SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 313 Weeks Ago, 6 Days Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Computer Science Posted 04 Dec 2017 My Price 9.00

Include Context B. Ask about one topic at a time

1. Which of the following is not one of the rules cited in class for making e-mail more effective?

A. Include Context B. Ask about one topic at a time

C. Use all capital letters D. Answer a backlog of email in reverse order

2. Which of the following is not an area to protect our computer in?

A. Installing protective systems. B. Tuning the installed protection

C. Wrapping the computer in foil D. Behaving to avoid difficulties

3. Which of the following is an example of identity theft?

A. taking a test for someone else B. using your older sibling's ID

C. posing as someone you're not to vote D. all of the above

4. The result of XORing 1011 1011 with 1001 0110 is

A. 0101 1100 B. 0101 0010 C. 1011 1111 D. 0100 0000

5. Respectively, rows and columns are designated with

A. numbers, letters B. letters, numbers C. numbers, numbers D. names, numbers

6. Spreadsheet formulas start with

A. + B. = C. @ D. !

7. Which of the following is not a valid range of cells?

A. A1>A5 B. C3-C8 C. 3B:6B D. all of the above

Page 27 of 30

8. All of the following are basic spreadsheet principles except

A. logical form B. clean layout C. no text D. clear and understandable

entries

9. To get the first characters in a cell you should use the

A. Begin function B. Start function C. Left function D. Get function

10. If you found regHours in a spreadsheet formula you'd know it's a

A. mistake B. named reference C. constant D. function

11. Which of the following is a valid XML tag?

A. <active?> B. <grad-date> C. <zip code> D. <DOB>

12. Which of the following is not one of the standard operations on databases?

A. Project B. Select C. Disassemble D. Union

13. The symbol to terminate a statement in JavaScript is

A. ~ B. ! C. . D. ;

14. Which of the following is not a term used to describe changing the value of a variable?

A. assign B. gets C. sets D. becomes

15. All of the following are input elements except

A. print B. radio button C. text box D. checkbox

16. In JavaScript, onclick is a(n)

A. variable B. event C. event handler D. button

17. The building blocks of programming are

A. programming languages B. functions C. HTML and JavaScript D. variables

and events

18. Random numbers in JavaScript are generated using

A. Math.random() B. Rnd C. Math.rnd D. Random.Math()

19. Which keyword generally begins the last line of a function?

A. end B. final C. outtie D. return

20. A false outcome for a termination test means

A. terminate the loop B. terminate the program

C. continue the loop D. do not enter the loop

21. The maximum number of times a loop can iterate is

A. 1024 B. 65,536 C. 1,048,576 D. infinite

22. Array elements cannot be numbered with

A. negative numbers B. decimals C. letters D. all of the above

23. Computers can

A. think B. manipulate information C. be creative D. all of the above

24. All computer computations can be completed with just

A. 4 instructions B. 6 instructions C. 9 instructions D. 11

instructions

25. For quality control purposes, enter B here. Also, take a deep breath and relax.

A. Not this one B. This one C. Not this one either D. Definitely not this one

Matching (50 pts)

A. spam B. spyware C. phishing D. rootkit E. worm

26. Software that directly manipulates the OS to hide its presence.

27. Social engineering concept that involves convincing trusting people to give up personal data.

28. Software that snoops on private information.

29. Software that copies itself over the Internet and contains malicious code.

30. Unsolicited commercial email.

A. cookie B. data controller C. key D. key escrow E. trapdoor

31. Registering a key with a third party so it can be retrieved easily.

32. In the RSA scheme, requires a 129 digit sequence made of the product of two prime

numbers.

33. The person setting policies for private information

34. Sending data to a third party before it is encrypted to bypass the usage of the key.

35. A record containing seven fields of information that uniquely identify a customer's session.

A. absolute cell reference B. relative cell reference C. function

D. foreign data E. delimited

36. Character symbolizing the end of each field (generally tab or semicolon)

37. A3

38. Data from another application to be imported into the spreadsheet

39. $A$3

40. MAX(A3:F3)

A. conditional formatting B. conditional formulas C. symbolic reference

D. literal reference E. filtering

41. Select only certain rows from a list.

42. Explicit column/row position

43. Make the entire computation of a cell contingent on the outcome of a condition

44. A word or phrase assigned to a cell or a range of cells

45. Applying an interpretation to the data and express that interpretation in an easy to see

manner.

