
AP CSP Unit 6, 7, 8, 10 Vocab Quizs
Authored by Wayground Content
Computers
11th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Linear Search
A search algorithm that checks each element of a list in order until the desired value is found or all elements have been checked.
A search algorithm that divides the list into halves to find the desired value quickly.
A search algorithm that uses a hash table to find the desired value in constant time.
A search algorithm that sorts the list before searching for the desired value.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Personally Identifiable Information (PPI)
Information that is publicly available about an individual.
Information about an individual that identifies, links, relates, or describes them.
Information that is only available to government agencies.
Information that is used for marketing purposes.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malware
Software designed to enhance system performance.
Software intended to damage a computing system or to take partial control over its operation.
Software that protects against viruses and malware.
Software used for data recovery and backup.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Optimization Problem
A problem with the goal of finding the 'best' solution among many (e.g., what is the shortest path from A to B?)
A problem that requires a simple yes or no answer.
A problem that involves random guessing to find a solution.
A problem that can only be solved through trial and error.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Public Key Encryption
Pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message.
Uses a single key for both encryption and decryption, which is shared between the sender and receiver.
Encrypts messages using a symmetric key that is changed frequently for security.
Requires the sender to have access to the receiver's private key to encrypt messages.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Computing Innovation
Includes a program as an integral part of its function.
Is solely based on physical hardware.
Excludes any form of software.
Is limited to traditional computing devices.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
List
An ordered collection of elements.
A random assortment of items.
A collection of unique elements.
A set of unordered items.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?