What is the purpose of a development process in programming?
A. To make programs harder to understand
B. To avoid user feedback
C. To help design, test, and improve programs
D. To copy other programs
C. To help design, test, and improve programs
What is a byte?
A. A large number
B. 8 bits
C. 100 bits
D. A computer
B. 8 bits
What is an algorithm?
A. A step-by-step solution
B. A coding error
C. A type of computer
D. A problem
A. A step-by-step solution
What is the Internet?
A. A single computer
B. A software program
C. A network of networks
D. A video game
C. A network of networks
What is a benefit of computing innovation?
A. Makes communication easier
B. Increases errors
C. Reduces information access
D. Deletes jobs
A. Makes communication easier
Working as a network engineer, you write a script to monitor network traffic, but it fails to start. What is the first type of error you should check for?
A- Runtime Error
B- Syntax Error
C- Logic Error
D- Overflow Error
D- Adding two maximum integer values causing an overflow.
Which of the following is considered metadata?
A. The size of the file and the date it was taken
B. A camera lens
C. A photo
D. The colors in a photo
A. The size of the file and the date it was taken
Which is an example of a Boolean expression?
A. 10 + 4
B. "hello"
C. x > 5
D. 3.14
C. x > 5
What does a router do?
A. Stores passwords
B. Connects devices and forwards data
C. Deletes data
D. Creates software
B. Connects devices and forwards data
What is a digital divide?
A. A break in your device
B. A type of virus
C. Unequal access to technology
D. A coding error
C. Unequal access to technology
Which of the following is an example of an overflow error not involving multiplication?
A-Subtracting two numbers without exceeding data type limits
B-Assigning a boolean value without any errors
C-Correctly using a data type to store a small number
Adding two maximum integer values causing an overflow
D- Adding two maximum integer values causing an overflow.
Which method is best for finding patterns in big data?
A. Guessing
B. Manual search
C. Visualization or filtering
D. Ignoring outliers
C. Visualization or filtering
What does a loop do in a program?
A. Ends the program
B. Repeats a section of code
C. Changes your computer settings
D. Adds variables
B. Repeats a section of code
What is the purpose of IP addresses?
A. To hide your identity
B. To identify devices on a network
C. To improve battery life
D. To store images
B. To identify devices on a network
Which of these is a negative impact of social media algorithms?
A. Better content filtering
B. Data privacy and echo chambers
C. Faster typing
D. Improved resolution
B. Data privacy and echo chambers
Which of the following is an example of a repeat until loop?
A- while(x > 10)
B- for x in range(10)
C- if(x > 10)
D- repeat until (x > 10)
D- repeat until (x > 10)
What is lossy compression?
A. A way to store data with no loss
B. Compressing files without changing them
C. Removing some data to reduce file size
D. Duplicating data
C. Removing some data to reduce file size
What is a selection in programming?
A. A way to store data
B. A command that always runs
C. A decision-making structure like if
D. A type of hardware
C. A decision-making structure like if
A team is developing a new application that must remain operational and accessible even during high traffic periods. Which system characteristic is most critical for this application?
A- Scalability
B- Cybersecurity Measures
C- High Bandwidth
D- Fault Tolerance
A- Scalability
What is open-source software?
A. Secret software
B. Software with limited users
C. Software where source code is public and can be modified
D. Software that cannot be shared
C. Software where source code is public and can be modified
A student is creating a program to analyze text data. They decide to use a hash table to count the frequency of each word. What is a positive impact of this decision?
A- It decreases the memory usage by storing only unique words, rather than all instances.
B- It simplifies the code by avoiding the need for complex data structures and algorithms.
C- It allows for efficient retrieval and updating of word frequencies, improving the program's performance.
D- It reduces the execution time by eliminating the need to sort the words alphabetically.
C- It allows for efficient retireval and updating of word frequencies, improving the program's performance.
Why is it hard to keep personal data private on the internet?
A. Data can be collected, shared, and sold easily
B. People never use the internet
C. The internet is always private
D. Data is never stored
A. Data can be collected, shared, and sold easily
Which is true about procedural abstraction?
A. It makes code harder to debug
B. It means every line is written twice
C. It organizes code into reusable blocks (functions)
D. It replaces variables
C. It organizes code into reusable blocks (functions)
A large organization is planning to upgrade its network to support increased data transfer rates. Which metric is most relevant to this upgrade?
A- Routing
B- Fault Tolerance
C- Scalability
D- Bandwidth
D- Bandwidth
An online retailer implements a system to analyze customers' shopping cart abandonment. What could be a positive impact of this analysis?
A- Higher marketing costs associated with data analysis
B- Decreased sales due to intrusive marketing tactics
C- Increased privacy concerns due to tracking of shopping habits
D-Improved understanding of customer behavior and preferences
D-Improved understanding of customer behavior and preferences