2021 AP CSP practice exam MCQ
In the following code segment, assume that the variable n has been initialized with an integer value. Which of the following is NOT a possible value displayed by the program?
"carrot"
The following table shows the value of expression based on the values of input1 and input2. Value of input1Value of input2Value of expressiontruetruefalsetruefalsetruefalsetruetruefalsefalsetrue Which of the following expressions are equivalent to the value of expression as shown in the table? Select two answers.
(NOT input1) OR (NOT input2)
To be eligible for a particular ride at an amusement park, a person must be at least 12 years old and must be between 50 and 80 inches tall, inclusive. Let age represent a person's age, in years, and let height represent the person's height, in inches. Which of the following expressions evaluates to true if and only if the person is eligible for the ride?
(age ≥ 12) AND ((height ≥ 50) AND (height ≤ 80))
A large spreadsheet contains the following information about local restaurants. A sample portion of the spreadsheet is shown below. ARestaurant NameBPrice RangeCNumber ofCustomer RatingsDAverageCustomer RatingEAcceptsCredit Cards1Joey Calzone's Pizzerialo1823.5false278th Street Bistromed414.5false3Seaside Taqueriamed2144.5true4Delicious Sub Shop IIlo2024.0false5Rustic Farm Tavernhi1164.5true6ABC Downtown Dinermed0-1.0true In column B, the price range represents the typical cost of a meal, where "lo" indicates under $10, "med" indicates $11 to $30, and "hi" indicates over $30. In column D, the average customer rating is set to -1.0 for restaurants that have no customer ratings. A student wants to count the number of restaurants in the spreadsheet whose price range is $30 or less and whose average customer rating is at least 4.0. For a given row in the spreadsheet, suppose prcRange contains the price range as a string and avgRating contains the average customer rating as a decimal number. Which of the following expressions will evaluate to true if the restaurant should be counted and evaluates to false otherwise?
(avgRating ≥ 4.0) AND ((prcRange = "lo") OR (prcRange = "med"))
A flowchart provides a way to visually represent an algorithm and uses the following building blocks. BlockExplanationOvalThe start or end of the algorithmRectangleOne or more processing steps, such as a statement that assigns a value to a variableDiamondA conditional or decision step, where execution proceeds to the side labeled true if the condition is true and to the side labeled false otherwiseParallelogramDisplays a message In the flowchart below, assume that j and k are assigned integer values. Based on the algorithm represented in the flowchart, what value is displayed if j has the initial value 3 and k has the initial value 4 ?
12
The player controls in a particular video game are represented by numbers. The controls and their corresponding binary values are shown in the following table. ControlBinary Value←01000↑01001→01011↓01111Jump11000Run11001Pause11011Reset11111 The numeric values for the controls can also be represented in decimal (base 10). What is the decimal value for the jump control?
24
Consider the following code segment. What value is displayed as a result of executing the code segment?
3
A game is played by moving a game piece left or right along a horizontal game board. The board consists of spaces of various colors, as shown. The circle represents the initial location of the game piece. YellowBlackGreenGreenRedYellowBlackBlackYellowBlack ● The following algorithm indicates how the game is played. The game continues until the game is either won by landing on the red space or lost when the piece moves off either end of the board. Step 1:Place a game piece on a space that is not red and set a counter to 0.Step 2:If the game piece is on a yellow space, move the game piece 3 positions to the left and go to step 3. Otherwise, if the game piece is on a black space, move the game piece 1 position to the left and go to step 3. Otherwise, if the game piece is on a green space, move the game piece 2 positions to the right and go to step 3.Step 3:Increase the value of the counter by 1.Step 4:If game piece is on the red space or moved off the end of the game board, the game is complete. Otherwise, go back to step 2. If a game is begun by placing the game piece on the rightmost black space for step 1, what will be the value of the counter at the end of the game?
4
A store uses binary numbers to assign a unique binary sequence to each item in its inventory. What is the minimum number of bits required for each binary sequence if the store has between 75 and 100 items in its inventory?
7
A sorted list of numbers contains 128 elements. Which of the following is closest to the maximum number of list elements that can be examined when performing a binary search for a value in the list?
8
In a certain video game, players are awarded bonus points at the end of a level based on the value of the integer variable timer. The bonus points are awarded as follows. If timer is less than 30, then 500 bonus points are awarded. If timer is between 30 and 60 inclusive, then 1000 bonus points are awarded. If timer is greater than 60, then 1500 bonus points are awarded. Which of the following code segments assigns the correct number of bonus points to bonus for all possible values of timer ? Select two answers.
A and D
The following spinner is used in a game. The region labeled "blue" represents 1414 of the spinner. The regions labeled "orange" and "purple" are equal in size. Which of the following code segments can be used to simulate the behavior of the spinner? Select two answers.
A and D
Which of the following best describes a challenge involved in using a parallel computing solution?
A parallel computing solution may not be appropriate for an algorithm in which each step requires the output from the preceding step.
Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system?
A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user's computer using the recorded data.
Which of the following best exemplifies the use of multifactor authentication to protect an online banking system?
After entering a password for an online bank account, a user must also enter a code that is sent to the user's phone via text message.
A company delivers packages by truck and would like to minimize the length of the route that each driver must travel in order to reach n� delivery locations. The company is considering two different algorithms for determining delivery routes. Algorithm IGenerate all possible routes, compute their lengths, and then select the shortest possible route. This algorithm does not run in reasonable time.Algorithm IIStarting from an arbitrary delivery location, find the nearest unvisited delivery location. Continue creating the route by selecting the nearest unvisited location until all locations have been visited. This algorithm does not guarantee the shortest possible route and runs in time proportional to n2�2. Which of the following best categorizes algorithm II?
Algorithm II uses a heuristic approach to provide an approximate solution in reasonable time.
Individuals sometimes attempt to remove personal information from the Internet. Which of the following is the LEAST likely reason the personal information is hard to remove?
All personal information is stored online using authentication measures, making the information hard to access.
Which of the following best explains how an analog audio signal is typically represented by a computer?
An analog audio signal is measured at regular intervals. Each measurement is stored as a sample, which is represented at the lowest level as a sequence of bits.
Which of the following is an example of an attack using a rogue access point?
An unauthorized individual gains the ability to view network traffic by connecting to a network router that uses weak or no security measures.
A code segment is intended to display the following output. up down down down up down down down Which of the following code segments can be used to display the intended output?
Answer: A
Assume that the Boolean variable hot is assigned the value true and the Boolean variable humid is assigned the value false. Which of the following will display the value true ? Select two answers.
B and C
Which of the following is NOT a benefit of collaborating to develop a computing innovation?
Collaboration eliminates the need to resolve differences of opinion.
Which of the following research proposals is most likely to be successful as a citizen science project?
Collecting pictures of birds from around the world that can then be analyzed to determine how location affects bird size
Which of the following best explains how data is transmitted on the Internet?
Data is broken into packets, which can be sent along different paths.
A group of students take hundreds of digital photos for a science project about weather patterns. Each photo file contains data representing the level of red, green, and blue for each pixel in the photo. The file also contains metadata that describes the date, time, and geographic location where the photo was taken. For which of the following goals would analyzing the metadata be more appropriate than analyzing the data? Select two answers.
Determining the chronological order of the photos
The player controls in a particular video game are represented by numbers. The controls and their corresponding binary values are shown in the following table. ControlBinary Value←01000↑01001→01011↓01111Jump11000Run11001Pause11011Reset11111 The numeric values for the controls can also be represented in decimal (base 10). What control is represented by the decimal value 15 ?
Down arrow
The figure below represents a network of physically linked devices labeled A through I. A line between two devices indicates that the devices can communicate directly with each other. Any information sent between two devices that are not directly connected must go through at least one other device. For example, in the network represented below, information can be sent directly between A and B, but information sent between devices A and G must go through other devices. What is the minimum number of connections that must be broken or removed before device B can no longer communicate with device C?
Four
A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best explains the result of this configuration as compared to a configuration in which the router does not limit the bandwidth?
Guest users will be restricted in the maximum amount of data that they can send and receive per second.
A large spreadsheet contains the following information about local restaurants. A sample portion of the spreadsheet is shown below. ARestaurant NameBPrice RangeCNumber ofCustomer RatingsDAverageCustomer RatingEAcceptsCredit Cards1Joey Calzone's Pizzerialo1823.5false278th Street Bistromed414.5false3Seaside Taqueriamed2144.5true4Delicious Sub Shop IIlo2024.0false5Rustic Farm Tavernhi1164.5true6ABC Downtown Dinermed0-1.0true In column B, the price range represents the typical cost of a meal, where "lo" indicates under $10, "med" indicates $11 to $30, and "hi" indicates over $30. In column D, the average customer rating is set to -1.0 for restaurants that have no customer ratings. A student is developing an algorithm to determine which of the restaurants that accept credit cards has the greatest average customer rating. Restaurants that have not yet received any customer ratings and restaurants that do not accept credit card are to be ignored. Once the algorithm is complete, the desired restaurant will appear in the first row of the spreadsheet. If there are multiple entries that fit the desired criteria, it does not matter which of them appears in the first row. The student has the following actions available but is not sure of the order in which they should be executed. ActionExplanationFilter by number of ratingsRemove entries for restaurants with no customer ratingsFilter by payment typeRemove entries for restaurants that do not accept credit cardsSort by ratingSort the rows in the spreadsheet on column D from greatest to least Assume that applying either of the filters will not change the relative order of the rows remaining in the spreadsheet. Which of the following sequences of steps can be used to identify the desired restaurant? Filter by number of ratings, then filter by payment type, then sort by rating Filter by number of ratings, then sort by rating, then filter by payment type Sort by rating, then filter by number of ratings, then filter by payment type
I, II, and III
The grid below contains a robot represented as a triangle, initially facing toward the top of the grid. The robot can move into a white or gray square but cannot move into a black region. The code segment below uses the procedure goalReached, which evaluates to true if the robot is in the gray square and evaluates to false otherwise. REPEAT UNTIL(goalReached()) { <MISSING CODE> } Which of the following replacements for <MISSING CODE> can be used to move the robot to the gray square?
IF(CAN_MOVE(left)) { ROTATE_LEFT() } MOVE_FORWARD()
The figure below represents a network of physically linked devices labeled A through I. A line between two devices indicates that the devices can communicate directly with each other. Any information sent between two devices that are not directly connected must go through at least one other device. For example, in the network represented below, information can be sent directly between A and B, but information sent between devices A and G must go through other devices.
If devices B and F fail, then device A will not be able to communicate with device G.
A city maintains a database of all traffic tickets that were issued over the past ten years. The tickets are divided into the following two categories. Moving violations Nonmoving violations The data recorded for each ticket include only the following information. The month and year in which the ticket was issued The category of the ticket Which of the following questions CANNOT be answered using only the information in the database?
In the past ten years, were nonmoving violations more likely to occur on a weekend than on a weekday?
The author of an e-book publishes the e-book using a no-rights-reserved Creative Commons license. Which of the following best explains the consequences of publishing the book with this type of license?
Individuals can freely distribute or use the contents of the e-book without needing to obtain additional permissions from the author.
RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone's GPS unit to track a user's location, running speed, and distance traveled. Users can use the application to review information and statistics about their previous runs. At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application shares the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other's contact lists or if they typically run at similar speeds. A basic RunRoutr account is free, but it displays advertisements that are targeted to individual users based on data collected by the application. For example, if a user's running route begins or ends near a particular store, the application may display an advertisement for that store. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application. Businesses have the ability to target advertisements to different groups of people who use RunRoutr. Which of the following groups is LEAST likely to receive targeted advertisements?
Individuals who sign up for a premium account
A certain social media application is popular with people across the United States. The developers of the application are updating the algorithm used by the application to introduce a new feature that allows users of the application with similar interests to connect with one another. Which of the following strategies is LEAST likely to introduce bias into the application?
Inviting a random sample of all users to try out the new algorithm and provide feedback before it is released to a wider audience
In the following procedure, the parameter age represents a person's age. The procedure is intended to return the name of the age group associated with age. People who are under 18 are considered minors, people who are 65 and older are considered senior citizens, and all other people are considered adults. The procedure does not work as intended. Line 1: PROCEDURE ageGroup(age) Line 2: { Line 3: result ←← "adult" Line 4: IF(age ≥ 65) Line 5: { Line 6: result ←← "senior citizen" Line 7: } Line 8: RETURN(result) Line 9: Line 10: result ←← "adult" Line 11: IF(age < 18) Line 12: { Line 13: result ←← "minor" Line 14: } Line 15: RETURN(result) Line 16: } Removing which two lines of code will cause the procedure to work as intended? Select two answers.
Line 8 Line 10
A list of numbers is considered increasing if each value after the first is greater than or equal to the preceding value. The following procedure is intended to return true if numberList is increasing and return false otherwise. Assume that numberList contains at least two elements. Line 1: PROCEDURE isIncreasing(numberList) Line 2: { Line 3: count ←← 2 Line 4: REPEAT UNTIL(count > LENGTH(numberList)) Line 5: { Line 6: IF(numberList[count] < numberList[count - 1]) Line 7: { Line 8: RETURN(true) Line 9: } Line 10: count ←← count + 1 Line 11: } Line 12: RETURN(false) Line 13: } Which of the following changes is needed for the program to work as intended?
Lines 8 and 12 should be interchanged.
Which of the following is a true statement about the use of public key encryption in transmitting messages?
Public key encryption enables parties to initiate secure communications through an open medium, such as the Internet, in which there might be eavesdroppers.
Which of the following best describes a direct benefit in using redundant routing on the Internet?
Redundancy often allows messages to be sent on the network even if some network devices or connections have failed.
In a science experiment, result X is expected to occur 25% of the time and result Y is expected to occur the remaining 75% of the time. The following code segment is intended to simulate the experiment if there are 100 trials. Line 1: xCount ←← 0 Line 2: yCount ←← 0 Line 3: REPEAT 100 TIMES Line 4: { Line 5: IF(RANDOM(1, 4) = 1) Line 6: { Line 7: xCount ←← xCount + 1 Line 8: } Line 9: IF(RANDOM(1, 4) > 1) Line 10: { Line 11: yCount ←← yCount + 1 Line 12: } Line 13: } Line 14: DISPLAY("Result X occurred") Line 15: DISPLAY(xCount) Line 16: DISPLAY("times and result Y occurred") Line 17: DISPLAY(yCount) Line 18: DISPLAY("times.") A programmer runs the code segment, and the following message is displayed. Result X occurred 24 times and result Y occurred 70 times. The result shows that 94 trials were counted, rather than the intended 100 trials. Which of the following changes to the code segment will ensure a correct simulation of the experiment?
Replacing line 9 with ELSE
A state government is attempting to reduce the digital divide. Which of the following activities has the greatest potential to contribute to the digital divide rather than reducing it?
Requiring applicants for government jobs to apply using an online platform
A certain computer has two identical processors that are able to run in parallel. The following table indicates the amount of time it takes to execute each of four processes on a single processor. Assume that none of the processes is dependent on any of the other processes. ProcessExecution Time onEither ProcessorP30 secondsQ10 secondsR20 secondsS15 seconds Which of the following parallel computing solutions would minimize the amount of time it takes to execute all four processes?
Running processes P and Q on one processor and processes R and S on the other processor
Each student at a school has a unique student ID number. A teacher has the following spreadsheets available. Spreadsheet I contains information on all students at the school. For each entry in this spreadsheet, the student name, the student ID, and the student's grade point average are included. Spreadsheet II contains information on only students who play at least one sport. For each entry in this spreadsheet, the student ID and the names of the sports the student plays are included. Spreadsheet III contains information on only students whose grade point average is greater than 3.5. For each entry in this spreadsheet, the student name and the student ID are included. Spreadsheet IV contains information on only students who play more than one sport. For each entry in this spreadsheet, the student name and the student ID are included. The teacher wants to determine whether students who play a sport are more or less likely to have higher grade point averages than students who do not play any sports. Which of the following pairs of spreadsheets can be combined and analyzed to determine the desired information?
Spreadsheets I and II
A list of numbers has n elements, indexed from 1 to n. The following algorithm is intended to display true if the value target appears in the list more than once and to display false otherwise. The algorithm uses the variables position and count. Steps 4 and 5 are missing. Step 1:Set count to 0 and position to 1.Step 2:If the value of the element at index position is equal to target, increase the value of count by 1.Step 3:Increase the value of position by 1.Step 4:(missing step)Step 5:(missing step) Which of the following could be used to replace steps 4 and 5 so that the algorithm works as intended?
Step 4 Repeat steps 2 and 3 until the value of position is greater than n. Step 5 If count is greater than or equal to 2, display true. Otherwise, display false.
