ap csp mc
3. Some programming languages use contants... which of the following are good uses for constant?
1 and 3 only
2. Which of the following statements are true about using a high-level programming language... 1,2,or 3
1, 2 and 3
34.Which of the following statements about security in the network is true? One or two
2 only
35.The figure below represents...What is minimum number of connections?
3
41.Which of the following has the greatest potentialFor compromising a users personal privacy?
A group of cookies
17.Computers are often used to search through large sets of data... which task is not an example were searching for patterns as needed?
A high school analysis student grades
29.Which of the following programs is most likely to benefit from the use of heuristics?
A program that finds the shortest
27. An algorithm will be used to identify the maximum value... which of the statements best describes the behavior of the two algorithms?
Algorithm 2
31.Which of the following best explains what happensWhen a new device is connected to the Internet?
And Internet protocol address
42.Which of the following best describes DDOS attack?
And attempt to deny users access
33.Which of the following is least likely to indicate a phishing attack?
And email from your bank
9. A computer program uses three bits to represent Integers... which of the following is the best exclamation for the result?
And overflow error occurred
28.Consider the code segment below
Changing line 3 to be arrow 10
11.Digital images are often represented by there red green and blue values... which describes a lossless transformation
Creating the negative of the image by creating a new RGB triplet
8. Consider the following numbers order least to greatest?
Decimal 11, binary 1100, hexadecimal d
1. The algorithm below is used to stimulate the results of flipping a coin 4 times... Resulted in an equal number of heads and tails?
Heads_counter = 2
15. A programmer is writing program... which consideration is least likely to affect the ability of the program to process larger data sets?
How many programming statements the program contains
18. A large data set contains information... which of the following questions could be answered from the data set?
How many states have a higher percentage
48. Many web browsers allow users to open anonymous windows... which statement about browsing sessions in the anonymous windows are true?
Items placed in a web stores
44. The Procedure draw length and direction... which figure is drawn by the program?
I️t looks like a three
4. ASCII is a character encoding scheme.
J
26. Central high school... which pairs of values indicate the students are eligible to receive academic awards?
Number of absences equals 5, grade point average equals 3.8
46.And author is considering publishing an e-book... Which would it be better for the other user creative common license instead of a traditional copy right? 1, 2 or three
One and two
7. A car manufacturer uses simulation software... which of the following are reasons to use simulation software? One, two or three
One, two, and three
43.Which of the following statements is true about program documentation?
Program documentation is useful during initial program development and for modifications
45.Which of the following is considered a unethical Use of computer resources?
Purchasing a single user copy
47. A city government is attempting... which activities are least likely to be effective in this purpose?
Putting all government forms
32.Which of the following activity posesThe greatest person in cyber security risk?
Reserving a hotel room
25. An algorithm has been developed...Which programming structure must be added to the existing algorithm?
Selection
38.Which of the following is a true statement about cloud computing?
Storing data using cloud computing can help ensure
50.Historically it has been observed... which best describes how technology companies can use this observation for planningpurposes?
Technology companies can set research and development goals
49. Both online newspapers and social media sites...Which best describes an advantage that online newspapers have over social media sites?
The ability to provide credibility
37.Which of the following is a character of the fault tolerant nature Of routing on the Internet?
The ability to provide data
39.Two computers are built by different manufacturers... which describes the ability of two computers to communicate with each other across Internet?
The computers can communicate directly because Internet communication
36.A user enters a web address... which best describes how the files are sent to the user?
The file is broken into packets for transmission the packets must be resembled
30.A certain computer game... which best describes the possibility of improving the running speed of the game?
The games running speed might be improved by using a process
19. A cable television company stores information... which of the following cannot be determined from the database?
The number of movies purchased by an individual
10. A program is expressed in a programming language...Which of the following is true of the program?
The program can also be expressed as binary code, but will be more easily understood
5. A new bank plans to make customer convenience a priority... which of the following is not true about the banks plan?
The simulations will not produce usable results
16. A student is recording a song on her computer... which could be a possible explanation for the difference in sound quality?
The song was saved using fewer bits per second then the original song
40.Which of the following statements is true?
Their Exist problems
23. When a cellular telephone use her places a call...Which of the following goals would be more useful to computationally Analyze the meta-data?
Two and three only
12. Which of the following can be represented by single binary digit?
Two answers. Divisible by 2, the value of a Boolean variable
51.A local government uses short message service... which statement is true regarding the benefits of using SMS text messages?
Two answers. SMS text messages are likely to reach, SMS text messages can be sent to multiple
13.Researchers have developed a simulation of packets traveling between server computers... which two outcomes are most likely to result?
Two answers. The effect of temporarily unavailable network connections, the impact of increased connection speeds
14. Which of the following are benefits of using well named variables?
Two answers. Will be easier for people to read, will be easier to modify
24.A school's library allows students... which indicates that a particular laptop is not currently borrowed?
Two answers. The difference between borrows, the sum of borrows
6.An online store use a six bit binary sequences... which of the following results of using seven bet sequences instead of six bit
Two times as many items can be uniquely identified
20. And Internet server provider is considering an update...Which is least likely to occur as a result of the update
Websites that are not visited
21.A search engine has a trend tracking feature... which question is least likely to be answerable using the trend features?
What is the cost
22. A retailer that sells footwear... Using the database which of the following can be determined?
Which items listed