AP CSP "AP Test" 2023 practice

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Internet protocol version 4 (IPv4) represents each IP address as a 32-bit binary number. Internet protocol version 6 (IPv6) represents each IP address as a 128-bit binary number. Which of the following best describes the result of using 128-bit addresses instead of 32-bit addresses?

2% times as many addresses are available.

A store uses binary numbers to assign a unique binary sequence to each item in its inventory. What is the minimum number of bits required for each binary sequence if the store has between 75 and 100 items in its inventory?

7

An office uses an application to assign work to its staff members. The application uses a binary sequence to represent each of 100 staff members. What is the minimum number of bits needed to assign a unique bit sequence to each staff member?

7

A sorted list of numbers contains 128 elements. Which of the following is closest to the maximum number of list elements that can be examined when performing a binary search for a value in the list?

8

A text-editing application uses binary sequences to represent each of 200 different characters. What is the minimum number of bits needed to assign a unique bit sequence to each of the possible characters?

8

Line 1: PROCEDURE ageGroup(age) Line 2: { Line 3: result ←← "adult" Line 4: IF(age ≥ 65) Line 5: { Line 6: result ←← "senior citizen" Line 7: } Line 8: RETURN(result) Line 9: Line 10: result ←← "adult" Line 11: IF(age < 18) Line 12: { Line 13: result ←← "minor" Line 14: } Line 15: RETURN(result) Line 16: } Removing which two lines of code will cause the procedure to work as intended?

8,10

Which of the following best explains how a certificate authority is used in protecting data?

A certificate authority verifies the authenticity of encryption keys used in secured communications.

A person wants to transmit an audio file from a device to a second device. Which of the following scenarios best demonstrates the use of lossless compression of the original file?

A device compresses the audio file before transmitting it to a second device. The second device restores the compressed file to its original version before playing it.

Which of the following best describes a challenge involved in using a parallel computing solution?

A parallel computing solution may not be appropriate for an algorithm in which each step requires the output from the preceding step.

Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system?

A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user's computer using the recorded data.

Which of the following best exemplifies the use of multifactor authentication to protect an online banking system?

After entering a password for an online bank account, a user must also enter a code that is sent to the user's phone via text message.

Individuals sometimes attempt to remove personal information from the Internet. Which of the following is the LEAST likely reason the personal information is hard to remove?

All personal information is stored online using authentication measures, making the information hard to access.

Which of the following best explains how an analog audio signal is typically represented by a computer?

An analog audio signal is measured at regular intervals. Each measurement is stored as a sample, which is represented at the lowest level as a sequence of bits.

A library of e-books contains metadata for each book. The metadata are intended to help a search feature find books that users are interested in. Which of the following is LEAST likely to be contained in the metadata of each e-book?

An archive containing previous versions of the e-book

Which of the following would be the best use of citizen science?

An experiment that requires data measurements to be taken in many different locations

Which of the following is an example of an attack using a rogue access point?

An unauthorized individual gains the ability to view network traffic by connecting to a network router that uses weak or no security measures.

Which of the following best explains how IP addresses are assigned?

As a new device is connected to the Internet, it is assigned an IP address to enable communication on the network.

Which of the following best describes the two code segments?

Both code segments display the correct average, but code segment I requires more arithmetic operations than code segment II.

A bank customer receives an e-mail from a sender claiming to be a bank employee. The e-mail asks the customer to provide personal information and to call a phone number if he or she has any questions. The customer suspects the e-mail might be a phishing attempt. Which of the following responses is most likely to be a privacy risk for the bank customer?

Calling the phone number given in the e-mail and providing the personal information over the phone

Which of the following is NOT a benefit of collaborating to develop a computing innovation?

Collaboration eliminates the need to resolve differences of opinion.

Which of the following research proposals is most likely to be successful as a citizen science project?

Collecting pictures of birds from around the world that can then be analyzed to determine how location affects bird size

Which of the following best explains how data is transmitted on the Internet?

Data is broken into packets, which can be sent along different paths.

A group of students take hundreds of digital photos for a science project about weather patterns. Each photo file contains data representing the level of red, green, and blue for each pixel in the photo. The file also contains metadata that describes the date, time, and geographic location where the photo was taken. For which of the following goals would analyzing the metadata be more appropriate than analyzing the data?

Determining the chronological order of the photos Determining whether two photos were taken at the same location on different days

Which of the following best describes the role of the Internet Engineering Task Force (IETF) ?

Developing standards and protocols for Internet communication

Which of the following is a true statement about Internet communication?

Every device connected to the Internet is assigned an Internet protocol (IP) address.

Which of the following is an example of symmetric encryption?

Finn and Gwen develop a system that maps each letter of the alphabet to a unique symbol using a secret key. Finn uses the key to write a message to Gwen where each letter is replaced with the corresponding symbol. Gwen uses the key to map each symbol back to the original letter.

A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best explains the result of this configuration as compared to a configuration in which the router does not limit the bandwidth?

Guest users will be restricted in the maximum amount of data that they can send and receive per second.

