AP-CSP Unit 4 Test Review

AP-CSP Unit 4 Test Review

11th - 12th Grade

21 Qs

quiz-placeholder

Similar activities

3D Objects - Terms & Transfomations

3D Objects - Terms & Transfomations

6th Grade - Professional Development

20 Qs

Web design

Web design

11th Grade

20 Qs

PSTS Administrasi Infrastruktur Jaringan Kelas XII TKJ

PSTS Administrasi Infrastruktur Jaringan Kelas XII TKJ

12th Grade

20 Qs

Security and Ethics

Security and Ethics

9th - 12th Grade

17 Qs

Computer System

Computer System

9th - 11th Grade

21 Qs

flowol week 3

flowol week 3

9th - 12th Grade

17 Qs

2.3.1 Graph Traversal & Path Finding Algorithms

2.3.1 Graph Traversal & Path Finding Algorithms

12th Grade - University

20 Qs

2021.10.15_ Đề kiểm tra tin học 12

2021.10.15_ Đề kiểm tra tin học 12

12th Grade

20 Qs

AP-CSP Unit 4 Test Review

AP-CSP Unit 4 Test Review

Assessment

Quiz

Computers

11th - 12th Grade

Medium

Created by

R M

Used 623+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following programs is most likely to benefit from the use of a heuristic?

A program that calculates a student's grade based on the student's quiz and homework scores.

A program that encrypts a folder of digital files

A program that finds the shortest driving route between two locations on a map.

A program that sorts a list of numbers in order from least to greatest.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following has the greatest potential for compromising a user's personal privacy?

A group of cookies stored by the user's Web Browser

The IP address of the user's computer

The user's email address

The user's public key used for encryption

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

when a cellular telephone user places a call. The carrier transmits the caller's voice as well as the voice of the person who is called. The encoded voices are the data of the call. In addition to transmitting the data, the carrier also stores metadata. The metadata of the call include information such as the time the call is placed and the phone numbers of both participants. For which of the following goals would it be more useful to computationally analyze the metadata instead of the data?


I. To determine if a caller frequently uses a specific word

II. To estimate the number of phone calls that will be placed next Monday between 10:30 AM and noon.

III To generate a list of criminal suspects when given the telephone number of a known criminal.

I only

II only

II and III only

I, II, and III

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A certain computer game is played between a human player and a computer-controlled player. Every time the computer-controlled player has a turn, the game runs slowly because the computer evaluates all potential moves and selects the best one. Which of the following best describes the possibility of improving the running speed of the game.

The game's running speed can only be improved if the game is played between two human players instead of with the computer-controlled player.

The game's running speed might be improved by using a process that finds approximate solutions every time the computer-controlled player has a turn.

The game's running speed cannot be improved because computers can only be programmed to find the best possible solution.

The game's running speed cannot be improved because the game is an example of an algorithm that does not run in a reasonable time.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Which of the following best describes a Distributed Denial of Service (DDoS) attack?

An attempt by a country to deny its citizens access to the Internet.

An attempt to deny users access to a Web site's resources by flooding the Web site with requests from multiple systems.

An attempt by one user to deny service to another by posting material on a social network.

An attempt by a user of the Internet to get private information from a secure database.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Quantities, characters, or symbols that are the inputs and outputs of computer programs.
Text
Outputs
Inputs
Data

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

Which of the following is least likely to indicate a phishing attack?

An email from your bank asks you to call the number on your card to verify a transaction.

An email from a merchant asks that you click on a link to reset your password.

An email from a utility company asks you to enter your date of birth and social security number for verification purposes.

An email that indicates you have won a large sum of money and asks you to enter your bank account number so that money can be transferred to you.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers