APCSP Big-Ideas Review

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is the minimum number of connections that must be broken or removed in the network before computer E can no longer communicate with computer F?

1

Each student that enrolls at a school is assigned a unique ID number, which is stored as a binary number. The ID numbers increase sequentially by 1 with each newly enrolled student. If the ID number assigned to the last student who enrolled was the binary number 1001 0011, what binary number will be assigned to the next student who enrolls?

1001 0100

An office uses an application to assign work to its staff members. The application uses a binary sequence to represent each of 100 staff members. What is the minimum number of bits needed to assign a unique bit sequence to each staff member?

7

Which of the following best explains how a certificate authority is used in protecting data?

A certificate authority verifies the authenticity of encryption keys used in secured communications.

A person wants to transmit an audio file from a device to a second device. Which of the following scenarios best demonstrates the use of lossless compression of the original file?

A device compresses the audio file before transmitting it to a second device. The second device restores the compressed file to its original version before playing it.

A list of binary values (0 or 1) is used to represent a black-and-white image. Which of the following is LEAST likely to be stored as metadata associated with the image?

A duplicate copy of the data

Which of the following is an advantage of a lossless compression algorithm over a lossy compression algorithm?

A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot.

A system is being developed to help pet owners locate lost pets. Which of the following best describes a system that uses crowdsourcing?

A mobile application that allows users to report the location of a pet that appears to be lost and upload a photo that is made available to other users of the application

Which of the following actions is most likely to raise legal or ethical concerns?

A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song.

Which of the following school policies is most likely to have a positive impact on the digital divide?

A school provides a laptop or tablet computer to all students enrolled at the school

Which of the following best explains what happens when a new device is connected to the Internet?

An Internet Protocol (IP) address is assigned to the device.

Which of the following activities is most likely to be successful as a citizen science project?

Collecting pictures of plants from around the world that can be analyzed to look for regional differences in plant growth

A user wants to save a data file on an online storage site. The user wants to reduce the size of the file, if possible, and wants to be able to completely restore the file to its original version. Which of the following actions best supports the user's needs?

Compressing the file using a lossless compression algorithm before uploading it

Consider the following numeric values. • Binary 1011 • Binary 1101 • Decimal 5 • Decimal 12 Which of the following lists the values in order from least to greatest?

Decimal 5, binary 1011, decimal 12, binary 1101

Which of the following actions is most likely to help reduce the digital divide?

Deploying satellites and other infrastructure to provide inexpensive Internet access to remote areas of Earth

A digital photo file contains data representing the level of red, green, and blue for each pixel in the photo. The file also contains metadata that describes the date and geographic location where the photo was taken. For which of the following goals would analyzing the metadata be more appropriate than analyzing the data?

Determining the likelihood that the photo was taken at a particular public event

Which of the following best describes the role of the Internet Engineering Task Force (IETF) ?

Developing standards and protocols for Internet communication

Biologists often attach tracking collars to wild animals. For each animal, the following geolocation data is collected at frequent intervals. • The time • The date • The location of the animal Which of the following questions about a particular animal could NOT be answered using only the data collected from the tracking collars?

Do the movement patterns of the animal vary according to the weather?

Which of the following best explains how data is typically assembled in packets for transmission over the Internet?

Each packet contains data to be transmitted, along with metadata containing information used for routing the data.

Which of the following is a true statement about Internet communication?

Every device connected to the Internet is assigned an Internet protocol (IP) address.

A video game character can face toward one of four directions: north, south, east, and west. Each direction is stored in memory as a sequence of four bits. A new version of the game is created in which the character can face toward one of eight directions, adding northwest, northeast, southwest, and southeast to the original four possibilities. Which of the following statements is true about how the eight directions must be stored in memory?

Four bits are enough to store the eight directions.

Directions: The question or incomplete statement below is followed by four suggested answers or completions. Select the one that is best in each case. Which of the following actions could be used to help reduce the digital divide? I. Providing free education and training on how to use computing devices II. Providing free or low-cost computing devices to low-income individuals III. Providing networks and infrastructure to people in remote areas

I, II, and III

Which of the following statements correctly explain how the Internet is able to facilitate communication at a large scale? 1. A central monitoring computer is used to track and maintain the connections of the Internet. 2. Data is routed between points in multiple ways so that if a connection fails, the data can be rerouted around the inoperative connections. 3. Protocols for packets and routing are used so that computers from different manufacturers can communicate in a standard way

II and III only

Internet protocol version 6 (IPv6) has been introduced to replace the previous version (IPv4). Which of the following best describes a benefit of IPv6 over IPv4?

