
Final Exam: Computer Science Principles
Authored by Jamisha McClain-Raymond
Information Technology (IT)
12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
24 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the time complexity of the binary search algorithm in the worst-case scenario?
Answer explanation
The binary search algorithm divides the search space in half with each step, leading to a logarithmic time complexity. In the worst-case scenario, it takes O(log n) time to find the target or determine its absence.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which data structure is used to implement a LIFO (Last In, First Out) system?
Queue
Stack
Linked List
Tree
Answer explanation
A Stack is a data structure that follows the LIFO principle, meaning the last element added is the first one to be removed. This is in contrast to a Queue, which follows FIFO (First In, First Out).
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In programming, what is the purpose of a loop?
To execute a block of code once
To execute a block of code multiple times
To define a variable
To terminate a program
Answer explanation
A loop is designed to execute a block of code multiple times, allowing for repetitive tasks to be performed efficiently. This distinguishes it from executing code just once or defining variables.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which protocol is primarily used for sending emails?
HTTP
FTP
SMTP
TCP
Answer explanation
SMTP (Simple Mail Transfer Protocol) is the standard protocol used for sending emails across the Internet, making it the correct choice. HTTP is for web traffic, FTP for file transfers, and TCP is a transport layer protocol.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main function of a firewall in cybersecurity?
To encrypt data
To block unauthorized access
To store passwords
To backup data
Answer explanation
The main function of a firewall in cybersecurity is to block unauthorized access to or from a private network, thereby protecting sensitive data and systems from potential threats.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a principle of data privacy?
Data minimization
Data duplication
Data inflation
Data obfuscation
Answer explanation
Data minimization is a key principle of data privacy, emphasizing that only the necessary data should be collected and retained. This reduces risks associated with data breaches and enhances user privacy.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the impact of computing on employment?
It only creates jobs
It only eliminates jobs
It both creates and eliminates jobs
It has no impact on jobs
Answer explanation
Computing impacts employment by both creating new job opportunities in tech and related fields, while also automating tasks that can lead to job losses in traditional roles. Thus, it both creates and eliminates jobs.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?