
AP Computer Science Review Part 2
Authored by James Santiago
Computers
11th Grade
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
31 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
In the following code segment, assume that the variable n has been initialized with an integer value. Which of the following is NOT a possible value displayed by the program?
artichoke
broccoli
carrot
daikon
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A scientist wants to investigate several problems. In which of the following situations is using a simulation LEAST suitable for solving a problem?
When a scientific study requires performing a large number of trials that need to be conducted very quickly
When it is considered acceptable to make simplifying assumptions when modeling a real-world object or phenomenon
When performing an experiment that would be too costly or dangerous to conduct in the real world
When the solution to the problem requires real-world data inputs that are continually measured at regular intervals
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A store uses binary numbers to assign a unique binary sequence to each item in its inventory. What is the minimum number of bits required for each binary sequence if the store has between 75 and 100 items in its inventory?
5
6
7
8
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A state government is attempting to reduce the digital divide. Which of the following activities has the greatest potential to contribute to the digital divide rather than reducing it?
Providing programs that focus on technology literacy at local libraries
Requiring applicants for government jobs to apply using an online platform
Working with technology companies to offer computing devices at discounted prices to individuals with reduced incomes
Working with telecommunications companies to build network infrastructure in remote areas
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
An online gaming company is introducing several new initiatives to encourage respectful communication between players of online games. Which of the following best describes a solution that uses crowdsourcing?
The company allows individual players to endorse fellow players based on courteous interactions. Once a player receives enough endorsements, the player is given free rewards that can be used during gameplay.
The company eliminates chat from gameplay and sets the default chat policy to off. Players must actively turn on chat to converse outside of gameplay.
The company introduces software that monitors all chats. Inappropriate conversations are identified, and players involved in the conversations are banned from the game.
The company updates the acceptable content guidelines to explicitly describe appropriate and inappropriate behavior. All players must electronically sign an agreement to adhere to the guidelines.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Consider the following code segment:
What value is displayed as a result of executing the code segment
3
4
9
12
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system?
A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user's computer using the recorded data.
A user has a very common password for an online banking account. Someone else guesses the password after a few attempts and gains access to the user's account.
A user logs into an unsecure Web site. Someone else is able to view unencrypted log-in information as it is transmitted over the Internet. The user has the same username and password for multiple accounts, so the user's log-in information for multiple systems may be compromised.
A user receives an e-mail that claims to be from the user's bank. The e-mail instructs the user to click on a link to a Web site and enter a username and password to verify an account. Shortly after following the steps, the user discovers that the Web site is fraudulent and that the user's username and password were stolen.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
26 questions
Exploring Computer Vision Concepts by Mohd Mirza
Quiz
•
10th Grade - University
26 questions
family fun
Quiz
•
1st Grade - Professio...
26 questions
Excel Quiz Chapter 2
Quiz
•
9th - 12th Grade
30 questions
IT security - 3
Quiz
•
9th Grade - University
26 questions
AP CSP Cybersecurity and Global Impacts
Quiz
•
9th - 12th Grade
35 questions
SCRATCH
Quiz
•
4th Grade - University
26 questions
grade 2 tux paint
Quiz
•
2nd Grade - University
30 questions
Empowerment Technology
Quiz
•
11th Grade
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade