In your own words explain the difference between a problem and an algorithm.
A problem is a statement of a task that may or may not be solvable by a computer. An algorithm is a finite set of instructions that accomplish a task.
Which concept does this algorithm BEST demonstrate?
A. Sequencing
B. Selection
C. Iteration
D. Execution
A. Sequencing
What is one of the benefits of using a library in a program?
A. simplifies creating a complex program
B. increases development time
C. removes all testing
D. reduces abstractions in the program
A. simplifies creating a complex program
Internet protocol version 6 (IPv6) has been introduced to replace the previous version (IPv4). Which of the following best describes a benefit of IPv6 over IPv4?
A. IPv6 addresses are shorter than IPv4 addresses, which allows for faster routing of packets.
B. IPv6 allows for a greater number of addresses than IPv4, which allows more devices to be connected to the Internet.
C. IPv6 eliminates the use of hierarchy in addressing, making addresses easier to use.
D. IPv6 allows users to bypass older security protocols so that data can be sent peer-to-peer without the use of routers.
B. IPv6 allows for a greater number of addresses than IPv4, which allows more devices to be connected to the Internet.
Which of the following best explains how data is transmitted on the Internet?
A. Data is broken into packets, which are all sent to the recipient in a specified order along the same path.
B. Data is broken into packets, which can be sent along different paths.
C. All data is transmitted in a single packet through a direct connection between the sender and the recipient.
D. Multiple data files are bundled together in a packet and transmitted together.
B. Data is broken into packets, which can be sent along different paths.
What is the third step using Binary Search to look for the number 32 in this list: 1, 2, 3, 4, 10, 11, 16, 25, 32, 33, 45, 47, 51, 69, 75
A. Compare the number 25 to the given number.
B. Compare the number 4 to the given number
C. Compare the number 33 to the given number
D. Compare the number 47 to the given number.
C. Compare the number 33 to the given number
A town government is designing a new bus system and are deciding where to put the different bus stops. They want to pick the collection of locations that minimizes the distance anyone needs to walk in order to get to at least one bus stop. What term best defines the kind of problem?
A. A decision problem
B. An optimization problem
C. An undecidable problem
D. An efficiency problem
B. An optimization problem
Dividing a program into separate subprograms (such as libraries) is known as:
A. modularity
B. iteration
C. API
D. documentation
A. modularity
Which of the following best describes a direct benefit in using redundant routing on the Internet?
A. Redundancy enables messages to be transmitted with as few packets as possible.
B. Redundancy enables network devices to communicate with as few network connections as possible.
C. Redundancy often allows messages to be sent on the network even if some network devices or connections have failed.
D. Redundancy prevents network communications from being intercepted by unauthorized individuals.
C. Redundancy often allows messages to be sent on the network even if some network devices or connections have failed.
A bank is developing an algorithm that will help them decide who to make loans to. As input the algorithm will consider information about the person applying for the loan and the amount of money requested, and as output the algorithm will decide whether the bank should give that loan. The bank intends to develop the algorithm using machine learning techniques. The algorithm will be trained using data from past loan decisions made by human bankers. Which of the following best describes whether this algorithm will include bias?
A. The algorithm will not be biased because using machine learning eliminates human biases
B. While the algorithm may be biased, the eventual decision made by the algorithm will not be
C. The algorithm will likely reflect the human biases in the data used to train it
D. Machine learning algorithms cannot be developed using biased data so if there is bias in the data it will be impossible to develop the algorithm
C. The algorithm will likely reflect the human biases in the data used to train it
Which of the follow efficiencies would be considered unreasonable?
A. 2^n
B. 2n
C. n^2
D. n^20
A. 2^n
Which of the following best describes the existence of undecidable problems
A. Undecidable problems are problems for which more than one algorithm solves the problem and computer scientists have not yet chosen the algorithm they believe is best
B. Undecidable problems are problems for which an algorithm can be written that will produce the same output for at least two possible inputs
C. Undecidable problems are problems for which an algorithm can be written that produces a correct output for all inputs but in an unreasonable time
D. An undecidable problem is a problem for which no algorithm can be constructed that always produces a correct output
D. An undecidable problem is a problem for which no algorithm can be constructed that always produces a correct output
A photographer stores digital photographs on her computer. In this case the photographs are considered the data. Each photograph also includes multiple pieces of metadata including:
Date: The date the photograph was taken
Time: The time the photograph was taken
Location: The location where the photograph was taken
Device: Which camera the photo was taken with
Which of the following could the photographer NOT do based on this metadata?
