Analyzing Code
Computer Computing
Internet
Decimal, Binary, Hexadecimal
Computer Assortment
100

The display if the variable lunchTime has the value False and timeToGoHome has the value True.

Let's go home.

100

ASCII character represented by the number 90 (decimal).

Z

100

When solving a problem will take an exceedingly large amount of time and an approximate solution is acceptable, wha approach may be used?

Heuristic

100

The decimal equivalent of binary 1010 and also hexadecimal A.

10 (decimal)


0    0000    0
1    0001    1
2    0010    2
3    0011    3
4    0100    4
5    0101    5
6    0110    6
7    0111    7
8    1000    8
9    1001    9
10    1010    A
11    1011    B
12    1100    C
13    1101    D
14    1110    E
15    1111    F

100

This is the result of the program below:

2 3 

200

The description for the result of running this program code.

 

Nothing is displayed because the program results in an infinite loop

200

ASCII character represented by the hexadecimal number 5A.

Z

200

The internet has redundancy because of multiple paths where if one path is broken or blocked, another path is taken making it more reliable. This redundancy means the internet is this.  

Fault tolerant 

200

The hexadecimal value for binary 1110.

E

200

This is an email from an unknown sender who wants the recipient to click on a link in the email.

Phishing

300

The result displayed from running this program code.

8

300

If a class decided to use binary addressing (like computers use) to send messages in their classroom. The initial plan was to use a nybble (4 bits). If there are 25 students in the room, we soon see there aren't enough addresses for each student. (1111 is 15 plus 0000 provides another option resulting in 16 options or 2^4 = 16)  How many more addresses are made available when the decision is made to add 3 more bits making 7 bits available?

112

(2^7 - 2^4 = 128 - 16 = 112)

(Note: You can't subtract exponents.)

300

The structure of the internet similar to how phone numbers have levels defining more generally at the top level the area code (i.e. 501) is a wide area, then narrowing to the local exchange area (i.e. 624), and finally the customer (the last 4 digits). This structure is used for DNS (the root, geographical such as uk, the organization such as edu or com, etc.) and IP Addresses (networks, hosts...). This structure helps the system scale (grow).

Hierarchical

300

The binary value for 3 (both decimal & hexadecimal).

0011 (binary) 

300

The image on the left is a robot in a grid of squares. The robot is represented by the triangle which is shown in the initial position. The image on the right is a code segment to move the robot in the grid. This is the location of the robot after running the code segment. (The dot shows the initial position for reference.)

400

The code segment that will move the robot to the gray square using the procedure ForwardAndLeft is started below. What is the last line of the code segment? (The robot cannot move into the black areas.)

ForwardAndTurn (1, 3); 

ForwardAndTurn (2, 1);  

ForwardAndTurn (2, 1); 

ForwardAndTurn (3, 0)   

400

If a class decided to use binary addressing (like computers use) to send messages in their classroom. The initial plan was to use a nybble (4 bits). If there are 25 students in the room, we soon see there aren't enough addresses for each student. (1111 is 15 plus 0000 provides another option resulting in 16 options or 2^4 = 16)  So the decision is made to add 3 more bits making 7 bits available resulting in the new 7 bit system giving how many times more addresses than the 4 bit system.

8

(2^7 / 2^4 = 2^(7-4) = 2^3 = 8 times more)

(Or 2^7 = 128  &  2^4 = 16, so 128/16 = 8)

400

A division of a domain appearing to the left of the domain name. Here it is "desserts" where the domain name is food.com

desserts.food.com

Subdomain

400

The hexadecimal value for 10110101100.

5AC


400

How is the output affected if line 4 to is changed to  z  =  y  +  x    

No change

500

A school gives Honor Roll students excused absence during semester tests. The computer science teacher has a list of students in her classes (cspList) and the school provided a list of Honor students for the whole school (honorList), but the teacher needs to develop a list of her students who have an excused absence (excusedList). To create excusedList, the teacher uses the procedure findHonor (list, name) which returns true if name is found in list and returns false otherwise.

The missing code to complete the procedure is shown with one List name redacted. What is the name of that list?

Missing code shown below:

excusedList

500

Students in several classes are to be put into groups of 4. A computer program is used to determine how many extra students remain in each class if the number of students doesn't divide evenly by 4. The line of code is studentsInClass mod 4 = x. For a class with 23 students, what is x? 

3

500

This figure represents a network of computers that are connected with each other. Any data sent between two computers not directly connected must go through one or more other computers that are connected. 

This is the minimum number of connections that must be disrupted to prevent D from communicating with F.

2

500

B (hex) + 0011 (binary)

14 (decimal)

B + 0011 = 11 + 3 = 14 (decimal)

500

If logic gate B is an OR, what is Input A for the output of logic gate B to be True as shown? (AND & OR gates only)

True

The output of the AND is False. If the output of B (an OR) is True, at least one input must be True. Since the output of AND is False, the other input must be True.

If the bottom input of B must be True, then at least one of the inputs to the OR represented by the smaller rectangle must be True, so A must be True.