AP Computer Science 3 Unit Tests Combined

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is true of intellectual property? A. Information created on a computer is not owned by anyone since only analog information is protected under copyright law. B. You do not need to cite work created by someone else if both the original work and your use of it are in digital form. C. Creative Commons enables content creators to freely distribute their otherwise copyrighted work. D. Creative Commons has severely hindered broad and open access to digital information

C. Creative Commons enables content creators to freely distribute their otherwise copyrighted work.

Convert the decimal (base-10) number 20 to binary (base-2). A. 10010 B. 00101 C. 11000 D. 10100

D. 10100

How many total numbers can be represented with an 8-bit binary (base-2) system? A. 127 B. 128 C. 255 D. 256

D. 256

Which of the following best describes the existence of undecidable problems? A. Undecidable problems are problems for which more than one algorithm solves the problem and computer scientists have not yet chosen the algorithm they believe is best B. Undecidable problems are problems for which an algorithm can be written that will produce the same output for at least two possible inputs C. Undecidable problems are problems for which an algorithm can be written that produces a correct output for all inputs but in an unreasonable time D. An undecidable problem is a problem for which no algorithm can be constructed that always produces a correct output

D. An undecidable problem is a problem for which no algorithm can be constructed that always produces a correct output

Which of the following Internet protocols is used to request and send pages and files on the World Wide Web? A. Transmission Control Protocol (TCP) B. Internet Protocol (IP) C. User Datagram Protocol (UDP) D. HyperText Transfer Protocol (HTTP)

D. HyperText Transfer Protocol (HTTP)

11. Jorge is sending a large image file to a friend as part of a shared classroom project. Which of the following is most likely true if Jorge opts to compress the image before sending it? A. The image can no longer be represented using bits. B. The image will have been converted into an analog form. C. The image will require more pixels to display it on the screen. D. The image will require fewer bits in order to be represented.

D. The image will require fewer bits in order to be represented.

Which of the following situations is most likely to cause issues arising from the digital divide? A. A state makes voter registration forms available only by visiting a government website B. Two internet-connected devices located in different countries and thousands of miles apart attempt to communicate with one another C. Packets sent from one router to another begin arriving in a different order than they were sent D. A smartphone attempts to communicate over the Internet with another type of device, like a tablet or laptop

A. A state makes voter registration forms available only by visiting a government website

Which of the following best describes the purpose of an IP address? A. IP addresses provide a unique number for identifying devices that send and receive information on the Internet B. IP addresses assist in the reconstruction of a message that has been divided into many packets C. IP addresses indicate the location where an internet-connected computing device was manufactured D. IP addresses indicate how many times an individual packet has been requested by a router

A. IP addresses provide a unique number for identifying devices that send and receive information on the Internet

The following algorithm is followed by a person every morning when they get up from bed to go to school 1) Wake up 2) Brush teeth 3) Put on shirt 4) Put on pants 5) Put on socks 6) Put on shoes 7) Tie shoes Which concept does this algorithm BEST demonstrate? A. Sequencing B. Selection C. Iteration D. Execution

A. Sequencing

Which of the following Internet protocols is MOST important in reassembling packets and requesting missing packets to form complete messages? A. Transmission Control Protocol (TCP) B. Internet Protocol (IP) C. User Datagram Protocol (UDP) D. HyperText Transfer Protocol (HTTP)

A. Transmission Control Protocol (TCP)

Which of the following Internet protocols is MOST important in reassembling packets and requesting missing packets to form complete messages? A. Transmission Control Protocol (TCP) B. Internet Protocol (IP) C. User Datagram Protocol (UDP) D. HyperText Transfer Protocol (HTTP)

A. Transmission Control Protocol (TCP)

Two devices are connected to the Internet and communicating with one another. A squirrel chews through one of the wires in the network that is currently being used by the devices to communicate. The network immediately begins using a different path through the network and communication continues as normal. This situation best exemplifies which principle? A. fault-tolerance B. scalability C. protocol D. pathing

A. fault-tolerance

A school is creating class schedules for its students. The students submit their requested courses and then a program will be designed to find the optimal schedule for all students. The school has determined that finding the absolute best schedule cannot be solved in a reasonable time. Instead they have decided to use a simpler algorithm that produces a good but non-optimal schedule in a more reasonable amount of time. Which principle does this decision best demonstrate? A. Unreasonable algorithms may sometimes also be undecidable B. Heuristics can be used to solve some problems for which no reasonable algorithm exists C. Two algorithms that solve the same problem must also have the same efficiency D. Approximate solutions are often identical to optimal solutions

B. Heuristics can be used to solve some problems for which no reasonable algorithm exists

Your computer uses 4 bits to represent decimal numbers (0, 1, 2, 3 and so on) in binary. What is the SMALLEST number for which an overflow error occur? A. 14 B. 15 C. 16 D. 17

C. 16 Since 15 is the limit when the computer uses only 4 bits, the attempt of the computer going over 15 can create an overflow error

Which of the following best describes how computing devices represent information? A. A computer will either represent information as bits or bytes but not both B. A computer represents data as a byte which is either a 0 or a 1 C. A computer represents data as bits which is either a 0 or a 1 D. A computer represents information as bits which contain 8 bytes.

C. A computer represents data as bits which is either a 0 or a 1

Which of the following is true of algorithms? A Algorithms may have an infinite set of instructions B. Algorithms must be expressed using a programming language C. Every algorithm can be constructed using combinations of sequencing, selection, and iteration D. Every problem can be solved with an algorithm

C. Every algorithm can be constructed using combinations of sequencing, selection, and iteration

Which of the following algorithmic efficiencies would be considered LEAST efficient? A. Linear B. Constant C. Polynomial D. Exponential

Exponential

Which of the following binary (base-2) numbers is LARGEST? A. 11000000 B. 01111111 C. 00000001 D. 10111111

A. 11000000

6, Convert the binary (base-2) number 1001 to decimal (base-10). A. 9 B. 10 C. 16 D. 17

A. 9

Which of the following is NOT true of how computers represent complex information? A. Computing devices use patterns of bits to represent complex information B. Abstraction helps represent complex information by surfacing complexity that might otherwise be hidden C. Depending on context the same sequence of bits may represent different types of information D. Common abstractions that are represented by computing devices include numbers, characters, and color.

B. Abstraction helps represent complex information by surfacing complexity that might otherwise be hidden

A town government is designing a new bus system. The planners are deciding where to put the different bus stops. They want to pick a set of bus stop locations that will minimize the distance anyone needs to walk in order to get to any bus stop in town. What term best defines this kind of problem? A decision problem B. An optimization problem C. An undecidable problem D. An efficiency problem

B. An optimization problem

Arman takes a picture with his smartphone which he subsequently posts online. Beatrice finds the picture online and posts a copy of it on her website with an attached Creative Commons license. Which of the following best describes who owns the photo? A. Beatrice owns the photo because only holders of a Creative Commons license can own works online. B. Arman owns the photo because he was the original creator and did not license the work. C. Arman owns the photo because it was granted a Creative Commons license by another person online. D. Both own the photo because creating a copy makes it her intellectual property.

B. Arman owns the photo because he was the original creator and did not license the work. If Beatrice profit offs from this, she is not allowed to do so

10. Which of the following is true of lossy and lossless compression algorithms? A. Lossy compression algorithms are used when perfect reconstruction of the original data is important. B. Lossy compression algorithms are typically better than lossless compression algorithms at reducing the number of bits needed to represent a piece of data. C. Lossless compression algorithms are only used to compress text data. D. Lossless compression algorithms only allow for an approximate reconstruction of the original data. Correct answer

B. Lossy compression algorithms are typically better than lossless compression algorithms at reducing the number of bits needed to represent a piece of data.

Which of the following is true of how packets are sent through the Internet? A. Packet metadata is only included on important packets to indicate they should get access to faster paths through the network B. Packet metadata is used to route and reassemble information travelling through the Internet C. Information sent through the internet is only encapsulated in packets if the message is too large to be sent as a datastream D. Information sent through the internet is split into two packets, one which contains the message and another which contains the metadata

B. Packet metadata is used to route and reassemble information travelling through the Internet

Which of the following is MOST likely to be an outcome of the digital divide? A. Certain companies will be unable to certify their technology as digitally secure. B. People from some racial or ethnic groups have unequal access to computing technology. C. People will have equal access and influence both globally and locally. D. Political groups in some countries are unable to agree on regulations of digital technology.

B. People from some racial or ethnic groups have unequal access to computing technology.

When visiting a museum Lian takes a photo of a painting with a smartphone which stores the photo as an image file. Which of the following best describes the differences between the painting itself and the photo of the painting stored on the smartphone? A. Both the painting and the photo are analog B. The photo is a digital representation of the analog painting C. Sampling can be used to determine whether the analog image is an accurate representation of the painting D. The phone can represent the photo in either digital or analog formats depending on the sampling technique that is used

B. The photo is a digital representation of the analog painting

Which of the following is true of how computers represent numbers? A. Using a fixed but large number of bits can eliminate the possibility of round off error when representing numbers in binary B. With a fixed number of bits some numbers are too large to represent in a computer which will lead to overflow errors. C. Using a fixed but large number of bits, for example 128, eliminates the possibility of overflow errors. D. With a large but fixed number of bits it is possible to eliminate either round-off errors or overflow errors, but not both.

B. With a fixed number of bits some numbers are too large to represent in a computer which will lead to overflow errors.

An Internet Service Provider (ISP) is a company that builds the routers and wired connections that allow individuals to access the Internet. An ISP is considering adding additional redundant connections to its network. Which of the following best describes why the company would choose to do so? A. It costs less to design a network that is redundant B. The protocols of the Internet only work on networks that are redundant C. Redundant networks are more reliable D. Adding additional connections reduces the fault-tolerance of the network

C. Redundant networks are more reliable

Which of the following is true of how the Internet has responded to the increasing number of devices now using the network? A. The Internet protocols are changed every year to adapt to the new devices that have been connected to the network B. While the number of devices connected to the Internet has grown, the network itself has not grown C. The protocols of the Internet were designed to scale as new devices are added D. The protocols of the Internet are no longer necessary thanks to the large number of devices now connected to the network

C. The protocols of the Internet were designed to scale as new devices are added

Ryan is designing an app that needs to quickly send low quality photos between users. Most smartphones take much higher quality photos than Ryan needs for his app. Which answer best describes the type of compression Ryan should choose and why? A. Lossless compression since it ensures perfect reconstruction of the photo. B. Lossy compression since it ensures perfect reconstruction of the photo. C. Lossless compression since it typically results in smaller data sizes. D. Lossy compression since it typically results in smaller data sizes.

D. Lossy compression since it typically results in smaller data sizes. Understand that Ryan wants to send low quality photos between users and other phone take up unnecessary high quality photos so lossy compression is the best

Emilee is watching an online video. The video is being sent to her laptop by a server over the Internet which splits the video into packets and sends them in the order they appear in the video. Which of the following is true about how the packets will arrive at her computer? A. The packets will always be received in the order that they were sent B. Either every packet will reach her computer or none of them will. C. Packets that arrive out of order will be sent back to the server. D. The packets may arrive out of order

D. The packets may arrive out of order

Emilee is watching an online video. The video is being sent to her laptop by a server over the Internet which splits the video into packets and sends them in the order they appear in the video. Which of the following is true about how the packets will arrive at her computer? A. The packets will always be received in the order that they were sent B. Either every packet will reach her computer or none of them will. C. Packets that arrive out of order will be sent back to the server. D. The packets may arrive out of order

D. The packets may arrive out of order

Which of the following best describes the protocols used on the Internet? A. The protocols of the Internet are designed by government agencies to ensure they remain free to use B. The protocols of the Internet are secret to maintain the privacy and security of people using them C. Each device connected to the Internet will use a protocol designed by the company that manufactured it D. The protocols of the Internet are open and used by all devices connected to the network

D. The protocols of the Internet are open and used by all devices connected to the network

Lucy is completing a project as part of a science class using materials she found online. Which of the following is MOST LIKELY to lead to legal consequences? A. Modifying a piece of open source software. B. Using open access research for which she does not acquire a license. C. Failing to publish her work under a Creative Commons license. D. Using images posted online by another student without permission or citation.

D. Using images posted online by another student without permission or citation.

A programmer has created a program that models the growth of foxes and rabbits. Which os the following potential aspects of the simulation does NOT need to be implemented? a) A representation of grass that rabbits must eat frequently to survive b) Each rabbit may only have a certain amount of children per litter c) Each fox must eat a rabbit frequently to survive d) Each rabbit can only live to a certain age, assuming that they are not eaten

a) A representation of grass that rabbits must eat frequently to survive

Why is it important that online systems with large data sets be scalable? a) If the workload placed on the system increases, the resulting decrease in performance can be mitigated b) If the workload placed on the system increases, the resulting increase in performance can be mitigated c) If a system is scalable, all future programs will run faster d) If a system is scalable, all future programs are guaranteed to run properly

a) If the workload placed on the system increases, the resulting decrease in performance can be mitigated Scalable systems demonstrate improved performance when additional hardware is added to the system. The benefit here is that the potential workload can be increased without damaging the overall performance

What is the benefit of using a programming library? a) Programming libraries include procedures for common functions, such as exponents, which saves programmers from having to make such procedure themselves b) Programming libraries make it easy to translate code from one programming language to another c) Programming libraries allow people to derive code from a compiled program because they correspond between complied and high-level code d) Programming libraries allow users to send procedures from their own programs between each other

a) Programming libraries include procedures for common functions, such as exponents, which saves programmers from having to make such procedure themselves Libraries contain functions that are useful for most users, but that are not directly supported by the bare language. While a method such as an exponent function might be easy to write, saving the programmer from having to do so makes the programming process more efficient

A theme park wants to create a simulation to determine how long it should expect the wait time at its most popular ride? Which of the following characteristic for the virtual patrons would be the most useful? Select two answers a) Ride preference - denotes whether a patron prefers a rollar coaster, other thrill rides, gentle rides, or no rides b) Walking preference - denotes how far a patron is willing to walk in between rides c) Food preference - denotes the type of food that a patron prefers to eat (eg - chicken, burgers, salads) d) Ticket type - denotes whether the patron has a single day pass, a multi-day pass, or an annual pass

a) Ride preference - denotes whether a patron prefers a rollar coaster, other thrill rides, gentle rides, or no rides b) Walking preference - denotes how far a patron is willing to walk in between rides

Why do most data-analyzing programs include options for creating graphs? a) Graphs are less taxing on the computer's graphics card than a plain spreadsheet b) Graphs make it easier to interpret data values, trends, and proportions, so they are an incredibly useful feature c) It is easier to code a graph-based data analyzer than a spreasheet-based one d) It is harder to make spreadsheets properly display because the resulting file is not an image

b) Graphs make it easier to interpret data values, trends, and proportions, so they are an incredibly useful feature Graphs are useful for summarizing and finding trends in data, so a quick way to create them makes it easier to find abnormalities or reach concluions


Ensembles d'études connexes

AP Physics Midterm Review- Kinematics

View Set

VYC1 Principles of Accounting- Chapters 1-15

View Set

New Jersey Laws, Rules, and Regulations Common to All Lines

View Set

Unit 5 Nervous System & Psychiatry

View Set

Ch 7.1:Sound Byte: Installing a Home Computer Network

View Set