AP CSP exam prep QU
For a given row in the spreadsheet, suppose genre contains the genre as a string and day contains the day as a string. Which of the following expressions will evaluate to true if the show should be counted and evaluates to false otherwise?
(genre = "talk") AND ((day = "Saturday") OR (day = "Sunday"))
What is the highest possible score the ESPN website could display?
255
Which of the following is an advantage of a lossless compression algorithm over a lossy compression algorithm?
A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot.
Which ASCII character is represented by the decimal (base 10) number 72?
H
ASCII characters can also be represented by hexadecimal numbers. According to ASCII character encoding, which of the following letters is represented by the hexadecimal (base 16) number 56?
V
What is the binary RGB triplet for the color indigo?
(01001011, 00000000, 10000010)
For a given row in the spreadsheet, suppose genre contains the genre as a string, num contains the number of copies in stock as a number, and cost contains the cost as a number. Which of the following expressions will evaluate to true if the book should be counted and evaluates to false otherwise?
(genre = "mystery") AND ((1 ≤ num) AND (cost < 10.00))
Which of the following lists the numbers in order from least to greatest?
1001(2), 10(10), C(16)
What is the decimal value of 11012?
13
How many different digits are used in the Hexadecimal number system?
16
How many different values can be represented using 4 bits?
16 different values
Which of the following best describes the result of using 9-bit values instead of 8-bit values?
2 times as many items can be uniquely identified
Which of the following best describes the result of using 64-bit integers instead of 32-bit integers?
2(32) times as many values can be represented
Consider the 4-bit binary numbers 0011, 0110, and 1111. Which of the following decimal values is NOT equal to one of these binary numbers?
9
Which of the following best exemplifies the use of multifactor authentication?
A Web site requires a user to enter a password as well as a numeric code received via text message before the user can log in to an account.
A computer program uses 3 bits to represent integers. When the program adds the decimal (base 10) numbers 5 and 3, the result is 0. Which of the following is the best explanation for the result?
An overflow error occurred.
A computer program uses 3 bits to represent integers. When the program adds the decimal (base 10) numbers 6 and 2, the result is 0. Which of the following is the best explanation for this result?
An overflow error occurred.
A certain programming language uses 4-bit binary sequences to represent nonnegative integers. For example, the binary sequence 0101 represents the corresponding decimal value 5. Using this programming language, a programmer attempts to add the decimal values 14 and 15 and assign the sum to the variable total. Which of the following best describes the result of this operation?
An overflow error will occur because 4 bits is not large enough to represent 29, the sum of 14 and 15.
Which number system is used to store information digitally in a computer?
Binary (base 2)
A user wants to save a data file on an online storage site. The user wants to reduce the size of the file, if possible, and wants to be able to completely restore the file to its original version. Which of the following actions best supports the user's needs?
Compressing the file using a lossless compression algorithm before uploading it
Digital images are often represented by the red, green, and blue values (an RGB triplet) of each individual pixel in the image. A photographer is manipulating a digital image and overwriting the original image. Which of the following describes a lossless transformation of the digital image?
Creating the negative of an image by creating a new RGB triplet for each pixel in which each value is calculated by subtracting the original value from 255. The negative of an image is reversed from the original; light areas appear dark, and colors are reversed.
Which of the following is an example of symmetric encryption?
Finn and Gwen develop a system that maps each letter of the alphabet to a unique symbol using a secret key. Finn uses the key to write a message to Gwen where each letter is replaced with the corresponding symbol. Gwen uses the key to map each symbol back to the original letter.
A video game character can face toward one of four directions: north, south, east, and west. Each direction is stored in memory as a sequence of four bits. A new version of the game is created in which the character can face toward one of eight directions, adding northwest, northeast, southwest, and southeast to the original four possibilities. Which of the following statements is true about how the eight directions must be stored in memory?
Four bits are enough to store the eight directions.
Which of the following are true statements about the data that can be represented using binary sequences? Binary sequences can be used to represent strings of characters. Binary sequences can be used to represent colors. Binary sequences can be used to represent audio recordings.
I, II, and III
A programmer is developing software for a social media platform. The programmer is planning to use compression when users send attachments to other users. Which of the following is a true statement about the use of compression?
Lossy compression of an image file generally provides a greater reduction in transmission time than lossless compression does.
Which of the following is a true statement about the use of public key encryption in transmitting messages?
Public key encryption enables parties to initiate secure communications through an open medium, such as the Internet, in which there might be eavesdroppers.
Which of the following best describes the result of applying this filter to every pixel in the image?
The image will be inverted, bright pixels will become dark and dark pixels will become bright.
The position of a runner in a race is a type of analog data. The runner's position is tracked using sensors. Which of the following best describes how the position of the runner is represented digitally?
The position of the runner is sampled at regular intervals to approximate the real-word position, and a sequence of bits is used to represent each sample.
Which of the following could be a possible explanation for the difference in image quality?
The saved image files were compressed with a lossy compression technique.
Which of the following best describes a privacy risk that could occur if this method of data collection is misused?
The vehicle location data could be used to monitor the movements of city residents.
Which of the following is a true statement about data compression?
There are trade-offs involved in choosing a compression technique for storing and transmitting data.
Which of the following is a true statement about the color encoded by this binary sequence:
This color is mostly red.
A new rechargeable battery pack is available for products that use AA batteries. Which of the following best explains how the data files in the table can be used to send a targeted e-mail to only those customers who have purchased products that use AA batteries to let them know about the new accessory?
Use the products file to generate a list of product IDs that use AA batteries, then use the list of product IDs to search the purchases file to generate a list of customer IDs, then use the list of customer IDs to search the customers file to generate a list of e-mail addresses
ASCII characters can also be represented by hexadecimal (base 16) numbers. According to the ASCII character encoding, which of the following characters is represented by the hexadecimal (base 16) number 6E16
n