Search Header Logo

Unit 2 Test Review

Authored by Melissa Estremera

Computers

10th - 12th Grade

Used 48+ times

Unit 2 Test Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Scientists studying birds often attach tracking tags to migrating birds. For each bird, the following data is collected regularly at frequent intervals:

Date and time

Latitude and Longitude

Altitude

Temperature


Which of the following questions about a particular bird could not be answered using only the data gathered from the tracking tags.

Approximately how much time does the bird spend in the air and on the ground?

Is the migration path of the bird affected by temperature patterns?

What are the effects of industrial pollution on the migration path of the bird?

Does the bird travel in groups with other tracked birds?

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Using computers, researchers often search large data sets to find interesting patterns in the data. Which is of the following is not an example where searching for patterns is needed to gather desired information?

An online shopping company analyzing customers purchase history to recommend new products.

A high school analyzing student attendance records to determine which students should receive a disciplinary warning.

A credit scoring company analyzing purchase history of clients to identify cases of identity theft.

A college analyzing high school students’ GPA and SAT scores to assess their potential college success.

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A car hailing company uses an app to track the travel trends of its customers. The data collected can be filtered and sorted by geographic location, time and date, miles travelled, and fare charged for the trip. Which of the following is least likely to be answerable using only the trends feature?

What time of the day is the busiest for the company at a given city.

How much money was earned by the company in a given month.

From which geographical location do the longest rides originate.

From which geographical location do the longest rides originate.

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

An online music download company stores information about song purchases made by its customers. Every day, the following information is made publicly available on a company website database.

The day and date of each song purchased. The title of the song. The cities where customers purchased each song. The number of times each song was purchased in a given city.

An example portion of the database is shown below. The database is sorted by date and song title.


Which of the following cannot be determined using only the information in the database?

The song that is purchased the most in a given week.

The total number of cities in which a certain song was purchased in a given month.

The city with the fewest purchases on a particular day.

The total number of songs purchased by a particular customer during the course of a given year.

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is not true about cybersecurity?

Recent data breaches have released personal information of hundreds of millions of people.

Cybersecurity is the protection of computer systems, networks, and data from digital attacks.

As we rely more on computing devices to store and send data, we increase our vulnerability to cyber attacks.

Cyber attacks can devastate large organizations, but individuals are largely unaffected.

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is a true statement about digital certificates in Web browsers?

Digital certificates are used to verify the ownership of public keys used in secure communication

Digital certificates are used to verify the IP addresses of Web sites

Digital certificates are used to verify that the connection to a Web site is fault tolerant

Digital certificates are used to verify that every packet sent in a transmission made it to the final destination

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following are true statements about phishing attacks?

I - Phishing attacks are characterized by communication from one person trying to trick another person into divulging personal information

II - Phishing attacks can be defended against using data compression

I only

II only

I and II

Neither I nor II

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?