100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
APCSP Midterm Review Questions 5th and 6th Period Questions With Complete Solutions $22.99   Add to cart

Exam (elaborations)

APCSP Midterm Review Questions 5th and 6th Period Questions With Complete Solutions

 4 views  0 purchase
  • Course
  • APCSP
  • Institution
  • APCSP

APCSP Midterm Review Questions 5th and 6th Period Questions With Complete Solutions

Preview 4 out of 92  pages

  • November 2, 2024
  • 92
  • 2024/2025
  • Exam (elaborations)
  • Unknown
  • APCSP
  • APCSP
avatar-seller
Classroom
APCSP Midterm Review Questions 5th and 6th Period
Questions With Complete Solutions

"There are 10 types of people in this world: Those who
understand binary, and those who don't."
Why might computer scientists find this statement humorous?
a) There are ten types of computer programmers in the world.
b) 10 (binary) = 2 (decimal)
c) 10 (decimal) = 1010 (binary)
d) 10 (hexadecimal) = 16 (decimal) = 1 0000 (binary) Correct
Answer b

12. In data compression, there are many different methods for
compressing data. We have many different protocols because
there is no one method that provides the absolute best
compression for all files in a reasonable amount of time. Which
of the following is the BEST term for the above example?
a) An algorithm
b) A heuristic
c) A selection
d) An iteration Correct Answer Choice 'B' is the correct
answer. The definition of a heuristic is a technique that allows
the user to find an approximate answer in a reasonable amount
of time. We use heuristic algorithms when problems cannot be
solved in a reasonable time and they do not have an exact
answer

A constant is a special type of variable sometimes used to
represent a piece of information in a computer
program. Which of the following choices is the best situation for
using a constant in a program?

,a) To represent a player's current score in a computer game.
b) To represent the number of times a loop has executed.
c) To represent the name of the leader in a bowling app.
d) To represent the maximum number of lives a player can have
in a game. Correct Answer d

A domain name consists of several domain labels separated by
dots. Which of the following statements about domain name
labels is FALSE?

a) Every domain name ends with a top-level domain label.
b) The hierarchy of domain name labels descends from left to
right.
c) The left most label of the domain name identifies the server.
d) There is virtually no limit on the number of subdomains in a
domain name. Correct Answer Choice B is the false statement.
Each domain name is broken up into labels that are separated by
dots. The top tier of labels is on the right (the .com, for
example). Each label on the left is a second level domain. This
means that choice A is true; the top-level domain labels and
every domain name. The most popular examples are .com, .net,
and .org.

Choice C is also true; the leftmost label is usually "www",
which would identify a World Wide Web server. Or that label
might be "mail", signifying an email server.

Choice D is also true; domain names can have a large number of
subdomains under the Domain Name System.

,A hacker changes a record so that the DNS maps an incorrect IP
address with a domain name. Which of the following is the
name for this kind of DNS attack?

a) DNS phishing
b) DNS ID hacking
c) DNS cache poisoning
d) None of these Correct Answer Choice C is the correct
answer. DNS cache poisoning is the act of making a DNS server
cache incorrect information. A common trick of hackers is to get
the DNS to associate the incorrect IP address with a domain
name, like in this question. For example, a hacker might want
any query about a bank's website to be directed to his or her
computer.

A hacker uses hundreds of different IP addresses to overrun a
bank's website with requests. This effectively shuts down the
website and prevents any Internet users from accessing it. Which
of the following is the name for this kind of attack?

a) DNS spoofing
b) 404 error
c) Denial of service
d) Distributed denial of service Correct Answer A denial of
service attack (DoS) is an attempt to shut down a website or
server by flooding it with requests. If the requests come from
hundreds or thousands of IP address like in this example, the
attack is called a distributed denial of service attack (DDoS).
This makes choice D correct.

, A hospital is using simulation software to help train their nurses
employees on safety regulations for their
particular department within the hospital. The training is
customized to the employee's job and
department. An employee must complete training in one level
before advancing to the next level of
training. The software is designed so that employees can easily
stop and start the training when desired.
The hospital's database includes the following information about
each nurse:
• Employee name
• Marital status
• Job title
• Safety certification level
• Home address
• Hospital department
Which of the following two pieces of database information are
less likely to be necessary for the
simulation software to work properly?
a) Employee name and Hospital department
b) Job title and Hospital department
c) Marital status and Home address
d) Safety certification level and Job title Correct Answer c

A new device is given an IP address and added to a network so
that it can access the Internet. Large amounts of files are
uploaded and downloaded on this new device, but other users
who were already online do not experience any difference in
performance. Which of the following enables this phenomenon?

a) Redundant routers

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $22.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

72042 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$22.99
  • (0)
  Add to cart