What is 2+2
4
When collaborating with a group for a project, what is NOT a positive effect of collaboration
A: Ability to compare ideas B: Diversity of ideas
C: Overabundance of ideas D: Accountability
C - Overabundance of ideas
What is metadata?
Data about data.
Most programming languages have a depository of functions that have been created for common use. Which term best describes this depository of functions.
A- Collection B- Encyclopedia
C- Bank D- Library
D- Library
What is the digital divide?
Where internet is not easily accessible in certain places.
What type of transportation vehicle travels by rail?
TRAIN CHOOOOOOO CHOOOOOOOO
What do program inputs do?
Provides many forms of inputs such as audio, visual, text, or tactile.
How many bits are in one binary byte?
A-1 B-3
C-5 D-8
D-8
For which of the following lists is a binary search the MOST useful?
A - Result of 100 coin flips B - A dictionary (word list)
C - List of siblings names D - Result of 100 dice rolls
B - A dictionary
How is phishing used to attack a users software?
By distributing malicious links for the user to click, providing the hacker information.
How many feet are in a mile?
5280
What will the code evaluate to?
https://docs.google.com/document/d/1dqZMdwPuAgrcFc0VyyocGTD3fcIO3ZLRvlkSVxpWX9M/edit?usp=sharing
Answer is A
Which data compression is better if I want to be able to recover the data?
A Lossless B Zip
C Lossy D JPEG
A-Lossless
Why is documentation an important part of an API or library?
A-Without documentation, it would be impossible to tell who wrote the procedure.
B-Since most programmer didn't write the library, documentation is necessary to explain how to use the library
C- Documentation is necessary to keep track of who has used each procedure also where and how it was used.
D-Documentation allows programs to utilize other programs.
B- Since most programmer didn't write the library, documentation is necessary to explain how to use the library
What does malware do to a computers software?
Stealing information, Slowing down the device, and even causing it to crash.
What type of food is a Big Mac at mcdonalds?
BURGER
Which code segment will make the robot follow the route? https://docs.google.com/document/d/1qNBoEZ1m-zaVmGn3TAK-9sxyt-yA6ytQhWkffVssBKQ/edit?usp=sharing
Answer is D
How much bigger is a megabyte than a kilobyte?
A - 1,000 times B - 100,000 times
C - 1,000,000 times D - 1,000,000,000 times
A-1,000 times bigger.
How do we use an abstraction in computer modeling?
A process that decides which aspects of the real world are most important to the model's current purpose.
____ encryption is a method of encryption involving one key for both encryption and decryption.
Symmetric
Who is the best computer science teacher
Anna Andrews
Where will the code end up after the code is ran?
https://docs.google.com/document/d/1-JgF1yTEiikEiCnH1lZrL3jIELXPH2sDgr6MYAmUg7k/edit?usp=sharing
Answer is A
What is it called when you process the data and make it uniform without changing the meaning of the data?
A-Data Compression B-Cleaning Data
C-Sampling technique D-Abstraction
B- Cleaning Data
I. A name in a list of names sorted in alphabetical order
II. A movie title in a list of movies sorted by rating
III. A price in a store inventory list in decreasing price order
A- I only B-I and II
C-I and III D- I,II and III
What is needed to decrypt a message when a sender uses a recipient's public key to encrypt a message?
The recipient's private key.