CPSC Final Exam Questions With Complete Solutions…
CPSC Final Exam Questions With Complete Solutions… The oldest form of information technology is A recording A precise, systematic method for producing a specified result is a algorithm Which metaphor features file cabinets and wastebaskets as typical components Desktop metaphor The mouse was invented by Douglas Engelbart and others at Stanford Research Institute A WANis to TCP/IP as LAN is to Ethernet Which of the following represents the correct order, from largest to smallest Internet, WWW, LAN The vary last part of a URL is the pathname Which of the following lines is properly nested? pibHappy New Year!/b/i/p (T/F) Most information available at the library is also available online False (T/F) It is not advisable to perform a site search to find information False (T/F) No one organizes the information posted on the Web True (T/F) The query processor looks up tokens or search terms in the index true (T/F) When a basic query with multiple words is performed, the pages returned by the query contains one or more of the search words True A weakness of Wikipedia is that the content is not validated by experts Identify a method used to find authoritative information Choose information from respected organizations In a search engine, the index is built by the Crawler The order in which "hits" are returned to a page is determined by Page Rank How many digits are in the hexadecimal system 16 The term that represents one billion bytes is Gigabyte (GB) The binary number 101 represents the decimal number 5 Which search technique will help avoid over constraining Begin with inclusive search and add one word at a time (T/F) Higher bandwidth usually means higher latency False (T/F) Each pixel on a computer display is formed from three colored lights: red, yellow, and blue False (T/F) RGB, the name for a color encoding method, is an acronym for red, green, blue True (T/F) All colors with equal intensities of the RGB subpixels are always some shade of grey True (T/F) Digitizing a sound wave requires that the analog wave be converted to bits True Haptic Devices are input/output technology for interacting with our sense of tough and feel The decimal number is 174 is equivalent to the binary number Which statement is incorrect? OCR systems can easily interpret words created by reCaptcha Using a scanned black and white photo, suppose the subpixels of one pixel had values of 195. If the image's pixels should all be nearer intense white keeping their relative relationships, the subpixels of the given pixel could be changed to values of: 212, 212, 212 (T/F) Rerunning a program with the same data produces exactly the same result every time True (T/F) The Fetch/Execute Cycle consists of 4 steps False (T/F) The ADD instruction adds the values, not the address numbers of the memory location True (T/F) A passage is the path in a semiconductor where electricity travels False How many instructions do computers know? a few In the Fetch/Execute Cycle, the action of retrieving the instruction's operands from memory occurs during the Instruction Fetch (IF) step The peripheral used by the computer for both input and output is the keyboard In the Fetch/Execute Cycle, the action of retrieving a machine instruction from the memory address given by the program counter occurs during the Data Fetch (DF) step In the Fetch/Execute Cycle, the action of determining which operation is to be performed and computing the addresses of he operands occurs during the Instruction Decode (ID) Step In the Fetch/Execute Cycle, the action of performing a machine instruction occurs during the Instruction Execute (EX) Step The speed of a computer is dependent on the number of cycles of what All of the above Perfect reproduction is a property of digital information (T/F) a heuristic process is an example of an algorithm false (T/F) To be effective, an algorithm needs outside help and further input true (T/F) Programs containing loops can be verified exhaustively, that is, by trying all cases False (T/F) Anyone who creates an algorithm needs to know why it works true A computer algorithm must have all of the above which of the following is a good example of effectiveness add 1 to the total number of students registered algorithms should use resources efficiently instruction sequences that repeat are called loops (T/F) when communicating via email, it is important to remember that you aren't there in person, so you should explain yourself more completely true (T/F) one message covering multiple topics is better than multiple messages, each with a single topic false (T/F) Email backlogs should be answered in the order they were received false (T/F) a well-conceived password should be easy to remember and difficult to break true (T/F) the word netiquette only applies to etiquette for email false when software is "acting strange," you should: save your work with a new file name, exit, and restart All of the following are difficult to convey in an email message except ambiguity the textbook author advocates using three different passwords which of the following is not an example of croudsourcing Google you receive an email from your bank informing you that they are performing an audit and have found possible problems with your account. they ask you to log in resolve the issue. this is an example of phishing generally speaking, a software license given you use of the software companies that make products available as open source software are vendors like Microsoft and Adobe Information that you did not create, but can treat as your own, is said to be in the public domain (T/F) American privacy laws are much stricter than European laws false (T/F) A company can place a cookie on your computer even if you've never visited its Web site true (T/F) "Opt-in" means the business can use it unless the person explicitly False (T/F) the purpose of encryption is to allow private transmission and storage of sensitive information true (T/F) americans' access to a free credit check to learn their "credit score" and check for errors applies the Fair Information Practices of Purposes and Security Principle False European privacy standards are closest to the policy called no uses american privacy standards are closest to the policy called no limits the person in charge of privacy policies and communication with individuals regarding their data controller spyware is software that snoops private information the most important consideration in a disaster recovery plan is to have a backup of your data the OCED privacy principles were developed in 1980 which OCED principle states that personal data should be protected by reasonable security measures against risks of disclosure, unauthorized access, misuse, modification, destruction, or loss security principle which privacy law was passed in 1996 health insurance privacy and accountability act the crime of posing as someone else for fraudulent purposes is known as identity theft
Written for
- Institution
- CPSC - Certified Professional Soil Classifier
- Course
- CPSC - Certified Professional Soil Classifier
Document information
- Uploaded on
- April 16, 2024
- Number of pages
- 8
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cpsc final exam questions with complete solutions