KHAN ACADEMY UNIT: COMPUTING INNOVATIONS UPDATED 2024 QUESTIONS AND ANSWERS SOLVED & VERIFIED 100%
KHAN ACADEMY UNIT: COMPUTING INNOVATIONS UPDATED 2024 QUESTIONS AND ANSWERS SOLVED & VERIFIED 100% Aisha sends an email message to her classmate Jamarion asking him to the prom. Which of these actions can Jamarion do without the consent of Aisha? ️Note that there may be multiple answers to this question. Ans- Reply to the message with another classmate CC'ed Forward the message to another classmate Take a screenshot of the message Replying to the message with another classmate BCC'ed Zaniyah wants to share photos of her newborn baby on her public social media account. She wants to be able to delete the posts once her baby grows up, however. How can she ensure she can completely delete the photos off the Internet later? Choose 1 answer: Ans- None of the above (There is no certain way to do this.) To celebrate National Teacher Day, a social media user starts a #MyFavTeacher hashtag and encourages other users to say thank you to their favorite teacher. The FBI is concerned about the trend and whether users will accidentally reveal information that can be used to answer bank account security questions. Which tweet would be the least concerning to the FBI? Ans- "A big thanks to my third grade teacher! They got me started down the path of science experiments. #MyFavTeacher" Eloise wants to share her political views with family members living in another state but doesn't want her posts to be viewed by potential employers in the future. What is the best strategy for ensuring that? Ans- She can send email messages with family members CC'ed on the email thread. Lavanya is a startup founder who is working on the design of a smart bracelet. She needs to sketch out some ideas with a designer who lives in another country and wants to try using an online collaborative whiteboarding program for their design session. Lavanya is nervous about their design ideas being lost or getting into the wrong hands, however. Which of these is not a way that the whiteboarding data could be lost or stolen? Choose 1 answer:Choose 1 answer: Ans- Lavanya could accidentally drop her laptop, resulting in a damaged hard drive and erased data. Benjamin is writing code for a medical software company. He would like feedback on his code and is considering either asking a colleague for an in-person code review or uploading the code to a collaborative code review program. What would be the most likely advantage of using collaborative code review software? Choose 1 answer:Choose 1 answer: Ans- Multiple colleagues could see his code and give feedback on ways to improve it. What is a benefit of online collaborative software? Ans- It allows for groups to work together even if they are not in the same geographic location. A novelist is writing a new book. Her new editor asks her to use an online collaborative document editor to draft the book. She has some privacy concerns, however. Which of her privacy concerns are the most valid? ️Note that there are 2 answers to this question. Ans- The editor can see how much time she spends writing in the document. The editor can see her typos and earlier drafts of the document. For a project called "The Sheep Market", Aaron Koblin collected drawings of sheep from strangers on the Internet. He posted the task on the Amazon Mechanical Turk crowdsourcing platform for 2 cents, and over the course of 40 days, at a rate of about 11 sheep per hour, he collected 10,000 drawings from 7,599 IP addresses. Which of these is true about his decision to crowdsource the sheep drawings? Ans- Aaron could expect diversity in the style of the sheep drawings. Threadless is an online store that sells shirts with user-submitted designs. Anyone can register and submit a design, then community members score the designs submitted each week, and Threadless picks the top designs to sell in their store each week. Designers receive royalties for every shirt sold. Here's one example of a submitted user design: What situation would be least likely to threaten the success of the Threadless crowdsourcing model? Ans- If a large number of new designers suddenly join the community and submit double the number of designs. Globe at Night is an international citizen science project with the goal of measuring the night sky brightness and understanding the impact of light pollution. Volunteers report the night sky brightness using an online interface: This map visualizes the 8,069 observations recorded in 2018: Which of these is not a benefit of running this as a citizen science project? Ans- The observations recorded by volunteers will be higher quality than observations recorded by professional astronomers. DreamLab is a research project with a goal of coming up with better treatments for cancer patients. How it works: Anyone can download the DreamLab app onto their smartphone. The app will run computer simulations while their smartphone charges at night. The app send results back to the research team. What is the primary benefit of enabling people to run the simulations on their smartphone? Ans- The researchers do not have to pay for the computing power used by the smartphones. The One Million Masterpiece is a global art project with the goal of collecting tiny digital pictures from online contributors and stitching them together into a giant canvas. Which of these is most likely true about the contributed pictures to the project? Ans- There will be a variety in what the pictures look like. A team of songwriters is working on song lyrics together for a pop star. They're trying to decide between two ways of working: Working on documents in a desktop text editing application and emailing their latest version of the document after editing them. Using an online collaborative text editor with real-time updates and revision history. Which of these is a benefit of using the online collaborative text editor? Ans- With the online collaborative text editor, they can iterate more quickly on the lyrics and even edit at the same time. The privacy policy for Twitter starts with this paragraph: Twitter is public and Tweets are immediately viewable and searchable by anyone around the world. We give you non-public ways to communicate on Twitter too, through protected Tweets and Direct Messages. You can also use Twitter under a pseudonym if you prefer not to use your name. This is a screenshot of the privacy settings for a particular user: Based on the policy and that setting, what is true about the user's tweets? Ans- Their tweets are not publicly viewable. Zooniverse is an initiative across multiple universities that runs many online citizen science projects. In the Plant Letters project, volunteers transcribe scanned images of letters to botanists at the Botanic Garden in the University of Coimbra, Portugal. Each letter is transcribed by multiple volunteers, so that mistakes made by a single volunteer won't be in the final transcription. This screenshot shows the letter transcribing interface: The university could have run this project in Portugal with local volunteers, but they chose to run it online. Which of these does not describe a benefit of running Plant Letters as an online citizen science project? Ans- Online volunteers will generally be of a higher quality than local volunteers. The Griffin family lives in multiple states, so they decide to use an online collaborative website to create their annual photo book. The website lets each of them upload photos from their computer, and then they can all arrange the photos into pages. What valid privacy concerns might the family members have? ️Note that there are 2 answers to this question. Ans- The company that created the website now has a copy of the family's personal photos on their web servers. One of the family members could accidentally upload a photo that others did not want to be shared. A team is designing a new user interface for a website and deciding between two formats for collaboration: An in-person brainstorming session using paper, markers, and post-its A digital document in a productivity software suite that allows for simultaneous editing and comment threads What would be the benefit of collaborating with the digital document? Ans- It would accomodate team members that could not attend the session in person. The goal of the MilkyWay@Home volunteer computing project is to build an accurate model of the Milky Way by simulating the composition of dark matter around the galaxy. Once volunteers sign up for the project and download the application, their computer will run models of the galaxy whenever it has spare CPU cycles. The results are sent back to the project's central database, so that scientists can identify the models with the best fit and publish the results. What's the primary benefit of enabling volunteers to run the models on their home computers? Ans- The researchers do not have to pay for the computing power used by the home computers. Yuto posts a tweet on his Twitter account with a photo of himself taking a bubble bath. A few months later, while preparing for a job interview, he decides to delete the photo in case the job recruiters find it. Once Yuto deletes the tweet, can the recruiters find the photo? Ans- Yes, if the tweet was archived by a web archive service or uploaded elsewhere by others who saw it. Kira sends an email message to a teammate about a conflict she's having with their boss. They later discover that the boss found out about the contents of the message. What's the most likely way that happened? Ans- The teammate forwarded the message to the boss. In 2013, Chicago entrepreneurs released a mobile application called Crowdfynd. People who lost items could post information on the application (description, photo, approximate location), and other people could post any items they found. Which scenario would be least likely to threaten the usefulness of the crowdfinding application? Ans- If some users of the application were people who just wanted to see what items were lost and found. Lavanya is a startup founder who is working on the design of a smart bracelet. She needs to sketch out some ideas with a designer who lives in another country and wants to try using an online collaborative whiteboarding program for their design session. Lavanya is nervous about their design ideas being lost or getting into the wrong hands, however. Which of these is not a way that the whiteboarding data could be lost or stolen? Ans- Lavanya could accidentally drop her laptop, resulting in a damaged hard drive and erased data. Benjamin is writing code for a medical software company. He would like feedback on his code and is considering either asking a colleague for an in-person code review or uploading the code to a collaborative code review program. What would be the most likely advantage of using collaborative code review software? Ans- Multiple colleagues could see his code and give feedback on ways to improve it. ClimatePrediction is a volunteer computing project with the goal of understanding how climate change is affecting the world currently and how it may affect it in the future. Once volunteers sign up for the project and download the application, their computer will run climate models whenever it has spare CPU cycles. The data generated by the climate models are sent back to the project's central database and scientists use the results in their research. What's the primary benefit of enabling volunteers to run the climate models on their home computers? Ans- The researchers do not have to pay for the computing power used by the home computers. Be My Eyes is a free app for visually impaired people to get help seeing the world. When a user needs visual assistance, they can be quickly connected to a sighted volunteer from a network of a few million volunteers. Here are some examples of questions that volunteers can help answer: What situation would be least likely to negatively affect the usefulness of the app? Ans- A huge number of volunteers sign up to be the sighted volunteers, and there are more volunteers than people that need help. In April 2020, Twitter users started a trend of posting their high school graduation photos. The FBI issued a warning soon after about the risks of posting those photos on public social media accounts. Which of these is not a potential risk of posting an old graduation photo? Ans- An attacker could download the image and threaten to share it with the press unless the user gives them money. In 2015, programmer Brendon Ferris created a website to crowdsource a melody. Visitors could vote for the next note in the melody's sequence, and once there were enough votes, the website would store the top-voted note. Which of these is true about his decision to crowdsource a melody? Ans- He could not predict at the start of the project how the final melody would sound. Max decides to work with a tax accountant on putting together his taxes, since he finds