
AP CSP Course & Exam Description
Quiz
•
Computers
•
12th Grade
•
Practice Problem
•
Medium
Laura Finke
Used 2+ times
FREE Resource
Enhance your content in a minute
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following best explains how data is typically assembled in packets for transmission over the Internet?
Each packet contains data to be transmitted, along with metadata containing information used for routing the data.
Each packet contains an encrypted version of the data to be transmitted, along with metadata containing the key needed to decrypt the data.
Each packet contains only the metadata used to establish a direct connection so that the data can be transmitted
Each packet contains multiple data files bundled together, along with metadata describing how to categorize each data file.
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Each student that enrolls at a school is assigned a unique ID number, which is stored as a binary number. Te ID numbers increase sequentially by 1 with each newly enrolled student. If the ID number assigned to the last student who enrolled was the binary number 1001 0011, what binary number will be assigned to the next student who enrolls?
1001 0100
1001 0111
1101 0100
1101 0111
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Te following grid contains a robot represented as a triangle. The robot is initially facing right. Which of the following code segments can be used to move the robot to the gray square along the path indicated by the arrows?
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A user purchased a new smart home device with embedded sofware and connected the device to a home network. Te user then registered the device with the manufacturer, setting up an account using a personal e-mail and password. Which of the following explains how a phishing attack could occur against the user of the smart home device?
A vulnerability in the device’s software is exploited to gain unauthorized access to other devices on the user’s home network.
A vulnerability in the device’s software is exploited to install software that reveals the user’s password to an unauthorized individual.
The user is sent an e-mail appearing to be from the manufacturer, asking the user to confirm the account password by clicking on a link in the e-mail and entering the password on the resulting page.
The user’s account is sent an overwhelming number of messages in an attempt to disrupt service on the user’s home network
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following school policies is most likely to have a positive impact on the digital divide?
A school allows students to bring a graphing calculator from home to complete in-class mathematics assignments.
A school allows students to bring a tablet computer to class every day to participate in graded quizzes
A school provides a laptop or tablet computer to all students enrolled at the school
A school recommends that all students purchase a computer with as much processing speed as possible so that projects run faster
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
In a certain country, a person must be at least 16 years old to drive a car and must be at least 18 years old to vote. Te variable age represents the age of a person as an integer. Which of the following expressions evaluates to true if the person is old enough to drive but not old enough to vote, and evaluates to false otherwise?
II only
I and II only
I and III only
II and III only
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A Web site uses several strategies to prevent unauthorized individuals from accessing user accounts. Which of the following is NOT an example of multifactor authentication?
Each employee for a company is issued a USB device that contains a unique token code. To log into a company computer, an employee must insert the USB device into the computer and provide a correct password
After logging into an account from a new device, a user must enter a code that is sent via e-mail to the e-mail address on file with the account.
In order to log into an account, a user must provide both a password and a fingerprint that is captured using the user’s device
When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Sistema Operativo
Quiz
•
1st - 12th Grade
10 questions
Excel
Quiz
•
11th - 12th Grade
15 questions
Vocabulary of Computer
Quiz
•
12th Grade
10 questions
Sprawdź się
Quiz
•
4th - 12th Grade
15 questions
Asesmen Sumatif
Quiz
•
12th Grade
20 questions
Teknik Pengolahan Audio dan Video
Quiz
•
12th Grade
10 questions
Intro to Windows Server 2012
Quiz
•
12th Grade
10 questions
Arduino
Quiz
•
7th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
