Heuristic
Efficiency
Binary
The Internet
Security
100

a "good enough" solution to a problem when an actual solution is impractical or impossible.

What is the defintion of heuristic?

100

  A            is a statement of a task that may or may not be solvable by a computer.

An                is a finite set of instructions that accomplish a task.

 What is a problem  and an algorithm?

100

A text-editing application uses binary sequences to represent each of 200 different characters. What is the minimum number of bits needed to assign a unique bit sequence to each of the possible characters?



A: 4

B: 6

C: 7

D. 8

What is D? 8

100

According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?

 A: about.example.com

 B: example.co.uk

C: example.com.org

D. example.org

What is A?

100

Which of the following best explains how data is typically assembled in packets for transmission over the Internet?

 A: Each packet contains data to be transmitted, along with metadata containing information used for routing the data.

 B: Each packet contains an encrypted version of the data to be transmitted, along with metadata containing the key needed to decrypt the data.

C: Each packet contains only the metadata used to establish a direct connection so that the data can be transmitted.

D. Each packet contains multiple data files bundled together, along with metadata describing how to categorize each data file.

What is A?

200

Which of the following is not an example of a heuristic?

A. Meredith estimates that each floor tile is 10 inches by 10 inches. She counts floor tiles to determine the size of a room.

B. Avaya begins reading a positive, well written review for a product online. Based on the quality of the writing, she assumes that the product must ne good without reading the rest of the review.

C.  Martha is instructed to inventory all of the items in three aisles of a grocery store. She counts everything item by item and writes down the totals.

D. Sarah, a college junior, goes to the campus center to give a tour to a high school student. She sees a crowd of people and assumes that the person wearing the high school letter jacket is the prospective student. 

What is C? Martha  must count every item in the three aisles of the grocery store. There is no shortcut and she gets an exact answer, so this is not an example of a heuristic. 

200

 The third step using Binary Search to look for the number 32 in this list: 1, 2, 3, 4, 10, 11, 16, 25, 32, 33, 45, 47, 51, 69, 75

a. Compare the number 25 to the given number.

b. Compare the number 4 to the given number 

c. Compare the number 33 to the given number 

d. Compare the number 47 to the given number.  

What is C?

200

Directions: For the question or incomplete statement below, two of the suggested answers are correct. For this question, you must select both correct choices to earn credit. No partial credit will be earned if only one correct choice is selected. Select the two that are best in each case.

Which of the following can be represented by a single binary digit?

Select two answers.

  • A: The position of the minute hand of a clock
  • B: The remainder when dividing a whole number by 2 
  • C: The value of a Boolean variable
  • D. The volume of a car radio

What is B and C?

200

Which of the following is a primary reason for the use of open protocols on the Internet?



A: Open protocols allow devices to specify how data packets are to be routed on the Internet in advance.

B: Open protocols ensure that all data transmission on the Internet is kept secure.

 C: Open protocols ensure that all Internet users are provided connections with equal bandwidth.


D. Open protocols provide a way to standardize data transmission between different devices.

What is D?

200

A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best explains the result of this configuration as compared to a configuration in which the router does not limit the bandwidth?

 A: The amount of time it takes guest users to send and receive large files is likely to decrease.

 B: The number of packets required for guest users to send and receive data is likely to decrease.

 C: Guest users will be prevented from having fault-tolerant routing on the Internet.

D. Guest users will be restricted in the maximum amount of data that they can send and receive per second.

What is D?

300

Brandon is writing a program that allows users to keep a database of recipes. Each recipe includes a name, a list of ingredients, and instructions. He is currently writing the search procedure that will allow users to find recipes in the database by looking up ingredients. Brandon realizes that if there are too many recipes in the database, searching for one will be very difficult. Which of the following describes a heuristic approach to solving this issue?

There are TWO correct answers.

A. The procedure could start by checking the recipes that have been searched for recently.

B.  The procedure could start by checking the recipes in alphabetical order.

C. The procedure could start by checking the recipes that have been entered into the database most recently.

D. The procedure could start by checking the recipes that the user normally searches for at that time of day.

What is A and D? both describe procedure that use past experiences (in this case previous search data) to make solving the problem much easier.

300

Which of the following is true of two algorithms designed to solve the same problem?

a. If two algorithms solve the same problem they must have the same efficiency 

b. If two algorithms solve the same problem they must have different efficiency 

c. For any given problem there is a single algorithm that can solve it with a single efficiency

d.  It is possible for two algorithms with different efficiencies to solve the same problem 

  

What is D?

300

A certain programming language uses 4-bit binary sequences to represent nonnegative integers. For example, the binary sequence 0101 represents the corresponding decimal value 5. Using this programming language, a programmer attempts to add the decimal values 14 and 15 and assign the sum to the variable total. Which of the following best describes the result of this operation?

a.
The correct sum of 29 will be assigned to the variable total. 

b.
An overflow error will occur because 4 bits is not large enough to represent either of the values 14 or 15. 

c.
An overflow error will occur because 4 bits is not large enough to represent 29, the sum of 14 and 15. 

d.
A round-off error will occur because the decimal values 14 and 15 are represented as approximations due to the fixed number of bits used to represent numbers.

What is c. The largest binary value that can be represented using 4 bits is 1111, which is equal to the decimal value 15. Since the sum is larger than the largest representable value, an overflow error will occur.

300

The transmission control protocol (TCP) and Internet protocol (IP) are used in Internet communication. Which of the following best describes the purpose of these protocols?

 A: To ensure that communications between devices on the Internet are above a minimum transmission speed

 B: To ensure that private data is inaccessible to unauthorized devices on the Internet

C: To establish a common standard for sending messages between devices on the Internet

D. To validate the ownership of encryption keys used in Internet communication

What is C?

300

Which of the following best explains how messages are typically transmitted over the Internet?


A: The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient’s device.

B: The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device.

 C: The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient’s device.

D. The message is transmitted as a single file and received in whole by the recipient’s device.

What is B?

400

In which of the following situations is it most appropriate to use a heuristic solution?

a. The only algorithms that provide exact solutions run in linear time 

b. The problem has been identified as undecidable 

c.  The only algorithms that provide exact solutions run in unreasonable time but exact solutions are not necessary 

d. Two different algorithms have been identified that solve the problem in reasonable time 

What is C?

400

A high school provides email addresses to freshman students. The email system typically assigns an email address in the format "firstname.lastname@coolschool.edu". However, if a student has the same name as a previous student, the system assigns them a different format.

In order to figure out whether an email address is already assigned, the system does a binary search through its list of existing email addresses.

Which of these statements is true?

a. The code for the binary search algorithm must be written in binary to achieve optimum efficiency.

b. The list of email addresses don't need to be sorted for binary search to work, but that would improve the efficiency of the algorithm.

c. In the worst case that the email address is not in the list, binary search will need to look at every item in the list.

d. The list of email addresses must be sorted for binary search to work.

What is 

400

A computer program performs the operation  and represents the result as the value . Which of the following best explains this result?

A: An overflow error occurred.

B: The precision of the result is limited due to the constraints of using a floating-point representation.

C: The program attempted to execute the operation with the arguments in reverse order.

D. The program attempted to represent a floating-point number as an integer.

What is B?

400

Which of the following best describes the relationship between the World Wide Web and the Internet?

 A: The World Wide Web is a protocol that is accessed using a data stream called the Internet.

B: The World Wide Web is a system of linked pages, programs, and files that is accessed using a data stream called the Internet.

 C: The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.

D. The World Wide Web is a Web site that is accessed using a protocol called the Internet

What is D?

400

Which of the following is a true statement about Internet communication?

A: Devices from different manufacturers are required to run the same operating system to communicate over the Internet.

B: Every device connected to the Internet is assigned a digital certificate by a certificate authority.


C: Every device connected to the Internet is assigned an Internet protocol (IP) address.

D. Every device connected to the Internet requires a high-bandwidth connection to enable redundant routing to each device.

What is C?

500

InstaGrocery is a service that delivers groceries to people's homes. Their service, website, and mobile app are powered by a variety of algorithms.

Which algorithm's runtime is most likely to be improved by the use of a heuristic?


Choose 1 answer:

a. Sorting the grocery options from lowest price to highest price for a browsing shopper

b. Calculating the final cost of the groceries plus tip and delivery fee

c. Calculating a fast route for the driver to deliver bagged groceries to many different customers.

d. Suggesting the grocery store that is the closest distance to the user


What is C?

500

All algorithms can be created by combining steps in three different ways.

What are Sequencing, Selection, and Iteration?

500

A video game character can face toward one of four directions: north, south, east, and west. Each direction is stored in memory as a sequence of four bits. A new version of the game is created in which the character can face toward one of eight directions, adding northwest, northeast, southwest, and southeast to the original four possibilities. Which of the following statements is true about how the eight directions must be stored in memory?



A: Four bits are not enough to store the eight directions. Five bits are needed for the new version of the game.


B: Four bits are not enough to store the eight directions. Eight bits are needed for the new version of the game.


C. Four bits are not enough to store the eight directions. Sixteen bits are needed for the new version of the game.

D. Four bits are enough to store the eight directions.


What is D ?

500

Researchers have developed a simulation of packets traveling between server computers and client computers in a network. Of the following, which two outcomes are most likely to be results of the simulation?

Select two answers.


A: Better understanding of the effect of temporarily unavailable network connections

B: Better understanding of the effect of using hexadecimal representations for binary data

C: Better understanding of the impact of access to public data in identifying solutions to problems

D. Better understanding of the impact of increased connection speeds for frequently visited servers

What is A and D?

500

Alice and Bob need to exchange some private data online. To do this, Alice creates an algorithm that will encrypt and decrypt data. They secretly meet to share the algorithm, then they each use the algorithm to encrypt their messages. What kind of encryption is this?

A. Symmetric encryption

B. Public key encryption

C. Vingenere cipher

D. Firewall software

What is A? Because both parties use the same key to encrypt and decrypt their data