This quiz covers videos (Search Algorithms, Recursion, Artificial Life

advertisement
This quiz covers videos (Search Algorithms, Recursion, Artificial Life and
Interactions between Agents), readings from “Blown to Bits” and labs from weeks
11 and 12.
This quiz consists of 10 multiple choice questions and has a time limit of 25
minutes. Note: Blackboard will show that the quiz is 3 hours. This, however, is for
special cases. Baring special circumstance, the time limit is 25 minutes which will
be enforced by the exam proctor. This quiz must be taken in a single sitting.
Note: students with IEPs accommodations that include extended exam time
should arrange to take the exam during a single time block that is sufficient to
accommodate the student’s needs.
Vocabulary: As this is a college course, the general reading level is at the
college level. To help bring students up to this reading level, each student may
use a non-electronic English and/or English/other language dictionary. Note that
this must be a non-electronic dictionary as electronic dictionaries (i.e. the
Internet) grants access to far too many resources well beyond a traditional
dictionary.
Each student may use one 8.5x11 sheet of hand written notes (both sides).
Students may NOT use cell phones, smart phones, textbooks, NetLogo, Internet
(other then to access the exam itself in Blackboard Learn), or neighbors.
Once a question has been answered, the student may not return to the question
(this is enforced by the Blackboard Learn software).
Password: TurtlesForever
Week 12 Possible Quiz Questions:
1. Which of the following best describes a binary search?
a) ***Starting with a sorted list, divide the list in half, compare the value at the
halfway point with the search item to see which half contains the search item.
Repeat this process with the smaller half until the item is found.
b) Convert the list to binary numbers and use a computer algorithm to locate the
item.
c) Convert the list to a sequence of ones and zeros. Then examine each
sequence until you find the item you are looking for.
d) For each item in the list, check to see if it is the desired item. If yes, stop the
search. If no, continue searching. Repeat this until the search item is found.
e) Convert the list to binary numbers. Then, compare each pair of adjacent
numbers from left to right. If the left number in a pair is greater than the right
number, then swap the numbers. Repeat this until the search item is found.
2. Which of the following is a recursive definition of factorial?
a) n! = n * (n-1) * (n-2) * ... * 1. For example: 5! = 5 * 4 * 3 * 2 * 1.
b) ***n! = n * (n-1)! , except when n=1, then 1! = 1. For example: 5! = 5 * 4!
c) n! = n + (n-1) + (n-1) + ... + 1. For example: 5! = 5 + 4 + 3 + 2 + 1.
d) n! = (n-1) * (n-2), except when n=1, then 1! = 1. For example: 5! = 4 * 3.
e) n! = (n-1) * (n-2), except when n=1 or n=1, then n! = 1. For example: 5! = 4 * 3.
3. A recursive computer program is one that ___________
a) ***Has a procedure that calls itself.
b) Has a procedure with a loop.
c) Has a procedure with a nested loop.
d) Has a procedure with an infinite loop.
e) Has a procedure without any loops.
4. What is the final value of n in the NetLogo code below:
let n 5
if (n > 1)
[ set n (n - 1)
]
set pen-size n
a.
b.
c.
d.
e.
-1
1
3
***4
5
5 After creating one turtle with its pen down, which best describes the pattern that
will be drawn:
to go
ask turtles
[ let t 10
while [t > 0]
[ set pen-size t
forward t
right 10
set t (t - 1)
]
]
end
a.
b.
c.
d.
e.
***A spiral where the lines get progressively thinner.
A figure 8 where the lines all have the same thickness.
A figure 8 where the lines get progressively thinner.
A square where the lines get progressively thinner.
A square where the lines all have the same thickness.
6) In a recursive program, the recursion stops when a certain test condition is
met. In the recursive program below, which line contains the stopping test
condition?
to spiral-recursive [stepStop]
if (stepStop < 0.01)
[ die
]
forward stepStop
right 45
spiral-recursive (stepStop * 0.9)
end
a.
b.
c.
d.
e.
to spiral-recursive [stepStop]
***if (stepStop < 0.01)
forward stepStop
spiral-recursive (stepStop * 0.9)
end
7) In Dr. Irene Lee’s video on Agent-Agent interactions, she what she defines as
“collision detection” can be implemented in Netlogo as:
a) collision = on
b) set collision true
c) ***count turtles-here > 1
d) A turtle “smacking” into another turtle.
e) if (collision = true)
8) In Professor Ackley’s video on artificial life, he presents a number of definitions of
life and points out that not all definitions of life include the same set of things. One of
the definitions he presents is: “Life is dynamically preserved pattern”. Which of the
following does he argue is included, at least to a small extent, in this definition?
a) Mount Rushmore
b) A crystal
c) Fire
d) ***An eddy (a small whirlpool) in a brook.
e) A computer
9) In chapter 3 of “Blown to Bits” by Lewis, Ledeen and Abelson, they claim “What
You See Is Not What the Computer Knows”. Which of the following is an example
they give of this?
a) Computers contain vast amounts of information, but do not “understand” or have
emotions about the information. Therefore, computers do not actually “know” it.
b) *** The U.S. government published a report with sensitive security information
blacked out, yet a civilian Internet blogger was able to read and publish the blacked
out information.
c) That what the computer knows is a sort of miniaturized duplicate of what is
shown in a “WYSIWYG” (What You See Is What You Get) editor.
d) The Internet contains such a vast amount of information that no single human
can actually see it all.
e) Computers are tricky and while they always show the truth, the truth you see is
not always the truth they have in mind.
10) In chapter 3 of “Blown to Bits” by Lewis, Ledeen and Abelson, they point out that
documents created on computers often contain meta data. This meta data ___________
a) is difficult, if not impossible, to forge. Therefore, it is often used as evidence in
court cases.
b) can only be read by the NSA (U.S. National Security Agency) or by other
organizations with access to large networks of supercomputers.
c) *** in a document released by the British government, was used by the press to
show that the British government was lying about the document’s authors.
d) is illegal in most countries, but the U.S. government is subversively trying to push
it through as part of a so called “Free Trade” agreement.
e) is currently illegal in the United States, but special interest groups in the music
and game industries are pushing for its use to protect their intellectual property.
Download