ap comp sci final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

An architecture company is planning to build a tower in California but they are worried about earthquakes. They decide to use a computer simulation in order to test the safety of different designs when an earthquake occurs. Which of the following are reasons to use a simulation in this context? I. Using the simulation software can save the company money because it allows them to test building materials for safety without purchasing physical materials. II. Using the simulation software will perfectly predict what will happen in the event of an earthquake. III. Using the simulation software can help ensure the safety of the building during an earthquake without endangering people. (A) I only (B) III only (C) I and III only (D) I, II and III Enduring Understandings Learning

a

Imagine you are playing an online game with your friends. You are at a crucial stage in the basketball game and need just one more free throw to win the game. You see the entire complex scene display quickly. You aim at the hoop to shoot your free throw. You click the shoot button but there is a momentary freeze on your screen only to discover that you have lost the game. What is demonstrated by this situation? (A) High bandwidth, high latency (B) Low bandwidth, high latency (C) High bandwidth, low latency (D) Low bandwidth, low latency

a

Which of the following can be represented by a sequence of 3 bits? I. The seven days of the week II. Between zero and eight pints of ice cream III. The nine innings in a standard baseball game (A) I only (B) I and II (C) I, II and III (D) None of the Above

a

Which of the following is NOT true regarding metadata? (A) In photos, metadata is hidden within the image and is stripped out using pixel processing methods. (B) Metadata can be useful in producing new insights and knowledge when processed with the data itself. (C) Metadata is information about data. (D) Most objects contain metadata including images, audio, and video files.

a

Which one of the following is NOT a benefit of the HTTPS protocol? (A) HTTPS ensures that only the client and the server can view the packets sent during their communication and they cannot be intercepted by a third party. (B) HTTPS verifies the identity of the server through a Certificate Exchange. (C) HTTPS encrypts the data before it is broken into packets to ensure its privacy. (D) HTTPS provides reasonable assurance by which the user can assume minimal cybersecurity risk of transactions carried out on that site.

a

What is a disadvantage of the open standard of Internet addressing and routing? Select two answers. (A) censorship (B) possibility of denial of service attacks (C) redundancy (D) hierarchy

a, b

FOUR INDEPENDENT ALGORITHMS listed below can be executed on a row of NUMBER cards (Not FACE cards) on a table. There are an EVEN number of cards,and they are in no special order. Which of the Algorithms involves BOTH Selection and Iteration? For this question select TWO correct answers (A) Look over all the cards to find the smallest one, and move it to the leftmost position. (B) Compare the first two cards. If the one on the left is greater, switch them (C) Compare the values of each pair of cards. For example, compare cards 0 and 1, compare cards 2 and 3, and so on for all pairs. Swap positions when the first card is greater than the second of the pair. (D) Find the middle card and switch it with the card in the rightmost position

a, c

You have been hired by a company to generate a simulation of a process within their multinational company. You try to convince them that there is significant value to starting with a simple model even though it might not model their process exactly. Which arguments below are viable supports for your position? Select two answers. (A) Models and simulations often omit unnecessary features of the objects or phenomena under investigation. (B) Writing very detailed models and simulations will help minimize costs as they are easier to write than more abstract models and simulations. (C) Simple models and simulations will execute faster allowing more opportunity for rapid testing and development. (D) Less abstract models and simulations omit details to simplify the study of the objects or processes involved.

a, c

Which of the following is true of algorithms? Select two answers. (A) Algorithms are composed of commands which implement sequencing, iteration, and selection by which a task can be completed on a computer. (B) When implementing a solution to a problem there is only one algorithm which will typically complete the task. (C) Algorithms are very specific to the language in which they are implemented. (D) Clarity and readability are important considerations when expressing an algorithm in a language.

a, d

A photo editing business uses software to compress images as they are stored to a hard drive and automatically uncompress images as they opened in the photo editing software. Every photo that is saved to disk is retrieved with lower image quality as compared to the original picture. What is the most likely reason for the reduced quality? (A) The compression software uses a lossless compression technique. (B) The compression software uses a lossy compression technique. (C) It is natural for a digital copy of any file to be retrieved with quality issues as compared to the original file. (D) The metadata of each image file is being corrupted in the compression process.

