AP Computer Science Principles Practice

AP Computer Science Principles Practice

10th Grade

20 Qs

quiz-placeholder

Similar activities

For and While Loops in Python

For and While Loops in Python

9th - 12th Grade

16 Qs

AQA Computer Science GCSE - 3.1 Fundamentals of algorithms

AQA Computer Science GCSE - 3.1 Fundamentals of algorithms

10th - 12th Grade

15 Qs

Computer Science

Computer Science

9th - 12th Grade

20 Qs

AP CSP Unit 5 Ch 1 Quiz

AP CSP Unit 5 Ch 1 Quiz

9th - 12th Grade

21 Qs

OCR GCSE CS MCQs 2.3 Defensive Design

OCR GCSE CS MCQs 2.3 Defensive Design

10th - 11th Grade

20 Qs

Loops

Loops

1st - 12th Grade

20 Qs

Code org 1

Code org 1

5th - 12th Grade

21 Qs

ocr computer science 2.5

ocr computer science 2.5

10th Grade

16 Qs

AP Computer Science Principles Practice

AP Computer Science Principles Practice

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Quizizz Content

Used 14+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following decimal (base-10) values is equivalent to the binary (base-2) value 101001?

22

37

41

82

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following would be the most appropriate name for a variable?

variable1

t

amountOfTimeRemainingInTheGame

time_left

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In order to be inducted into a school’s National Honor Society (NHS), they must meet certain criteria for their GPA, serviceHours and grade. The expression below indicates whether a student has been accepted as a member of the NHS.


(GPA = 3.65) AND (serviceHours = 30) AND (NOT grade = 9)


Which of the following values would indicate a student that would be accepted into NHS?

GPA = 3.85, serviceHours = 45, grade = 9

GPA = 3.50, serviceHours = 100, grade = 10

GPA = 4.00, serviceHours = 15, grade = 11

GPA = 3.65, serviceHours = 30, grade = 12

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

As of 2016, the selling of used digital media is illegal. Along with selling it, there are many other illegal uses of digital media. Which of the following would be a legal use of digital media?

You download an app on your smartphone that allows you to ‘strip’ the audio from any YouTube music video and permanently keep that audio in your music collection.

You make an MP3 copy of a song because the CD you bought expressly permits you to do so, and then you put your MP3 copy on the Internet, using a file-sharing network, so that millions of other people can download it.

You have a computer with a CD burner, which you use to burn copies of music you have downloaded onto writable CDs for all of your friends.

You download a song from iTunes and sync it to the cloud so that it is accessible on all of your devices.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an advantage that text-based programming languages (e.g., Processing) have over block-based programming languages (e.g., Scratch)?

Text-based programming languages allow programmers to write programs in English and other natural languages.

Text-based programming languages do not require the programmer to worry about syntax, capitalization, or punctuation.

Programs written in text-based programming languages do not require debugging.

Text-based programming languages offer programmers more detailed control over lower-level functionality when writing a program.

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A program is expressed in a programming language. Which of the following is true of the program?

The program can also be expressed as binary code, but will be more easily understood by humans when expressed in a higher-level programming language.

The program can also be expressed as binary code, which will reduce the likelihood of errors.

The program cannot be expressed as binary code, because binary code can only be used to represent data.

Some parts of the program can be expressed as binary code, but operations must be expressed using a higher-level programming language.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following best describes a Distributed Denial of Service (DDoS) attack?

An attempt by a country to deny its citizens access to the Internet

An attempt to deny users access to a Web site's resources by flooding the Web site with requests from multiple systems

An attempt by one user to deny service to another user by posting material on a social network

An attempt by a user of the Internet to get private information from a secure database

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?