The following procedures are available for string manipulation.
Procedure Call
substring(str, start, end)
concat(str1, str2)
len(str)
Explanation
Returns a substring of consecutive characters of str starting with the character at position start and ending with the character at position end. The first character of str is considered position 1. For example, substring("delivery", 3, 6) returns "live".
Returns a single string consisting of str1 followed by str2. For example, concat("key", "board") returns "keyboard".
Returns the number of characters in str. For example, len("key") returns 3.
A programmer wants to create a new string by removing the character in position n of the string oldStr. For example, if oldStr is "best" and n is 3, then the new string should be "bet". Assume that 1 < n < len(oldStr).
Which of the following code segments can be used to create the desired new string and store it in newStr ?
Select
TWO answers.
Introduction to Algorithms
3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
726 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Introduction to the Theory of Computation
3rd EditionMichael Sipser
389 solutions
Home
Subjects
Expert solutions
Create
Log in
Sign up
Upgrade to remove ads
Only ₩37,125/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (59)
A video-streaming Web site uses 32-bit integers to count the number of times each video has been played. In anticipation of some videos being played more times than can be represented with 32 bits, the Web site is planning to change to 64-bit integers for the counter. Which of the following best describes the result of using 64-bit integers instead of 32-bit integers?
2^32 times as many values can be represented.
Which of the following can be represented by a single binary digit? Select two answers.
-The remainder when dividing a whole number by 2
-The value of a Boolean variable
The figure below represents a network of physically linked computers labeled A through G. A line between two computers indicates that the computers can communicate directly with each other, Any information sent between two computers that are not directly connected must go through at least one other computer. For example, information can be sent directly between computers A and B, but information sent between computers A and C must go through other computers.
3
Which of the
following statements about security in the network is true?
I. Computers A and D need to communicate with at least two additional computers in the network in order to communicate with each other.
II. Computers B and C can communicate with each other without additional computers being aware of the communication.
II only
Why was IPv6 introduced as the new version of the Internet Protocol?
With only 32 bit IP addresses, the older version could not support the large number of devices connecting to the internet.
Which of the following best explains what happens when a new device is connected to the Internet?
An Internet Protocol (IP) address is assigned to the device.
Which of the following are ways that the Internet has changed the way people collaborate? Select TWO answers.
-Video Conferencing software enables people to talk to co-worker's and friends.
-Cloud Computing allows people to work on the same document from different areas of the World.
Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes the ability of the two computers to communicate with each other across the Internet?
The computers can communicate directly because Internet communication uses standard protocols.
Which of the following identifies a device using the internet?
An IP address
ASCII is a character-encoding scheme that uses 7 bits to represent each character. The decimal (base 10) values 65 through 90 represent the capital letters. A through Z, as shown in the table below. What ASCII character is represented by the binary (base 2) number 1001010 ?
J
How are protocols like HTTP, TCP, and IP created?
A worldwide group of volunteers draft revise, and publish protocols.
Why is the Domain Name System useful?
Domain names are easier for people to remember than the IP addresses of frequently visited websites.
Which of the following statements are true of the standards of the internet? Select TWO answers.
-Internet standards ensure that hardware and software created by different companies will be able to communicate with each other online.
-Internet standards are specific
procedures and rules that are created in order to benefit the Internet Community.
The Internet Engineering Task Force makes decisions by rough consensus, not by the majority of votes. What does this ensure about the Internet?
Although the standards that govern the Internet (like HTTP and DNS) might change, they will not be affected by a small group or party.
The new version of the Internet Protocol, IPv6, allows for IP addresses that are 128 bits long, How many possible IP addresses are available with IPv6?
2^128
Which of the following statements are true of the Internet Engineering Task Force (IETF)? Select TWO ANSWERS.
-The most important work of the IETF is to create and maintain protocols like HTTP and TCP.
-The IETF is
completely made up of volunteers from all over the world who do not need to attend meetings in person to participate.
Which of the following statements is true regarding the networks that make up the Internet? Select TWO answers.
-Different types of networks can be connected in order to transfer data and communicate.
-All devices that are connected on a network use the same protocol.
Which of the following statements about packets is TRUE?
None of these Statements are true.
Which of the following statements about redundancy on the Internet are TRUE? Select TWO answers.
-Redundancy has good qualities; if several routers fail, data can still be transferred.
-Redundancy has good qualities; many devices can be added to the
network without affecting traffic.
