100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
COSC 100 Final Questions and Answers CA$18.81   Add to cart

Exam (elaborations)

COSC 100 Final Questions and Answers

 4 views  0 purchase
  • Course
  • COSC
  • Institution
  • COSC

COSC 100 Final Questions and Answers

Preview 3 out of 20  pages

  • August 24, 2024
  • 20
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • COSC
  • COSC
avatar-seller
COSC 100 Final Questions and Answers
A poorly made web page may have both horizontal and vertical scroll bars
TRUE or FALSE - Answer -TRUE

How many peripheral devices can be daisy-chained to one single USB port?
A. 127
B. 128
C. 255
D. 256 - Answer -A. 127

An early computing machine was an abacus -- where was it invented?
A. India
B. U.S
C. France
D. China - Answer -D. China

The first step in forensically copying a hard drive is to boot the computer to see how big
the hard drive is and how much data is on it
TRUE or FALSE - Answer -FALSE

Data about data are called
A. Databases
B. Metadata
C. Data images
D. Data paths - Answer -B. Metadata

Google analytics can track the time a person stays on a page.
TRUE or FALSE - Answer -TRUE

After compression, it is possible that the original representation can be reproduced
perfectly.
TRUE or FALSE - Answer -TRUE

Kevin Warwick embedded a computer chip and became a cyborg.
TRUE or FALSE - Answer -TRUE

CSS can be used to animate objects on a web page.
TRUE or FALSE - Answer -FALSE

,USB port is the most common port.
TRUE or FALSE - Answer -TRUE

15 in base 10 is ____ in binary
A. 0000
B. 10000
C. 1111
D. 101010 - Answer -C. 1111

According to the CDT, the US does not have a set of basic privacy laws for online.
TRUE or FALSE - Answer -TRUE

The max length of a video that may be used is
A. 10% or 30 secs - whichever is less
B. 2 minutes
C. 5 minutes
D. None - Answer -A. 10% or 30 seconds - whichever is less

A hash code (ex md5) is used to make sure all bits of a hard drive are copied correctly?
TRUE or FALSE - Answer -TRUE

Once data is deleted on a computer or other device it can no longer be read by
forensics
TRUE or FALSE - Answer -FALSE

Visualization of data can help put data into context and uses patterns to help
understand data.
TRUE or FALSE - Answer -TRUE

Digital information is represented as strings of bits
TRUE or FALSE - Answer -TRUE

In Shirky's book HERE COMES EVERYBODY the best choice for the main point of the
story is
A. technology is advancing and cell phones are the wave of the future
B. cell phones should always be password protected for security's sake
C. Cab drivers should clean out their cabs after each customer
D. the internet can be a powerful tool and aid in justice. - Answer -D. The internet can
be a powerful tool and aid in justice

Data will be how much larger in 2020 than in 2012?
A. twice as large
B. 10 times as large
C. 50 times as large
D. Data is shrinking - not an issue - Answer -A. twice as large

, The father of ubiquitous computing is
A. Bill Gates
B. Steve Jobs
C. Herman Hollerith
D. Mark Weiser - Answer -D. Mark Weiser

Computers can only perform about 100 different instructions, such as ADD, MULT, and
DIV, etc
TRUE or FALSE - Answer -TRUE

For large websites, it is fairly common that a web page is written in more than one
language.
TRUE or FALSE - Answer -TRUE

In the TED talk "Data is the new soil" means that data is dirty and is corrupting us
TRUE or FALSE - Answer -FALSE

According to Commandment 4 of the Ten Commandments of Computer Ethics, stealing
sensitive information, or leaking confidential information is as good as robbery.
TRUE or FALSE - Answer -TRUE

if p is True, then ~~~p is ________?
A. False
B. True
C. undefined - Answer -A. FALSE

In the Data Visualization "Every single _____ should testify directly to the content"
Edward Tufte.
A. number
B. pixel
C. square
D. point - Answer -B. pixel

Hyperlinks are used to connect web pages on the world wide web
TRUE or FALSE - Answer -TRUE

When a computer connects to the Internet it is assigned an ________.
A. Modem
B. IP Address
C. unique 3 character name
D. a file extension - Answer -B. IP Address

Flaming is sending rude or offensive materials either via email or other form of
messaging.
TRUE or FALSE - Answer -TRUE

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller millyphilip. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for CA$18.81. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75323 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
CA$18.81
  • (0)
  Add to cart