Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

APCSP FINAL

        Help!  

Question
Answer
Which of the following is an example of a phishing attack?   Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information  
🗑
In a certain computer program, two positive integers are added together, resulting in an overflow error. Which of the following best explains why the error occurs?   The program can only use a fixed number of bits to represent integers; the computed sum is greater than the maximum representable value.  
🗑
Which of the following is an advantage of a lossless compression algorithm over a lossy compression algorithm?   A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot.  
🗑
A programmer is developing software for a social media platform. The programmer is planning to use compression when users send attachments to other users. Which of the following is a true statement about the use of compression?   Lossy compression of an image file generally provides a greater reduction in transmission time than lossless compression does.  
🗑
A user wants to save a data file on an online storage site. The user wants to reduce the size of the file, and wants to be able to completely restore the file to its original version. Which of the following actions best supports the user’s needs?   Compressing the file using a lossless compression algorithm before uploading it  
🗑
A media librarian at a movie studio is planning to save digital video files The movie studio would like to be able to access full-quality videos . Which of the following actions is LEAST likely to support the studio’s goal?   Using lossy compression software to reduce the size requirements of the data being stored  
🗑
Digital images are often represented by the (an RGB triplet) of each individual pixel in the image. A photographer is manipulating a digital image and overwriting the original image. Which of the following a lossless transformation of the digital image?   Creating the negative of an image by creating a new RGB triplet for each pixel in which each value is calc by subtracting the original value from 255. The negative of an image is reversed from the originallight areas appear dark, and colors are reversed.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: kmarino23