Directions: The question or incomplete statement below is followed by four suggested answers or completions. Select the one that is best in each case. A smartphone stores the following data for each photo that is taken using the phone. The file name of the photo The date and time the photo was taken The geographic location where the photo was taken Assume that all of the photos that have been taken on the phone are accessible. Which of the following can be determined using the photo data described above? I. The number of photos that were taken at a particular geographic locationII. The number of photos that were taken in the last yearIII. The name of the person who took the most recent photo

I and II

Which of the following are true statements about how the Internet enables crowdsourcing? I. The Internet can provide crowdsourcing participants access to useful tools, information, and professional knowledge. II. The speed and reach of the Internet can lower geographic barriers, allowing individuals from different locations to contribute to projects. III. Using the Internet to distribute solutions across many users allows all computational problems to be solved in reasonable time, even for very large input sizes.

I and II

Which of the following actions could be used to help reduce the digital divide? I. Providing free education and training on how to use computing devicesII. Providing free or low-cost computing devices to low-income individualsIII. Providing networks and infrastructure to people in remote areas

I,II,III

Which of the following can be represented by a sequence of bits? An integer An alphanumeric character A machine language instruction

I,II,III

Internet protocol version 6 (IPv6) has been introduced to replace the previous version (IPv4). Which of the following best describes a benefit of IPv6 over IPv4?

IPv6 allows for a greater number of addresses than IPv4, which allows more devices to be connected to the Internet.

Which of the following statements is true about the network?

If devices B and F fail, then device A will not be able to communicate with device G.

The author of an e-book publishes the e-book using a no-rights-reserved Creative Commons license. Which of the following best explains the consequences of publishing the book with this type of license?

Individuals can freely distribute or use the contents of the e-book without needing to obtain additional permissions from the author.

Businesses have the ability to target advertisements to different groups of people who use RunRoutr. Which of the following groups is LEAST likely to receive targeted advertisements?

Individuals who sign up for a premium account

A certain social media application is popular with people across the United States. The developers of the application are updating the algorithm used by the application to introduce a new feature that allows users of the application with similar interests to connect with one another. Which of the following strategies is LEAST likely to introduce bias into the application?

Inviting a random sample of all users to try out the new algorithm and provide feedback before it is released to a wider audience

Which of the following best describes one of the benefits of using an iterative and incremental process of program development?

It helps programmers identify errors as components are added to a working program.

A student wants to create an algorithm that can determine, given any program and program input, whether or not the program will go into an infinite loop for that input. The problem the student is attempting to solve is considered an undecidable problem. Which of the following is true?

It is not possible to create an algorithm that will solve the problem for all programs and inputs.

A list of numbers is considered increasing if each value after the first is greater than or equal to the preceding value. The following procedure is intended to return true if numberList is increasing and return false otherwise. Assume that numberList contains at least two elements. Line 1: PROCEDURE isIncreasing(numberList) Line 2: { Line 3: count ←← 2 Line 4: REPEAT UNTIL(count > LENGTH(numberList)) Line 5: { Line 6: IF(numberList[count] < numberList[count - 1]) Line 7: { Line 8: RETURN(true) Line 9: } Line 10: count ←← count + 1 Line 11: } Line 12: RETURN(false) Line 13: } Which of the following changes is needed for the program to work as intended?

Lines 8 and 12 should be interchanged.

Which of the following explains a benefit of using open standards and protocols for Internet communication?

Open standards and protocols allow different manufacturers and developers to build hardware and software that can communicate with hardware and software on the rest of the network.

Which of the following best compares the values displayed by programs A and B?

Program A and program B display the same number of values, but the values differ

Which of the following is a true statement about the use of public key encryption in transmitting messages? Responses

Public key encryption enables parties to initiate secure communications through an open medium, such as the Internet, in which there might be eavesdroppers.

Which of the following best describes a direct benefit in using redundant routing on the Internet?

Redundancy often allows messages to be sent on the network even if some network devices or connections have failed.

A population researcher is interested in predicting the number of births that will occur in a particular community. She created a computer model that uses data from the past ten years, including number of residents and the number of babies born. The model predicted that there would be 200 births last year, but the actual number of births last year was only 120. Which of the following strategies is LEAST likely to provide a more accurate prediction?

Removing as many details from the model as possible so that calculations can be performed quickly

Which of the following are ways in which a programmer can use abstraction to manage the complexity of a program?

Replacing each instance of repeated code with a call to a procedure Replacing several lines of documentation with a single line of documentation name1,name2,name3, and name 4 with a list of strings called names

A state government is attempting to reduce the digital divide. Which of the following activities has the greatest potential to contribute to the digital divide rather than reducing it?

Requiring applicants for government jobs to apply using an online platform

An Internet user has a need to send private data to another user. Which of the following provides the most security when transmitting private data?

Sending the data using public-key encryption

In which of the following situations would it be most appropriate to choose lossy compression over lossless compression?

Storing music files on a smartphone in order to maximize the number of songs that can be stored

Which of the following best explains how symmetric encryption algorithms are typically used?

Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

Which of the following best explains the relationship between the Internet and the World Wide Web?

The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that is accessed via the Internet.

Which of the following statements about the Internet is true?

The Internet is designed to scale to support an increasing number of users.

A free online encyclopedia contains articles that can be written and edited by any user. Which of the following are advantages the online encyclopedia has over a traditional paper-based encyclopedia?

The ability to have a larger number of perspectives reflected in the encyclopedia content The ability to quickly update encyclopedia content as new information becomes available

A program developed for a Web store represents customer account balances using a format that approximates real numbers. While testing the program, a software developer discovers that some values appear to be mathematically imprecise. Which of the following is the most likely cause of the imprecision?

The account balances are represented using a fixed number of bits, resulting in round-off errors.

An online gaming company is introducing several new initiatives to encourage respectful communication between players of online games. Which of the following best describes a solution that uses crowdsourcing?

The company allows individual players to endorse fellow players based on courteous interactions. Once a player receives enough endorsements, the player is given free rewards that can be used during gameplay.

A video-streaming Web site keeps count of the number of times each video has been played since it was first added to the site. The count is updated each time a video is played and is displayed next to each video to show its popularity.

The count for the video became larger than the maximum value allowed by the data type used to store the count.

A small team of wildlife researchers is working on a project that uses motion-activated field cameras to capture images of animals at study sites. The team is considering using a "citizen science" approach to analyze the images. Which of the following best explains why such an approach is considered useful for this project?

The image analysis is likely to take a longer time for the research team than for a distributed group of individuals.

A computer program performs the operation 2/3 and represents the result .66667 as the value . Which of the following best explains this result?

The precision of the result is limited due to the constraints of using a floating-point representation.

In the following procedure, the parameter n is an integer greater than 2. Which of the following best describes the value returned by the procedure?

The procedure returns the sum of the integers from 1 to n.

Which of the following describes the result of executing the program?

The program displays the sum of the odd integers from 1 to 19.

In public key cryptography, the sender uses the recipient's public key to encrypt a message. Which of the following is needed to decrypt the message?

The recipient's private key

A binary number is to be transformed by appending three 0s to the end of the number. For example, 11101 is transformed to 11101000. Which of the following correctly describes the relationship between the transformed number and the original number?

The transferred number is 8 times as large

A user reads reviews of a popular artist's new album and then downloads the album from the Web site of a licensed online music seller. Which of the following is LEAST likely to be a consequence of this action?

The user will be in violation of the Digital Millennium Copyright Act (DMCA).

Which of the following best explains the ability to solve problems algorithmically?

There exist some problems that cannot be solved algorithmically using any computer.

Which of the following best describes the purpose of machine learning programs?

To analyze large data sets, recognize patterns, and make predictions based on data

Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are used?

Unauthorized individuals can use data mining and other techniques to guess a user's password.

Which of the following is most likely to be a data privacy concern for RunRoutr users?

Users of the application may have the ability to determine information about the locations of users that are not on their contact lists.

Which of the following is an example of a phishing attack? Responses

Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information

A media librarian at a movie studio is planning to save digital video files for archival purposes. The movie studio would like to be able to access full-quality videos if they are needed for future projects. Which of the following actions is LEAST likely to support the studio's goal?

Using lossy compression software to reduce the size requirements of the data being stored

A musician is creating a song using audio samples. Which of the following actions will minimize the risk of a copyright violation when creating sample-based music?

Using samples published with a no-rights-reserved Creative Commons license

A scientist wants to investigate several problems. In which of the following situations is using a simulation LEAST suitable for solving a problem?

When the solution to the problem requires real-world data inputs that are continually measured at regular intervals.

The following code segment is intended to remove all duplicate elements in the list myList. The procedure does not work as intended. j ←← LENGTH(myList) REPEAT UNTIL(j = 1) { IF(myList[j] = myList[j - 1]) { REMOVE(myList, j) } j ←← j - 1 } For which of the following contents of myList will the procedure NOT produce the intended results? Select two answers.

[10, 10, 20, 20, 10, 10] [30, 50, 40, 10, 20, 40]

The following code segment is used to move the robot in the grid. count ←← 1 REPEAT 4 TIMES { REPEAT count TIMES { MOVE_FORWARD() } ROTATE_LEFT() count ←← count + 1 } Which of the following code segments will move the robot from the center square along the same path as the code segment above?

count ←← 0 REPEAT 4 TIMES { count ←← count + 1 REPEAT count TIMES { MOVE_FORWARD() } ROTATE_LEFT() }

What are the values of the first and second as a result of executing the code segment?

first = 100 second = 100

A student is writing a program to model different real-world events using simulations. Which of the following simulations will generate a result that would best be stored using a Boolean variable?

flipping a coin

What is the minimum number of connections that must be broken or removed before device B can no longer communicate with device C?

four


संबंधित स्टडी सेट्स

Chapter 18: Care of Patients with Arthritis and Other Connective Tissue Diseases

View Set

Money & Banking Chapter 5 The Structure of Interest Rates

View Set

Manipulated -Independent Variables

View Set