100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
APCSP Midterm Review Questions 5th and 6th Period Questions With Complete Solutions $22.99   In winkelwagen

Tentamen (uitwerkingen)

APCSP Midterm Review Questions 5th and 6th Period Questions With Complete Solutions

 5 keer bekeken  0 keer verkocht
  • Vak
  • APCSP
  • Instelling
  • APCSP

APCSP Midterm Review Questions 5th and 6th Period Questions With Complete Solutions

Voorbeeld 4 van de 92  pagina's

  • 2 november 2024
  • 92
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Onbekend
  • APCSP
  • APCSP
avatar-seller
Classroom
APCSP Midterm Review Questions 5th and 6th Period
Questions With Complete Solutions

"There are 10 types of people in this world: Those who
understand binary, and those who don't."
Why might computer scientists find this statement humorous?
a) There are ten types of computer programmers in the world.
b) 10 (binary) = 2 (decimal)
c) 10 (decimal) = 1010 (binary)
d) 10 (hexadecimal) = 16 (decimal) = 1 0000 (binary) Correct
Answer b

12. In data compression, there are many different methods for
compressing data. We have many different protocols because
there is no one method that provides the absolute best
compression for all files in a reasonable amount of time. Which
of the following is the BEST term for the above example?
a) An algorithm
b) A heuristic
c) A selection
d) An iteration Correct Answer Choice 'B' is the correct
answer. The definition of a heuristic is a technique that allows
the user to find an approximate answer in a reasonable amount
of time. We use heuristic algorithms when problems cannot be
solved in a reasonable time and they do not have an exact
answer

A constant is a special type of variable sometimes used to
represent a piece of information in a computer
program. Which of the following choices is the best situation for
using a constant in a program?

,a) To represent a player's current score in a computer game.
b) To represent the number of times a loop has executed.
c) To represent the name of the leader in a bowling app.
d) To represent the maximum number of lives a player can have
in a game. Correct Answer d

A domain name consists of several domain labels separated by
dots. Which of the following statements about domain name
labels is FALSE?

a) Every domain name ends with a top-level domain label.
b) The hierarchy of domain name labels descends from left to
right.
c) The left most label of the domain name identifies the server.
d) There is virtually no limit on the number of subdomains in a
domain name. Correct Answer Choice B is the false statement.
Each domain name is broken up into labels that are separated by
dots. The top tier of labels is on the right (the .com, for
example). Each label on the left is a second level domain. This
means that choice A is true; the top-level domain labels and
every domain name. The most popular examples are .com, .net,
and .org.

Choice C is also true; the leftmost label is usually "www",
which would identify a World Wide Web server. Or that label
might be "mail", signifying an email server.

Choice D is also true; domain names can have a large number of
subdomains under the Domain Name System.

,A hacker changes a record so that the DNS maps an incorrect IP
address with a domain name. Which of the following is the
name for this kind of DNS attack?

a) DNS phishing
b) DNS ID hacking
c) DNS cache poisoning
d) None of these Correct Answer Choice C is the correct
answer. DNS cache poisoning is the act of making a DNS server
cache incorrect information. A common trick of hackers is to get
the DNS to associate the incorrect IP address with a domain
name, like in this question. For example, a hacker might want
any query about a bank's website to be directed to his or her
computer.

A hacker uses hundreds of different IP addresses to overrun a
bank's website with requests. This effectively shuts down the
website and prevents any Internet users from accessing it. Which
of the following is the name for this kind of attack?

a) DNS spoofing
b) 404 error
c) Denial of service
d) Distributed denial of service Correct Answer A denial of
service attack (DoS) is an attempt to shut down a website or
server by flooding it with requests. If the requests come from
hundreds or thousands of IP address like in this example, the
attack is called a distributed denial of service attack (DDoS).
This makes choice D correct.

, A hospital is using simulation software to help train their nurses
employees on safety regulations for their
particular department within the hospital. The training is
customized to the employee's job and
department. An employee must complete training in one level
before advancing to the next level of
training. The software is designed so that employees can easily
stop and start the training when desired.
The hospital's database includes the following information about
each nurse:
• Employee name
• Marital status
• Job title
• Safety certification level
• Home address
• Hospital department
Which of the following two pieces of database information are
less likely to be necessary for the
simulation software to work properly?
a) Employee name and Hospital department
b) Job title and Hospital department
c) Marital status and Home address
d) Safety certification level and Job title Correct Answer c

A new device is given an IP address and added to a network so
that it can access the Internet. Large amounts of files are
uploaded and downloaded on this new device, but other users
who were already online do not experience any difference in
performance. Which of the following enables this phenomenon?

a) Redundant routers

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Classroom. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor $22.99. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 67866 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
$22.99
  • (0)
  Kopen