
AP CSP Unit 8 Review
Authored by Shane Chavez
Computers
11th Grade
Used 170+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
Includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
computing innovation
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Information about an individual that identifies, links, relates, or describes them.
Information about an individual that identifies, links, relates, or describes them.
sensitive data (SD)
private information (PI)
confidential details (CD)
personally identifiable information (PII)
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
Keyrecording
Keytracing
Keyphishing
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Software intended to damage a computing system or to take partial control over its operation.
Software intended to damage a computing system or to take partial control over its operation.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A wireless access point that gives unauthorized access to secure networks.
A wireless access point that gives unauthorized access to secure networks.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A process of encoding messages to keep them secret, so only "authorized" parties can read them.
A process of encoding messages to keep them secret, so only "authorized" parties can read them.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Empowerment Technologies
Quiz
•
KG - 12th Grade
14 questions
Threat Prevention
Quiz
•
11th Grade
10 questions
Soal Latihan 2 - Scratch
Quiz
•
8th - 12th Grade
10 questions
Scratch
Quiz
•
KG - Professional Dev...
13 questions
Grade 11 Term 4 Practice 1
Quiz
•
11th Grade
15 questions
Cyber Security KS4
Quiz
•
8th - 12th Grade
15 questions
Linux-2 Quiz 2 -- LAMP
Quiz
•
1st - 12th Grade
12 questions
Windows 10 Installation
Quiz
•
11th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
22 questions
El Imperfecto
Quiz
•
9th - 12th Grade
15 questions
ACT Reading Practice
Quiz
•
11th Grade
20 questions
SSS/SAS
Quiz
•
9th - 12th Grade
20 questions
verbos reflexivos en español
Quiz
•
9th - 12th Grade
14 questions
Making Inferences From Samples
Quiz
•
7th - 12th Grade
23 questions
CCG - CH8 Polygon angles and area Review
Quiz
•
9th - 12th Grade
8 questions
Momentum and Collisions
Lesson
•
9th - 12th Grade