4. What order should the following procedures be used in creating an app to reserve a study room in the library? • checkAvail()-checks the availability of the time requested since multiple people can use the app at the same time • record Resv()-records the room reservation • request Time()-asks for a reservation time for the study room • timesAvail()-displays the times the room is available update Times()-updates the times available to be displayed ELSE (A) requestTime(), record Resv(), timesAvail(), checkAvail(), update Times() (B) requestTime(), timesAvail(), record Resv(), update Times() (C) timesAvail(), requestTime(), checkAvail(). recordResv(), update Times() (D) request Time(), record Resv(), updateTimes() Questions 5 and 6 are based on the code below. Assume the variables and list already have values. IF (topSongs [1] song AND song Times Played 100 REMOVE (topSongs, 1) play (song) song Times Played song Times Played 1 5. What is the code doing? (A) Playing a song from the topSongs list (B) If a song is in topSongs, playing it, then removing it (C) Removing a song from topSongs if it has been played 100 times; otherwise playing the song and increasing the number of times played (D) This code will not run as written.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
PLEASE JUST ANSWER QUESTIONS 4-7 SHOW WORK AND EXPLANATION OF HOW YOU GOT THE ANSWER!!!
:
194> STEP 5. Build Your Test-Taking Confidence
1. When running a program that counts the num-
ber of records in a large dataset, you receive an
error on your computer screen, in binary format:
11110001.
Convert the error message from binary to deci-
mal to be able to look it up.
(A) 239-Invalid operation. Corrupt data
caused the error.
(B) 240-Decimal numbers are stored impre-
cisely in computers. A rounding error
occurred.
(C) 241-Overflow error. The object exceeded
its maximum size. The dataset is too large
to run on your computer.
(D) 404 Error message not found.
2. You read in the news about an employee who
took advantage of decimal numbers used with
currency exchanges to steal money. What is the
most likely way the employee accomplished
this?
(A) The employee redirected the overflow
amount when it occurred and deposited it
in his account.
(B) The employee took advantage of rounding
and deposited the fractional amounts.
(C) The amount is represented in binary and
when the right-most bit was a 1, he
replaced it with a 0 and deposited the
difference.
(D) The employee converted to Euros and
then back to U.S. dollars. The difference
in the exchange rate was deposited into his
account.
3. Saving your information from an online form
to be able to auto-fill fields in future forms
captures some of your Personally Identifiable.
Information (PII). This could be an example of:
(A) an ethical matter
(B) a legal problem
(C) a privacy concern
(D) a security issue
4. What order should the following procedures be
used in creating an app to reserve a study room
in the library?
•
checkAvail()-checks the availability of
the time requested since multiple people
can use the app at the same time
• record Resv()-records the room
reservation
• requestTime()-asks for a reservation
time for the study room
• timesAvail()-displays the times the
room is available
ELSE
update Times()-updates the times
available to be displayed
(A) requestTime(), record Resv(), timesAvail(),
checkAvail(), update Times()
(B) requestTime(), timesAvail(), record Resv(),
update Times()
(C) timesAvail(), requestTime(), checkAvail(),
recordResv(), update Times()
(D) requestTime(), record Resv(), update Times()
Questions 5 and 6 are based on the code below.
Assume the variables and list already have values.
IF (topSongs[i] song AND song Times Played 100)
REMOVE (topSongs, i)
play (song)
song Times Played song Times Played 1
5. What is the code doing?
(A) Playing a song from the topSongs list
(B) If a song is in topSongs, playing it, then
removing it
(C) Removing a song from topSongs if it has
been played 100 times; otherwise playing
the song and increasing the number of
times played
(D) This code will not run as written.
Transcribed Image Text:: 194> STEP 5. Build Your Test-Taking Confidence 1. When running a program that counts the num- ber of records in a large dataset, you receive an error on your computer screen, in binary format: 11110001. Convert the error message from binary to deci- mal to be able to look it up. (A) 239-Invalid operation. Corrupt data caused the error. (B) 240-Decimal numbers are stored impre- cisely in computers. A rounding error occurred. (C) 241-Overflow error. The object exceeded its maximum size. The dataset is too large to run on your computer. (D) 404 Error message not found. 2. You read in the news about an employee who took advantage of decimal numbers used with currency exchanges to steal money. What is the most likely way the employee accomplished this? (A) The employee redirected the overflow amount when it occurred and deposited it in his account. (B) The employee took advantage of rounding and deposited the fractional amounts. (C) The amount is represented in binary and when the right-most bit was a 1, he replaced it with a 0 and deposited the difference. (D) The employee converted to Euros and then back to U.S. dollars. The difference in the exchange rate was deposited into his account. 3. Saving your information from an online form to be able to auto-fill fields in future forms captures some of your Personally Identifiable. Information (PII). This could be an example of: (A) an ethical matter (B) a legal problem (C) a privacy concern (D) a security issue 4. What order should the following procedures be used in creating an app to reserve a study room in the library? • checkAvail()-checks the availability of the time requested since multiple people can use the app at the same time • record Resv()-records the room reservation • requestTime()-asks for a reservation time for the study room • timesAvail()-displays the times the room is available ELSE update Times()-updates the times available to be displayed (A) requestTime(), record Resv(), timesAvail(), checkAvail(), update Times() (B) requestTime(), timesAvail(), record Resv(), update Times() (C) timesAvail(), requestTime(), checkAvail(), recordResv(), update Times() (D) requestTime(), record Resv(), update Times() Questions 5 and 6 are based on the code below. Assume the variables and list already have values. IF (topSongs[i] song AND song Times Played 100) REMOVE (topSongs, i) play (song) song Times Played song Times Played 1 5. What is the code doing? (A) Playing a song from the topSongs list (B) If a song is in topSongs, playing it, then removing it (C) Removing a song from topSongs if it has been played 100 times; otherwise playing the song and increasing the number of times played (D) This code will not run as written.
1:35 AM Mon Apr 10
X
Kami Export - Whole test.pdf
1
AP
6. In the above code, after a song has been deleted
from the list once, it keeps being removed after
the user adds it back to the list. What is the best
way to fix this error?
(A) Change the program to allow songs to be
played 1,000 times before being deleted.
(B) Send the user a message to confirm they
want to delete the song stating it can never
be added back to the list.
(C) Write a new procedure to add a song
back to the list if it had been on the list
previously.
(D) Set song Times Played back to 0 after
removing a song.
7. Which of the following will evaluate to false?
i. false AND (true OR NOT (false)
ii. true AND (NOT (true AND false))
iii. NOT (false OR (true OR false)).
(A) i and ii
(B) ii and iii
(C) i and iii
(D) i, ii, and iii
:
8. Which of the following will evaluate to true?
i. (true OR false) AND NOT (true OR
NOT (false))
ii. NOT (true AND
(NOT (true OR false)))
iii. (NOT (true) OR (true AND false))
(A) i
(B) ii
(C) i and iii
(D) ii and iii
9. A group that is watching sea turtle nests, records
data about their nests. Which of the following
is metadata?
(A) Daily temperature of the nest
(B) Date the eggs were laid
(C) Nest tag
(D) Number of data fields tracked
Computer Science Principles Practice Exam 2 < 195
10. The video the nest watchers took of the baby sea
turtles making their way to the water is too large
to send. How can the volunteers compress the
video to get it to the scientists in full resolution?
(A) Lossless compression will allow the scien-
tists to see the video in full resolution.
(B) Lossy compression will make the file small
enough to send.
(C) They should be combined for the best
compression.
(D) Any compression technique will be
sufficient.
11. When analyzing a list of potential employees
for promotion that an algorithm produced, the
team noticed that there were no members of a
particular group included. With further research,
it was determined that part of the criteria that
the algorithm used included prior employees in
that position, which had few from that particular
group. What is this is an example of?
(A) Bias
(B) Citizen science
(C) Single criteria elimination
(D) Targeted data
12. Which of the following techniques would be
best to use to further analyze patterns that
emerged during data mining?
i. Classifying data to categorize it into distinct
groups
ii. Cleaning data to determine which data to
include in the processing
iii. Clustering data to separate data with simi-
larities into subclasses
iv. Filtering to set conditions so only records
meeting the criteria are included
(A) i, ii, iii
(B) i, iii, iv
(C) i, ii, iv
(D) i, ii, iii, iv
@ 43% (
Transcribed Image Text:1:35 AM Mon Apr 10 X Kami Export - Whole test.pdf 1 AP 6. In the above code, after a song has been deleted from the list once, it keeps being removed after the user adds it back to the list. What is the best way to fix this error? (A) Change the program to allow songs to be played 1,000 times before being deleted. (B) Send the user a message to confirm they want to delete the song stating it can never be added back to the list. (C) Write a new procedure to add a song back to the list if it had been on the list previously. (D) Set song Times Played back to 0 after removing a song. 7. Which of the following will evaluate to false? i. false AND (true OR NOT (false) ii. true AND (NOT (true AND false)) iii. NOT (false OR (true OR false)). (A) i and ii (B) ii and iii (C) i and iii (D) i, ii, and iii : 8. Which of the following will evaluate to true? i. (true OR false) AND NOT (true OR NOT (false)) ii. NOT (true AND (NOT (true OR false))) iii. (NOT (true) OR (true AND false)) (A) i (B) ii (C) i and iii (D) ii and iii 9. A group that is watching sea turtle nests, records data about their nests. Which of the following is metadata? (A) Daily temperature of the nest (B) Date the eggs were laid (C) Nest tag (D) Number of data fields tracked Computer Science Principles Practice Exam 2 < 195 10. The video the nest watchers took of the baby sea turtles making their way to the water is too large to send. How can the volunteers compress the video to get it to the scientists in full resolution? (A) Lossless compression will allow the scien- tists to see the video in full resolution. (B) Lossy compression will make the file small enough to send. (C) They should be combined for the best compression. (D) Any compression technique will be sufficient. 11. When analyzing a list of potential employees for promotion that an algorithm produced, the team noticed that there were no members of a particular group included. With further research, it was determined that part of the criteria that the algorithm used included prior employees in that position, which had few from that particular group. What is this is an example of? (A) Bias (B) Citizen science (C) Single criteria elimination (D) Targeted data 12. Which of the following techniques would be best to use to further analyze patterns that emerged during data mining? i. Classifying data to categorize it into distinct groups ii. Cleaning data to determine which data to include in the processing iii. Clustering data to separate data with simi- larities into subclasses iv. Filtering to set conditions so only records meeting the criteria are included (A) i, ii, iii (B) i, iii, iv (C) i, ii, iv (D) i, ii, iii, iv @ 43% (
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 5 steps

Blurred answer
Knowledge Booster
Windows
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education