Compression
CC & IP
Data
The Internet p1
The Internet p2
100

A process for reducing the number of bits needed to represent something without losing any information. This process is reversible.

Lossless Compression

100

A work or invention that is the result of creativity, such as a piece of writing or a design, to which one has rights and for which one may apply for a patent, copyright, trademark, etc.

Intellectual Property

100

 What is the binary equivalent of the decimal number 10? A. 1001 B. 1010 C. 1100 D. 1110

Answer: B. 1010

100

the inclusion of extra components so that a system can continue to work even if individual components fail, for example by  having more than one path between any two connected devices in a network.

Redundancy

100

 What does "bandwidth" measure? A. The physical length of an internet cable B. The amount of data that can be transmitted over a network in a given amount of time C. The number of connected devices on a network D. The speed at which data packets are received

Answer: B. The amount of data that can be transmitted over a network in a given amount of time

200

A process for reducing the number of bits needed to represent something in which some information is lost or thrown away. This process is not reversible.

Lossy Compression

200

A collection of public copyright licenses that enable the free distribution of an otherwise copyrighted work, used when an author wants to give people the right to share, use, and build upon a work that they have created

Creative Commons

200

 Which of the following best describes the purpose of ASCII encoding?

 A. To compress data for storage 

B. To represent characters as binary numbers

 C. To encrypt data for secure communication

 D. To translate binary numbers into hexadecimal

Answer: B. To represent characters as binary numbers

200

Can continue to function even in the event of individual component failures. This is important because elements of complex systems like a computer network fail at unexpected times, often in groups

Fault Tolerant

200

 What is the main role of a router in a network? A. To increase the bandwidth of the network B. To store data packets until they are ready to be sent C. To forward data packets between devices or networks D. To encode data before transmission

Answer: C. To forward data packets between devices or networks

300

Which of the following is an advantage of a lossless compression over a lossy compression Algorithm?

A. A lossless compression algorithm can guarantee that compressed information is kept secure, while a lossy compression algorithm cannot

B. A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot.

C. A lossless compression algorithm typically allows for faster transmission speeds than does a lossy compression algorithm

D. A lossless compression algorithm typically provides a greater reduction in the number of bits stored or transmitted than does a lossy compression algorithm.

B

300

Which of the following is NOT an advantage of using open-source software

A

Open-source software is generally free or lower in cost than commercially available software.

B

The availability of source code makes it possible to customize open-source software to a user’s individual needs.

C

The original developer of open-source software provides free or low-cost support for users installing and running the software.

D

Unlike commercial software, which can become obsolete when the company that created it goes out of business, open-source software can be updated without the involvement of the original programmers.

C

300

How many unique values can be represented with 5 bits? A. 10 B. 16 C. 32 D. 64


Answer: C. 32 Explanation: The formula for calculating the number of values is , where is the number of bits. So .

300

 HyperText Transfer Protocol - the protocol used for transmitting web pages over the Internet

HTTP

300

Which of the following best describes what happens when a data packet is lost during transmission? A. The packet is automatically duplicated by the network. B. The receiving device alerts the sender to retransmit the packet. C. The router replaces the lost packet with a placeholder. D. The sender immediately stops all data transmission.


Answer: B. The receiving device alerts the sender to retransmit the packet

400

A user wants to save a data file on an online storage site. The user wants to reduce the size of the file, if possible, and wants to be able to completely restore the file to its original version. Which of the following actions best supports the user's needs?

A. Compressing the file using a lossless compression before uploading it.

B. Compressing the file using a lossy compression before uploading it.

C. Compressing the file using both lossy and lossless compression before uploading it.

D. Uploading the original file without using any compression algorithm.

A

400

Question: Which of the following actions is most likely to raise legal or ethical concerns? 

A. A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song. 

B. A musician writes an original song and registers it with a copyright office. 

C. A musician collaborates with another artist to create a new song without using samples. 

D. A musician creates a song using public domain samples and publishes it under a Creative Commons license.

CORRECT A

400

 Which of the following statements about overflow errors in binary arithmetic is true? A. Overflow errors only occur during subtraction. B. Overflow errors result when a number is too small to be represented. C. Overflow errors occur when the result of a calculation exceeds the storage limit for the assigned number of bits. D. Overflow errors can be avoided by using the largest possible data type.


Answer: C. Overflow errors occur when the result of a calculation exceeds the storage limit for the assigned number of bits.

400

the system responsible for translating domain names like example.com into IP addresses

Domain Name System (DNS)

400

Why is packet-switching an efficient method of transmitting data across the internet? A. Data is transmitted as a continuous, unbroken stream. B. Each packet takes a fixed path, ensuring it arrives in order. C. Packets can take different routes to avoid congestion. D. Large files are transmitted all at once instead of being broken up.

Answer: C. Packets can take different routes to avoid congestion

500

Which of the following is a true statement about data compression? 

A. Data compression is only useful for files being transmitted over the Internet.

B. Regardless of the compression technique used, once a data file is compressed, it cannot be restored to its original state. 

C. Sending a compressed version of a file ensures that the contents of the file cannot be intercepted by an unauthorized user. 

D. There are trade-offs involved in choosing a compression technique for storing and transmitting data.

D

500

Which of the following actions violates intellectual property laws?

 A. A student shares software they developed with others using an open-source license. 

B. A software developer uses code snippets from a public repository in their project without attribution. 

C. A graphic designer uses royalty-free images purchased from a stock photography site in their work.

 D. A musician creates an original song and registers it under copyright protection.

B

500

Which of the following sequences of bytes best represents a bitmap image where each byte corresponds to a pixel and 0 represents black while 255 represents white? A. [0, 255, 0, 255, 0, 255] B. [128, 128, 128, 128, 128, 128] C. [255, 255, 255, 255, 255, 255] D. [0, 0, 0, 0, 0, 0]

Answer: A. [0, 255, 0, 255, 0, 255] Explanation: Alternating between 0 and 255 creates a pattern of black and white pixels.

500

 Which of the following statements best describes the relationship between the World Wide Web (WWW) and the internet? A. The World Wide Web is a physical network, while the internet is a collection of websites. B. The World Wide Web is an application built on the internet that allows access to websites and online resources. C. The internet and the World Wide Web are two completely separate technologies. D. The internet is limited to web browsers, whereas the World Wide Web encompasses all online communication.

Answer: B. The World Wide Web is an application built on the internet that allows access to websites and online resources Explanation: The internet is the global network infrastructure that connects computers, while the World Wide Web is a system of interlinked documents and resources accessed via the internet.

500

 Which of the following scenarios will result in network latency? A. A router is overwhelmed with too many packets to process. B. Bandwidth is increased on a high-speed network. C. Data packets are sent directly between two devices without a router. D. The packet size is reduced to optimize transmission.

Answer:A