In which of the following situations would it be most appropriate to choose lossy compression over lossless compression?
Storing music files on a smartphone in order to maximize the number of songs that can be stored
Which of the following best explains how symmetric encryption algorithms are typically used?
Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.
Which of the following best explains the relationship between the Internet and the World Wide Web?
The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that is accessed via the Internet.
Which of the following statements about the Internet is true?
The Internet is designed to scale to support an increasing number of users.
A program developed for a Web store represents customer account balances using a format that approximates real numbers. While testing the program, a software developer discovers that some values appear to be mathematically imprecise. Which of the following is the most likely cause of the imprecision?
The account balances are represented using a fixed number of bits, resulting in round-off errors.
An online gaming company is introducing several new initiatives to encourage respectful communication between players of online games. Which of the following best describes a solution that uses crowdsourcing?
The company allows individual players to endorse fellow players based on courteous interactions. Once a player receives enough endorsements, the player is given free rewards that can be used during gameplay.
A video-streaming Web site keeps count of the number of times each video has been played since it was first added to the site. The count is updated each time a video is played and is displayed next to each video to show its popularity. At one time, the count for the most popular video was about two million. Sometime later, the same video displayed a seven-digit negative number as its count, while the counts for the other videos displayed correctly. Which of the following is the most likely explanation for the error?
The count for the video became larger than the maximum value allowed by the data type used to store the count.
RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone's GPS unit to track a user's location, running speed, and distance traveled. Users can use the application to review information and statistics about their previous runs. At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application shares the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other's contact lists or if they typically run at similar speeds. A basic RunRoutr account is free, but it displays advertisements that are targeted to individual users based on data collected by the application. For example, if a user's running route begins or ends near a particular store, the application may display an advertisement for that store. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application. Adrianna uses RunRoutr to suggest a running route. All compatible users near Adrianna receive a notification that shows her running route. Which of the following data is not obtained using data collected from Adrianna's smartphone but necessary for RunRoutr to share Adrianna's running route?
The current locations of other RunRoutr users
In the following procedure, the parameter n is an integer greater than 2. Which of the following best describes the value returned by the procedure?
The procedure returns the sum of the integers from 1 to n.
A binary number is to be transformed by appending three 0s to the end of the number. For example, 11101 is transformed to 11101000. Which of the following correctly describes the relationship between the transformed number and the original number?
The transformed number is 8 times the value of the original number.
RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone's GPS unit to track a user's location, running speed, and distance traveled. Users can use the application to review information and statistics about their previous runs. At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application shares the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other's contact lists or if they typically run at similar speeds. A basic RunRoutr account is free, but it displays advertisements that are targeted to individual users based on data collected by the application. For example, if a user's running route begins or ends near a particular store, the application may display an advertisement for that store. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application. Which of the following data must be collected from a user's smartphone in order for RunRoutr to suggest a running route?
The user's geographic position
Which of the following best explains the ability to solve problems algorithmically?
There exist some problems that cannot be solved algorithmically using any computer.
Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are used?
Unauthorized individuals can use data mining and other techniques to guess a user's password.
RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone's GPS unit to track a user's location, running speed, and distance traveled. Users can use the application to review information and statistics about their previous runs. At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application shares the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other's contact lists or if they typically run at similar speeds. A basic RunRoutr account is free, but it displays advertisements that are targeted to individual users based on data collected by the application. For example, if a user's running route begins or ends near a particular store, the application may display an advertisement for that store. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application. Which of the following is most likely to be a data privacy concern for RunRoutr users?
Users of the application may have the ability to determine information about the locations of users that are not on their contact lists.
RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone's GPS unit to track a user's location, running speed, and distance traveled. Users can use the application to review information and statistics about their previous runs. At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application shares the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other's contact lists or if they typically run at similar speeds. A basic RunRoutr account is free, but it displays advertisements that are targeted to individual users based on data collected by the application. For example, if a user's running route begins or ends near a particular store, the application may display an advertisement for that store. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application. Which of the following is most likely to be a benefit to users of the application?
Users of the application may see health benefits as a result of the application encouraging them to exercise with each other.
Which of the following is an example of a phishing attack?
Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information
Delivery trucks enter and leave a depot through a controlled gate. At the depot, each truck is loaded with packages, which will then be delivered to one or more customers. As each truck enters and leaves the depot, the following information is recorded and uploaded to a database. The truck's identification number The truck's weight The date and time the truck passes through the gate Whether the truck is entering or leaving the depot Using only the information in the database, which of the following questions CANNOT be answered?
What is the average number of customer deliveries made by each truck on a particular day?
A scientist wants to investigate several problems. In which of the following situations is using a simulation LEAST suitable for solving a problem?
When the solution to the problem requires real-world data inputs that are continually measured at regular intervals.
The following code segment is intended to remove all duplicate elements in the list myList. The procedure does not work as intended. j ←← LENGTH(myList) REPEAT UNTIL(j = 1) { IF(myList[j] = myList[j - 1]) { REMOVE(myList, j) } j ←← j - 1 } For which of the following contents of myList will the procedure NOT produce the intended results? Select two answers.
[10, 10, 20, 20, 10, 10] [30, 50, 40, 10, 20, 40]
The following question uses a robot in a grid of squares. The robot is represented by a triangle, which is initially facing right. Consider the following procedure. Which of the following code segments will move the robot to the gray square along the path indicated by the arrows?
botStepper 2 MOVE_FOWARD botStepper 3
The question below uses a robot in a grid of squares. The robot is represented as a triangle, which is initially in the center square and facing toward the top of the grid. The following code segment is used to move the robot in the grid. count ←← 1 REPEAT 4 TIMES { REPEAT count TIMES { MOVE_FORWARD() } ROTATE_LEFT() count ←← count + 1 } Which of the following code segments will move the robot from the center square along the same path as the code segment above?
count ←← 0 REPEAT 4 TIMES { count ←← count + 1 REPEAT count TIMES { MOVE_FORWARD() } ROTATE_LEFT() }
Consider the following code segment. What are the values of first and second as a result of executing the code segment?
first = 100, second = 100
A flowchart provides a way to visually represent an algorithm and uses the following building blocks. BlockExplanationOvalThe start or end of the algorithmRectangleOne or more processing steps, such as a statement that assigns a value to a variableDiamondA conditional or decision step, where execution proceeds to the side labeled true if the condition is true and to the side labeled false otherwiseParallelogramDisplays a message In the flowchart below, assume that j and k are assigned integer values. Which of the following initial values of j and k will cause the algorithm represented in the flowchart to result in an infinite loop?
j = 5, k = -5
The following procedures are available for string manipulation. Procedure CallExplanationsubstring(str, start, end)Returns a substring of consecutive characters of str starting with the character at position start and ending with the character at position end. The first character of str is considered position 1. For example, substring("delivery", 3, 6) returns "live".concat(str1, str2)Returns a single string consisting of str1 followed by str2. For example, concat("key", "board") returns "keyboard".len(str)Returns the number of characters in str. For example, len("key") returns 3. A programmer wants to create a new string by removing the character in position n of the string oldStr. For example, if oldStr is "best" and n is 3, then the new string should be "bet". Assume that 1 < n < len(oldStr). Which of the following code segments can be used to create the desired new string and store it in newStr ? Select two answers.
left ←← substring(oldStr, 1, n - 1) right ←← substring(oldStr, n + 1, len(oldStr)) newStr ←← concat(left, right) newStr ←← substring(oldStr, 1, n - 1) newStr ←← concat(newStr, substring(oldStr, n + 1, len(oldStr)))
A code segment is intended to transform the list utensils so that the last element of the list is moved to the beginning of the list. For example, if utensils initially contains ["fork", "spoon", "tongs", "spatula", "whisk"], it should contain ["whisk", "fork", "spoon", "tongs", "spatula"] after executing the code segment. Which of the following code segments transforms the list as intended?
len ←← LENGTH(utensils) temp ←← utensils[len] REMOVE(utensils, len) INSERT(utensils, 1, temp)
Consider the following procedure. Procedure CallExplanationdrawLine(x1, y1, x2, y2)Draws a line segment on a coordinate grid with endpoints at coordinates (x1, y1) and (x2, y2) The drawLine procedure is to be used to draw the following figure on a coordinate grid.
xVal ←← 1 yVal ←← 0 len ←← 1 REPEAT 5 TIMES { drawLine(xVal, yVal, xVal, yVal + len) xVal ←← xVal + 1 len ←← len + 1 }