AP Computer Science Principles Test Prep

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A library of e-books contains metadata for each book. The metadata are intended to help a search feature find books that users are interested in. Which of the following letters is LEAST likely to be contained in the metadata of each e-book? (A) An archive containing previous versions of the e-book (B) The author and title of the e-book (C) The date the e-book was first published (D) The genre of the e-book (e.g., comedy, fantasy, romance, etc.)

A

Which of the following letters best describes the purpose of machine learning programs? (A) To analyze large data sets, recognize patterns, and make predictions based on data (B) To automatically translate algorithms from natural language to machine language (C) To determine whether an algorithm can be constructed to answer "yes" or "no" for all possible inputs (D) To find approximate solutions to problems that would otherwise require an unreasonably long amount of time to solve

A

Which of the following letters best describes the role of the Internet Engineering Task Force (IETF) ? (A) Developing standards and protocols for Internet communication (B) Preventing copyrighted materials from being illegally distributed online (C) Preventing malicious software from being distributed online (D) Verifying the ownership of encrypted keys used in secured messages

A

Which of the following letters explains a benefit of using open standards and protocols for Internet communication? (A) Open standards and protocols allow different manufacturers and developers to build hardware and software that can communicate with hardware and software on the rest of the network. (B) Open standards and protocols provide ways for users to eliminate the latency of messages they send on the Internet. (C) Open standards and protocols allow users to freely share or reuse material found on the Internet for noncommercial purposes. (D) Open standards and protocols prevent developers from releasing software that contains errors.

A

A bank customer receives an e-mail from a sender claiming to be a bank employee. The e-mail asks the customer to provide personal information and to call a phone number if he or she has any questions. The customer suspects the e-mail might be a phishing attempt. Which of the following responses is most likely to be a privacy risk for the bank customer? (A) Calling the bank at its official phone number to ask whether the request for personal information is legitimate (B) Calling the phone number given in the e-mail and providing the personal information over the phone (C) Checking that the domain name of the sender's e-mail address is associated with the bank (D) Conducting a Web search to see if other people have received similar requests for personal information

B

A computer program uses 4 bits to represent nonnegative integers. Which of the following statements describe a possible result when the program uses this number representation? I. The operation 4+8 will result in an overflow error. II. The operation 7 + 10 will result in an overflow error. III. The operation 12 + 3 will result in an overflow error. (A) I only (B) II only (C) II and III only (D) I, II, and III

B

For which of the following strings is it NOT possible to use byte pair encoding to shorten the string's length? (A) "BANANA" (B) "LEVEL_UP" (C) "MEET_ME_LATER" (D) "NEITHER_HERE_NOR_THERE"

B

Which of the following letters allows users to refer to Web sites using names, such as example.com, rather than numbers, such as 93.184.216.34 ? (A) A digital certificate (B) The domain name system (DNS) (C) The hypertext transfer protocol (HTTP) (D) The simple mail transfer protocol (SMTP)

B

A NAND gate is a type of logic gate that produces an output of false only when both of its two inputs are true. Otherwise, the gate produces an output of true. Which of the following Boolean expressions correctly models a NAND gate with inputs P and Q ? (A) (NOT P) AND (NOT Q) (B) (NOT P) AND Q (C) NOT (P AND Q) (D) NOT (P OR Q)

C

A color is often represented by a 6-digit hexadecimal number that describes how the colors red, green, and blue are mixed to create the desired color. From left to right, the first two digits represent the amount of red, the second two digits represent the amount of green, and the last two digits represent the amount of blue. Which of the following hexadecimal numbers represents the color with the greatest amount of blue in it? (A) 0099A1 (B) A10099 (C) A100B0 (D) FFA100

C

A population researcher is interested in predicting the number of births that will occur in a particular community. She created a computer model that uses data from the past ten years, including number of residents and the number of babies born. The model predicted that there would be 200 births last year, but the actual number of births last year was only 120. Which of the following strategies is LEAST likely to provide a more accurate prediction? (A) Gathering data for additional years to try to identify patterns in birth rates (B) Refining the model used in the computer simulation to more closely reflect the data from the past ten years (C) Removing as many details from the model as possible so that calculations can be performed quickly (D) Taking into consideration more information about the community, such as the ages of residents

C

Which of the following letters describes how a distributed denial-of-service (DDoS) attack is most likely to compromise an online store's Web site? (A) By causing incorrect information about services to be displayed (B) By making it difficult for the site to safeguard customer login information (C) By preventing customers from placing orders (D) By preventing the store from filling previously placed orders

C

Which of the following letters is a true statement about Internet communication? (A) Devices from different manufacturers are required to run the same operating system to communicate over the Internet. (B) Every device connected to the Internet is assigned a digital certificate by a certificate authority. (C) Every device connected to the Internet is assigned an Internet protocol (IP) address. (D) Every device connected to the Internet requires a high-bandwidth connection to enable redundant routing to each device.

C

Which of the following letters is an underlying assumption that is made when Moore's law is used? (A) As computer hardware improves, the algorithms used in programs will become more efficient. (B) As computer hardware improves, developers will become more skilled at writing code. (C) As computer hardware improves, future computers will be able to run faster than current computers. (D) As computer hardware improves, the number of cybersecurity concerns will increase.

C

A musician is creating a song using audio samples. Which of the following actions will minimize the risk of a copyright violation when creating sample-based music? (A) Using samples found on popular music-streaming sites (B) Using samples found on peer-to-peer networks (C) Using samples from nondigital sound sources (vinyl records, tapes, etc.) (D) Using samples published with a no-rights-reserved Creative Commons license

D

A text-editing application uses binary sequences to represent each of 200 different characters. What is the minimum number of bits needed to assign a unique bit sequence to each of the possible characters? (A) 4 (B) 6 (C) 7 (D) 8

D

A user reads reviews of a popular artist's new album and then downloads the album from the Web site of a licensed online music seller. Which of the following letters is LEAST likely to be a consequence of this action? (A) Advertisements for the artist's other albums will be displayed when the user visits a different Web site. (B) Album reviews from other people who live nearby will be displayed to the user. (C) Similar artists will be recommended to the user based on the user's download selection. (D) The user will be in violation of the Digital Millennium Copyright Act (DMCA).

D

Internet protocol version 4 (IPv4) represents each IP address as a 32-bit binary number. Internet protocol version 6 (IPv6) represents each IP address as a 128-bit binary number. Which of the following letters best describes the result of using 128-bit addresses instead of 32-bit addresses? (A) 4 times as many addresses are available. (B) 96 times as many addresses are available. (C) 96^2 times as many addresses are available. (D) 2^96 times as many addresses are available.

D

The latency of a network connection is most appropriately measured with which of the following units? (A) Bits per byte (B) Bits per second (C) Bytes (D) Milliseconds

D

Which of the following letters best characterizes a high-level programming language? (A) A language comprised entirely of hardware logic gates (B) A language in which each instruction corresponds directly to an instruction in a computer's machine code (C) A language that is easy for a computer to interpret but difficult for humans to interpret (D) A language that uses multiple abstractions to manage complexity

D


Ensembles d'études connexes

Unit 3 (Corporate Actions and Questions)

View Set

Configuring Network Addressing and Internet Connections Lesson 5 Practice Question's

View Set

Managerial Accounting Chapter 12

View Set

Iggy Chp 35 - Care of Patients with Cardiac Problems, CH 33, 35 Cardiac, Nursing Management: Coronary Artery Disease and Acute Coronary Syndrome, Nursing Assessment: Cardiovascular System

View Set

ALS 20-6 AFH 33-337 The Tongue and Quill Chapter 12 Electronic Communications and Social Media

View Set

N405 Exam 1 Chapter 4: Finding Sources of Evidence

View Set

CONTEMP. ENVIRON. ISSUES: exam 2

View Set

chapters 17, 24, 25, & 18 exam review

View Set

Red Summer, Tuskegee Institute, Tulsa, and Scottsboro Boys

View Set