b

How many times will the following loop be executed? x ← 0 REPEAT UNTIL (x > 5) IF (x MOD 2 = 0) x ← x - 1 IF (NOT (x MOD 2) = 0) x ← x + 3 (A) The loop will not execute (B) 3 (C) 6 (D) There is an infinite loop

b

Since it is well known that you took AP CS Principles, your family decides to discuss the internet with you at a holiday party. I. Aunt Minnie says, "The Internet is wholly interesting because it is all about the documents and information in the documents enabling us to become smarter as a society". II. Uncle Jack says, "I love that the Internet connects all the devices such that data can be shared at the speed of light." III. Cousin Josiah comments, "Open standards have been instrumental in the growth of the Internet as multiple networks can be connected without concern so long as they implement established standards." Which of the above statements are correct? (A) II only (B) III only (C) I and II only (D) II and III only

b

Which of the following is a characteristic of the fault-tolerant nature of communication on the Internet? A. The ability of users to trust that the software they download is free of viruses if it says it is free of malware. B. The ability to provide data transmission even when some connections have failed. C. The ability to resolve errors in domain name server lookups. D. The ability to transfer data using multiple protocols such as hypertext transfer protocol (HTTP), Internet Protocol (IP), and simple mail protocol (SMTP).

b

You were hired as a manager of a set of new programmers because of your experience in generating quality code. One of your new programmers brings a solution which looks nothing like what you would generate for the same problem. Which of the following might be a good next step? I. Analyze the solution for correctness and readability. II. Realize that there are multiple ways to solve most problems and work to understand this employee's solution. III. If the program includes sequence, selection, and iterative statements, assume the solution is correct and congratulate her for her outstanding contribution. (A)I only (B) I and II only (C) II and III only (D)I, II and III

b

The various protocols used on the internet operate in layers in which the protocol at each layer rely on the protocols at the lower layers to do their jobs, and higher layers (higher level of abstraction) are built on top of the lower layers (lower level of abstraction). From the list provided choose the two (2) answers that correctly describe the relative levels of abstraction of the internet protocols. For example: if protocol A relies on protocol B, it means that A is a higher level of abstraction than B. Select two answers. (A) TCP/IP is a higher level of abstraction than HTTP (B) HTTP is a higher level of abstraction than TCP/IP (C) DNS is a higher level of abstraction than TCP/IP (D) TCP/IP is a higher level of abstraction than DNS

b, c

Which two of the following statements are true about routing on the Internet? Select two answers. (A) Your router receives all the traffic of the Internet and delivers to your computer only the messages intended for you. (B) A packet traveling between two computers on the Internet may be rerouted many times along the way. (C) A packet contains addressing information to allow routers to decide how best to forward along that packet towards its destination. (D) Information traveling between two computers over the Internet will always take the same path.

b, c

Your school uses network filtering hardware and software to deny access to blacklisted websites and files. In the school's library there is a student accessing one of the blacklisted websites. Which of the following methods is the student most likely using to defeat the network filtering. Select two answers. (A) The student is using a personal device that is connected to the school's WiFi but since it is not running the network filtering software, the school is unable to filter the Internet traffic. (B) The student is using a personal mobile device that is connected to the Internet through a data plan. (C) The student is using a school device that allowed the configuration of a proxy server to encrypt the data of the blacklisted website. (D) The student used brute force attack methods on the filtering system and discovered the password that allows it to be disabled.

b, c

. Consider the following algorithms to store a color digital image. Which algorithms are examples of "lossy" compression? Select two answers: (A) The algorithm breaks the image into quadrants, and those quadrants into sub-quadrants creating 16 uniformly sized parts. The parts are saved in separate smaller files along with the information needed to completely reassemble the original image. (B) The image is divided into squares that are 2 by 2 pixels each. Each square is translated into a single pixel whose color is the average of the color values from the 4 pixels in the square. (C) The algorithm find runs of identical pixels. It saves the same information by saving the pixel value once and then the number of consecutive identical pixels. (D) The algorithm translates a color image into a grayscale version of the color original storing only averages of the data used to store the original colors in the picture.

b, d

A crime investigator is accessing an online database of crimes within a certain radius of the city center. The database contains the following information: Date of crime Name of offender Neighborhood of crime The investigator is looking for other crimes that occurred in a certain area on a certain date. Which of the following algorithms can be used to find all crimes that occurred in a certain neighborhood on a certain day? I. Make a new list by filtering the data so only the crimes from a certain neighborhood are on the list. Perform multiple binary searches to find all crimes that occurred in that neighborhood on a certain day, adding each new occurrence to a final list. II. Make a new list by filtering the data so only the crimes from a certain neighborhood are on the list. Perform multiple linear searches to find all crimes that occurred on the given day, adding each new occurrence to a final list. (A) Both algorithms work correctly (B) Algorithm I always works correctly, but Algorithm II only works correctly when the date data is sorted. (C) Algorithm II always work correctly, but Algorithm I only works correctly when the date data is sorted. (D) Neither algorithm will correctly find all crimes

c

A high school surveys all of its 1,750 students to determine the average number of hours U.S. high school students sleep per night. Which of the following is a true statement? (A) The high school should not use the data from this study because it is based on direct observation. (B) The high school can use this data to determine the average number of hours U.S. high school students sleep per night. (C) The high school cannot draw meaningful conclusions from this data because the sample size is too small. (D) The high school can use the results of this survey to conclude that U.S. high school students do not get enough sleep

c

A student is taking a survey of her class in order to determine their average hours of sleep per night. She is tracking the number of students in her class that have replied. She sees that the number of students who have replied is represented by the digits "12" but she does not remember what base she used. Which of the following are possible bases that the number 12 could be in? I. Binary (base 2) II. Decimal (base 10) III. Hexadecimal (base 16) (A) I and II (B) I and III (C) II and III (D) I, II, and III

c

Consider the following numbers. Binary 1101 Decimal 14 Hexadecimal F Which of the following lists them from least to greatest? (A) Decimal 14, Binary 1101, Hexadecimal F (B) Hexadecimal F, Decimal 14, Binary 1101 (C) Binary 1101, Decimal 14, Hexadecimal F (D) Decimal 14, Hexadecimal F, Binary 1101

c

How many bits are used in the address of an IPv4 packet? (A) 4 (B) 16 (C) 32 (D) 128

c

In the process of engineering a piece of software, which of the following statements would generally be considered to be most accurate? (A) Software engineering places much greater emphasis on using the correct set of software commands than it does the sequence of the commands. (B) Having multiple people collaborating on the engineering of a piece of software is not very productive as the creation of software is best left to a single person and vision. (C) The end user of the software must be considered in the design, implementation, and release of the software. (D) Software engineers should not concern themselves with choosing any particular development tool or programming language because they are all essentially the same in functionality and efficiency.

c

Several of your peers have conflicting viewpoints concerning what is, and is not, a creative artifact. Which of the statements listed below will you use to settle the conflict among your peers? I. For something to be considered a creative artifact, it must include only original material generated by the creator of the artifact. II. Creative artifacts can be produced by combining existing artifacts in a new and novel way. III. Computing can facilitate the creation and modification of computational artifacts. (A) I only (B) II only (C) II and III (D) I and II

c

The Domain Name System (DNS) is designed to I. Allow for nested domain naming (e.g., digitalportfolio.collegeboard.org ) II. Allow for centralized access and administration III. Use cache and redundant servers for quick matching of IP addresses to domain names IV. Use a static database for matching IP address to domain names (A) I only (B) II only (C) I and III only (D) II and IV only

c

What are some of the advantages of using models and simulations to mimic a real-world process or system under study? I. Models and simulations mimic real-world events without the cost or danger of real world prototypes or testing. II. The results of models and simulations may generate new knowledge and new hypotheses related to the phenomena being modeled. III. We cannot change the model or simulation as rapidly as we can change the real-world process or system under study, therefore, it allows us to minimize iterations in a model or simulation. (A) I only (B) II only (C) I and II only (D) I, II and III

c

Which of the following statements is NOT correct regarding abstraction as applied to computer science: (A) Higher level languages utilize abstraction to hide details of the CPU instructions from the programmer. (B) A computer chip is often an abstraction of many lower level logic gates and memory combined to perform a specific function. (C) Binary sequences are abstractions which are used to represent colors in an image. (D) Smaller programs and apps can be combined into large programs to create higher level abstractions.

c

Which one of these would be least likely to make programming code easily modifiable in the future? (A) Using meaningful variable names which reflect the purpose of the data that is stored in them. (B) Combining duplicated code into one procedure. (C) Creating more procedures for the program. (D) Increasing the number of comments in your code by which others can understand the program and why you implemented it that way.