IPv6 allows for a greater number of addresses than IPv4, which allows more devices to be connected to the Internet

Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?

Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer.

The developers of a music-streaming application are updating the algorithm they use to recommend music to listeners. Which of the following strategies is LEAST likely to introduce bias into the application?

Making recommendations based on listening data gathered from a random sample of users of the application

Which of the following is a primary reason for the use of open protocols on the Internet?

Open protocols provide a way to standardize data transmission between different devices.

A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet. Which of the following activities is LEAST likely to be effective in this purpose?

Putting all government forms on the city Web site

A software company is designing a mobile game system that should be able to recognize the faces of people who are playing the game and automatically load their profiles. Which of the following actions is most likely to reduce the possibility of bias in the system?

Testing the system with people of different ages, genders, and ethnicities

Which of the following best describes the relationship between the World Wide Web and the Internet?

The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.

Which of the following is a characteristic of the fault-tolerant nature of routing on the Internet?

The ability to provide data transmission even when some connections have failed

From the perspective of the application's developers, which of the following is most likely to be a benefit of storing all user data in a database?

The developers can analyze the data to make improvements to the application based on user behavior.

A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent to the user?

The file is broken into packets for transmission. The packets must be reassembled upon receipt.

Which of the following best explains how messages are typically transmitted over the Internet?

The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device.

Which of the following statements best explains the ability of the network to provide fault tolerance?

The network is considered fault-tolerant because there are redundant paths between each pair of devices

A student is recording a song on her computer. When the recording is finished, she saves a copy on her computer. The student notices that the saved copy is of lower sound quality than the original recording. Which of the following could be a possible explanation for the difference in sound quality?

The song was saved using fewer bits per second than the original song.

The transmission control protocol (TCP) and Internet protocol (IP) are used in Internet communication. Which of the following best describes the purpose of these protocols?

To establish a common standard for sending messages between devices on the Internet

StreamPal is an audio-streaming application for mobile devices that allows users to listen to streaming music and connect with other users who have similar taste in music. After downloading the application, each user creates a username, personal profile, and contact list of friends who also use the application. The application uses the device's GPS unit to track a user's location. Each time a user listens to a song, the user can give it a rating from 0 to 5 stars. The user can access the following features for each song that the user has rated. A list of users on the contact list who have given the song the same rating, with links to those users' profiles A map showing all other users in the area who have given the song the same rating, with links to those users' profiles A basic StreamPal account is free, but it displays advertisements that are based on data collected by the application. For example, if a user listens to a particular artist, the application may display an advertisement for concert tickets the next time the artist comes to the user's city. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application. Which of the following is most likely to be a data privacy concern for StreamPal users?

Users of the application may have the ability to determine information about the locations of users that are not on their contact list.

MeeReader is an e-reading application that allows users to download and read books and articles on a device. Each user creates a profile with the following personal preferences. Screen brightness and contrast Choice of typeface and font size Amount of spacing between lines of text Activation of a text-to-speech feature that reads the text out loud When the user launches the application, the application scans the user's face and uses facial recognition software to AP Computer Science Principles Test Booklet Midterm Review Big Idea 5 Copyright © 2021. The College Board. These materials are part of a College Board program. Use or distribution of these materials online or in print beyond your school's participation in the program is prohibited. Page 3 of 7 determine the user's identity. Once the user has been identified, the user's personal preferences are applied to whatever book or article the user chooses to read. The application stores all user information in a database, including personal preferences and a record of previously read books and articles. Which of the following is most likely to be a beneficial effect of using MeeReader?

Users with visual impairments may be able to more easily read or listen to books and articles.

A media librarian at a movie studio is planning to save digital video files for archival purposes. The movie studio would like to be able to access full-quality videos if they are needed for future projects. Which of the following actions is LEAST likely to support the studio's goal?

Using lossy compression software to reduce the size requirements of the data being stored

A musician is creating a song using audio samples. Which of the following actions will minimize the risk of a copyright violation when creating sample-based music?

Using samples published with a no-rights-reserved Creative Commons license

An Internet service provider (ISP) is considering an update to its servers that would save copies of the Web pages most frequently visited by each user. Which of the following is LEAST likely to occur as a result of the update?

Web sites that are not visited frequently might no longer be accessible to users.

According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?

about.example.com


संबंधित स्टडी सेट्स

TURP transurethral resection of the prostate

View Set

Research Methods Study Questions Ch. 1-9

View Set

Sterile Compounding and Hazardous Drugs

View Set