Comp Sci Flashcards
Which of the following is an example of a phishing attack?
Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information
What are the values of first and second as a result of executing the code segment?
first = 200, second = 100
Which of the following best explains the relationship between the Internet and the World Wide Web?
The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that are accessed via the Internet.
A code segment is intended to display the following output.
up down down down up down down down
Which of the following code segments can be used to display the intended output?
Repeat 2 Times
Display “up”
Repeat 3 times
Display “down”
Which of the following best exemplifies the use of multifactor authentication to protect an online banking
system?
Requiring the use of a fingerprint scan and a password.
Which of the following best describes a direct benefit in using redundant routing on the Internet?
Redundancy often allows messages to be sent on the network even if some network devices or connections have failed.
Which of the following replacements for <MISSING> can be used to move the robot to the gray
square?</MISSING>
IF (CAN_MOVE (right))
{
ROTATE_RIGHT ()
}
IF (CAN_MOVE (left))
{
ROTATE_LEFT ()
}
MOVE_FORWARD()
Which of the following is NOT a benefit of collaborating to develop a computing innovation?
Collaboration can decrease the size and complexity of tasks required of individual team membe
- The author of an e-book publishes the e-book using a no-rights-reserved Creative Commons license. Which
of the following best explains the consequences of publishing the book with this type of license?
Individuals can freely distribute or use the contents of the e-book without needing to obtain additional permissions from the author.
Which of the following best explains how devices and information can be susceptible to unauthorized access
if weak passwords are used?
Un authorized individuals can deny services to a computing system by overwhelming the system with login attempts.
At one time, the count for the most popular video was about two million. Sometime later, the same video displayed a seven-digit negative number as its count, while the counts for the other videos displayed correctly. Which of the following is the most likely explanation for the error?
The count for the video became larger than the maximum value allowed by the data type used to store the count.
Which of the following statements about the Internet is true?
The Internet requires all communications to use encryption protocols
Individuals sometimes attempt to remove personal information from the Internet. Which of the following is the LEAST likely reason the personal information is hard to remove?
All personal information is stored online using authentication measures, making the information hard to access.
A scientist wants to investigate several problems. In which of the following situations is using a simulation
LEAST suitable for solving a problem?
When the solution to the problem requires real-world data inputs that are continually measured a regular intervals.
A state government is attempting to reduce the digital divide. Which of the following activities has the
greatest potential to contribute to the digital divide rather than reducing it?
Requiring applicants for government jobs to apply using an online platform.
Which of the following code segments will move the robot to the gray square along the path indicated by the arrows?
C
Using only the information in the database, which of the following questions CANNOT be answered?
What is the average number of customer deliveries made by each truck on a particular day?
Which of the following pairs of spreadsheets
can be combined and analyzed to determine the desired information?
Spreadsheets I and II
Which of the following parallel computing solutions would minimize the amount of time it takes to execute
all four processes?
p and q on one processor and processes r and s on the other processor.
Which of the following expressions represents the value stored in the variable x as a result of executing
the program?
2 * 3 * 3 * 3 * 3
Which of the following best explains why such an approach is considered useful for this
project?
The image analysis is likely to take a longer time for the research team than for a distributed group of individuals.
red red blue red red blue red red blue
Which of the following code segments can be used to display the intended output?
C
In a certain computer program, two positive integers are added together, resulting in an overflow error.
Which of the following best explains why the error occurs?
The program cannot represent integers; the integers are converted into decimal approximations, leading to rounding errors.
For which of the following input values will the circuit have an output of true ?
A = true, B = false, C = false, D = false