c

You decide you are going to take your internet privacy seriously. Which of the following action poses the greatest risk to your internet privacy? (A) Sharing your email address with those who request it. (B) Connecting to secured networks using the provided network name and password when visiting hotels. (C) Encrypting your files and sharing your private key to ensure others who you choose to share files with can read them. (D) Using cloud storage to ensure access to your files from all your devices.

c

. If the post office delivered mail just as routers deliver messages on the Internet, which of the following statements would be true? Select two answers. A. One mailman would be responsible for delivering a letter from sender to receiver. B. Your mail could not be delivered if a road your mailman was planning to take were under construction. C. Letters would be written on the outside of envelopes for all to read instead of letters put inside envelopes. D. The mailman would sometimes take a different path to deliver each letter to your home.

c, d

A student draws a gorgeous digital image on her school computer. She decides she wants to show her brother, so she saves it and later downloads the image onto her home computer. When she opens and resizes the image at home, the quality is noticeably inferior to the original she saved. Which of the following is a reasonable explanation for the reduced quality? (A) Low bandwidth of her Wi-Fi connection caused a slow download. (B) High latency of her Wi-Fi connection caused a delay in starting the download. (C) The process she used to save the image utilized a "lossless" compression algorithm. (D) The process she used to save the image utilized a "lossy" compression algorithm.

d

Digital data can be compressed in order to reduce file size, and speed of transmission through a network. While some compression techniques are lossy, others preserve the original data in the compressed form. Compression techniques (lossy or lossless) can do the following, EXCEPT: (A) Combine multiple files to create a single, compressed file that can be restored to its original form (B) Compress a high resolution photo to a low resolution format such as .jpg (C) Extract a compressed zip file to its original size (D) Enlarge a file in order to increase the resolution in the original, thereby increasing the file size

d

If Alice wishes to send Bob an encrypted message using public-key encryption, she should encrypt her message with ________________, (A) her private key (B) her public key (C) Bob's private key (D) Bob's public key

d

In the process of digging, a landscaping company cuts a fiber line. Transmission of Internet traffic is still possible through additional pathways that provide alternate routes between the source and destination. The additional pathways describe a concept known as: (A) bandwidth (B) hierarchy (C) latency (D) redundancy

d

When building internet networks it is important to consider redundancy. Which of the following is an example of redundancy? (A) Optimizing the system so that a single request has the shortest time between request and receipt (B) Optimizing the system so that as much data as possible can be transferred in a given amount of time (C) The hierarchical nature of the internet allows for massive growth (D) Ensuring that if any single node in the network were to stop working, packets can still be delivered

d

Which of the following statement about algorithmic efficiency is correct? (A) Any algorithm that correctly solves a problem will have the same efficiency as any other algorithm that correctly solves that same problem. (B) If an algorithm is considered efficient, it will always be rather simple and contain little code. (C) When determining the overall efficiency of an algorithm, time is the only factor considered. (D) Formal reasoning can be used to determine the efficiency of an algorithm.

d

Which type of chart would best display the individual data from 1,000 individuals' daily time spent in social media? (A) Pie Chart (B) Bar Chart (C) Line Chart (D) Scatter Plot

d

You are given a 32-bit word which was copied from computer RAM and are asked to determine what was represented by the word. Which of the following represents the most complete response? I. The 32-bit word could be integer data as binary is how data is always represented in RAM. II. The 32-bit word could be an instruction for the CPU as hardware processes binary words. III. We cannot be certain as to what the word represented without more information. (A) I only (B) II only (C) I and II (D) I, II and III

d

You write an algorithm in your program to that calculates and prints the total miles traveled during a road trip. When you test your algorithm, it does not print the correct value. Which of the following would NOT be a productive way to debug the code? (A) Go through each line of your algorithm and make sure each one is logical and makes sense. (B) Print the value of miles after each calculation (C) Ask a colleague to look at your algorithm to see if they can debug the code. (D) Delete the entire algorithm and start over

d


Ensembles d'études connexes

Micro Exam 3: Examples of Symbiosis Biofilms and Microbiome

View Set

Honors US History Chapter 23 Study Guide

View Set

SCIPAD: Types of monohybrid inheritance

View Set

Incorrect NCLEX Questions Part 2

View Set

The Challenges of Starting a Business (Chap. 5)

View Set

Strategic Management ch. 9 Corporate Strategy: Strategic Alliances, Mergers and Acquisitions

View Set