what is 10000100
what is 132
True or False: If I'm working on a multimedia school project, I must have permission to use copyrighted works if I'm going to sell my project.
true
what are the most commons side effects of constant use of the internet
free response
who is known as the father of wifi
who is Vic Hayes
The type of control structure that can be used for making decisions in a program based on the value of a Boolean expression.
What is an if statement (or selection, or branching)
what is 10110111
what is 183
True or False: A 1st grader's Haiku poem can be copyrighted.
true
An Internet user has a need to send private data to another user. Which of the following provides the most security when transmitting private data
Sending the data using public-key encryption
A person wants to transmit an audio file from a device to a second device. Which of the following scenarios best demonstrates the use of lossless compression of the original file?
A device compresses the audio file before transmitting it to a second device. The second device restores the compressed file to its original version before playing it.
The process of placing a loop inside another loop.
What is nesting
what is 463
what is 111001111
___ distinct numbers can be represented with 9 bits
512
Internet protocol version 6 (IPv6) has been introduced to replace the previous version (IPv4). Which of the following best describes a benefit of IPv6 over IPv4?
IPv6 allows for a greater number of addresses than IPv4, which allows more devices to be connected to the Internet.
Flight simulation software, which imitates the experience of flying, is often used to train airline pilots. Which of the following is LEAST likely to be an advantage of using flight simulation software for this purpose?
Flight simulation software provides a more realistic experience for pilots than actual training flights.
The failure to create a correct condition that controls a repeat statement results in this type of programming error.
What is an infinite loop
what is 11100 in arabic numerals
what is 28
DISPLAY (20 mod 4) + 3
What is 3
An Internet user has a need to send private data to another user. Which of the following provides the most security when transmitting private data?
Sending the data using public-key encryption
The binary search algorithm makes this vital assumption about the list of data being considered.
What is the data is sorted
The following code should display "even" if the positive number num is even.
IF (MISSING CONDITION)
DISPLAY ("EVEN")
Give a Boolean expression that could replace MISSING CONDITION
What is num MOD 2 == 0
what is 435 in binary
110110011
RGB color values mimic the human eye by representing colors using 3 values of ____ bits each.
What is 8 bits
Which of the following best explains how a certificate authority is used in protecting data?
A certificate authority verifies the authenticity of encryption keys used in secured communications.
Which of the following scenarios best exemplifies a phishing attack?
A user receives an e-mail from a sender offering technical help with the user’s computer. The e-mail prompts the user to start a help session by clicking a provided link and entering the username and password associated with the user’s computer.
i <- 0
sum <- 0
REPEAT UNTIL i = 4
sum <- sum + i
i <- i + 1
DISPLAY (sum)
What is 6