Which of the following statements are TRUE of the Internet? Select TWO ANSWERS.
-Most network routing on the Internet is hierarchical.
-Most data can follow more than one path to the destination device.
Which of the following statements is an accurate interpretation of bandwidth speed?
The rate at which data is downloaded in a set amount of time.
Tom sends Troy an email, Which of the following statements about the way the email sent is NOT true?
The packets arrive at Troy's computer in the correct order so that they can be reassembled correctly.
Desktop computers, laptops, tablets, smartphones, and other devices are made by different companies, yet they are all able to access the Internet. This has led to the widespread use of the Internet from many different kinds of devices. Which of the following makes this possible?
Open standards and protocols
Which of the following is an example of a subdomain of college.org to the domain name system (DNS)?
contact.college.org
What is the primary reason that routing on the internet is redundant?
Networks are still available in case of a path rоuter failure.
Which of the following statements about TCP/IP is FALSE?
TCP/IP are the only protocols necessary to send and receive information over the Internet.
Which of the following statements about packets is FALSE?
The packet does not contain information about the sender's IP address.
Many networks are set up using a hierarchical architecture to create a "backbone" network. In this system, several connected routers act as the backbone, and many smaller LANs are connected to the backbone. This is much different than having a system where every router is connected to every other router. What are the benefits of the hierarchical approach to setting up a network? Select TWO answers.
-It makes the process of transferring data much more efficient.
-It decreases congestion in the network.
Which of the following best describes the basic idea of fault tolerance?
If part of the system fails, the operation continues without interruption.
Which of the following best explains how messages are typically transmitted over the Internet?
The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device.
Which of the following domain names are part of the same top tier? Select TWO ANSWERS
-www.collegeA.edu
-www.collegeB.edu
New websites are being created every day, yet internet users are still able to navigate the web and access information at the same speed. Which of the following most makes this possible:
Hierarchical DNS
A new device is given as IP address and added to a network so that it can access the Internet. Large amounts of files are uploaded and downloaded on this new device, but other users who were already online do not experience any difference in performance. Which of the following enables this phenomenon?
Redundant routers
The figure below represents a network of physically linked computers labeled A though F. Computers with a line between them can communicate directly to each other and if two computers do not have a line connecting them, they must go through at least one other computer to communicate
with each other.
For example, information can be sent directly between B and E, but the information sent between computers B and C must fo through other computers. What is the minimum number of connections that must be broken or removed in the network before computer E and B can no longer communicate?
2
Which of the following statements is TRUE regarding Internet protocols?
All of the above are false.
Which of the following is a primary reason for the use of open protocols on the Internet?
Open protocols provide a way to standardize data transmission between different devices.
Choose the correct answer.
II only
Each packet being routed around the internet contains header information about the packet itself, and it also contains part of the file being transferred. Imagine you are sending an image of a basketball player from computer A to computer B across the Internet. Of the following, which information would be contained in each packet's header? Select TWO.
-The IP address of the destination computer.
-The sequence number of the packet in relation to all other packets of the image.
Which of the following best describes the relationship between the World Wide Web and the Internet?
The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.
How does the hierarchical architecture of the DNS help the system scale?
Domain names have set structure, making them easy to organize and manage.
You have a coordinate grid that is 96 x 96. Assuming that you encode the x and y coordinate as separate numbers, what is the minimum number of bits that you will need to encode a coordinate in that space?
14
What is the largest binary number you can write given you have four bits? Convert this to decimal (base ten).
15
How many bits are necessary to convert 128 from decimal (base ten) to binary (base two)?
8
Two students are sending messages to one another using a 5-bit protocol. They decide to modify their protocol to 7-bit messages. How many move values can be represented in a 7-bit message than a 5-bit message?
4 times as many
The Internet Engineering Task Force makes decisions by rough consensus, not by the majority of votes. What does this ensure about the Internet?
Although the standards that govern the Internet (like HTTP and DNS) might change, they will not be affected by a small group or party.
A digital certificate is an attachment to an electronic message used for security purposes. The most common use of a digital certificate is to verify that a user sending a message is who he or she claims to be. and to provide the receiver with the means to encode a reply. provides the receiver with the means to encode a reply. Is a protocol seldom used by internet users because it requires too many layers. Is given upon completion of a digital training class. Select TWO answers.
-Is an attachment to an electronic message used for security purposes.