it overwhelming to do all the paperwork himself. The accountant suggests using an online collaborative spreadsheet program to collect all the information necessary. Max is concerned that his tax information may get lost or stolen, however. Which of these is not a way that the tax information in the spreadsheet may get lost or stolen? Ans- Max's partner could borrow his laptop and accidentally delete the tax information from the hard drive. IPv4 is the first standardized version of the Internet Protocol. IPv4 is gradually being replaced by IPv6, a more scalable version of the protocol. Which feature of IPv4 makes it a less scalable system? Ans- Each IPv4 address is a 323232-bit number. That's enough space for 2^{32}2322, start superscript, 32, end superscript (4.3 times 10^{9}4.3×1094, point, 3, times, 10, start superscript, 9, end superscript) possible addresses for Internet-connected computing devices (less than the current number of Internet-connected devices). The following table compares two data transport protocols from the suite of protocols powering the Internet. What are the most likely identities of Protocol 1 and Protocol 2? Ans- Protocol 1 = TCP, Protocol 2 = UDP A new high school is built and needs to be connected to the Internet. The IT administrator found these four local providers for Internet services: Which of these comparisons between the providers is correct? Ans- SpectralWeb can transfer 2 times more data per second than TopSat. Which of the following is the best description of an IP address? Ans- A number that identifies Internet-connected devices/ A number assigned to a computing device that can receive data on the Internet Which of these is a way that the Internet Protocol (IP) contributes to Internet communications? Ans- It describes an addressing scheme to uniquely identify each node on the Internet./ It describes how to route packets of data around the Internet, from router to router, based on a destination address./ It describes a way to uniquely identify computing devices that are connected to the Internet so that messages can be sent to them. The following passage describes the Internet but contains a missing adjective: The Internet is a loosely-organized international collaboration of interconnected networks. Even though the computing devices belong to a wide range of companies, individuals, and governments, all the devices on the Internet can successfully communicate with each other thanks to the <???> nature of Internet protocols. What is the most appropriate adjective to replace <???>? Ans- open Logan typed this URL in his browser's address bar: Which of these protocols were used by the browser in fetching and loading the webpage? ️Note that there may be multiple answers to this question. Choose all answers that Ans- TCP IP HTTP Which diagram best illustrates the process of routing a single packet from a sender to a receiver on the Internet? Ans- one with the arrow pointing to the bottom row and stays on the bottom row then goes up and down to the computer. Which of these statements about the digital divide is true? Ans- Even for-profit companies can take actions to help bridge the digital divide. Which of these configurations does NOT represent a computer network of six devices? The blue rectangles indicate devices and the green lines indicate a communication path between the devices. Ans- one that is not attached so it lowkey looks like a sandwhich Which of these best describes the fault tolerance of routing on the Internet? Ans- There are multiple routes for each IP packet to follow. A packet can be re-routed if a path becomes unavailable. An intranet is a private network set up for an organization like a company or university. Here's an intranet with six routers labeled A - F: Diagram with 6 routers labeled A through F and 7 lines connecting them. There are no arrows on any of the lines. Line goes from A to B Line goes from A to C Line goes from B to C Line goes from C to E Line goes from C to F Line goes from D to E Line goes from E to F An intranet is more secure, because computers can communicate without using the publicly accessible Internet, but it is often not as fault-tolerant. Imagine that router B needs to send a message to router D. Which of the following situations will lead to the message failing to arrive? ️Note that there are 2 answers to this question. Ans- If these two connections go down: C to E, and F to E. If the connection between D and E goes down. There are some times of the year where online shoppers make significantly more purchases. One of those times is Cyber Monday, the Monday after the US Thanksgiving holiday. Large shopping websites may prepare in advance to make sure their infrastructure is scalable to handle Cyber Monday shoppers. Assuming a store where approximately 50% of shoppers make a purchase, which of these charts represent an online store that scales well to meet the demand of a surge of shoppers? The purple line shows all the shoppers on the website, while the green dashed line shows the number of sales. Ans- purple going up green also just going up Many people worry about what would happen if either the Internet or the World Wide Web went down (if they suffered a complete outage and were unreachable). Which of these predictions is correct? Ans- If the Internet went down, the World Wide Web would also go down, since the WWW relies on the Internet protocols. Makayla used a tool to measure how many bits she could transfer over her classroom's Internet connection. This table shows the bits transferred each second: According to those measurements, what is the bandwidth of the connection? Ans- 5500 bits/s The Internet Protocol (IP) includes a rule that each message must include a source IP address and a destination IP address. What are the likely consequences of a computer sending a message that does not follow that IP rule? text{I}Istart text, I, end text. The administrator of the device will receive a message from the Internet Protocol Authority (IPA) reminding them of the proper addressing format. .....................
Written for
- Institution
- Khan
- Course
- Khan
Document information
- Uploaded on
- April 21, 2024
- Number of pages
- 33
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
khan academy unit computing innovations updated 2
-
aisha sends an email message to her classmate jama
-
zaniyah wants to share photos of her newborn baby
-
which tweet would be the least concerning to the
Also available in package deal