Computer Science, Midterm

studied byStudied by 21 people
5.0(1)
get a hint
hint

Bit

1 / 84

Tags and Description

85 Terms

1

Bit

The smallest unit of information in a computer, it is either a 0 or a 1.

New cards
2

Byte

A series of 8 bits.

New cards
3

How do computing devices represent complex information.

Patterns of bits.

New cards
4

Abstraction

When a programmer hides all but the relevant data about an object in order to reduce complexity and increase efficiency.

Common ones include numbers, characters, and colors.

New cards
5

Analog

Data with values that change continuously, or smoothly, over time. Some examples include music, colors of a painting, or position of a sprinter during a race.

New cards
6

Dialog

Data that changes discreetly through a finite set of possible values.

New cards
7

What is the smallest number for which an overflow error occur in a 3-bit computer?

8

New cards
8

What are overflow errors?

With a set amount of bits, some numbers may not be able to be represented, and the binary will "overflow." Fixed numbers will never eliminate the possibility of overflow errors.

New cards
9

What are round-off errors?

When a number that is too precise is attempted to be represented. Fixed numbers will never eliminate the possibility of round-off errors.

New cards
10

What number does the binary representation system start with?

0

New cards
11

Lossy Compression

Removes parts of the original algorithm, minimizes the amount of bits, reduces data size, will not be able to recreate the original algorithm.

New cards
12

Lossless Compression

Packs similar data, will be able to recreate the original algorithm.

New cards
13

Copyright

Applies to all material, even if it is digitized.

New cards
14

What is Creative Commons?

Copyright that enables creators to freely distribute their otherwise copyrighted work.

New cards
15

Could the same sequence of bits represent different types of information?

Yes

New cards
16

Computing Device

A machine that can run a program.

New cards
17

Computing System

A group of computers working together for a common purpose.

New cards
18

Computing Network

A group of connected computers that can send or receive data.

New cards
19

Path

A sequence of direct connections.

New cards
20

Internet Protocols

The Internet protocols are open and used by all devices connected to the network.

They did not change and were designed with the intent that more devices would connect over time.

New cards
21

How does data travel from one device to another?

Using any path it wishes to, the data travels from one location to the other.

As long as the two decided are using the same protocols.

New cards
22

Packet Metadata

The location/IP address added to packets to tell them where to go and how to reassemble, it must be included in every packet.

New cards
23

Packet

Sent data is always divided into packets.

Not always received in the order they are sent.

Take different paths.

New cards
24

IP Address

A unique number for identifying devices that send and receive information on the Internet. It is able to be changed.

New cards
25

Which Internet protocol reassembles packets and requests missing packets to form complete messages?

Transmission Control Protocol (TCP)

New cards
26

Which of the following Internet protocols is used to request and send pages and files on the World Wide Web?

Hyper Text Transfer Protocol (HTTP)

New cards
27

Redundancy

Allows devices to stay connected when a particular path is no longer available, making the Internet fault-tolerable and making networks more reliable. This can be done by adding connections to the network.

New cards
28

Design Specification

Requirements for how a program will work and how users will interact with it.

New cards
29

Element ID

The name given to an element of code in order to identify it easily.

New cards
30

What is a string?

A command in quotations, this could be a number or a word, numbers do not need to be in quotations.

New cards
31

Event-Driven Programming

Some program statements run when triggered by an event, like a mouse click or a key press. Programs run differently each time depending on user interactions.

New cards
32

Sequential Programming

Program statements run in order, from top to bottom. No user interaction. Code runs the same way every time.

New cards
33

Comments

Form of program documentation written into the program to be read by people and which do not affect how a program runs.

New cards
34

Pair Programming

A collaborative programming style in which two programmers switch between the roles of writing code and tracking or planning high level progress.

A driver manipulates the keyboard and the mouse, whereas a navigator keeps track of the big picture, and guides the driver towards the goal.

New cards
35

Documentation

A written description of how a command or piece of code works or was developed.

New cards
36

Debugging Strategies

-Keeping your code clean -Running your code frequently -Use classmates and resources

New cards
37

Program

A collection of program statements. Programs run (or “execute”) one command at a time.

New cards
38

Program Statement

A command or instruction. Sometimes also referred to as a code statement.

New cards
39

User Interface

The inputs and outputs that allow a user to interact with a piece of software. User interfaces can include a variety of forms such as buttons, menus, images, text, and graphics.

New cards
40

Input

Data that are sent to a computer for processing by a program. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.

New cards
41

Output

Any data that are sent from a program to a device. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.

New cards
42

User Datagram Protocol (UDP)

Used to send and receive packets quickly without error checking.

New cards
43

Topic ideas you came up with. How you and your partner decided upon your final topic.

Sleep resources, waze for amusement parks, and clothing app that helps with outfits.

We both love fashion and Pinterest and decided it would be the most helpful app to design.

New cards
44

Information gained by interviewing potential users of the app regarding their prior knowledge and how you used this information to plan your app.

Both knew of Pinterest and used it to create outfits, but had not heard of something similar to our app idea.

One recommended a shop to recommend clothing purchase and the other recommended a quiz for clothing in regard to color.

We ended up including both.

New cards
45

Your initial plan for the app, including layout and functionality.

An app where photos can be uploaded, and with that the app can create outfits from scratch, or based on a specific item. The app also allows one to upload an inspirational photo and will create a similar outfit out of clothes in your uploaded closet.

Included a quiz page, store, search, account, and home page.

New cards
46

Changes you made during the development process and why you made them.

Added more screens, allowing the user to have more control over what the app does.

Added noise when you open the app, something fun for the users.

New cards
47

A brief description of the layout and functionality of your final app, including inputs and outputs.

Some of the app’s functions include allowing the users to upload photos of clothing to create their online closet, following other users and saving their outfits, building and having outfits built for them out of clothing they already have in their closets, taking fashion quizzes to find out their unique style, recommending stores and purchasing online clothing shops, and searching for outfits for any occasion.

Starts on a blank screen with the actual app icon, when clicked, it makes a cute noise and takes the user to the screen.

The user can toggle between the account, home, search, quiz, and store pages.

When going into settings, notifications can be turned off, the screen can be changed from dark to light mode, the app can be logged out of, or the account can be deleted.

New cards
48

Sampling

A process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples.

New cards
49

Which of the following best describes how computing devices represent information?

A.) A computer will either represent information as bits or bytes but not both.

B.) A computer represents data as a byte which is either a 0 or 1.

C.) A computer represents data as a bit which is either a 0 or a 1.

D.) A computer represents information as bits that contain 8 bytes.

C.) A computer represents data as a bit which is either a 0 or a 1.

New cards
50

Which of the following is NOT true of how computers represent complex information?

A.) Computing devices use patterns of bits to represent complex information.

B.) Abstraction helps represent complex information by surfacing complexity that might otherwise be hidden.

C.) Depending on the context the same sequence of bits may represent different types of information.

D.) Common abstractions represented by computing devices include numbers, characters, and color.

B.) Abstraction helps represent complex information by surfacing complexity that might otherwise be hidden.

New cards
51

When visiting a museum Lian takes a photo of a painting with a smartphone which stores the photo as an image file. Which of the following best describes the difference between the painting itself and the photo of the painting stored on the smartphone?

A.) Both the painting and the photo are analog.

B.) The photo is a digital representation of the analog painting.

C.) Sampling can be used to determine whether the analog image is an accurate representation of the painting.

D.) The phone can represent the photo in either digital or analog formats depending on the sampling technique that is used.

B.) The photo is a digital representation of the analog painting.

New cards
52

Your computer uses 4 bits to represent decimal numbers in binary. What is the smallest number for which an overflow error occurs?

A.) 14

B.) 15

C.) 16

D.) 17

C.) 16

New cards
53

Which of the following is true of how computers represent numbers?

A.) Using a fixed but large number of bits can eliminate the possibility of round-off error when representing numbers in binary.

B.) With a fixed number of bits some numbers are too large to represent in a computer, which will lead to overflow errors.

C.) Using a fixed but large number of bits, for example, 128, eliminates the possibility of overflow errors.

D.) With a large but fixed number of bits it is possible to eliminate either round-off errors or overflow errors, but not both.

B.) With a fixed number of bits some numbers are too large to represent in a computer, which will lead to overflow errors.

New cards
54

Which of the following binary numbers is the largest?

A.) 11000000

B.) 011111111

C.) 00000001

D.) 101111111

A.) 11000000

New cards
55

How many total numbers can be represented with an 8-bit binary system?

A.) 127

B.) 128

C.) 255

D.) 256

D.) 256

New cards
56

Which of the following is true of lossy and lossless compression algorithms?

A.) Lossy compression algorithms are used when perfect reconstruction of the original data is important.

B.) Lossy compression algorithms are typically better than lossless compression.

C.) Lossless compression algorithms are only used to compress text data.

D.) Lossless compression algorithms only allow for an approximate reconstruction of the original data.

B.) Lossy compression algorithms are typically better than lossless compression.

New cards
57

Jorge is sending a large file to a friend as a part of a shared classroom project. Which of the following is most likely true if Jorge opts to compress the image before sending it?

A.) The image can no longer be represented using bits.

B.) The image will have been converted into an analog form.

C.) The image will require more pixels to display on the screen.

D.) The image will require fewer bits in order to be represented.

D.) The image will require fewer bits in order to be represented.

New cards
58

Which of the following is true of intellectual property?

A.) Information created on a computer is not owned by anyone since only analog information is protected under copyright law.

B.) You do not need to cite work created by someone else if both the original work and your use of it are in digital form.

C.) Creative Commons enables content creators to freely distribute their otherwise copyrighted work.

D.) Creative Commons has severely hindered broad and open access to digital information.

C.) Creative Commons enables content creators to freely distribute their otherwise copyrighted work.

New cards
59

Lucy is completing a project as part of a science class using materials she found online. Which of the following is most likely to lead to legal consequences?

A.) Modifying a piece of open-source software.

B.) Using open access research for when she does not acquire a license.

C.) Failing to publish her work under a Creative Commons license.

D.) Using images posted online by another student without permission or citation.

D.) Using images posted online by another student without permission or citation.

New cards
60

A “computing device” can be defined as…

A.) A sequence of direct connections.

B.) A machine that can run a program.

C.) A group of connected computers that can send or receive data.

D.) A group of computers working together for a common purpose.

B.) A machine that can run a program.

New cards
61

A “computing system” can be defined as…

A.) A sequence of direct connections.

B.) A machine that can run a program.

C.) A group of connected computers that can send or receive data.

D.) A group of computers working together for a common purpose.

D.) A group of computers working together for a common purpose.

New cards
62

A “computing network” can be defined as…

A.) A sequence of direct connections.

B.) A machine that can run a program.

C.) A group of connected computers that can send or receive data.

D.) A group of computers working together for a common purpose.

C.) A group of connected computers that can send or receive data.

New cards
63

A “path” can be defined as…

A.) A sequence of direct connections.

B.) A machine that can run a program.

C.) A group of connected computers that can send or receive data.

D.) A group of computers working together for a common purpose.

A.) A sequence of direct connections.

New cards
64

Which of the following best describes the protocols used on the Internet?

A.) The protocols of the Internet are designed by government agencies to ensure they remain free to use.

B.) The protocols of the Internet are secret to maintain the privacy and security of people using them.

C.) Each device connected to the Internet will use a protocol designed by the company that manufactured it.

D.) The protocols of the Internet are open and used by all devices connect to the network.

D.) The protocols of the Internet are open and used by all devices connect to the network.

New cards
65

Jesse purchases a new smartphone and is immediately able to use it to send a photo over the Internet to a friend who lives in a different country. Which of the following is not necessary to make this possible?

A.) Both devices are using the same shared and open protocols.

B.) A single direct connection is established between any two devices connected to the Internet.

C.) The data of the image is routed through a sequence of directly connected devices before arriving at its destination.

D.) Both devices are directly connected to at least one part of the Internet.

B.) A single direct connection is established between any two devices connected to the Internet.

New cards
66

Which of the following is true of how the Internet has responded to the increasing number of devices now using the network?

A.) Internet protocols are changed every year to adapt to the new devices that have been connected to the network.

B.) While the number of devices connected to the Internet had grown, the network itself has not grown.

C.) The protocols of the Internet were designed to scale as new devices are added.

D.) The protocols of the Internet are no longer necessary thanks to the large number of devices now connected to the network.

C.) The protocols of the Internet were designed to scale as new devices are added.

New cards
67

Which of the following is true of how packets are sent through the Internet?

A.) Packet metadata is the only included on important packets to indicate they should get access to faster paths through the network.

B.) Packet metadata is used to route and reassemble information traveling through the Internet.

C.) Information sent through the Internet is only encapsulated in packets if the message is too large to be sent as a data stream.

D.) Information sent through the Internet is split into two packets, one which contains the message and another which contains the metadata.

B.) Packet metadata is used to route and reassemble information traveling through the Internet.

New cards
68

Emilee is watching an online video. The video is being sent to her laptop by a server over the Internet which splits the video into packets and sends them in the order they appear in the video. Which of the following is true about how the packets will arrive at her computer?

A.) The packets will always be received in the order they were sent.

B.) Either every packet will reach her computer or none of them will.

C.) Packets that arrive out of order will be sent back to the server.

D.) The packets may arrive out of order.

D.) The packets may arrive out of order.

New cards
69

Which of the following best describes the purpose of an IP address?

A.) IP addresses provide a unique number for identifying devices that send and receive information on the Internet.

B.) IP addresses assist in the reconstruction of a message that has been divided into many packets.

C.) IP addresses indicate the location where an internet-connected computing device.

D.) IP addresses indicate how many times an individual packet has been requested by a router.

A.) IP addresses provide a unique number for identifying devices that send and receive information on the Internet.

New cards
70

Which of the following Internet protocols is MOST important in reassembling packets and requesting missing packets to form complete messages?

A.) Transmission Control Protocol (TCP)

B.) Internet Protocol (IP)

C.) User Datagram Protocol (UDP)

D.) HypterText Transfer Protocol (HTTP)

A.) Transmission Control Protocol (TCP)

New cards
71

Which of the following Internet protocols is used to request and send pages and files on the World Wide Web?

A.) Transmission Control Protocol (TCP)

B.) Internet Protocol (IP)

C.) User Datagram Protocol (UDP)

D.) HypterText Transfer Protocol (HTTP)

D.) HypterText Transfer Protocol (HTTP)

New cards
72

Two devices are connected to the Internet and communicate with one another. A squirrel chews through one of the wires in the network that is currently being used by the devices to communicate. The network immediately begins using a different path through the network and communication continues as normal. This situation best exemplifies which principle?

A.) Fault-tolerance

B.) Scalability

C.) Protocol

D.) Pathing

A.) Fault-tolerance

New cards
73

An Internet Service Provider (ISP) is a company that buids the routers and wired connections that allow individuals to access the Internet. An ISP is considering adding additional redundant connections to its network. Which of the following best describes why the company would choose to do so?

A.) It costs less to design a network that is redundant.

B.) The protocols of the Internet only work on networks that are redundant.

C.) Redundant networks are more reliable.

D.) Adding additional connections reduces the fault tolerance of the network.

C.) Redundant networks are more reliable.

New cards
74

Which of the following actions would usually be helpful in designing and developing an app?

A.) Interviewing potential users of the app.

B.) Writing the entire program code before testing any parts of it.

C.) Observing users attempting to use the app.

A.) Interviewing potential users of the app. C.) Observing users attempting to use the app.

New cards
75

Which of the following best describes the purpose of a design specification?

A.) Tracking errors that arise through user testing.

B.) Documenting comments that will need to be added to a program.

C.) Describing the requirements for how a program will work or users will interact with it.

D.) Listing detailed questions that will be asked of users during interviews.

C.) Describing the requirements for how a program will work or users will interact with it.

New cards
76

Which of the following best describes the differences between sequential and event-driven programming?

A.) In sequential programming commands run one at a time. In event-driven programming, all commands run at the same time.

B.) In sequential programming commands run faster than in event-driven programming.

C.) In sequential programming each command is run many times in sequence. In event-driven programming, all commands are run a single time as an event.

D.) In sequential programming commands run in the order they are written. In event-driven programming, some commands run in response to user interactions or other events.

D.) In sequential programming commands run in the order they are written. In event-driven programming, some commands run in response to user interactions or other events.

New cards
77

Which of the following is NOT a reason to include comments in programs?

A.) Comments help the computer decide whether certain components of a program are important.

B.) Comments help programmers debug issues in their own code.

C.) Comments help document how code was written for other programmers to use.

D.) Comments enable programmers to track their work throughout the development process.

A.) Comments help the computer decide whether certain components of a program are important.

New cards
78
<p>Which line code in this program is most likely to result in an error?</p><p>A.) 1</p><p>B.) 2</p><p>C.) 3</p><p>D.) 4</p>

Which line code in this program is most likely to result in an error?

A.) 1

B.) 2

C.) 3

D.) 4

B.) 2

New cards
79
<p>What is the minimum number of paths that would need to be broken to prevent Computing Device A from connecting with Computing Device E?</p><p>A.) 1</p><p>B.) 2</p><p>C.) 3</p><p>D.) 4</p>

What is the minimum number of paths that would need to be broken to prevent Computing Device A from connecting with Computing Device E?

A.) 1

B.) 2

C.) 3

D.) 4

C.) 3

New cards
80
<p>Device A is attempting to send data over the Internet to Device E. Which of the following is true of how data will travel through the network?</p><p>A.) The data will always travel through Device B as it is the shortest path.</p><p>B.) The data will never be sent to Device G since there are other, shorter paths available.</p><p>C.) It is possible that the data travels through any of the devices in the network before arriving at Device E.</p><p>D.) If the data travels through Device D then it will not travel through Device B.</p>

Device A is attempting to send data over the Internet to Device E. Which of the following is true of how data will travel through the network?

A.) The data will always travel through Device B as it is the shortest path.

B.) The data will never be sent to Device G since there are other, shorter paths available.

C.) It is possible that the data travels through any of the devices in the network before arriving at Device E.

D.) If the data travels through Device D then it will not travel through Device B.

C.) It is possible that the data travels through any of the devices in the network before arriving at Device E.

New cards
81
<p>The following program is run. Then the user clicks the “bottomButton” once ad then clicks the “topButton” once. What will be displayed in the console?</p><p>A.) cow pig chicken</p><p>B.) cow chicken pig</p><p>C.) pig cow chicken</p><p>D.) chicken pig cow</p>

The following program is run. Then the user clicks the “bottomButton” once ad then clicks the “topButton” once. What will be displayed in the console?

A.) cow pig chicken

B.) cow chicken pig

C.) pig cow chicken

D.) chicken pig cow

D.) chicken pig cow

New cards
82
<p>What will the “background-color” of the “topButton” be when the program is finished running?</p><p>A.) red</p><p>B.) orange</p><p>C.) blue</p><p>D.) green</p>

What will the “background-color” of the “topButton” be when the program is finished running?

A.) red

B.) orange

C.) blue

D.) green

C.) blue

New cards
83
<p>The following program is run. Then the user clicks the “topButton” button once. What will be displayed in the console?</p><p>A.) cat bird dog</p><p>B.) dog cat bird</p><p>C.) cat dog bird</p><p>D.) bird cat dog</p>

The following program is run. Then the user clicks the “topButton” button once. What will be displayed in the console?

A.) cat bird dog

B.) dog cat bird

C.) cat dog bird

D.) bird cat dog

C.) cat dog bird

New cards
84
<p>If the user does NOT click the button what color will “topButton” be when this program finishes running?</p><p>A.) red</p><p>B.) blue</p><p>C.) green</p><p>D.) orange</p>

If the user does NOT click the button what color will “topButton” be when this program finishes running?

A.) red

B.) blue

C.) green

D.) orange

B.) blue

New cards
85
<p>The following program is run. Then the user clicks the “bottomButton” two times. What will be displayed in the console?</p><p>A.) apple banana cherry cherry dragon fruit</p><p>B.) banana dragon fruit cherry cherry</p><p>C.) banana dragon fruit apple apple</p><p>D.) banana cherry cherry dragon fruit</p>

The following program is run. Then the user clicks the “bottomButton” two times. What will be displayed in the console?

A.) apple banana cherry cherry dragon fruit

B.) banana dragon fruit cherry cherry

C.) banana dragon fruit apple apple

D.) banana cherry cherry dragon fruit

B.) banana dragon fruit cherry cherry

New cards

Explore top notes

note Note
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 22 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 3423 people
Updated ... ago
4.8 Stars(25)
note Note
studied byStudied by 54 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 110 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 5121 people
Updated ... ago
4.8 Stars(41)

Explore top flashcards

flashcards Flashcard35 terms
studied byStudied by 27 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard49 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard30 terms
studied byStudied by 178 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard33 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard53 terms
studied byStudied by 27 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard40 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard52 terms
studied byStudied by 1285 people
Updated ... ago
4.7 Stars(3)
flashcards Flashcard48 terms
studied byStudied by 141 people
Updated ... ago
4.9 Stars(7)