New Activity
Play Quiz
1. 
In a certain computer program, two positive integers are added together, resulting in an overflow error. Which of the following best explains why the error occurs?
A.
The program attempted to perform an operation that is considered an undecidable problem.
B.
The precision of the result is limited due to the constraints of using a floating-point representation.
C.
The program can only use a fixed number of bits to represent integers; the computed sum is greater than the maximum representable value.
D.
The program cannot represent integers; the integers are converted into decimal approximations, leading to rounding errors.
2. 
A color in a computing application is represented by an RGB triplet that describes the amount of red, green, and blue, respectively, used to create the desired color. A selection of colors and their corresponding RGB triplets are shown in the following table. Each value is represented in decimal (base 10).
A.
Ivory
B.
Light yellow
C.
Neutral gray
D.
Vivid yellow
3. 
Answer
A.
(00100101, 00000000, 10000010)
B.
(00100101, 00000000, 01000001)
C.
(01001011, 00000000, 10000010)
D.
(01001011, 00000000, 01000001)
4. 
An office uses an application to assign work to its staff members. The application uses a binary sequence to represent each of 100 staff members. What is the minimum number of bits needed to assign a unique bit sequence to each staff member?
A.
5
B.
6
C.
7
D.
8
5. 
Answer the question
A.
3
B.
12
C.
24
D.
48
6. 
Answer
A.
B.
C.
D.
7. 
A binary number is to be transformed by appending three 0s to the end of the number. For example, 11101 is transformed to 11101000. Which of the following correctly describes the relationship between the transformed number and the original number?
A.
The transformed number is 3 times the value of the original number.
B.
The transformed number is 4 times the value of the original number.
C.
The transformed number is 8 times the value of the original number.
D.
The transformed number is 1,000 times the value of the original number.
8. 
A store uses binary numbers to assign a unique binary sequence to each item in its inventory. What is the minimum number of bits required for each binary sequence if the store has between 75 and 100 items in its inventory?
A.
5
B.
6
C.
7
D.
8
9. 
Which of the following can be represented by a sequence of bits? I. An integer II. An alphanumeric character III. A machine language instruction
A.
I only
B.
III only
C.
I and II only
D.
I, II, and III
10. 
Which of the following best explains how an analog audio signal is typically represented by a computer?
A.
An analog audio signal is measured as input parameters to a program or procedure. The inputs are represented at the lowest level as a collection of variables
B.
An analog audio signal is measured at regular intervals. Each measurement is stored as a sample, which is represented at the lowest level as a sequence of bits.
C.
An analog audio signal is measured as a sequence of operations that describe how the sound can be reproduced. The operations are represented at the lowest level as programming instructions.
D.
An analog audio signal is measured as text that describes the attributes of the sound. The text is represented at the lowest level as a string
11. 
A person wants to transmit an audio file from a device to a second device. Which of the following scenarios best demonstrates the use of lossless compression of the original file?
A.
A device compresses the audio file before transmitting it to a second device. The second device restores the compressed file to its original version before playing it.
B.
A device compresses the audio file by removing details that are not easily perceived by the human ear. The compressed file is transmitted to a second device, which plays it.
C.
A device transmits the original audio file to a second device. The second device removes metadata from the file before playing it.
D.
A device transmits the original audio file to a second device. The second device plays the transmitted file as is.
12. 
In which of the following situations would it be most appropriate to choose lossy compression over lossless compression?
A.
Storing digital photographs to be printed and displayed in a large format in an art gallery
B.
Storing a formatted text document to be restored to its original version for a print publication
C.
Storing music files on a smartphone in order to maximize the number of songs that can be stored
D.
Storing a video file on an external device in order to preserve the highest possible video quality
13. 
Answer
A.
The number of registered users increased at about a constant rate each year for all eight years.
B.
The number of registered users increased at about a constant rate for years 1 to 5 and then about doubled each year after that.
C.
The number of registered users about doubled each year for years 1 to 5 and then increased at about a constant rate after that.
D.
The number of registered users about doubled each year for all eight years.
14. 
Answer
A.
Across all eight years, the average amount of data stored per user was about 10 GB.
B.
Across all eight years, the average amount of data stored per user was about 100 GB.
C.
The average amount of data stored per user appears to increase by about 10 GB each year.
D.
The average amount of data stored per user appears to increase by about 100 GB each year.
15. 
Answer
A.
Over 75% of the files stored are 1 MB in size or less.
B.
Over 75% of the files stored are 10 MB in size or less.
C.
Over 75% of the files stored are at least 100 KB in size.
D.
Over 75% of the files stored are at least 1 MB in size.
16. 
Answer
A.
The total number of books borrowed in a given year
B.
The total number of books that were never borrowed in a given year
C.
The total number of books that were returned past their due date in a given year
D.
The total number of people who borrowed at least one book in a given year
17. 
Answer
A.
Author
B.
Title
C.
Genre
D.
Quantity Available
18. 
Which of the following actions are likely to be helpful in reducing the digital divide? Select two answers.
A.
Designing new technologies intended only for advanced users
B.
Designing new technologies to be accessible to individuals with different physical abilities
C.
Implementing government regulations restricting citizens’ access to Web content
D.
Having world governments support the construction of network infrastructure
19. 
A state government is attempting to reduce the digital divide. Which of the following activities has the greatest potential to contribute to the digital divide rather than reducing it?
A.
Providing programs that focus on technology literacy at local libraries
B.
Requiring applicants for government jobs to apply using an online platform
C.
Working with technology companies to offer computing devices at discounted prices to individuals with reduced incomes
D.
Working with telecommunications companies to build network infrastructure in remote areas
20. 
A system is being developed to help pet owners locate lost pets. Which of the following best describes a system that uses crowdsourcing?
A.
A mobile application and collar that uses GPS technology to determine the pet’s location and transmits the location when the owner refreshes the application
B.
A mobile application and collar that uses wireless technology to determine whether the pet is within 100 feet of the owner's phone and transmits a message to the owner when the pet is nearby
C.
A mobile application that allows users to report the location of a pet that appears to be lost and upload a photo that is made available to other users of the application
D.
A mobile application that transmits a message to all users any time a lost pet is returned to its owner
21. 
An online gaming company is introducing several new initiatives to encourage respectful communication between players of online games. Which of the following best describes a solution that uses crowdsourcing?
A.
The company allows individual players to endorse fellow players based on courteous interactions. Once a player receives enough endorsements, the player is given free rewards that can be used during gameplay.
B.
The company eliminates chat from gameplay and sets the default chat policy to off. Players must actively turn on chat to converse outside of gameplay.
C.
The company introduces software that monitors all chats. Inappropriate conversations are identified, and players involved in the conversations are banned from the game.
D.
The company updates the acceptable content guidelines to explicitly describe appropriate and inappropriate behavior. All players must electronically sign an agreement to adhere to the guidelines.
22. 
A student purchases a single-user license of a copyrighted application and wants other students to be able to use it at the same time. Under which of the following conditions is it considered acceptable for the student to share the application?
A.
When the application is shared only with students at the same school
B.
When the application is shared on a peer-to-peer network
C.
When the student gets permission from the copyright owner of the application
D.
When the student makes a copy of the application for another student to use only once
23. 
Which of the following best describes the impact of Creative Commons?
A.
Creative Commons gives creators of digital content the ability to indicate how their works can be legally used and distributed, enabling broad access to digital information.
B.
Creative Commons gives Internet users the right to legally use and distribute any previously copyrighted work, enabling broad access to digital information.
C.
Create Commons provides lossless transmission of messages, enabling reliable distribution of digital information.
D.
Creative Commons provides private transmission of messages, enabling secure distribution of digital information.
24. 
Which of the following best explains how a certificate authority is used in protecting data?
A.
A certificate authority certifies the safety of a particular Web site so that users know that it does not contain any viruses.
B.
A certificate authority issues passwords that grant access to secure databases.
C.
A certificate authority maintains a secure database that maps all Web domain names to the IP addresses of the servers where the sites are hosted.
D.
A certificate authority verifies the authenticity of encryption keys used in secured communications.
25. 
Which of the following scenarios best exemplifies a phishing attack?
A.
A user connects to a public wireless network. An unauthorized individual intercepts data transmitted on the network, looking for private information that can be used to gain access to the user’s accounts.
B.
A user’s e-mail account is overwhelmed with messages containing large attachments, which causes the account to exceed the maximum amount of data allowed and temporarily prevents the user from sending and receiving new messages.
C.
A user receives an e-mail from a sender offering technical help with the user’s computer. The e-mail prompts the user to start a help session by clicking a provided link and entering the username and password associated with the user’s computer.
D.
A user chooses a weak password for an online account. An unauthorized individual successfully guesses the user’s password from a list of common passwords.
26. 
Which of the following is a true statement about the use of public key encryption in transmitting messages?
A.
Public key encryption enables parties to initiate secure communications through an open medium, such as the Internet, in which there might be eavesdroppers.
B.
Public key encryption is not considered a secure method of communication because a public key can be intercepted.
C.
Public key encryption only allows the encryption of documents containing text; documents containing audio and video must use a different encryption method.
D.
Public key encryption uses a single key that should be kept secure because it is used for both encryption and decryption.