Computing's Impact on Society
Which of the following is a common way to represent text in binary?
ASCII
Hexadecimal
Decimal
RGB
What file transfer technology allows users direct access control over remote servers with minimal protocol overhead?
WebDAV (Web-based Distributed Authoring and Versioning)
SCP (Secure Copy Protocol)
FTP (File Transfer Protocol)
SFTP (Secure File Transfer Protocol)
Which programming paradigm would most effectively support a program that requires extensive reuse of previously written code through inheritance and polymorphism?
Logic programming
Functional programming
Object-oriented programming
Procedural programming
Why are algorithms important in computer science?
They serve as the primary user interface for applications
They solve problems and perform tasks efficiently
They increase the storage capacity of computers
They boost the processing speed of CPUs directly
What advantage do algorithm-driven recommendations on streaming services offer over traditional broadcasting programming methods?
Streaming recommendations ensure that all viewers have access to the same content at the same time everywhere globally.
Personalized content delivery based on viewer's history and preferences increases engagement and satisfaction.
Algorithmic recommendations discourage binge-watching by offering diverse genre options regardless of user history.
They require less bandwidth because content is delivered via algorithms rather than as a continuous stream.
What should be done if you suspect your personal data has been compromised?
Continue using the same passwords since changing them frequently can be confusing
Change your passwords and monitor your accounts for unusual activity
Share details of the compromise publicly to warn others
Ignore the signs as false positives rarely occur
How might an algorithm that anonymizes datasets by generalizing sensitive attributes affect user privacy?
It completely ensures that individual data cannot be traced back to an individual, fully preserving privacy.
It has no impact on privacy since the original dataset remains unchanged and secure at its source location.
It enhances user experience by providing personalized content without compromising privacy.
It may create a false sense of security if the anonymized data can be re-identified through linkage with other datasets.

How are we doing?
Give us your feedback and let us know how we can improve
Which algorithmic solution is most efficient for finding the shortest path in a sparsely-connected graph with thousands of nodes?
Brute force search checking all possible paths.
Breadth-first search exploring neighbor nodes equally.
Depth-first search prioritizing one branch at a time.
A* search algorithm utilizing heuristics.
What interdisciplinary challenge can be addressed by applying computer vision systems integrated into drones in disaster response scenarios?
Delivering emergency supplies via drone navigation systems to affected zones when road access is obstructed.
Automated damage assessment following natural disasters through image recognition facilitating rapid response efforts.
Mapping out inaccessible areas post-disaster using GPS-coordinated drone flights to inform rescue team deployments.
Enhancing search and rescue operations with thermal imaging drones identifying heat signatures of people trapped under debris.
Which activity would involve using algorithms within computational thinking?
Writing steps for solving mathematical equations.
Drawing blueprints for a house.
Sorting files by alphabetical order.
Developing skills through repetitive practice.