-The most
common use of a digital certificate is to verify that a user sending a message is who he or she claims to be. and to provide the receiver with the means to encode a reply.
Which of the following do HTTPS and SSL procedures ensure? Select TWO ANSWERS.
-That messages being sent are encrypted and thus secure.
-That the identity of the server involved in an interaction can be trusted.
Digital certificates are issued by ...?
A certified instructor by Certification Authorities (CA). Like a central trusted body is used to issue driving licenses or passports, a CA fulfill the role of the Trusted Third Party by accepting Certificate applications from entities, authenticating applications, issuing Certificates and maintaining status information about the Certificates issued.
TCP/IP does all of the below EXCEPT:
choose the path needed (which routers) to move a message from point A to point B
If the post office delivered mail exactly like the routers deliver messages on the Internet, which of the following statements would be true? SELECT 2 ANSWERS
-Letters would be written on the outside of the envelope for all to read instead of letters put inside
envelopes
-The mailman would sometimes take a different path to deliver each letter to your home
The Internet, A Mobile Hotspot, School Computer Lab are examples of what?
IP
The _____________ takes inventory of all packets in the datastream to ensure they are successfully sent and received.
TCP
Which of the following refers to chunks of data and their metadata, used to route and reassemble information on the Internet ?
Packets
Which term refers to the way in which information travels on the Internet, not as a single piece but in chunks?
datastreams
Which of the following terms can be described as sending all packets without checking whether they were received or ordered properly?
UDP
Choose the two statements that best describe the relationship between HTTP and the World Wide Web.
-The World Wide Web is a collection of pages and files that is shared between computers using HTTP.
-HTTP and the World Wide Web both rely on other layers of protocols for sending
information on the Internet
Which of the following is the best description of the term Net Neutrality?
It is the principle that Internet service providers (ISPs) must treat all Internet communications equally, and not discriminate or charge differently based on user, content, website, platform, application, type of equipment, source address, destination address, or method of communication.
Which of the following is the best description of the term Internet censorship ?
It is the control or suppression of what can be accessed, published, or viewed on the Internet enacted by regulators, or on their own initiative. Individuals and organizations may engage in self-censorship for moral, religious, or business reasons, to conform to societal norms, due to intimidation, or out of fear of legal or other consequences
Which of the following is the best description of the term Digital Divide?
It is the growing gap between the underprivileged members of society, especially the poor, rural, elderly, and handicapped portion of the population who do not have access to computers or the internet; and the wealthy, middle-class, and young Americans living in urban and suburban areas who have access.
Students also viewedAP Computer science
23 terms
mgrieco22
AP Computer Science Midterm
56 terms
Shyleshh_G
Compsci Unit 2
124 terms
zach_raphael7Plus
HM 4/5/21
20 terms
Kva10
Sets found in the same folderCompsci Unit 2
124 terms
zach_raphael7Plus
AP-CSP
20 terms
Joseph457777
AP computer Science
36 terms
Jenna_Vivo6
Unit test 1,2,3
28 terms
MARTIN_URUETA
Other sets by this creatorSpanish Transitional Expressions
15 terms
kelly1kim
AHHHHHHH (calc bc)
44 terms
kelly1kim
ap csp vocab
73 terms
kelly1kim
ap lang terms #6
5 terms
kelly1kim
Verified questionsbiology
Explain how your body uses chemical energy during exercise.
Verified answer
physics
The mass of a carbon nucleus is approximately 12 times the mass of a neutron. $(a)$ Use the results of Problem 112 to show that after $N$ head-on collisions of a neutron with carbon nuclei at rest, the kinetic energy of the neutron is approximately $0.716^N K_0$, where $K_0$ is its initial kinetic energy.
Verified answer
environmental science
Explain how a population of insects could become resistant to a pesticide.
Verified answer
computer science
How many integers modulo $11^{3}$ have inverses? (Note: $11^{3}=1331.)$
Verified answer
Recommended textbook solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Service Management: Operations, Strategy, and Information Technology
7th EditionJames Fitzsimmons, Mona Fitzsimmons
103 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Service Management: Operations, Strategy, and Information Technology
7th EditionJames Fitzsimmons, Mona Fitzsimmons
103 solutions
Other Quizlet setsUnit 2: Chapter 2
59 terms
burkej208
Baptism
18 terms
dgarnercm
IMPUESTOS
19 terms
ajavier16