APCSP FINAL AND AP TEST

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A __________ is a mistake in the algorithm or program that causes it to behave incorrectly or unexpectedly. A. Logic error B. Syntax error C. Run-time error D. Overflow error

A. Logic error

Why are parameters useful when programming? A. Parameters allow for more flexible, generalized behaviors in functions. B. Parameters determine the number of times the function will run. C. Parameters are useful for teams of programmers because they help define the boundaries of the problem they are trying to solve. D. Parameters change the order of operations within a function.

A. Parameters allow for more flexible, generalized behaviors in functions.

It is the inclusion of extra components that can be used to mitigate failure of a system if other components fail. A. Redundancy B. Fault-tolerant C. Data stream D. Parallel Computing

A. Redundancy

What does protocol mean? A. Rules B. Security C. Orders D. Services

A. Rules

__________ is a computational model in which operations are performed in order one at a time. A. Sequential Computing B. Parallel Computing C. Distributed Computing D. Efficiency

A. Sequential Computing

Fill in the blank of the following statement: "______ encryption is a method of encryption involving one key for both encryption and decryption." A. Symmetric B. Asymmetric C. Public key D. SSL

A. Symmetric

It is an error that occurs when a computer attempts to handle a number that is outside of the defined range of values. A. Syntax error B. Overflow error C. Logic error D. Run-time error

B. Overflow error

These are data sent to a computer for processing by a program. A. Events B. Program inputs C. Program outputs D. Program design

B. Program inputs

Which of the following is considered an unethical use of computer resources? A. Downloading freeware or shareware onto your home computer B. Purchasing a single-user copy of photo editing software and installing it on all computers in a computer lab C. Purchasing a game from an app store and downloading it directly to a mobile device D. Searching online for an electronic version of a school textbook

B. Purchasing a single-user copy of photo editing software and installing it on all computers in a computer lab

What is Abstraction? A. The use of computers to solve problems. B. Representing 'real world' problems in a computer using variables and symbols and removing unnecessary elements from the problem. C. Breaking down a large problem into smaller sub-problems. D. Identifying the steps involved in solving a problem.

B. Representing 'real world' problems in a computer using variables and symbols

Which of the following is NOT true about TCP/IP packets? A. Packets are numbered so if they arrive out of order the message can be reassembled. B. TCP guarantees that no packets are ever dropped C. Packets can be routed on different paths from sender to receiver. D. Messages are broken into packets to improve reliability of the internet.

B. TCP guarantees that no packets are ever dropped

An online store uses 6-bit binary sequences to identify each unique item for sale. The store plans to increase the number of items it sells and is considering using 7-bit binary sequences. Which of the following best describes the result of using 7-bit sequences instead of 6-bit sequences? A. 2 more items can be uniquely identified. B. 10 more items can be uniquely identified. C. 2 times as many items can be uniquely identified. D. 10 times as many items can be uniquely identified.

C. 2 times as many items can be uniquely identified.

__________ is a computational model in which multiple devices are used to run a program. A. Sequential Computing B. Parallel Computing C. Distributed Computing D. Efficiency

C. Distributed Computing

A programmer is writing a program that is intended to be able to process large amounts of data. Which of the following considerations is LEAST likely to affect the ability of the program to process larger data sets? A. How long the program takes to run B. How much memory the program requires as it runs C. How many programming statements the program contains D. How much storage space the program requires as it runs

C. How many programming statements the program contains

A placeholder for a piece of information that can change A. Proxy B. Element C. Condition D. Variable

D. Variable

Which statement is true? A. A series of fluid, or flexible, steps including brainstorming, planning, creating, refining, and revision of your work is Creative Development Process B. A series of fluid, or flexible, steps including brainstorming, planning, creating, refining, and revision of your work is Creative Collaboration Process C. A series of fluid, or flexible, steps including brainstorming, planning, creating, refining, and revision of your work is Teamwork D. A series of fluid, or flexible, steps including brainstorming, planning, creating, refining, and revision of your work is Heuristic Process

A series of fluid, or flexible, steps including brainstorming, planning, creating, refining, and revision of your work is Creative Development Process

Programming languages have some similarities and differences to the "natural" language you use in everyday speech. Select the true statement about programming languages: A. Ambiguities in natural language necessitate the creation of programming languages for controlling a computer. B. There is only one possible way to interpret an instruction written in natural language. C. The number of defined words in a programming language is about the same as the number of words in a natural language. D. There are typically many possible ways to interpret an instruction written in a programming language.

