A software development technique where two programmers work side-by-side: one writes code while the other reviews it in real time.
Pair Programming
The process of turning raw facts and figures into visual formats like charts and graphs to help humans understand patterns.
Data Visualization
A step-by-step set of instructions used to solve a problem or complete a task.
Algorithm
A standardized way for software applications to communicate and interact with each other.
API (Application Programming Interface)
Bias that results from prejudice in the algorithms or the data used in computing systems, often causing unfair outcomes.
Algorithmic Bias
Data that provides information about other data, such as the date created or file size.
Metadata
A control structure that repeats a set of instructions as long as a condition is true.
Loop
Unequal access to computing resources and the internet based on socioeconomic, geographic, or demographic factors.
Digital Divide
Which of the following best explains how open-source projects benefit innovation?
A. They are always free
B. They are developed solely by professionals
C. They allow collaborative contributions and improvements
D. They are more secure by default
C. They allow collaborative contributions and improvements
Which of the following is an advantage of using lossless data compression?
A. Files take up less space but lose some quality
B. Original data can be perfectly reconstructed
C. It's faster than lossy compression
D. It reduces CPU usage
B. Original data can be perfectly reconstructed
What is the purpose of using a selection (IF/ELSE) statement in a program?
A. To organize data into lists
B. To repeat code multiple times
C. To make decisions and execute code based on conditions
D. To define new variables
C. To make decisions and execute code based on conditions
Which of the following best describes a heuristic in computer science?
A. A method that guarantees an optimal solution
B. A rule-based encryption system
C. A technique for reducing problem-solving time that may not always be perfect
D. A way to randomize output
C. A technique for reducing problem-solving time that may not always be perfect
A new facial recognition system has a higher error rate for certain demographics. What is the most responsible step a developer should take?
A. Ignore it
B. Collect more representative data
C. Increase image brightness
D. Decrease resolution
B. Collect more representative data
A student has a dataset with missing values in some records. What is the best approach to preserve data integrity?
A. Delete all rows
B. Ignore the missing values
C. Fill in estimated values using statistical methods
D. Fill all with zeroes
C. Fill in estimated values using statistical methods
Which of the following will call the function drawStar? A. drawStar
B. drawStar();
C. function drawStar;
D. function drawStar();
B. drawStar();
A process that transforms data into a fixed-size string of characters, typically used for ensuring data integrity.
Hashing
Which of the following is a true statement about program documentation?
A. Program documentation should not be changed after it is first written.
B. Program documentation is only needed for programs in development; it is not needed after a program is completed.
C. Program documentation is useful when programmers collaborate but not when a programmer works individually on a project.
D. Program documentation is useful during initial program development and also when modifications are made to existing programs.
D. Program documentation is useful during initial program development and also when modifications are made to existing programs.
An online store uses 6-bit binary sequences to identify each unique item for sale. The store plans to increase the number of items it sells and is considering using 7-bit binary sequences. Which of the following best describes the result of using 7-bit sequences instead of 6-bit sequences?
A. 2 more items can be uniquely identified.
B. 10 more items can be uniquely identified.
C. 2 times as many items can be uniquely identified.
D. 10 times as many items can be uniquely identified.
C. 2 times as many items can be uniquely identified.
How many times will this loop iterate?
var x=5;
while (x>=0){
var squared=Math.pow(x, 2);
console.log(squared);
x=x-1;
}
6 times
A malicious or unauthorized Wi-Fi hotspot set up to trick users into connecting, allowing attackers to intercept or manipulate network traffic.
Rogue Access Point