A. Filter photos to those taken in the last week
B. Filter photos to those taken in a particular country
C. Filter photos to those taken of buildings
D. Filter photos to those taken with her favorite camera
C. Filter photos to those taken of buildings
Which of the following is a characteristic of the fault-tolerant nature of routing on the Internet?
A. The ability to use a hierarchical naming system to avoid naming conflicts
B. The ability to provide data transmission even when some connections have failed
C. The ability to resolve errors in domain name system (DNS) lookups
D. The ability to use multiple protocols such as hypertext transfer protocol (HTTP), Internet protocol (IP), and simple mail transfer protocol (SMTP) to transfer data
B. The ability to provide data transmission even when some connections have failed
In which of the following situations would parallel systems MOST likely be used to help analyze data?
A. Data analysis involving two or more columns of data
B. Data analysis involving both string and numeric data
C. Data analysis involving large datasets
D. Data analysis that could result in two or more different types of visualizations
C. Data analysis involving large datasets
In which of the following situations is it most appropriate to use a heuristic solution?
A. The only algorithms that provide exact solutions run in linear time
B. The problem has been identified as undecidable
C. The only algorithms that provide exact solutions run in unreasonable time but exact solutions are not necessary
D. Two different algorithms have been identified that solve the problem in reasonable time
C. The only algorithms that provide exact solutions run in unreasonable time but exact solutions are not necessary
Which term refers to a solution to a large problem that is based on the solutions of smaller subproblems.
A. procedural abstraction
B. API
C. parameter
D. Library
A. procedural abstraction
This question refers to the same collection of photos and their metadata described in the previous question. Due to a computer error, the Time metadata for all of the photographs is accidentally set to the same time of day. The other pieces of metadata and the data itself are not affected by the error. Which of the following is MOST likely to be the result of this problem?
A. The photographer will not be able to view any of the images
B. The photographer will not be able to sort images by the date they were taken
C. The photographer will not be able to filter to photographs taken in the morning
D. The photographer will not be able to find images taken on the same date
C. The photographer will not be able to filter to photographs taken in the morning
Which of the following best explains how data is typically assembled in packets for transmission over the Internet?
A. Each packet contains data to be transmitted, along with metadata containing information used for routing the data.
B. Each packet contains an encrypted version of the data to be transmitted, along with metadata containing the key needed to decrypt the data.
C. Each packet contains only the metadata used to establish a direct connection so that the data can be transmitted.
D. Each packet contains multiple data files bundled together, along with metadata describing how to categorize each data file.
A. Each packet contains data to be transmitted, along with metadata containing information used for routing the data.
Which of the following best explains how messages are typically transmitted over the Internet?
A. The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient’s device.
B. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device.
C. The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient’s device.
D. The message is transmitted as a single file and received in whole by the recipient’s device.
B. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device.
Which of the following is true of algorithms?
A. Algorithms may have an infinite set of instructions
B. Algorithms must be expressed using a programming language
C. Every algorithm can be constructed using combinations of sequencing, selection, and iteration
D. Every problem can be solved with an algorithm
C. Every algorithm can be constructed using combinations of sequencing, selection, and iteration
This function checks if a character is a vowel. If it is, it returns true. Otherwise, it returns false. Where should return false; be written in the code?
PIC NEEDED #16
A. OPTION A
B. OPTION B
C. OPTION C
D. OPTION D
C. OPTION C
Which column of data might be able to be visualized or analyzed but first would need to be cleaned?
PIC NEEDED #23
A. How Travel
B. How Long
C. Time Arrive
D. Biggest Challenges
B. How Long
A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best explains the result of this configuration as compared to a configuration in which the router does not limit the bandwidth?
A. The amount of time it takes guest users to send and receive large files is likely to decrease.
B. The number of packets required for guest users to send and receive data is likely to decrease.
C. Guest users will be prevented from having fault-tolerant routing on the Internet.
D. Guest users will be restricted in the maximum amount of data that they can send and receive per second.
D. Guest users will be restricted in the maximum amount of data that they can send and receive per second.
Which of the following is a primary benefit of making a computing system fault-tolerant?
A. If one component of the system fails, users of the system can often still access it.
B. If one component of the system is hacked, no information will be stolen.
C. If the system becomes too expensive, making it fault-tolerant will save money.
D. If the system cannot operate efficiently, making it fault-tolerant will speed up its operation.
A. If one component of the system fails, users of the system can often still access it.