<!DOCTYPE html>
Welcome to Sreeja's Individual Github Page!Home | TPT | Create Task | Code |
Proctored MCQ Week3 : Quiz5 Corrections
Quiz5 Score: 38/50
Quiz5 Test Corrections: 12 Questions
- Question: 3
- Original Answer: A B
- Correct Answer: B D
- Why I Got It Wrong: For these values, the procedure repeatedly adds 2 to result five times, resulting in the intended product 10.
- Question: 9
- Original Answer: A
- Correct Answer: D
- Why I Got It Wrong: Algorithm I does not work correctly. In algorithm I, if two people are tied for the earliest birthday, they both sit down when they are eventually paired.
- Question: 13
- Original Answer: B
- Correct Answer: C
- Why I Got It Wrong: Program I also correctly moves the robot to the gray square by repeatedly moving the robot forward, rotating left, moving forward, and rotating right.
- Question: 15
- Original Answer: A
- Correct Answer: C
- Why I Got It Wrong: The programs display different values.
- Question: 16
- Original Answer: C
- Correct Answer: A
- Why I Got It Wrong: While the two programs initialize i to different values, the same values are printed inside the loop because program A prints i and then increments it and program B increments i and then prints it.
- Question: 28
- Original Answer: B
- Correct Answer: D
- Why I Got It Wrong: The variable val1 is assigned false because NOT (category = “new”) is false and age ≥ 65 is false.
- Question: 30
- Original Answer: B
- Correct Answer: D
- Why I Got It Wrong: The loop begins at the end of the list and moves to the start of the list, so index should be decremented, not incremented.
- Question: 32
- Original Answer: B
- Correct Answer: A
- Why I Got It Wrong: Running processes P and R on one processor will take a total of 50 seconds. Running processes Q and S on the other processor will take a total of 25 seconds. With the processors running in parallel, this solution will take 50 seconds; the optimal solution takes only 40 seconds.
- Question: 35
- Original Answer: A Correct Answer: C
- Why I Got It Wrong: There are many possible paths between devices A and D, including A-B-D, A-C-D, A-C-F-D, and A-B-E-F-D.
- Question: 42
- Original Answer: C
- Correct Answer: A
- Why I Got It Wrong: While this solution may reduce disrespectful communication between players, it does not make use of input from a large number of users.
- Question: 44
- Original Answer: C
- Correct Answer: A
- Why I Got It Wrong: Tricking a user into providing personal information is an example of a phishing attack. While this type of attack can be used to obtain personal information, it does not allow unauthorized individuals to intercept information transmitted on a network.
- Question: 45
- Original Answer: B
- Correct Answer: C
- Why I Got It Wrong: Code segment I also displays the correct average.
Proctored MCQ Week2 : Quiz3 Corrections
Quiz3 Score: 28/50
Quiz3 Test Corrections: 22 Questions
- Question: 2
- Original Answer: A
- Correct Answer: D
- Why I Got It Wrong: While some solutions benefit from being validated by a human, not all problems can be solved with an algorithm.
- Question: 3
- Original Answer: C
- Correct Answer: B
- Why I Got It Wrong: Algorithm I does not work correctly. In algorithm I, if two people are tied for the earliest birthday, they both sit down when they are eventually paired.
- Question: 6
- Original Answer: A C
- Correct Answer: A D
- Why I Got It Wrong: This algorithm displays the numbers 1, 2, 4, 5, 7, 8, 10, 11, 13, 14, 16, 17, and 19. The number 20 is not displayed since the algorithm terminates immediately after x is assigned the value 20.
- Question: 14
- Original Answer: C
- Correct Answer: D
- Why I Got It Wrong: The World Wide Web is not a protocol, and the Internet is not a data stream. The Internet is an interconnected network of networks, and the World Wide Web is an information system that is accessed via the Internet.
- Question: 17
- Original Answer: B C
- Correct Answer: C D
- Why I Got It Wrong: This option is incorrect. Since “Ben” is not in nameList, the procedure will display 0, indicating that the procedure worked as intended.
- Question: 18
- Original Answer: A
- Correct Answer: C
- Why I Got It Wrong:Incorrect. The procedure traverses this list and never encounters a positive value. The procedure then returns false as intended.
- Question: 19
- Original Answer: D
- Correct Answer: A
- Why I Got It Wrong:The database does not store information about the date of a particular sale. Because the database stores information on item identification numbers and quantities available, the retailer can search for all item identification numbers that have a quantity of 0.
- Question: 22
- Original Answer:D
- Correct Answer: B
- Why I Got It Wrong: This option is incorrect. If the fraction 2 divided by 3 were to be represented as an integer, it would be rounded or truncated to an integer value.
- Question: 29
- Original Answer: B
- Correct Answer: D
- Why I Got It Wrong: This option is incorrect. In the simulation, the variable flip_counter represents the number of times a coin was flipped. When flip_counter equals 1, only one coin has been flipped. This information does not lead to knowledge about the result of the simulation.
- ** Question: 30**
- Original Answer: A
- Correct Answer: D
- Why I Got It Wrong: The Internet is a network of interconnected networks, but the World Wide Web is an information system that is accessed via the Internet.
- ** Question: 32**
- Original Answer: C
- Correct Answer: B
- Why I Got It Wrong: This option is incorrect. The operation 10 plus 7 causes an overflow error, but 12 plus 3 does not produce a result large enough to cause an overflow error.
- ** Question: 33**
- Original Answer: B
- Correct Answer: A
- Why I Got It Wrong: The selections of a local radio station can reflect existing human biases. Making recommendations using only this data may lead to bias in the application.
- ** Question: 34**
- Original Answer: C
- Correct Answer: B
- Why I Got It Wrong: This algorithm has linear efficiency, so it runs in a reasonable amount of time. Therefore, a heuristic is not appropriate.
* Question: 35
- Original Answer: C
- Correct Answer: D
- Why I Got It Wrong: The user’s download history can be used to recommend similar artists based on aggregated data from many users.
- ** Question: 36**
- Original Answer: C
- Correct Answer: B D
- Why I Got It Wrong: Removing three connections could prevent devices A and F from communicating, but it can also be done by removing only two connections.
- ** Question: 37**
- Original Answer: B
- Correct Answer: C
- Why I Got It Wrong: This system uses wireless technology to find a lost pet, rather than the contributions of many individuals.
- ** Question: 38**
- Original Answer: C
- Correct Answer: B
- Why I Got It Wrong: Publishing an e-book with a no-rights-reserved Creative Commons license enables people to freely distribute it.
- ** Question: 39**
- Original Answer: A
- Correct Answer: B
- Why I Got It Wrong: This option is incorrect. The approximation 30.6 million would be a better estimate for year 11.
- ** Question: 41**
- Original Answer:
- Correct Answer: A
- Why I Got It Wrong: This option is incorrect. The recipient’s public key cannot be used to decrypt the message.
- ** Question: 42**
- Original Answer:
- Correct Answer: C
- Why I Got It Wrong: Using 6 bits will only allow for up to 64 sequences because 2^6=64. Using 7 bits will allow for up to 128 sequences because 2^7=128. Therefore, a minimum of 7 bits are needed.
- ** Question: 43**
- Original Answer:
- Correct Answer: C
- Why I Got It Wrong: Users with a premium account do not receive advertisements.
- ** Question: 44**
- Original Answer:
- Correct Answer: D
- Why I Got It Wrong: This option is correct. The procedures square and cube are each used to determine a power of n. A generalization of this procedure is Power, open parenthesis, n comma m, close parenthesis, which calculates n raised to the mpower.
- ** Question: 45**
- Original Answer:
- Correct Answer: B
- Why I Got It Wrong: Infrequently used files are removed from user devices and stored on a Web server. If a user has no Internet connection, the user will be unable to access these files.
- ** Question: 46**
- Original Answer:
- Correct Answer: B
- Why I Got It Wrong: This is an example of symmetric encryption because the secret key is used for both encryption and decryption of messages.
- ** Question: 47**
- Original Answer:
- Correct Answer: A D
- Why I Got It Wrong: This code segment sets bonus to 0 when score < 50, sets bonus to score * 10 when score > 100, and sets bonus to score when 100 ≥ score ≥ 50. This code segment sets bonus to score * 10 when score > 100, sets bonus to score when 100 ≥ score ≥ 50, and sets bonus to 0 when score < 50.
- ** Question: 48**
- Original Answer:
- Correct Answer: B
- Why I Got It Wrong: It is not possible to use byte pair encoding in the string Open quotation, LEVEL, underscore, UP, close quotationbecause no pair of characters appears in the string more than once.
- ** Question: 49**
- Original Answer:
- Correct Answer: B
- Why I Got It Wrong: A user can see a map of other people in the area who may not be on the user’s contact list.
Proctored MCQ Week1 : Quiz1, Quiz2 Test Corrections
Quiz1 Score: 37/50
Quiz1 Test Corrections: 13 Questions
- Question: 9
- Original Answer: C
- Correct Answer: B
- Why I Got It Wrong: Unlike in the original system, customers do not begin the call session by hearing a prerecorded message with answers to common questions.
- Question: 11
- Original Answer: A
- Correct Answer: C
- Why I Got It Wrong: This list would be helpful in deciding whether the customer should be directed to a representative or to a recording.
- Question: 20
- Original Answer: B
- Correct Answer: A
- Why I Got It Wrong: If each list is sorted separately and then combined, the combined list will not necessarily be sorted. When list1 and list2 are combined, the newList may have duplicates and will likely not be sorted. Performing the Sort and then the RemoveDuplicates procedures will result in a list that is sorted, has no duplicates, and contains the names of all the books found in either list1 or list2.
- Question: 21
- Original Answer: A
- Correct Answer: C
- Why I Got It Wrong: The World Wide Web is not a protocol, and the Internet is not a data stream. The Internet is an interconnected network of networks, and the World Wide Web is an information system that is accessed via the Internet.
- Question: 23
- Original Answer: A
- Correct Answer: B
- Why I Got It Wrong: The IP address of a user’s computer is required for the user to send and receive information on the Internet. The IP address in itself does not contain any extra information about the user.
- Question: 28
- Original Answer: A
- Correct Answer: D
- Why I Got It Wrong: There are trade-offs involved in choosing a compression technique for storing and transmitting data.
- Question: 36
- Original Answer: A
- Correct Answer: D
- Why I Got It Wrong:The database does not store information about the date of a particular sale. Because the database stores information on item identification numbers and quantities available, the retailer can search for all item identification numbers that have a quantity of 0.
- Question: 37
- Original Answer: A
- Correct Answer: D
- Why I Got It Wrong: The values I selected were flipped and if it was run using the values I selected the code segment would’ve worked.
- Question: 41
- Original Answer: A
- Correct Answer: C
- Why I Got It Wrong: If only one link were removed, for instance from F to E, a message from computer E could travel through other computers and connect with E through G or A.
* Question: 42
- Original Answer: A
- Correct Answer: D
- Why I Got It Wrong: I need to study the binary system and the values of the binary number system more thoroughly.
* Question: 45
- Original Answer: A
- Correct Answer: C
- Why I Got It Wrong: This question can be answered by filtering the data for the date and the sports category. The cost of a given product is not tracked by the described search engine.
* Question: 47
- Original Answer: A D
- Correct Answer: A C
- Why I Got It Wrong: If devices E and F were to fail, devices A and C can still communicate. One possible path is A-D-C.
* Question: 48
- Original Answer: B
- Correct Answer: A
- Why I Got It Wrong: Removing three connections could prevent devices A and F from communicating, but it can also be done by removing only two connections.
Quiz2 Score: 35/50
Quiz2 Test Corrections: 15 Questions
* Question: 2
- Original Answer: A
- Correct Answer: B
- Why I Got It Wrong: While linking a social media account to a phone number may improve the security of the site, it does not improve access to devices and the Internet.
* Question: 7
- Original Answer: A
- Correct Answer: B
- Why I Got It Wrong: The ability to keep data secure is not a primary function of a compression algorithm.
* Question: 9
- Original Answer: B
- Correct Answer: A
- Why I Got It Wrong: If the same formula can be applied to every data element, then the computations can be done in parallel on multiple processors.
