
Unit 2 Test Review
Authored by Melissa Estremera
Computers
10th - 12th Grade
Used 48+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
21 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Scientists studying birds often attach tracking tags to migrating birds. For each bird, the following data is collected regularly at frequent intervals:
Date and time
Latitude and Longitude
Altitude
Temperature
Which of the following questions about a particular bird could not be answered using only the data gathered from the tracking tags.
Approximately how much time does the bird spend in the air and on the ground?
Is the migration path of the bird affected by temperature patterns?
What are the effects of industrial pollution on the migration path of the bird?
Does the bird travel in groups with other tracked birds?
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Using computers, researchers often search large data sets to find interesting patterns in the data. Which is of the following is not an example where searching for patterns is needed to gather desired information?
An online shopping company analyzing customers purchase history to recommend new products.
A high school analyzing student attendance records to determine which students should receive a disciplinary warning.
A credit scoring company analyzing purchase history of clients to identify cases of identity theft.
A college analyzing high school students’ GPA and SAT scores to assess their potential college success.
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A car hailing company uses an app to track the travel trends of its customers. The data collected can be filtered and sorted by geographic location, time and date, miles travelled, and fare charged for the trip. Which of the following is least likely to be answerable using only the trends feature?
What time of the day is the busiest for the company at a given city.
How much money was earned by the company in a given month.
From which geographical location do the longest rides originate.
From which geographical location do the longest rides originate.
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
An online music download company stores information about song purchases made by its customers. Every day, the following information is made publicly available on a company website database.
The day and date of each song purchased. The title of the song. The cities where customers purchased each song. The number of times each song was purchased in a given city.
An example portion of the database is shown below. The database is sorted by date and song title.
Which of the following cannot be determined using only the information in the database?
The song that is purchased the most in a given week.
The total number of cities in which a certain song was purchased in a given month.
The city with the fewest purchases on a particular day.
The total number of songs purchased by a particular customer during the course of a given year.
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is not true about cybersecurity?
Recent data breaches have released personal information of hundreds of millions of people.
Cybersecurity is the protection of computer systems, networks, and data from digital attacks.
As we rely more on computing devices to store and send data, we increase our vulnerability to cyber attacks.
Cyber attacks can devastate large organizations, but individuals are largely unaffected.
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is a true statement about digital certificates in Web browsers?
Digital certificates are used to verify the ownership of public keys used in secure communication
Digital certificates are used to verify the IP addresses of Web sites
Digital certificates are used to verify that the connection to a Web site is fault tolerant
Digital certificates are used to verify that every packet sent in a transmission made it to the final destination
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following are true statements about phishing attacks?
I - Phishing attacks are characterized by communication from one person trying to trick another person into divulging personal information
II - Phishing attacks can be defended against using data compression
I only
II only
I and II
Neither I nor II
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?