Question
click below
click below
Question
Normal Size Small Size show me how
APCSP FINAL
Question | Answer |
---|---|
Which of the following is an example of a phishing attack? | Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information |
In a certain computer program, two positive integers are added together, resulting in an overflow error. Which of the following best explains why the error occurs? | The program can only use a fixed number of bits to represent integers; the computed sum is greater than the maximum representable value. |
Which of the following is an advantage of a lossless compression algorithm over a lossy compression algorithm? | A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot. |
A programmer is developing software for a social media platform. The programmer is planning to use compression when users send attachments to other users. Which of the following is a true statement about the use of compression? | Lossy compression of an image file generally provides a greater reduction in transmission time than lossless compression does. |
A user wants to save a data file on an online storage site. The user wants to reduce the size of the file, and wants to be able to completely restore the file to its original version. Which of the following actions best supports the user’s needs? | Compressing the file using a lossless compression algorithm before uploading it |
A media librarian at a movie studio is planning to save digital video files The movie studio would like to be able to access full-quality videos . Which of the following actions is LEAST likely to support the studio’s goal? | Using lossy compression software to reduce the size requirements of the data being stored |
Digital images are often represented by the (an RGB triplet) of each individual pixel in the image. A photographer is manipulating a digital image and overwriting the original image. Which of the following a lossless transformation of the digital image? | Creating the negative of an image by creating a new RGB triplet for each pixel in which each value is calc by subtracting the original value from 255. The negative of an image is reversed from the originallight areas appear dark, and colors are reversed. |