* Question: 12
- Original Answer: C
- Correct Answer: D
- Why I Got It Wrong: Compressing a user’s pictures only affects data on the user’s device. It does not rely on information contributed by a large number of users.
* Question: 14
- Original Answer: A
- Correct Answer: D
- Why I Got It Wrong: The two line graphs are roughly the same shape, indicating that the average amount of data stored per user remained about the same across all eight years.
* Question: 18
- Original Answer: C
- Correct Answer: D
- Why I Got It Wrong: After initializing result to 2, the code segment multiplies result by 5 a total of three times rather than multiplying result by 3 a total of five times. This yields the result 2(53).
* Question: 19
- Original Answer: D
- Correct Answer: C
- Why I Got It Wrong: When x is not negative, y is assigned the value false and the display statement is never executed.
* Question: 24
- Original Answer: A
- Correct Answer: C
- Why I Got It Wrong: Redundancy on the Internet allows packets to be transmitted along multiple paths, but does not reduce the number of packets needed to transmit a particular message.
* Question: 30
- Original Answer: A`
- Correct Answer: C`
- Why I Got It Wrong: The decimal equivalent of this triplet is (37, 0, 130).`
* Question: 31
- Original Answer: D
- Correct Answer: A
- Why I Got It Wrong: The binary RGB triplet for vivid yellow is (11111111, 11111111, 00001110).
* Question: 34
- Original Answer: B
- Correct Answer: A
- Why I Got It Wrong: This expression will not count books that have exactly one copy in stock because it uses the expression (1 < num) instead of (1 ≤ num).
* Question: 35
- Original Answer: D
- Correct Answer: C
- Why I Got It Wrong: While fractions are sometimes represented by decimal approximations that are subject to rounding errors, integers are not.
* Question: 42
*Original Answer: A B
- Correct Answer: B C
- Why I Got It Wrong: Redundant routing provides fault tolerance, which enables a cloud storage site to continue to operate if some part of a network fails.
* Question: 43
- Original Answer: B
- Correct Answer: A
- Why I Got It Wrong: The given code segment causes the robot to end in the lower-right corner of the grid, facing toward the top of the grid. This code segment causes the robot to rotate left before moving forward, causing the robot to follow a different path. The robot ends in the upper-right corner of the grid, facing toward the top of the grid.
* Question: 45
- Original Answer: C
- Correct Answer: A
- Why I Got It Wrong: The desired information cannot be determined with these two spreadsheets because students with grade point averages of 3.5 or less cannot be identified.
TPT & Test Prep
Tri 3 Big Idea 5.5: Legal and Ethical Concerns
5.5 Notes
- There were many Lawyers making a profession on Patents and how they can be impacted on General Public Licensing (GPL)
- Qualcomm makes its money on patents
- Patents are an exclusive right granted for an invention
- Open Source by nature, specifically GPL, says any derivative work is free and code should be shared
- Qualcomm wants all derivative work to require a royalty payment payment, also anyone who uses the idea/patent pays royalty
- “Black Duck® software composition analysis (SCA) helps teams manage the security, quality, and license compliance risks that come from the use of open source and third-party code in applications and containers.”
- Important to know the type of software license you are copying, it could impact billions of dollars in business
5.5 Activity
- When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in GitHub pages.
The tech-talk and the video covers some of the license types that are available to pick for the team/individual project. A license is a A unique string, typically non-guessable, that allows a user to activate the unique rights they have purchased for a given application or service and is often used interchangeably with Serial Number. In GitHub, it permits users to do anything with a given project as long as they credit the developer and don’t hold him or her liable for the project’s use.
- Make a license for your personal and Team project. Document license you picked and why.
For our team project, we chose the creative commons license. This license is the best fit for our personal and team projects due to how it allows the creator to retain copyright whilst allowing others to copy and distribute and make use of their work non-commercially. The Creative Commons license also ensures creators get the recognition and credit for the work they produce and share.
