AP Computer Science Review Part 2

AP Computer Science Review Part 2

11th Grade

31 Qs

quiz-placeholder

Similar activities

Assessment Term 2.2 - Y9 U4 Python Search algorithms

Assessment Term 2.2 - Y9 U4 Python Search algorithms

7th - 12th Grade

30 Qs

Hoja de Cálculo Aplicado

Hoja de Cálculo Aplicado

11th Grade

33 Qs

Ôn tập kiểm tra 15 phút môn tin lần 1 kỳ 2 khối 10 MĐ

Ôn tập kiểm tra 15 phút môn tin lần 1 kỳ 2 khối 10 MĐ

9th - 12th Grade

29 Qs

DESAFIO DE LA TECNOLOGIA

DESAFIO DE LA TECNOLOGIA

1st Grade - University

26 Qs

J808 1.5 Planning tools

J808 1.5 Planning tools

10th - 11th Grade

35 Qs

PH1 Jaringan Komputer & Internet

PH1 Jaringan Komputer & Internet

8th Grade - University

30 Qs

Pra PAS Animasi2D

Pra PAS Animasi2D

11th Grade

31 Qs

Hardware and software 1º Bach

Hardware and software 1º Bach

11th Grade

27 Qs

AP Computer Science Review Part 2

AP Computer Science Review Part 2

Assessment

Quiz

Computers

11th Grade

Hard

Created by

James Santiago

Used 7+ times

FREE Resource

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

In the following code segment, assume that the variable n has been initialized with an integer value. Which of the following is NOT a possible value displayed by the program?

artichoke

broccoli

carrot

daikon

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A scientist wants to investigate several problems. In which of the following situations is using a simulation LEAST suitable for solving a problem?

When a scientific study requires performing a large number of trials that need to be conducted very quickly

When it is considered acceptable to make simplifying assumptions when modeling a real-world object or phenomenon

When performing an experiment that would be too costly or dangerous to conduct in the real world

When the solution to the problem requires real-world data inputs that are continually measured at regular intervals

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A store uses binary numbers to assign a unique binary sequence to each item in its inventory. What is the minimum number of bits required for each binary sequence if the store has between 75 and 100 items in its inventory?

5

6

7

8

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A state government is attempting to reduce the digital divide. Which of the following activities has the greatest potential to contribute to the digital divide rather than reducing it?

Providing programs that focus on technology literacy at local libraries

Requiring applicants for government jobs to apply using an online platform

Working with technology companies to offer computing devices at discounted prices to individuals with reduced incomes

Working with telecommunications companies to build network infrastructure in remote areas

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An online gaming company is introducing several new initiatives to encourage respectful communication between players of online games. Which of the following best describes a solution that uses crowdsourcing?

The company allows individual players to endorse fellow players based on courteous interactions. Once a player receives enough endorsements, the player is given free rewards that can be used during gameplay.

The company eliminates chat from gameplay and sets the default chat policy to off. Players must actively turn on chat to converse outside of gameplay.

The company introduces software that monitors all chats. Inappropriate conversations are identified, and players involved in the conversations are banned from the game.

The company updates the acceptable content guidelines to explicitly describe appropriate and inappropriate behavior. All players must electronically sign an agreement to adhere to the guidelines.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Consider the following code segment:

What value is displayed as a result of executing the code segment

3

4

9

12

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system?

A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user's computer using the recorded data.

A user has a very common password for an online banking account. Someone else guesses the password after a few attempts and gains access to the user's account.

A user logs into an unsecure Web site. Someone else is able to view unencrypted log-in information as it is transmitted over the Internet. The user has the same username and password for multiple accounts, so the user's log-in information for multiple systems may be compromised.

A user receives an e-mail that claims to be from the user's bank. The e-mail instructs the user to click on a link to a Web site and enter a username and password to verify an account. Shortly after following the steps, the user discovers that the Web site is fraudulent and that the user's username and password were stolen.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?