
Beaver10001000
Quiz
•
Computers
•
10th Grade
•
Hard
Marta Gjiri
FREE Resource
Enhance your content
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 4 pts
Skyline
Story
A skyline consists of 14 towers as shown. The height of a tower is measured from the bottom of its base to its highest point, including any flagpoles or antennas.
Question
If the towers are listed from shortest to tallest, which tower would be 10th in the list?
Answer explanation
Explanation of Answer
Notice that the skyline consists of one sequence of towers that gets taller from left to right followed by a second sequence of towers that gets taller from left to right. Also notice that the last two towers in each of these sequences make up the four tallest towers overall. (This did not have to be true. It could have been the case, for example, that the four tallest towers were all at the end of one of the two sequences.)
Since there are 14 towers in total, if we ignore the four tallest towers, the tallest remaining tower will be 10th in the list. The tallest remaining tower is the one in Option A.
Connections to Computer Science
In this task, you are asked to determine which tower would be the 10th in a list of towers if all the towers were ordered by height. Arranging items in order is called sorting.
There are many well-known sorting algorithms and this task is related to the mergesort algorithm. The key idea behind this technique is to separately sort the two halves of the items. Then you must merge these two sorted lists to produce one completely sorted list. If you chose to solve this problem by sorting all 14 towers, then you could have been merging the sorted towers in the left half with the sorted towers in the right half.
Country of Original Author
Canada
2.
MULTIPLE CHOICE QUESTION
30 sec • 4 pts
Library Books
Story
Beavertown Library has only a small pile of books. When a beaver wishes to borrow a book, they take the book that is on the top of the pile and record their name. When a beaver returns a book, they place their book on the top of the pile and record their name again.
At the beginning of the week the pile of books was arranged as shown: pic 1
The library’s records at the end of the week show the following information: pic 2
Question
Which book did Cato borrow?
Charlotte’s Web
Curious George
Go, Dog, Go!
The Hobbit
Answer explanation
Explanation of Answer
At the beginning of the week, Alba borrowed a book and then Felix borrowed a book. Looking at how the books were arranged at the beginning, this tells us that Alba borrowed Charlotte’s Web and Felix borrowed Curious George.
At the end of the week, Cato borrowed a book immediately after Felix returned a book. Since books are taken from the top of the pile and returned to the top of the pile, this means Cato borrowed the same book that Felix returned. Since Felix borrowed only one book that week, we know that he must have returned Curious George. Thus, Cato borrowed Curious George.
It is interesting to notice that we do not need to consider all of the books that were borrowed and returned. For example, it does not matter which book Marta borrowed.
Connections to Computer Science
In this problem, you are asked to keep track of which books are available as they are borrowed and returned. The key property is that the last book returned is the first book that must be borrowed the next time someone borrows a book. We say that this follows the last-in first-out or LIFO principle.
In computer science, a collection of items that follows this principle is called a stack. It is one fundamental way that a collection can be stored. In particular, a computer program will often be broken into smaller pieces called subroutines. The order in which these subroutines are executed is often determined using a stack. Another example of a stack is a web browser’s back button: the last page visited is the first page revisited when the back button is pressed.
Country of Original Author
Canada
3.
MULTIPLE CHOICE QUESTION
30 sec • 4 pts
Locked Chests
Story
Five different chests are engraved with letters as shown: pic 1
Question
What is the lost label?
496
639
436
649
Answer explanation
Explanation of Answer
Chest BEB is the only one where the first and the third letter match. So, this chest matches key 636, which is the only key where the first and third digit match. So we know that the letter B corresponds to the digit 6 and the letter E to the digit 3.
LetterABERDigit 63
Chest AER is the only one that ends with a letter other than B. So, this chest matches key 934, which is the only key that ends with a digit other than 6. Thus, the letter A corresponds to the digit 9 and the letter R to the digit 4.
LetterABERDigit9634
Now that we know all the letter-digit pairings, we can match the remaining chests to keys, and discover that chest RAB matches key 496, which is missing.
Connections to Computer Science
Cryptography is an area of study that lies at the intersection of computer science and mathematics. The mapping between digits and letters in this task is based on the monoalphabetic substitution cipher example called the Vatsyayana cipher. The idea came from an Indian text from the 4th century AD. The Vatsyayana cipher creates unique pairs for the alphabet letters – a letter always matches another letter and each letter can be used only in one pair. During encryption of an original message one letter is directly substituted by a paired letter. Interestingly, the exact same process is used to decrypt the message. By directly substituting a letter in the encrypted message with its paired letter, the original message can be retrieved. This encryption method is easy to crack as, once someone is sure about a letter pair(s), they can decrypt all other pairs.
Modern cryptographic techniques, such as those that are used for banking transactions through the internet, use much more advanced computational methods that rely on the difficulty of hard mathematical problems, such as factoring a number which has two very large prime factors.
Country of Original Author
Cyprus
4.
MULTIPLE CHOICE QUESTION
30 sec • 4 pts
Water Bottles
Story
Dani is required to entirely fill as many empty water bottles as possible using a 50 litre tank.
Suppose she is given the following 10 empty bottles where each bottle is labelled with the number of litres it can hold.
Question
What is the maximum number of bottles that Dani can fill entirely?
4
7
8
10
Answer explanation
Explanation of Answer
Dani can approach this task by first arranging the bottles from smallest to largest (in terms of how many litres they can hold).
At any point, if Dani has two empty bottles that can hold different amounts of water, there is no advantage to filling the larger bottle. So Dani can now fill the bottles one by one from smallest to largest. The smallest 7 bottles can be filled entirely using litres of water. The tank will have 8 litres left but all the remaining bottles can hold more than 8 litres, so no more bottles can be filled entirely.
Connections to Computer Science
This problem can be solved using a greedy strategy. For this problem, we can fill the bottles in sorted order according to the amount of water each bottle holds.
More generally, a greedy strategy involves making the best choice at each stage in the hopes of finding the best solution. In this way, it makes one greedy choice after another, reducing the given problem into a smaller one.
However, not every problem can be solved optimally using a greedy strategy. For example, knapsack problems usually do not have optimal solutions that can be found using a greedy strategy. Nevertheless, the greedy strategy is still useful because it is easy to describe and implement and often gives a good approximation to the optimal solution.
Country of Original Author
Thailand
5.
MULTIPLE CHOICE QUESTION
30 sec • 4 pts
Ancient Texts
Story
Symbols form the titles of ancient texts. Each type of symbol is associated with a digit as shown below. Some different symbols are associated with the same digit.
Answer explanation
Of the options, the only text that has the special number 6944 is the one in Option C.
Connections to Computer Science
When storing information, one important goal is to be able to quickly retrieve a particular piece of information. One method to accomplish this goal is to store information in a hash table.
A hash table consists of several locations where we can store information. The position of where to store a piece of information is determined by a hash function. For this task, the hash function for the symbols, which were the keys, was to assign them to one of the digits from 0 to 9, the values.
As was also realized in solving this task, sometimes there are collisions in the hash function, where two keys yield the same value. In order to deal with this, various collision resolution strategies have been developed to maintain efficiency. Hashing can provide extremely efficient lookup times even with a massively large amount of data.
Country of Original Author
Taiwan
6.
MULTIPLE CHOICE QUESTION
30 sec • 6 pts
Part B
Beaver Intelligence Agency
Story
For security reasons, a secret message was broken into four parts (1, 2, 3, and 4). Copies of these parts were then sent to the divisions and subgroups of the Beaver Intelligence Agency (BIA) as shown: pic 1
Labels on the copies of the message parts indicate who has access to it:
“” means everyone in the BIA has access to this copy.
“#” means the division that receives it and the division’s subgroups (indicated by arrows) have access.
“=” means only the division or subgroup that receives it has access to this copy.
Question
Which one of the following has access to all four parts of the message?
Fox Subgroup
Wolf Division
Rabbit Division
Chipmunk Subgroup
Answer explanation
Explanation of Answer
Parts labelled with “” are accessible to everyone. We can visualize this by cloning each part labelled with “” and placing a clone within every division and subgroup. The Fox Subgroup holds part 4 labelled with “”. Here is what the BIA looks like after cloning this part: pic 1
Parts labelled with “=” are only accessible to the receiving division or subgroup so we don’t make clones of parts labelled with “=”. Looking at the BIA after all the clones have been made, we see that only the Chipmunk Subgroup has access to all four parts of the message.
Connections to Computer Science
There are various programming paradigms that different programming languages follow. For example, there are imperative programming languages (such as C++ or Python), functional programming languages (like Scheme), and object-oriented programming languages (like Java). In object-oriented programming (OOP), an object is a way of storing both data and particular operations to access or transform that data. Most object oriented programming languages are class-based, meaning that objects are instances of classes.
In this task, the divisions and subgroups represent classes. Every class has access to the relevant objects with the corresponding type of visibility. Public objects (those marked with a ) can be accessed from every class in the program. Private objects (those marked with a “=”) are only visible and changeable by the class itself. Protected objects (#) can be accessed by the class itself and by its subclasses. In this task, the subgroups can read “#" messages from their division leader.
Different types of visibility are very useful for organizing a program. A class does not have to deal with objects and properties from other classes, and access to information can be carefully controlled. In this way, some programming errors can be avoided.
Country of Original Author
Austria
7.
MULTIPLE CHOICE QUESTION
30 sec • 6 pts
Mountain Climber
Story
Binsa is climbing in the mountain range shown which has 11 peaks each of a different height.
Binsa climbs by starting at the top of a random peak, then looking left and right. If she sees a peak immediately beside her that is higher than the one she is currently on, she climbs to the top of this higher peak. If two neighbouring peaks are both higher, she climbs to the top of the higher one. She continues to do this until there is no higher peak immediately beside her.
Question
From how many of the peaks (including the highest peak) will Binsa reach the highest peak?
3
4
6
7
Answer explanation
Explanation of Answer
We label the peaks as shown.
Notice that the highest peak is .
If Binsa starts on she will not climb any further since the peak on her left and the peak on her right are both lower. She will not reach the highest peak from here. In addition, if she starts on any peak to the left of she will not reach the highest peak since she will not be able to climb past .
If Binsa starts on , both of the neighbouring peaks are higher so she will climb the higher one, , and reach the highest peak.
If Binsa starts on , she has reached the highest peak.
If Binsa starts on , she will climb to and reach the highest peak.
If Binsa starts on , both of the neighbouring peaks are higher so she will climb the higher one, .
From , Binsa will not climb any further since the peak on her left and the peak on her right are both lower. She will not reach the highest peak from here. In addition, if she starts on any peak to the right of she will not reach the highest peak since she will not be able to climb past .
Thus, there are exactly 3 peaks from which Binsa will reach the highest peak. They are , , and .
Connections to Computer Science
The process that Binsa follows is called a greedy algorithm. The key idea in a greedy algorithm is to make a choice at each step based on “local information", regardless of whether there is a better option that might yield a better solution. In this task, even though Binsa is trying to reach the highest peak overall, she decides what to do next only by looking at the two mountains right beside her. That is, instead of trying to look for the global maximum, instead she looks for a local maximum.
Greedy algorithms do not always correctly solve problems, but when they do, they usually do so very efficiently. For example, the change making problem yields a fast greedy solution: in most currency systems, making a certain amount of change can be done by repeatedly using a coin of as large a value as possible. Stopping this process when the desired total is reached, will always minimize the number of coins used.
Unfortunately, not every greedy algorithm gives the best answer. However, even if a greedy algorithm is incorrect, sometimes they can be used to find a solution that is “good enough". This is called an approximation algorithm.
A specific type of greedy algorithm used in artificial intelligence is called the hill-climbing algorithm. The name of this technique comes from the idea behind this task. Additionally, the story behind this task is related to an idea from geography called topographic isolation. One of the great things about studying computer science is how it can be applied to almost any other subject area.
Country of Original Author
Canada
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
19 questions
Informatika Kelas 5 Bab 2
Quiz
•
5th Grade - University
15 questions
Начала программирования на языке Паскаль
Quiz
•
8th - 11th Grade
13 questions
RAM&HDD/SSD
Quiz
•
10th - 12th Grade
15 questions
Chapter 3: Storage devices and media (Part 2):
Quiz
•
10th - 11th Grade
10 questions
Fundamentals of Algorithms
Quiz
•
10th Grade
11 questions
Процедуры и функции
Quiz
•
10th Grade
10 questions
Espacio Opcional 3er Año Pío XII
Quiz
•
10th Grade
10 questions
10 класс повторение CSS and Внедрение мультимедиа
Quiz
•
10th Grade
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
11 questions
NEASC Extended Advisory
Lesson
•
9th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
10 questions
Boomer ⚡ Zoomer - Holiday Movies
Quiz
•
KG - University
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
20 questions
Multiplying and Dividing Integers
Quiz
•
7th Grade