If decimal number 89 represents ASCII character Y, what binary number is used to store ASCII character Q?
a) 1100101
b) 1010001
c) 101001
d) 0101001
What is 1010001?
How is it possible to reduce data file size for compression and then restore it to its original format without any loss of information?
Reparative data, like a color on an image, can be stored with a formula.
Consider the following code, What is the output of the program?
a = (12 + 13) / 5
b = 14 - 5 * 2 + 6
c = b / a
DISPLAY (c)
2.0
Programs and algorithms have similar goals, such as using a sequence of steps to reach a specified goal. What is a difference between a program and an algorithm?
A. Programs are shorter
B. Programs are in human language. Algorithms are written in computer language such as Java or Python.
C. Programs are written in machine language. Algorithms are written in computer language such as Java or Python.
D. Programs are written in computer language such as Java or Python. Algorithms are written in human language.
D
What does a router transmits?
packets on the internet
If the initial list contains the following names. What will the list look like after executing the sorting procedure?
["Tom Smith","Joe Schnook,"Kathy Bones", "Jill Brewer"]
["Kathy Bones","Jill Brewer", "Joe Schnook","Tom Smith"]
What is metadata?
It is data about data, such as file size, data format, creation date etc.
Consider the following code segment. How many different numbers can be displayed during program execution?
x = random(1, 5)
IF x MOD 2 = 0
y = RANDOM(6, 8)
ELSE
y = RANDOM(1, 3)
DISPLAY y
6
Consider the adjacent procedure. What is the result of calling the procedures?(Parameters a, b are integers.)
PROCEDURE mystery (a, b)
temp = 0
REPEAT b TIMES
temp = temp + a
RETURN temp
mystery returns a * b
A person at a home computer tries to browse several new locations on the Web. Initially, websites appear, like Google search and other commonly used websites, but there are difficulties reaching many other web sites?
What may explain this problem?
The Internet is probably down The reason you can see some websites is because your local computer's cache memory is storing frequently visited web sites
Consider the following four hexadecimal numbers.
7b3d2a fedcb 11a2b a7bc26
Display the numbers in descending order?
a7bc26, 7b3d2a, fedcb, 11a2b
A high resolution picture is taken of an eagle flying in the sky. Is this picture a goos candidate for lossless data compression or should lossy data compression be used?
This picture is a candidate for lossless data compression. Much of the picture will include sky pixels of the same color that can be stored in a formula and restored to its original image quality.
Consider the following code segment. What is the output of the program?
str = "RACECAR"
n = length (str)
s1 = substring (str, 5, n+1)
s2 = substring (str, 1, 5)
DISPLAY (s1, s2)
CAR RACE
Consider the following procedure. What values are displayed by executing the following statements?
PRINT (isPerfect(6))
PRINT(isPerfect(10)
PROCEDURE isPerfect (n)
k = 2
sum = 1
REPEAT UNTIL (k = n)
if (n MOD k = 0)
sum = sum + k
k = k + 1
RETURN sum = n
true false
Pirating software and other intellectual property rights are challenging issues with a technological world. Which of the following are techniques that companies use to prevent software pirating?
I. Sell software and software activation keys separately.
II. Require online software verification, before software is activated.
III. Sell cloud-based software applications that require "rental" fees for usage
I only
Consider the following four binary numbers.
1110011 10101010 11110000 11001100
Display the numbers in ascending order.
10101010, 11001100, 11100111, 11110000
The National Security Agency (NSA) collects and processes more data than any other US government agency. The enormous data collection raises concern on a regular basis about privacy issues. What can such an agency do to make US citizen more comfortable about their personal and sensitive information?
Limit initial data collection to metadata until such data triggers security concerns.
Consider the following procedure. What is the result of calling the procedure?(Parameter x is a list of integers.)
PROCEDURE mystery (x)
n = length (x)
sum = 0
FOR EACH item in x
sum = sum + item
RETURN sum / n
mystery returns the mean value of list x.
Consider the following procedure search. Does this procedure use a search algorithm correctly so that it will determine if target is in numbers?
PROCEDURE search (numbers, target)
found = false
FOR EACH nr IN numbers
IF (nr = target)
found = true
RETURN found
No, search will not find target if it is the last element
Consider the following Internet functions.
- Checks if connected node has knowledge of the destination IP.
- If the connected node has knowledge of destination IP, sends packet to node
- If the connected node has no knowledge of the destination IP, find other path.
Which of the following is the Internet device that handles the above-mentioned actions?
Router
Graphics images are stored as two-dimensional arrays of pixel. This is further divided up into three 8-bt sequences that store the RGB (Red, Green, Blue) values of each pixel.
If 24-bits are used for one pixel and this pixel's color is determined by three Red, Green, Blue value, each using 8-bits, how many different color combination exist for a pixel?
16,77,216
Data files starts in many different original formats, like number, text, still images, videos and audio sounds. What is true about the storage of all these data files in a computer?
All data files, regardless of its original format, are converted into a digital format and at its lowest level become a sequence of binary bits of ones and zeros
Consider the following code segment.What is the output of the program?
number = [10, 15, 20, 25, 30, 35, 40]
n = length (numbers)
k = 1
REPEAT n TIMES
IF (k MOD 2 = 0)
DISPLAY (numbers [k] )
k = k + 1
15 25 25
Is the linear search ever better than the binary search and if so, when does this happen?
The linear search works correctly with a randomly ordered list.
The binary search requires an order list.
What does Moore's law, from 1965, say about the chip technology?
Moore predicted that computing would increase in power and simultaneously decrease in relative cost at an exponential pace