The integer 2307 % 2 is...
odd
The three control structures we learned about are...
Procedure
. A file contains 1,000 characters stored using standard ASCII (1 byte per character).
Approximately how many bits are used to store this file?
A. 1,000 bits
B. 8,000 bits
C. 128,000 bits
D. 256,000 bits
8,000 bits
What is the internet
The Internet is an interconnected network
This means it is a public network consisting of many other
independent and autonomous networks.
Select an incorrect variable name.
!data_type
If myList is a list (in python), then myList.remove( i ) does which of the following?
A company uses crowdsourcing to label images for AI training. One way the company might handle conflicting or inconsistent labels?
:Use a voting system to choose the most popular label.
:Prioritize labels from expert users without further review.
:Aggregate data from multiple users and require a quality check for verification.
:Discard data from single users and rely on automated labeling.
Aggregate data from multiple users and require a quality check for verification.
What does R, G, B
Red, Green, Blue
True or false
The Internet uses communication protocols
Additional points explain if they have protocols what they are
True
Protocols are agreed-upon rules that define how data is transmitted
between devices. Devices on the Internet follow common protocols
(such as TCP/IP) so they can communicate reliably and understand
one another.
Select the correct data type of variable x.
1 x = "1 + 1 = Two"
range(9) includes all of the following numbers:
Which of the following functions is defined to take several arguments?
How many bits are in a 5 bytes?
40
Internet Protocol.
what is the correct output.
1 x = 5
2 x = 5.5
3 x = 6
4 x = 10
5 print(x)
10

count 1 =
count 2 =
count 1 = 2
count 2 = 3
A student receives an email from their "school IT department" asking them to reset their password
by clicking a link. This might be a ____________ attempt.
phishing
. Smallest number of bits to make unique ID #s in binary (i.e., using 0s and 1s) for
513 students?
10
what is a user Datagram protocol?
Computer applications can
send messages to other hosts on an Internet Protocol network.
When you divide in AP Pseudocode, you will obtain...
A float sometimes
what is the value after this program
i ← 1
n ← 2
REPEAT until i = 4
{
n ← n * 2
i ← i + 1
}
16
How many times does this code print
def main( ):
i = 2
while i > 0:
print("Goodbye!")
i += 1
main( )
it prints forever
Humans have __________ types of cone cells in their eyes:
3
How are messages sent across the internet?
PACKETS!!!!!