APCSP Midterm Exam
A computer program uses 3 bits to represent integers. When the program adds the decimal (base 10) numbers 5 and 3, the result is 0. Which of the following is the best explanation for the result?
A an overflow error occurred
Which of the following has the greatest potential for compromising a user's personal privacy?
A. A group of cookies stored by the user's Web browser
Which of the following is least likely to indicate a phishing attack?
A. An email from your bank asks you to call the number on your card to verify a transaction.
Researchers have developed a simulation of packets traveling between server computers and client computers in a network. Of the following which two outcomes are most likely results of simulation?
A. Better understanding of the effect of temporarily unavailable network connections. D. Better understanding of the impact of increased connection speeds for frequently visited servers.
Consider the code segment below Which of the following changes will NOT affect the results when the code segment is executed?
A. Changing line 3 to b <- 10
A school library Which of the following indicate that a particular lap top is not currently borrowed?
A. The difference between borrows and returns is zero. D. The sum of borrows and returns is a positive even number.
A user enters a Web address in a browser, and a request for a file is sent to a web server. Which of the following best describes how the file is sent to the user?
A. The file is broken into packets for transmission. The packets must be reassembled upon receipt.
Which of the following could be a possible explanation for the difference in sound quality?
A. The song was saved using fewer bits per second than the original song.
A retailer sells footwear Using only database, which of the following can be determined?
A. Which items listed in the database are not currently in the store.
Consider the following numbers. Binary 1100, Decimal 11, Hexadecimal D. Which of the following is lists the numbers in order from least to greatest?
B Decimal 11, Binary 1100, Hexadecimal D
Which of the following can be represented by a single binary digit?(Select two)
B the remainder when dividing a whole number by 2 C the value of the Boolean variable
Which of the following best explains what happens when a new device is connected to the Internet?
B. An Internet Protocol(IP) address is assigned to the device.
Students gender Which of the following questions could be answered by analyzing only information in the data set?
B. How many stars have a higher percentage of female computer science majors than male computer science majors attending college in that state?
Which of the following is a characteristic of the fault-tolerant nature of routing on the Internet?
B. The ability to provide data transmission even when some connections have failed.
A certain computer game played between a human player... Which of the following best describes the possibility of improving the running speed of the game?
B. The game's running speed might be improved by using a process that finds approximate solutions every time the computer-controlled player has a turn.
cable television Which of the following CANNOT be determined using only the information in the database?
B. The number of movies purchased by an individual subscriber for a particular month.
Which of the following are benefits of using well-named variables in a computer program?
B. The program will be easier for people to read. D. The program will be easier to modify in the future
Which of the following best describes the result of using 7-bit sequences instead of 6-bit sequences?
C 2 times as many items can be uniquely identified
Which of the following describes lossless transformation of the digital image?
C Creating the negative of an image by creating a new RGB triplet
ASCII charcter is represented by the binary(base 2) number 1001010?
C J
Diagram What is the minimum number of connections that must be broken or removed in the network before computer E can no longer communicate with computer F?
C. 3
Which of the following tasks is NOT an example where searching for patterns is needed to produce useful information?
C. A high school analyzing student grades to identify the students with the top ten highest grade point averages.
Which of the following programs is most likely to benefit from the use of a heuristic?
C. A program that finds the shortest driving route between two locations on a map
An algorithm will be used to identify the maximum value in a list of one or more integers. Consider the two versions... Which of the following statements best describes the behavior of the two algorithms?
C. Algorithm II Always works correctly, but Algorithm I only works correctly when the maximum value is greater than or equal to -1.
An author creative commons license publishing Ebook.
C. I and II
When a cellular telephone For which of the following goals would it be more useful to computationally analyze the metadata instead of the data?
C. II and III only
Which of the following activities poses the greatest personal cyber security risk?
C. Reserving a hotel room by e-mailing a credit card number to a hotel
An algorithm has been developed to compute the sum of all the elements in a list of integers. Which of the following programming structures must be added to the existing algorithm so that the new algorithm computes the sum of only the even integers in the list?
C. Selection
Which of the following is a true statement about cloud computing?
C. Storing data using cloud computing can help ensure that data are not lost if a user's computer stops functioning
Search engine trend tracker Which of the following questions is LEAST likely to be answerable using the trends feature?
C. What is the cost of a certain electronics product?
A car manufacturer uses simulation software during the design process for a new car. Which of the following are reasons to use simulation software in this content?
D I,II,III
Which of the following statements are true about high level programming language instead of lower level programming language? 1. Programs written in high-level language are generally easier for people to read then programs written in low level language.
D I,II,III
Which of the following is not true about the bank's plan?
D The simulation will not produce usable results because actual customer data are not available
The algorithm below ... Step 1 - Initialize the heads_counter and flip_counter
D heads_counter = 2
Which of the following is a true statement about program documentation?
D. Program documentation is useful during initial program development and also when modifications are made to existing programs.
Two computers buily by differnt manufactures.... WHich of the following best describes the ability of the two computers to communicate with each other across the internet?
D. The computers can communicate directly because Internet communication uses standard protocols
Which of the following statements is true?
D. There exists problems that no algorithm will ever be able to solve for all possible inputs.
An internet service provider is considering an update to its servers that would save copies of the Web pages most frequently visited by each user. Which of the following is LEAST likely to occur as a result of the update?
D. Web sites that are not visited frequently might no longer be accessible to users.
A programmer is writing a program that is intended to be able to process large amounts of data. Which of the following considerations is least likely t affect the abilit of the program to process larger data sets?
How many programming statements the program contains.
A program is expressed in a programming language. Which of the following is true of the program?
The program can also be expressed as binary code, but will be more easily understood by humans when expressed in a higher-level programming language.