Which of the following is the main reason to use procedural abstraction in programming?
A. To speed up the execution time of a program
B. To reduce the number of variables
C. To simplify code by grouping repeated behavior
D. To visualize how data is stored
C. To simplify code by grouping repeated behavior
Which of these is considered and example of metadata?
A. The text in an email
B. The resolution of an image
C. The password to an Epic Games account
D. The RGB (binary) values of a photo
B. The resolution of an image
A student develops an algorithm that solves a problem, but it only works in some cases. What do we call this algorithm?
A. Efficient
B. Polynomial
C. Heuristic
D. Recursive
C. Heuristic
What is the purpose of the Domain Name System (DNS)?
A. Protect user data
B. Translate IP addresses into MAC addresses
C. Convert human-readable URLs into IP addresses
D. Control internet bandwidth
C. Convert human-readable URLs into IP addresses
What is the digital divide?
A. A new type of computer hardware created in 2023
B. A gap in access to computing and the internet across different populations
C. An error in software development which governments are actively trying to fix
D. The division of a network into different cables across the world
B. A gap in access to computing and the internet across different populations
A student is developing a program and uses a flowchart before coding. What stage of the development process is this?
A. Iteration
B. Implementation
C. Design
D. Testing
C. Design
Why should we care about bias in large datasets?
A. It reduces processing time
B. It leads to fewer incorrect values in your code
C. It can lead to inaccurate or unfair conclusions
D. It increases the data abstraction efficiency
C. It can lead to inaccurate or unfair conclusions.
Which of the following is an advantage of using a linear search as opposed to a binary search?
A. It can be faster for all data
B. It finds multiple values
C. It uses recursion
D. It doesn’t require sorted data
D. It doesn’t require sorted data
What guarantees that packets are properly delivered and in order on the internet?
A. DNS
B. TCP
C. HTTP
D. IP by itself
B. TCP
What is a positive impact of open source software?
A. It costs more to maintain
B. It restricts who can view the code
C. It allows anyone to improve the code
D. It runs slower
C. It allows anyone to improve the code
A team of developers employs pair programming as part of their development work. What is the key benefit of this method?
A. Less time making the program
B. Less memory used
C. Increased collaboration/code quality
D. Shorter syntax
C. Increased collaboration/code quality
Which of the following best describes how data abstraction supports data analysis?
A. It removes unneeded data
B. It visualizes all data points
C. It hides unnecessary details, allowing focus on relevant patterns
D. It alters the format of the data for the sake of analysis
C. It hides unnecessary details, allowing focus on relevant patterns.
Which response identifies the best explanation for the differences in sequencing, selection, and iteration in algorithms?
A. They all do math
B. They all represent code structures: order, making decisions, and repetition
C. They are only used in low level code
D. They only apply to list manipulation
B. They all represent code structures: order, making decisions, and repetition
A cyberattack targets a web server by sending a high volume of requests to the server. When the server receives the requests, it gets overwhelmed and crashes. What kind of cyberattack is this?
A. Phishing
B.Rouge Access Point
C. DDoS Attacks
D. Malware
C. DDoS Attacks
A software company releases its source code to the public. What is this known as?
A. Cloud computing
B. Open-source software
C. Creative Commons
D. Hardware integration
B. Open-source software
What error is this?
is_even(number):
if number % 2 == 1:
return True
else:
return False
print(is_even(4))
A. Syntax Error
B. Overflow Error
C. Runtime Error
D. Logic Error
D. Logic Error
A dataset is cleaned by minimizing outliers, converting formats, and addressing unknowns. What threat does this cause in analysis?
A. Reduced accuracy
B. Introduction of human bias into the dataset
C. Slower computation
D. Larger file sizes
B. Introduction of human bias into the dataset
What is a decidable problem?
A. It has an algorithm that will always produce a result for any input
B. It involves numeric outputs only
C. It can’t be solved using binary
D. It’s solved faster using random inputs
A. It has an algorithm that will always produce a result for any input
What is the best option to explain how a layered structure of internet protocols facilitate scalability and innovation?
A. Each layer is only able to work with new hardware
B. Layers are integrated tightly and inseparable
C. New protocols can be developed at higher layers without changing the underlying infrastructure
D. Only packet size is configurable
C. New protocols can be developed at higher layers without changing the underlying infrastructure
A facial recognition system that has difficulty correctly spotting people of darker skin tones best illustrates which of the following?
A. Lack of internet access
B. Bias involved from training datasets that lack diversity
C. A hardware failure
D. Algorithmic efficiency
B. Bias involved from training datasets that lack diversity
What is the Error?
PROCEDUREmystery(a)
{
DISPLAY a+4+"cabin")
}
A. Syntax Error on line 1
B. Syntax Error on line 3
C. Runtime Error on line 3
D. No error
B. Syntax Error on line 3
In a vast population health dataset, deleting personally identifying information will not always provide anonymity. Why?
A. Because data can always be decrypted.
B. Because metadata and combining data with outside datasets can still identify persons.
C. Because anonymized data can’t be used at all.
D. Because data types will revert to the default.
B. Because metadata and combining data with outside datasets can still identify persons.
A student switched from using linear search to binary search in their program to increase efficiency. Yet, the binary search is always returning the wrong results. What is the most likely cause of the error?
A. The search function uses functions instead of iteration
B. The list was not sorted before applying binary search
C. Binary search can’t be used with numeric values
D. Binary search requires duplicate values to function
B. The list was not sorted before applying binary search
A distributed architecture maintains end-user authentication data in a few discrete data centers. Even with all HTTPS and encryption in place, the attacker's goal was met: the attacker obtained the end-user's credentials during a man-in-the-middle (MitM) attack. What is the most reasonable problem?
A. Poor physical security of the database
B. A fault in the encryption algorithm
C. Failure to validate SSL/TLS certificates during session establishment
D. Slow DNS propagation
C. Failure to validate SSL/TLS certificates durng session establishment
A fitness app on users' mobile devices collects their location as part of its core functionality – which includes tracking runs and suggesting running routes. The company sells the anonymized data they collect about users to third-party vendors. What is the top privacy threat in this case?
A. The app violates open-source software licenses
B. The data could be de-anonymized using location patterns
C. GPS tracking consumes too much bandwidth
D. Users may forget to update the app
B. The data could be de-anonymized using location patterns