Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

PRINCIPLES OF COMPUTER SCIENCE II- TEST BANK

Rating
-
Sold
-
Pages
19
Grade
A+
Uploaded on
26-11-2025
Written in
2025/2026

PRINCIPLES OF COMPUTER SCIENCE II- TEST BANK

Institution
Course

Content preview

PRINCIPLES OF COMPUTER SCIENCE
II- TEST BANK
true - answers (t/f) Variables update line by line.

false - answers (t/f) Typing "var" before a word only updates a variable.

the last line that is true - answers What line of an if statement will show in a console.log
area?

true - answers (t/f) A number added to a variable updates it line by line.

true - answers (t/f) The else statement at the end of an if else only executes if
everything else is false.

name, number, variable - answers Updating a variable gives the variable a new...?

how many times they are called - answers How many times do functions execute?

in a declared function - answers Where should you put lines of code that are repeated in
an on event?

false - answers (t/f) It does not matter in what order lines of code are entered.

the same name as the declared function - answers What name is used to call a
function?

equals - answers What does == mean in code?

false - answers (t/f) The most limiting statement should come last in code.

they help eliminate repeated code. - answers why create functions in code?

false - answers (t/f) && means "or"

conditionals - answers What statements are executed in sequential order based on the
value of Boolean expressions?

true - answers (t/f) A flow chart is used to trace the path of Boolean expressions.
What is a ciphertext? - answers An unrecognizable secret formatted file.

What does SSL stand for? - answers Secure Sockets Layer.

,What is a digital signature? - answers A signature that gives reason to believe that the
sender was an authorized one.

What is malicious software? - answers Another term for malware meaning harmful
software.

What does public key encryption not require? - answers A secure channel by which the
initial key exchange must occur.

Private Key Encryption - answers Another term for symmetric encryption.

What is a firewall? - answers A security system that monitors incoming/outgoing
network traffic.

What is asymmetric encryption - answers Encryption that uses a public and private key.

What is phishing? - answers An attempt to collect personal information and money by
disguising as a trustworthy source.

What is a DDOS attack? - answers A cyber attack where the perpetrator uses more
than one IP address.

What is social engineering? - answers The act of psychological manipulation of a
human.

What is ransomeware? - answers Software used to threaten a victim in order to pay.

What is hash encryption? - answers Encryption done using a hash function.

What is a digital certificate? What does it do? - answers An electronic document that
proves ownership of a public key.

What is another word for DNS spoofing? - answers DNS cache poisoning.

What is a type of encryption that uses a hash function? - answers One-way encryption.

What is pharming? - answers The act of redirecting website traffic to an alternative fake
site

What encryption type is commonly used for email? - answers Asymmetric encryption

What is PGP? - answers Pretty Good Privacy

What is net neutrality? - answers The law that asserts that all traffic on the internet is
given equal priority.

, What does each computer connected to the internet have? - answers Its own unique
address defined by the Internet Protocol.

What is the problem with IP addresses? - answers IP addresses are difficult for us to
remember.

What is a DNS, and what does it do? - answers The Domain Name Server translates
names to IP addresses.

What is a good analogy for DNS? - answers It's like an address book mapping domain
names to actual IP addresses.

What are the steps of finding a server using DNS? - answers 1. Your computer will
check its cache to see if it knows the address you are requesting.
2. The server will ask a root if it knows where the given top-level domain is (.com, .org,
etc.).
3. Once we've found our top-level domain server we will ask that server if it can find the
second-level domain server (example.com).
4. We will then find the sub-domain by asking the second-level domain server
(www.example.com)
5. The second-level domain server will then send our computer the IP address so we
can save it!
6. Finally, our PC will send a get request to the IP address.

What are the levels of domain and how are they read? - answers From highest to lowest
level: root, top-level domain, second-level domain, and subdomain

Why is DNS hierarchical? - answers Each layer is in charge of a small section of data,
its easy to manage and add data, and it's much faster leading to a scalable, fault
tolerant internet.

How fast is the DNS process? - answers Extremely fast, completing tasks in
milliseconds.

What is the internet? - answers Physically: A massive network that connects individual
networks using a series of complicated routers.
Conceptually: A philosophy of making information and knowledge open and accessible
to all.

What is a network? - answers Two or more computer systems linked together.

What do routers do? - answers Routers forward information around as requested by
constituent computers.

Who provides the routers we typically connect to? - answers The ISPs

Written for

Course

Document information

Uploaded on
November 26, 2025
Number of pages
19
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$16.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
TrustworthyScholar

Get to know the seller

Seller avatar
TrustworthyScholar NURSING, ECONOMICS, MATHEMATICS, BIOLOGY, AND HISTORY MATERIALS — PREMIUM TUTORING, HOMEWORK SUPPORT, EXAM & TEST PREPARATION, AND COMPLETE STUDY GUIDES WITH GUARANTEED TOP GRADES. I am a committed medical professional equipp
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
1 year
Number of followers
0
Documents
840
Last sold
1 year ago
The Test Bank Marketplace by Professor Vincent. "Premium Test Banks for Major Courses. Trusted by Students."

Welcome to Professor Vincent's Test Bank Vault—the premier destination for top-rated test banks. Founded by educators, we provide instant access to verified exam preparation materials for Nursing, Economics, Engineering, Finance, and a wide range of major courses. We don't just sell documents; we sell academic confidence. Unlock your potential and study smarter with Professor Vincent today!

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions