AP Computer Science Review Part 2

AP Computer Science Review Part 2

11th Grade

31 Qs

quiz-placeholder

Similar activities

COMPTIA ITF

COMPTIA ITF

1st Grade - Professional Development

29 Qs

98-367 PT4

98-367 PT4

8th - 12th Grade

27 Qs

U4 Big Data and Privacy Review

U4 Big Data and Privacy Review

11th Grade

33 Qs

Data Risks

Data Risks

10th - 12th Grade

26 Qs

CIW Lesson 8 Vocab

CIW Lesson 8 Vocab

9th - 12th Grade

27 Qs

IT Fundamentals:  6.0 Security

IT Fundamentals: 6.0 Security

11th - 12th Grade

29 Qs

AP CSP Cybersecurity and Global Impacts

AP CSP Cybersecurity and Global Impacts

9th - 12th Grade

26 Qs

L2 ICT U1 Protecting Data Quiz

L2 ICT U1 Protecting Data Quiz

11th Grade

29 Qs

AP Computer Science Review Part 2

AP Computer Science Review Part 2

Assessment

Quiz

Computers

11th Grade

Hard

Created by

James Santiago

Used 7+ times

FREE Resource

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

In the following code segment, assume that the variable n has been initialized with an integer value. Which of the following is NOT a possible value displayed by the program?

artichoke

broccoli

carrot

daikon

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A scientist wants to investigate several problems. In which of the following situations is using a simulation LEAST suitable for solving a problem?

When a scientific study requires performing a large number of trials that need to be conducted very quickly

When it is considered acceptable to make simplifying assumptions when modeling a real-world object or phenomenon

When performing an experiment that would be too costly or dangerous to conduct in the real world

When the solution to the problem requires real-world data inputs that are continually measured at regular intervals

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A store uses binary numbers to assign a unique binary sequence to each item in its inventory. What is the minimum number of bits required for each binary sequence if the store has between 75 and 100 items in its inventory?

5

6

7

8

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A state government is attempting to reduce the digital divide. Which of the following activities has the greatest potential to contribute to the digital divide rather than reducing it?

Providing programs that focus on technology literacy at local libraries

Requiring applicants for government jobs to apply using an online platform

Working with technology companies to offer computing devices at discounted prices to individuals with reduced incomes

Working with telecommunications companies to build network infrastructure in remote areas

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An online gaming company is introducing several new initiatives to encourage respectful communication between players of online games. Which of the following best describes a solution that uses crowdsourcing?

The company allows individual players to endorse fellow players based on courteous interactions. Once a player receives enough endorsements, the player is given free rewards that can be used during gameplay.

The company eliminates chat from gameplay and sets the default chat policy to off. Players must actively turn on chat to converse outside of gameplay.

The company introduces software that monitors all chats. Inappropriate conversations are identified, and players involved in the conversations are banned from the game.

The company updates the acceptable content guidelines to explicitly describe appropriate and inappropriate behavior. All players must electronically sign an agreement to adhere to the guidelines.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Consider the following code segment:

What value is displayed as a result of executing the code segment

3

4

9

12

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system?

A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user's computer using the recorded data.

A user has a very common password for an online banking account. Someone else guesses the password after a few attempts and gains access to the user's account.

A user logs into an unsecure Web site. Someone else is able to view unencrypted log-in information as it is transmitted over the Internet. The user has the same username and password for multiple accounts, so the user's log-in information for multiple systems may be compromised.

A user receives an e-mail that claims to be from the user's bank. The e-mail instructs the user to click on a link to a Web site and enter a username and password to verify an account. Shortly after following the steps, the user discovers that the Web site is fraudulent and that the user's username and password were stolen.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?