Search Header Logo

AP computer

Authored by liu vaz

Instructional Technology

9th Grade

Used 3+ times

AP computer
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

Is a common security attack in which a victim is tricked into giving up personal information or downloading malware

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

3 mins • 1 pt

Is like a box that can hold one value at a time, such as one word, one costume, or one list

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

3 mins • 1 pt

Another name for an item in a list

Evaluate responses using AI:

OFF

4.

OPEN ENDED QUESTION

3 mins • 1 pt

Is the inclusion of back-up connections in case one part fails

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

3 mins • 1 pt

A single unit of data that can only have one of two values

Evaluate responses using AI:

OFF

6.

OPEN ENDED QUESTION

3 mins • 1 pt

Algorithms are not fully reversible; you can reconstruct only an approximation of the original data

Evaluate responses using AI:

OFF

7.

OPEN ENDED QUESTION

3 mins • 1 pt

…is a named sequence of instructions that may take inputs and may report a value. It is also used to hide long lines of code

Evaluate responses using AI:

OFF

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?