rental" fees for usage

I only

400

Consider the following four binary numbers.

1110011 10101010 11110000 11001100

Display the numbers in ascending order.

10101010, 11001100, 11100111, 11110000

400

The National Security Agency (NSA) collects and processes more data than any other US government agency. The enormous data collection raises concern on a regular basis about privacy issues. What can such an agency do to make US citizen more comfortable about their personal and sensitive information?

Limit initial data collection to metadata until such data triggers security concerns. 

400

Consider the following procedure. What is the result of calling the procedure?(Parameter x is a list of integers.)


PROCEDURE mystery (x)

     n = length (x)

     sum = 0

     FOR EACH item in x

          sum = sum + item

     RETURN sum / n

mystery returns the mean value of list x.

400

Consider the following procedure search. Does this procedure use a search algorithm correctly so that it will determine if target is in numbers?


PROCEDURE search (numbers, target)

found = false

FOR EACH nr IN numbers

     IF (nr = target)

          found = true

     RETURN found

No, search will not find target if it is the last element

400

Consider the following Internet functions.


- Checks if  connected node has knowledge of the destination IP. 

- If the connected node has knowledge of destination IP, sends packet to node

- If the connected node has no knowledge of the destination IP, find other path.


Which of the following is the Internet device that handles the above-mentioned actions?

Router

500

Graphics images are stored as two-dimensional arrays of pixel. This is further divided up into three 8-bt sequences that store the RGB (Red, Green, Blue) values of each pixel.

If 24-bits are used for one pixel and this pixel's color is determined by three Red, Green, Blue value, each using 8-bits, how many different color combination exist for a pixel?

16,77,216

500

Data files starts in many different original formats, like number, text, still images, videos and audio sounds. What is true about the storage of all these data files in a computer?

All data files, regardless of its original format, are converted into a digital format and at its lowest level become a sequence of binary bits of ones and zeros

500

Consider the following code segment.What is the output of the program?


number = [10, 15, 20, 25, 30, 35, 40]

n = length (numbers)

k = 1

REPEAT n TIMES

     IF (k MOD 2 = 0)

          DISPLAY (numbers [k] )

     k = k + 1

15 25 25

500

Is the linear search ever better than the binary search and if so, when does this happen?

The linear search works correctly with a randomly ordered list.

The binary search requires an order list.

500

What does Moore's law, from 1965, say about the chip technology?

Moore predicted that computing would increase in power and simultaneously decrease in relative cost at an exponential pace

M
e
n
u