A. Ambiguities in natural language necessitate the creation of programming

Which of the following is LEAST likely to indicate a phishing attack? A. An e-mail from your bank asks you to call the number on your card to verify a transaction B. An e-mail from a merchant asks that you click on a link to reset your password C. An e-mail from a utility company asks you to enter your date of birth and social security number for verification purposes. D. An e-mail indicates that you have won a large sum of money and asks you to enter your bank account number so that the money can be transferred to you

A. An e-mail from your bank asks you to call the number on your card to verify a

Transmission capacity measure by bit rate is the _____________. A. Bandwidth B. Latency C. Binary message D. Protocol

A. Bandwidth

It is a process that makes the data uniform without changing their meaning (e.g., replacing all equivalent abbreviations, spellings, and capitalizations with the same word) A. Cleaning data B. Formatting data C. Creating data D. Data review

A. Cleaning data

It is a form of program documentation written into the program to be read by people and does not affect how a program runs. A. Comment B. Acknowledgement C. Variables D. Functions

A. Comment

A program designed to run blocks of code or functions in response to specified events (e.g. a mouse click) A. Event-driven Program B. Action-driven Program C. Response-driven Program D. User-driven Program

A. Event-driven Program

Any valid unit of code that resolves to a value A. Expression B. Equation C. Program D. Formula

A. Expression

A piece of code you can use over and over again A. Function B. Abstraction C. Non-Function D. Expression

A. Function

Which of the following are true statements about how the Internet enables crowdsourcing? I. The Internet can provide crowdsourcing participants access to useful tools, information, and professional knowledge. II. The speed and reach of the Internet can lower geographic barriers, allowing individuals from different locations to contribute to projects. III. Using the Internet to distribute solutions across many users allows all computational problems to be solved in reasonable time, even for very large input sizes. A. I and II only B. I and III only C. II and III only D. I, II, and III

A. I and II only

Which of the following are true statements about digital certificates in Web browsers? I. Digital certificates are used to verify the ownership of encrypted keys used in secured communication. II. Digital certificates are used to verify that the connection to a Web site is fault tolerant. A. I only B. II only C. I and II D. Neither I and II

A. I only

How does a computer resolve a domain name into an IP address? A. It asks a DNS server for the corresponding IP address B. It scans addresses until it finds the one it's looking for C. It uses a Border Gateway Protocol to get the address from a nearby computer. D. It creates an IP address for the domain, and shares it with the closest DNS.

A. It asks a DNS server for the corresponding IP address

Which unit is the smallest? A. Kilobyte B. Megabyte C. Gigabyte D. Terabyte

A. Kilobyte

Which of the following BEST describes how protocols on the Internet (e.g. IP, TCP, HTTP) make use of abstraction to accomplish their respective purposes? A. Low level protocols can provide functionality to high level protocols without revealing the details of how this is accomplished. B. High level protocols take into account specific implementation details of lower level protocols to ensure they are compatible. C. Low level protocols are written in binary while high level protocols are written hexadecimal D. High level protocols can take on the role of a low level protocol in the event of failure in the system.

A. Low level protocols can provide functionality to high level protocols without

A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent to the user? A. The file is broken into packets for transmission. The packets must be reassembled upon receipt. B. The file is broken into packets for transmission. The user's browser must request each packet in order until all packets are received. C. The server attempts to connect directly to the user's computer. If the connection is successful, the entire file is sent. If the connection is unsuccessful, an error message is sent to the user. D. The server repeatedly attempts to connect directly to the user's computer until a connection is made. Once the connection is made, the entire file is sent.

A. The file is broken into packets for transmission. The packets must be

A student is recording a song on her computer. When the recording is finished, she saves a copy on her computer. The student notices that the saved copy is of lower sound quality than the original recording. Which of the following could be a possible explanation for the difference in sound quality? A. The song was saved using fewer bits per second than the original song. B. The song was saved using more bits per second than the original song. C. The song was saved using a lossless compression technique. D. Some information is lost every time a file is saved from one location on a computer to another location.

A. The song was saved using fewer bits per second than the original song.

Which of the following best describes the purpose of machine learning programs? A. To analyze large data sets, recognize patterns, and make predictions based on data B. To automatically translate algorithms from natural language to machine language C. To determine whether an algorithm can be constructed to answer "yes" or "no" for all possible inputs D. To find approximate solutions to problems that would otherwise require an unreasonably long amount of time to solve

A. To analyze large data sets, recognize patterns, and make predictions based on data

Which of the following is a reason to use lossy compression? A. You want to save space and are not concerned if the file is the highest quality possible. B. You want the compressed file to be larger than the original. C. You want the highest quality audio file possible, with no modifications. D. You want the highest quality image file possible, with no modifications.

A. You want to save space and are not concerned if the file is the highest quality possible.

Which of the following is an example of symmetric encryption? A. Evy buys a locked box that operates using two different codes. When the first code is entered, a slot opens that allows a message to be put in the box. When the second code is entered, the door to the box opens. Evy gives the first code to her friends so they can leave messages for her and keeps the second code to herself so that she is the only one who can retrieve the messages. B. Finn and Gwen develop a system that maps each letter of the alphabet to a unique symbol using a secret key. Finn uses the key to write a message to Gwen where each letter is replaced with the corresponding symbol. Gwen uses the key to map each symbol back to the original letter. C. Hannah writes a message to send to Isabel and hides the message under a rock behind the soccer field. Hannah gives Isabel the exact location of the rock so that only Isabel can find the message. D. Juan writes a message to send to Kelly and slides the message through a slot in the front of Kelly's locker. Juan knows that Kelly has not shared her locker combination with anyone, so no one other than Kelly will be able to read the message.

B. Finn and Gwen develop a system that maps each letter of the alphabet to a unique symbol using a secret key. Finn uses the key to write a message to Gwen where each letter is replaced with the corresponding symbol. Gwen uses the key to map each symbol back to the original letter.

Which of the following best describes the basic idea of fault tolerance? A. A system that never fails B. If part of the system fails, the operation continues without interruption C. A program that does not allow inputs out of a range given by a programmer D. A program that does not allow loss of precision

B. If part of the system fails, the operation continues without interruption

A compression scheme for long strings of bits called run-length encoding is described as follows: Rather than record each 0 and 1 individually, instead record "runs" of bits by storing the number of consecutive 1s and 0s that appear. Since it's binary, any run of 0s must be followed by a run of 1s (even if the run is only 1-bit long) and vice versa. Thus, you can store a list of small numbers that represents the alternating runs of 0s and 1s. Above is an example: To uncompress the data back into its original binary state, you simply reverse the process. This technique is an example of what type of compression? A. Lossy Compression B. Lossless Compression C. Fast Fourier Transform Compression D. Tailored Compression

B. Lossless Compression

Which of the following is a characteristic of the fault-tolerant nature of routing on the Internet? A. The ability to use a hierarchical naming system to avoid naming conflicts B. The ability to provide data transmission even when some connections have failed C. The ability to resolve errors in domain name system (DNS) lookups D. The ability to use multiple protocols such as hypertext transfer protocol (HTTP), Internet protocol (IP), and simple mail transfer protocol (SMTP) to transfer data

B. The ability to provide data transmission even when some connections have failed

______________ provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. A. Internet Task Force B. Transmission Control Protocol C. The Internet Service Provider D. World Wide Web

B. Transmission Control Protocol

The visual elements of a program through which a user controls or communications the application. A. Game Screen B. User Interface C. Dialog Box D. Visual System

B. User Interface

Which of the following will call the function drawStar? A. drawStar B. drawStar(); C. function drawStar; D. function drawStar();

B. drawStar();

What is one important naming convention of functions? A. A function name should indicate how long the function takes to run. B. Two functions with similar behavior should be given identical names to indicate the relationship between them. C. A function name should be as descriptive as possible to indicate what the function does. D. Function names should be organized alphabetically.

