AP CSP Unit 4 Test Review (code.org)
Quiz
•
Computers
•
11th - 12th Grade
•
Practice Problem
•
Medium
Mr Kershaw
Used 159+ times
FREE Resource
About this resource
This quiz thoroughly covers the core concepts from AP Computer Science Principles Unit 4, which focuses on computing systems and networks, cybersecurity, and data analysis. The content is designed for 11th and 12th grade students and requires understanding of fundamental cybersecurity principles, encryption methods, data concepts, and algorithmic thinking. Students need to grasp the differences between symmetric and asymmetric encryption, understand how public key cryptography works with separate keys for encryption and decryption, and recognize various cybersecurity threats including DDoS attacks, phishing scams, and brute-force attacks. The quiz also assesses knowledge of heuristic algorithms, metadata analysis, big data processing challenges, and basic modular arithmetic operations. Students must understand when approximate solutions are preferable to exact solutions for computational efficiency and how network security protocols like HTTPS protect data transmission. Created by Mr Kershaw, a Computers teacher in US who teaches grade 11,12. This comprehensive review assessment effectively prepares students for their AP Computer Science Principles exam by covering essential cybersecurity and data analysis concepts. Teachers can deploy this quiz as a formative assessment tool to gauge student understanding before the unit test, assign it as homework to reinforce key vocabulary and concepts, or use it as a warm-up activity to activate prior knowledge before advancing to more complex topics. The varied question formats help students practice both conceptual understanding and practical application of cybersecurity principles they'll encounter on the AP exam. This assessment aligns with College Board's AP Computer Science Principles standards, particularly those addressing computing systems and networks (CSN), data and analysis (DAT), and the impacts of computing (IOC), ensuring students develop the critical thinking skills needed to analyze how computing innovations affect security, privacy, and data processing in our interconnected world.
See more
Student preview

21 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following programs is most likely to benefit from the use of a heuristic?
A program that calculates a student's grade based on the student's quiz and homework scores.
A program that encrypts a folder of digital files
A program that finds the shortest driving route between two locations on a map.
A program that sorts a list of numbers in order from least to greatest.
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following has the greatest potential for compromising a user's personal privacy?
A group of cookies stored by the user's Web Browser
The IP address of the user's computer
The user's email address
The user's public key used for encryption
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
when a cellular telephone user places a call. The carrier transmits the caller's voice as well as the voice of the person who is called. The encoded voices are the data of the call. In addition to transmitting the data, the carrier also stores metadata. The metadata of the call include information such as the time the call is placed and the phone numbers of both participants. For which of the following goals would it be more useful to computationally analyze the metadata instead of the data?
I. To determine if a caller frequently uses a specific word
II. To estimate the number of phone calls that will be placed next Monday between 10:30 AM and noon.
III To generate a list of criminal suspects when given the telephone number of a known criminal.
I only
II only
II and III only
I, II, and III
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A certain computer game is played between a human player and a computer-controlled player. Every time the computer-controlled player has a turn, the game runs slowly because the computer evaluates all potential moves and selects the best one. Which of the following best describes the possibility of improving the running speed of the game.
The game's running speed can only be improved if the game is played between two human players instead of with the computer-controlled player.
The game's running speed might be improved by using a process that finds approximate solutions every time the computer-controlled player has a turn.
The game's running speed cannot be improved because computers can only be programmed to find the best possible solution.
The game's running speed cannot be improved because the game is an example of an algorithm that does not run in a reasonable time.
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following best describes a Distributed Denial of Service (DDoS) attack?
An attempt by a country to deny its citizens access to the Internet.
An attempt to deny users access to a Web site's resources by flooding the Web site with requests from multiple systems.
An attempt by one user to deny service to another by posting material on a social network.
An attempt by a user of the Internet to get private information from a secure database.
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Quantities, characters, or symbols that are the inputs and outputs of computer programs.
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is least likely to indicate a phishing attack?
An email from your bank asks you to call the number on your card to verify a transaction.
An email from a merchant asks that you click on a link to reset your password.
An email from a utility company asks you to enter your date of birth and social security number for verification purposes.
An email that indicates you have won a large sum of money and asks you to enter your bank account number so that money can be transferred to you.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade