In the following code segment, assume that the variable n has been initialized with an integer value. Which of the following is NOT a possible value displayed by the program?
AP Computer Science Review Part 2

Quiz
•
Computers
•
11th Grade
•
Hard
James Santiago
Used 7+ times
FREE Resource
31 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
artichoke
broccoli
carrot
daikon
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A scientist wants to investigate several problems. In which of the following situations is using a simulation LEAST suitable for solving a problem?
When a scientific study requires performing a large number of trials that need to be conducted very quickly
When it is considered acceptable to make simplifying assumptions when modeling a real-world object or phenomenon
When performing an experiment that would be too costly or dangerous to conduct in the real world
When the solution to the problem requires real-world data inputs that are continually measured at regular intervals
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A store uses binary numbers to assign a unique binary sequence to each item in its inventory. What is the minimum number of bits required for each binary sequence if the store has between 75 and 100 items in its inventory?
5
6
7
8
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A state government is attempting to reduce the digital divide. Which of the following activities has the greatest potential to contribute to the digital divide rather than reducing it?
Providing programs that focus on technology literacy at local libraries
Requiring applicants for government jobs to apply using an online platform
Working with technology companies to offer computing devices at discounted prices to individuals with reduced incomes
Working with telecommunications companies to build network infrastructure in remote areas
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
An online gaming company is introducing several new initiatives to encourage respectful communication between players of online games. Which of the following best describes a solution that uses crowdsourcing?
The company allows individual players to endorse fellow players based on courteous interactions. Once a player receives enough endorsements, the player is given free rewards that can be used during gameplay.
The company eliminates chat from gameplay and sets the default chat policy to off. Players must actively turn on chat to converse outside of gameplay.
The company introduces software that monitors all chats. Inappropriate conversations are identified, and players involved in the conversations are banned from the game.
The company updates the acceptable content guidelines to explicitly describe appropriate and inappropriate behavior. All players must electronically sign an agreement to adhere to the guidelines.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Consider the following code segment:
What value is displayed as a result of executing the code segment
3
4
9
12
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system?
A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user's computer using the recorded data.
A user has a very common password for an online banking account. Someone else guesses the password after a few attempts and gains access to the user's account.
A user logs into an unsecure Web site. Someone else is able to view unencrypted log-in information as it is transmitted over the Internet. The user has the same username and password for multiple accounts, so the user's log-in information for multiple systems may be compromised.
A user receives an e-mail that claims to be from the user's bank. The e-mail instructs the user to click on a link to a Web site and enter a username and password to verify an account. Shortly after following the steps, the user discovers that the Web site is fraudulent and that the user's username and password were stolen.
Create a free account and access millions of resources
Similar Resources on Quizizz
32 questions
CSP assessment

Quiz
•
9th - 12th Grade
30 questions
Cybersecurity Chapter 1 to 3 summary

Quiz
•
11th Grade
26 questions
Data Risks

Quiz
•
10th - 12th Grade
26 questions
AP CSP Cybersecurity and Global Impacts

Quiz
•
9th - 12th Grade
29 questions
L2 ICT U1 Protecting Data Quiz

Quiz
•
11th Grade
29 questions
COMPTIA ITF

Quiz
•
1st Grade - Professio...
33 questions
U4 Big Data and Privacy Review

Quiz
•
11th Grade
35 questions
Networks and Computing for Year 9

Quiz
•
9th - 12th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University