C. A function name should be as descriptive as possible to indicate what the

An expression that evaluates to true or false in programming is called _______. A. Variable Expression B. Algebraic Expression C. Boolean Expression D. Global Expression

C. Boolean Expression

What can help with identifying and correcting program errors? A. Revisiting requirements B. Clustering requirements and test C. Collaboration D. Consolidating testing

C. Collaboration

It is the practice of obtaining input or information from a large number of people via the Internet. A. Researching B. Information gathering C. Crowdsourcing D. Collecting data

C. Crowdsourcing

__________ are important tools for finding information and recognizing patterns in data. A. Visual tools B. Data extracting systems C. Data filtering systems D. Data monitoring systems

C. Data filtering systems

Which of the following is NOT true about functions in programming? A. Functions are reusable programming abstractions. B. Functions help reduce the complexity of writing and maintaining programs. C. Functions cannot make calls to other functions within the same program. D. Once defined, a function can be called many times from different parts of a program.

C. Functions cannot make calls to other functions within the same program.

An author is considering publishing an e-book using a Creative Commons license. In which of the following situations would it be better for the author to use a Creative Commons license instead of a traditional copyright? I. The author wants to make the e-book available as a free download. II. The author wants to prevent people from sharing copies of the e-book on peer-to- peer networks. III. The author wants to allow people permission to use and modify the e-book. A. I only B. II only C. I and III D. II and III

C. I and III

Software or applications that let a group of people work together in real-time over the internet A. Selection B. Online databases/libraries C. Online collaborative tools D. Linear search

C. Online collaborative tools

Small chunks of information that have been carefully formed from larger chunks of information A. Protocols B. IP Addresses C. Packets D. Routers

C. Packets

These are any data sent from a program to a device. A. Events B. Program inputs C. Program outputs D. Program design

C. Program outputs

When programmers work together, what is an example of how abstraction in programming can promote collaboration? A. Team members can rely on one another to explain their code. B. Programmers can write functions without needing to know what they do or how they should work. C. Programmers can use functions created by their partners, relying on the functionality without needing to know the specific details of how the function is implemented. D. In order for programmers to work together, they must work in the same room.

C. Programmers can use functions created by their partners, relying on the functionality without needing to know the specific details of how the function is implemented.

A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet. Which of the following activities is LEAST likely to be effective in this purpose? A. Holding basic computer classes at community centers B. Providing free wireless Internet connections at locations in low-income neighborhoods C. Putting all government forms on the city Web site D. Requiring that every city school has computers that meet a minimum hardware and software standard.

C. Putting all government forms on the city Web site

Which of the following activities poses the greatest personal cybersecurity risk? A. Making a purchase at an online store that uses public key encryption to transmit credit card information B. Paying a bill using a secure electronic payment system C. Reserving a hotel room by e-mailing a credit card number to a hotel. D. Withdrawing money from a bank account using an automated teller machine (ATM)

C. Reserving a hotel room by e-mailing a credit card number to a hotel.

It is a mistake in the program where the rules of the programming language are not followed. A. Run-time error B. Logic error C. Syntax error D. Overflow error

C. Syntax error

Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes the ability of the two computers to communicate with each other across the Internet? A. The computers cannot communicate because different manufacturers use different communication protocols. B. The computers can communicate, but additional hardware is needed to convert data packets from one computer's protocol to the other computer's protocol. C. The computers can communicate directly because Internet communication uses standard protocols. D. The computers can communicate directly only if the messages consist of text; other formats cannot be interpreted across computers.

C. The computers can communicate directly because Internet communication uses standard protocols.

How can financial transactions safely occur on the Internet? A. Through the use of symmetric keys B. Through the use of double authentication methods C. Through certificates issued by Certificate Authorities (CAs) that validate the keys used D. Through the use of frequency analysis

C. Through certificates issued by Certificate Authorities (CAs) that validate the keys used

When would lossless data compression be preferred over lossy one? A. When you do not need to get back to the original file B. When you need to display the file on mobile devices and websites C. When you need to get back to the original file D. When you have limited space available on your computer

C. When you need to get back to the original file

A coffee shop is considering accepting orders and payments through their phone app and has decided to use public key encryption to encrypt their customers' credit card information. Is this a secure form of payment? A. No, public key encryption allows the credit card information to be read by the public. B. No, the internet protocols are open standards and thus everything sent over the internet is sent "in the clear". C. Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve. D. Yes, public key encryption is secure because it transmits credit card information in binary.

C. Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve.

Which statement is true about routing on the Internet? A. Information travelling between two computers over the Internet will always take the same path. B. A packet travelling between two computers on the Internet may be rerouted many times along the way C. There is one router which receives and redirects all the traffic of the Internet. D. A packet contains addressing information to allow routers to decide how best to forward along that packet towards its destination.

D. A packet contains addressing information to allow routers to decide how best to forward along that packet towards its destination.

__________ can reflect existing human biases because of biases written into the algorithms or biases in the data used by the innovation. A. Computing biases B. Computing challenges C. Computing algorithms D. Computing innovations

D. Computing innovations

Which of the following is NOT an example of metadata for an image file? A. Size of the image B. Date the image was created C. Image resolution D. Copy of each image pixel

D. Copy of each image pixel

Finding and fixing problems in your algorithm or program A. Hacking B. Cracking C. Problem Solving D. Debugging

D. Debugging

What is the best explanation for why digital data is represented in computers in binary? A. The binary number system is the only system flexible enough to allow for representing data other than numbers. B. As a consequence of history: early pioneers of computing were making secret codes in binary, and this simply evolved into modern computing. C. It's impossible to build a computing machine that uses anything but binary to represent numbers D. It's easier, cheaper, and more reliable to build machines and devices that only have to distinguish between binary states.

D. It's easier, cheaper, and more reliable to build machines and devices that only have to distinguish between binary states.

A user clicks on a website, and it begins to load immediately, but it takes a long time to load completely and pictures appear slowly, one by one. Which of the following is demonstrated through this situation? A. High bandwidth, high latency B. Low bandwidth, high latency C. High bandwidth, low latency D. Low bandwidth, low latency

D. Low bandwidth, low latency

It is a data about a data. A. Information B. Database C. Message D. Metadata

D. Metadata

__________ support collaboration by allowing programmers to share and provide feedback on ideas and documents. A. Information B. Business Models C. Potential users D. Online tools

D. Online tools

Which of the following is a true statement about program documentation? A. Program documentation should not be changed after it is first written. B. Program documentation is only needed for programs in development; it is not needed after a program is completed. C. Program documentation is useful when programmers collaborate but not when a programmer works individually on a project. D. Program documentation is useful during initial program development and also when modifications are made to existing programs.

D. Program documentation is useful during initial program development and also when modifications are made to existing programs.

Which of the following statements best describes the properties of public key encryption? A. Public key encryption is a highly secure encryption scheme that in which a single shared key is used by both the sender and receiver of the message. B. Public key encryption makes use of certain types of problems which are easier for humans to solve than computers. C. Public key encryption makes use of mathematical problems which no algorithm can be used to solve. D. Public key encryption is an encryption method which relies on separate keys for encrypting and decrypting information.

D. Public key encryption is an encryption method which relies on separate keys for encrypting and decrypting information.

How does cryptography enable the Internet to process transactions securely? A. Frequency analysis is used to disguise the use of common letters in encrypted messages keeping passwords secure B. Symmetric keys are used to encrypt and decrypt messages for speed in processing to avoid being intercepted C. Polynumeric alphabets are used encrypt and decrypt messages to allow for use with different languages D. The public key encryption model is easy to use to encrypt data bat intractable to decrypt for large numbers

D. The public key encryption model is easy to use to encrypt data bat intractable to decrypt for large numbers

In public key cryptography, the sender uses the recipient's public key to encrypt a message. Which of the following is needed to decrypt the message? A. The sender's public key B. The sender's private key C. The recipient's public key D. The recipient's private key

D. The recipient's private key

Which of the following classifies as metadata about a webpage? A. The tags that make up the body of the webpage B. A table on a webpage C. A list on a webpage D. The title of the webpage

D. The title of the webpage

Which of the following is a true statement about data compression? A. Data compression is only useful for files being transmitted over the Internet. B. Regardless of the compression technique used, once a data file is compressed, it cannot be restored to its original state. C. Sending a compressed version of a file ensures that the contents of the file cannot be intercepted by an unauthorized user. D. There are trade-offs involved in choosing a compression technique for storing and transmitting data.

D. There are trade-offs involved in choosing a compression technique for storing and transmitting data.

Which one of the following statements about functions is TRUE? A. A function can change names over the course of a program. B. Code can be added or removed dynamically from a function while the program is running. C. Functions can be called using different names depending on where in the program they are called. D. Two functions in a single program can have different names but contain identical code.

D. Two functions in a single program can have different names but contain identical code.

An Internet service provider (ISP) is considering an update to its servers that would save copies of the Web pages most frequently visited by each user. Which of the following is LEAST likely to occur as a result of the update? A. Average response time for user requests might decrease. B. Privacy of users might be negatively affected. C. Storage requirements for the servers might increase. D. Web sites that are not visited frequently might no longer be accessible to users.

D. Web sites that are not visited frequently might no longer be accessible to users.

When programmers work together, what is an example of how abstraction in programming can promote collaboration? A. Team members can rely on one another to explain their code. B. Programmers can write functions without needing to know what they do or how they should work. C. Programmers can use functions created by their partners, relying on the functionality without needing to know the specific details of how the function is implemented. D. In order for programmers to work together, they must work in the same room.

Programmers can use functions created by their partners, relying on the functionality without needing to know the specific details of how the function is implemented.

It is the collection of facts and patterns extracted from data. A. Metadata B. Information C. Database D. Message

B. Information

Which type of compression do zip files use? A. Lossy B. Lossless C. Non-compressed D. Max compression

B. Lossless

Which file type is lossy compressed sound? A. mp4 B. mp3 C. wav D. wma

A, B, D

kilobyte? A. 1,000 times bigger B. 100,000 times bigger C. 1,000,000 times bigger D. 1,000,000,000 times bigger

A. 1,000 times bigger

Knowing how to drive a car without knowing how the engine works is an example of A. Abstraction B. Function C. Variable D. Algorithm

A. Abstraction

How is collaboration useful in analyzing datasets? A. Applying differing experience and skills provides better analysis and insight B. The multiple viewpoints can provide several outcomes for the data. C. The analysis can be divided among several people, speeding up the analysis D. Having multiple leaders helps the group form alliances based on interest.

A. Applying differing experience and skills provides better analysis and insight

What is the proper format for a single line comment? A. THIS IS A COMMENT B. // This is a comment C. /* This is a comment D. This is a comment

B. // This is a comment

Pulling out specific differences to make one solution work for multiple problems A. Top Down Design B. Abstraction C. Variable D. None of the above

B. Abstraction

Which of the following best explains what happens when a new device is connected to the Internet? A. A device driver is assigned to the device. B. An Internet Protocol (IP) address is assigned to the device. C. A packet number is assigned to the device. D. A Web site is assigned to the device.

B. An Internet Protocol (IP) address is assigned to the device.

Which of the following would be the best use of citizen science? A. An experiment that requires all participants to be working in the same laboratory B. An experiment that requires data measurements to be taken in many different locations C. An experiment that requires expensive equipment to conduct D. An experiment that requires specialized knowledge and training to conduct

B. An experiment that requires data measurements to be taken in many different locations

A process that reverses encryption, taking a secret message and reproducing the original plain text A. Encryption B. Decryption C. Cracking Encryption D. Cipher

B. Decryption

__________ is an action that causes something to happen. A. Action B. Event C. Call D. Program

B. Event

Which are true regarding high-level and low-level programming languages? I. High-level can be more abstract II. Low-level is harder to find errors III. High-level is more easily understood by humans

B. I, II, and III

It is a collection of program statements that is part of a program. A. Software B. Program software C. Expression D. Code Segment

D. Code Segment


संबंधित स्टडी सेट्स

CH. 33 CAD and Acute Coronary Syndrome

View Set

Head & Neck Anatomy - The Skeletal System

View Set

FIN 320 DePaul University Final Study Guide

View Set