Tri 3 Big Idea 5.6: Safe Computing
5.6 Notes
PII = Personal Identifiable Information
- LinkedIn is a place where we want to be know for our accomplishments (the person that looks at your LinkedIn will, most likely, look at things like Instagram or Facebook)
- Things that will be known by everyone: Name, Email (suggest a junk email), Picture, High School attended, College Attended, Properties you own, State-City of residence, all State-City of previous residence, Credit Report
- Things that you should strive to keep absolutely secret: Credentials for Access, Two-Factor Authentication on Financial accounts, Social Security Number, Tax records
- Phishing is where unknown sources try to entice you into a response, like click here and receive $500. Often such systems impersonate someone like Amazon asking for login information.
- Symmetric encryption is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
- Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys – one public key and one private key – to encrypt and decrypt a message and protect it from unauthorized access or use.
5.6 Activity
- Describe PII you have seen on project in CompSci Principles.
In CSP, the CRUD that needs to be entered was an example of the PII stuff I have seen. Since we are entering information such as email and phone numbers, this is information that should be protected.
- What are your feelings about PII and your exposure?
In the age of technology, it is important that individuals stay vigilant on what they post online. Whether it be comments on social media or actual posts, all of this information can be traced back to you.
- Describe good and bad passwords? What is another step that is used to assist in authentication.
Good passwords are made up of a few key components including randomness, complexity and length. If your password is predictable, simple and or/short, chances are it is less secure. A combination of random letters, numbers and characters will be less likely to be hacked into.
- Try to describe Symmetric and Asymmetric encryption.
Symmetric encryption uses the same key to encrypt and decrypt data making it very easy to use. Asymmetric encryption uses a public key to encrypt data and a private key to decrypt information.
- Provide and example of encryption we used in deployment.
During deployment, something that we used was certbot. This was something that allowed us to ensure that out website was secure.
- Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.
I don’t think there are an phishing schemes I have learned about in a hard way, however, I have definitely encountered it. I will often get emails or texts claiming to be from my bank and asking to enter in my information. Things like these are fake and are just a way to gain access to personal information.
Tri 3 Big Idea 5.3: Computing Bias
5.3 Notes
- Computing bias is something that has been done intentionally as well as unintetiontinally: (Tik Tok vs. Facebook) VS. (The main demographic of HP computor users being white cis men)
- When demographics are targted intentionally, it is done to ensure that the activies are more interactive and personalised for the users. For example, Tik tok, is an app made for teenagers and generally people under 30. If Tik Tok tried marketing to people older, it would no lomger be as intersting for the youth and would most likely lead to a different demographic of users.
- Amazon, Alexa Google, Apple Siri original had flaws in detecting accents or young voices -> unintentional
- One is algorithmic AI bias or “data bias,” where algorithms are trained using biased data. The other kind of bias in AI is societal AI bias
5.3 Activity
- Does the owner of the computer think this was intentional?
I don’t think the HP computor’s creator intentionally made it so that mainly white men had access to the computor. However, it is impotant to note that no drastic steps have ben taken to improve this.
- If yes or no, justify you conclusion.
HP computors were marketed for the general-public. There were no signifiers that it was marketed towards the west only and not outside of that.
- How do you think this happened?
I think this happened due to the digital divide and how many people could actually get access to these computors. The digtal devide has been an issue even going past HP. The only ay to fix this is help end the rampant poverty and un-eduction while also introducing technology such as computors.
- Is this harmful? Was it intended to be harmful or exclude?
This divide is harmful, however, it wasn’t in any way intentional. This unintentional exclusion can lead to a further seperation between the west and the rest of the country.
- Should it be corrected?
This should be corrected in order to help introduce for progress into the world and close the digital divide.
- What would you or should you do to produce a better outcome?
In order to produce a better outcome, we should be making electronics more available and inexpensive. As well as this, implementing more education on the internet can help people identify and emphasize the importance of technology.
Tri 3 Big Idea 5.4: Crowd-sourcing
5.4 Notes
- Crowdsourcing provides the ability to obtain shared information, share information, and participate in distributed computing
- Wikipedia has a ton of information from crowdsourcing
- Crypto currency and associated block chain
- COVID data, it is easy to recognize areas that are contributing and not contributing.
- We have all experienced Crowdsourcing by using external data through API’s, namely RapidAPI
- we have all participated in code Crowdsourcing by using GitHub. Many of you have forked from the Teacher repository
5.4 Activity
- CompSci has 150 principles students. Describe a crowdsource idea and how you might initiate it in our environment?
An example of crowd sourcing that can be done in our Computer Science class is a form of a forum where new discoveries of code can be shared. For example, if someone, in their free time were to create a new game or create a mini quiz, they could share the code for this so that their classmates could use this in their own works or to build upon this. As well as this, such as an API, students can create a sort of data base for said quizzes and so then other students can implement the data into their projets.
- What about Del Norte crowdsourcing? Could your final project be better with crowdsourcing?
Especially for our project, croud sourcing is something that would be very beneficial. Since our website is a reading website, if we could implement a method for students to edit the summary of books it would help moer students and theorietically add in more reliable infromantion. While this would need a form of monitoring to ensure the information is true, it would add more exposure to more books.
Tri 3 Big Idea 5.1: Beneficial and Harmful Effects of Computing
5.1 Notes
- Dopamine plays a role in how we feel pleasure which can be assoiciated with technology (good and bad)
- Anthony Rosner -> hero in the World of Warcraft online gaming community and submerged himself in a fantasy world that seemingly fulfilled his every need -> his real life was virtually nonexistent
- After turning away from the game, Rosner found other sources of pleasure. He joined a gym, started DJing at his university, and became much more active socially. “I couldn’t believe what I had been missing,” he says.
- Automated telephone trees were designed to save employers money, but also reduce hold time for customers.
5.1 Activity
- Come up with three of your own Beneficial and corresponding Harmful Effects of Computing
- Computing and the internet helps introduce more ways to experience/view the world -> People may become wrapped up in what they see on the internet instead of actaully experiencing the internet.
- There is an increased knowledge and understanding -> The overuse of the internet and mobile devices can lead to a numerous amounts of mental and physical health problems.
- Improvements in industry and jobs and an interconnectedness of the world as a result of globalization -> human’s break their social interact with friends and families
- Talk about dopamine issues above. Real? Parent conspiracy? Anything that is impacting your personal study and success in High School?
Dopamine is a type of neurotransmitter that is generally associated with how we as humans feel/experience pleasure. When using technology, Dopamine can be released and our body begins to associate feeling good to using technology. When this happens, our bodies can form a certain reliance on technology that can soon lead to an addiction. For example, when using social media apps, there is ofton a form of a ‘for you page’ where content is tailored and formed around what is apealing to the users. Pages like this can make people get addicted to viewing the content instead of focusing on resposibilites.
Tri 3 Big Idea 5.2: Digital Divide
5.2 Notes
- Poorer or rural areas in America and other countries may have less or little access to Technology
- Some countries may have different or restricted access, for instance China and USA may have divide in service allowed in their countries.
- Individual may have less access to latest updates, thus may be working on older generations of computers
- Religious groups like the Amish choose not to use technology
- San Diego county has regional distinction in many categories between Northern and Southern population, usually indicated by Interstate 8.
- Sunnyvale CA has been known as technology hub of influence for the entirety of the United States.
5.2 Activity
- How does someone empower themself in a digital world?
Someone can empower themselves in the digital world by confidently participating in the digital world and building upon the knowledge, experience and values that people already have.
- How does someone that is empowered help someone that is not empowered? Describe something you could do at Del Norte HS.
In many ways they are preventing people from being digitally empowered as a system since it doesn’t always make it nesasaary for people to use paper. While paper is a vital part of our society and cannot be replaced, computers should become more accesable and available to the general public. At del norte, we can create technology drives and aother sorts of fundraisers to raise money for technological devices so that the digital devide can be closed in a way.
- Is paper or red tape blocking digital empowerment? Are there such barriers at Del Norte? Elsewhere?
Yes, there are many elements preventing digital empowerment such as location, income, and general knowlege of the use of technology. Living in the US, and especially San Diego, many students and people are able to have multiple personal devices without an issue. However, moving away from the US, many developing countries such as India don’t necassarily have the same privilge. These barriers exists virtually everywhere, at a larger or smaller scale depending on where you live.