A. root element B. entity C. data type D. atomic E. relationship

46. The tag that encloses all of the content of the XML file.

47. Number, text, image, etc.

48. Anything that can be identified by a fixed number of its characteristics.

49. A correspondence between rows of one table and the rows of another table.

50. Not decomposable into any smaller parts.

A. programming B. assignment C. undefined D. Booleans E. compound

statement

51. When a name is declared but no value is assigned yet.

52. True or false.

53. Changing the value of a variable.

54. Groups of statements surrounded by {}.

55. The act of formulating an algorithm into code.

A. event handler B. onclick C. onchange D. dot operator E. event

56. The program that performs the task to respond to an event.

57. The event handling attribute for a button.

58. The event handling attribute for a text field

59. Provides a means of navigation to the proper object, selecting the property of an object.

60. An indication from the computer that something just happened.

A. parameters B. call C. local variables D. global variables E. scope

61. Property that allows a local and global variable to share the same name.

62. Declared outside of any function, they can be used throughout the whole program.

63. Declared in a function and can only be used therein.

64. Run or execute the statements of the function to produce an answer.

65. Values the function will compute on, the input of the function.

A. iteration B. initialization C. nested loop D. array E.handle

66. A loop within a loop.

67. Set the iterations variable's value for the first iteration of the loop.

68. Looping through a series of statements to repeat them.

69. A special code the computer uses to identify an object like a timer.

70. An indexed base name.

A. evaluation function B. parallel computation C. metarules

D. Universality Principle E. intractable

71. Rules that describe how to break or transcend existing rules.

72. Any computer can simulate any other computer using only simple instructions

73. The application of several computers to a task.

74. A problem that cannot be solved with a realistic amount of computer time on any computer.

75. A procedure that assigns a value to each piece and computes a score for each move.

True/False (25 points)

76. One good method for creating a password is to take an acronym of something you like and

substitute harder-to-guess pieces into it.

A. True B. False

77. Passwords are generally stored in plain text to allow the administrator easy access.

A. True B. False

78. A third-party cookie can use a loophole to get your information across different sites.

A. True B. False

79. Backups are not a good idea for sensitive or important data.

A. True B. False

80. Text that is too long for a cell to display is truncated.

A. True B. False

81. To change a relative cell reference to an absolute reference, you should use the ampersand

(&).

A. True B. False

82. In the example we did in class, the trip being planned was to the Arctic Circle.

A. True B. False

83. Spreadsheets can be sorted based on the current row, not by the current column.

A. True B. False

84. Individual pages in a spreadsheet are called leafs.

A. True B. False

85. Database users usually access logical views, not the physical database on the disk.

A. True B. False

86. - can be a binary or unary operator.

A. True B. False

87. JavaScript is mainly used for Web applications.

A. True B. False

88. When evaluating a statement with an = in it, start on the left side and compute that first.

A. True B. False

89. Joining two strings together using the + is called concatenation.

A. True B. False

90. Radio button elements are used for both input and output.

A. True B. False

91. It is illegal to put a button element inside an XHTML table cell.

A. True B. False

92. Every function must have at least one parameter.

A. True B. False

93. A random number generated in JavaScript is always between 0 and 1.

A. True B. False

94. When a local and global variable have the same name, the global variable has priority in the

function the local variable is declared in.

A. True B. False

95. j++ is a shortcut that means add j + j.

A. True B. False

96. An indexed item is called an element.

A. True B. False

97. You can safely use an element that is past the bounds of the array.

A. True B. False

98. NP-complete problems have no known "practical" algorithmic solutions.

A. True B. False

99. Work-proportional-to-n algorithms take longer than work-proportional-to-n2 algorithms.

A. True B. False

100. Select A. here because it is True that you are done with this class!

A. True B. False

Answers

(5)
Status NEW Posted 04 Dec 2017 06:12 AM My Price 9.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly

Not Rated(0)