
AP computer

Quiz
•
Computers
•
8th - 12th Grade
•
Hard
Oluwanifemi Elesinnla
Used 94+ times
FREE Resource
Student preview

10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The procedure BinarySearch (numList, target) correctly implements a binary search algorithm on the list of numbers numList. The procedure returns an index where target occurs in numList, or -1 if target does not occur in numList. Which of the following conditions must be met in order for the procedure to work as intended?
The length of numList must be even.
The list numList must not contain any duplicate values.
The values in numList must be in sorted order.
The value of target must not be equal to -1.
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following scenarios best exemplifies a phishing attack?
A user connects to a public wireless network. An unauthorized individual intercepts data transmitted on the network, looking for private information that can be used to gain access to the user’s accounts.
A user’s e-mail account is overwhelmed with messages containing large attachments, which causes the account to exceed the maximum amount of data allowed and temporarily prevents the user from sending and receiving new messages.
A user receives an e-mail from a sender offering technical help with the user’s computer. The e-mail prompts the user to start a help session by clicking a provided link and entering the username and password associated with the user’s computer.
A user chooses a weak password for an online account. An unauthorized individual successfully guesses the user’s password from a list of common passwords.
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
An office uses an application to assign work to its staff members. The application uses a binary sequence to represent each of 100 staff members. What is the minimum number of bits needed to assign a unique bit sequence to each staff member?
5
6
7
8
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Consider the following algorithms. Each algorithm operates on a list containing n elements, where n is a very large integer.
I. An algorithm that accesses each element in the list twice
II. An algorithm that accesses each element in the list n times
III. An algorithm that accesses only the first 10 elements in the list, regardless of the size of the list Which of the algorithms run in reasonable time?
I only
III only
I and II only
I, II, and III
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following best describes the impact of Creative Commons?
Creative Commons gives creators of digital content the ability to indicate how their works can be legally used and distributed, enabling broad access to digital information.
Creative Commons gives Internet users the right to legally use and distribute any previously copyrighted work, enabling broad access to digital information.
Create Commons provides lossless transmission of messages, enabling reliable distribution of digital information.
Creative Commons provides private transmission of messages, enabling secure distribution of digital information.
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A biologist wrote a program to simulate the population of a sample of bacteria. The program uses the following procedures.
Procedure Call Explanation
InitialPopulation () Returns the number of bacteria at the start of the
simulation
NextPopulation (currPop) Based on the current value of currPop, returns
the number of bacteria after one hour
Code for the simulation is shown below.
hours ← 0
startPop ← InitialPopulation ()
currentPop ← startPop
REPEAT UNTIL ((hours ≥ 24) OR (currentPop ≤ 0))
{
currentPop ← NextPopulation (currentPop)
hours ← hours + 1
}
DISPLAY (currentPop - startPop)
Which of the following are true statements about the simulation?
I. The simulation continues until either 24 hours pass or the population reaches 0.
II. The simulation displays the average change in population per hour over the course of the simulation.
III. The simulation displays the total population at the end of the simulation.
I only
II only
III only
I and II
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A system is being developed to help pet owners locate lost pets. Which of the following best describes a system that uses crowdsourcing?
A mobile application and collar that uses GPS technology to determine the pet’s location and transmits the location when the owner refreshes the application
A mobile application and collar that uses wireless technology to determine whether the pet is within 100 feet of the owner’s phone and transmits a message to the owner when the pet is nearby
A mobile application that allows users to report the location of a pet that appears to be lost and upload a photo that is made available to other users of the application
A mobile application that transmits a message to all users any time a lost pet is returned to its owner
Create a free account and access millions of resources
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade
Discover more resources for Computers
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade
6 questions
RL.10.1 Cite Evidence

Quiz
•
10th Grade
10 questions
Characteristics of Life

Quiz
•
9th - 10th Grade