APCSP Unit 1 Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A class of database applications that look for hidden patterns in a group of data that could be used to predict future behavior is called A) data mining B) data application C) data detritus D) data reading

A

A problem with de-identification of data could be 1. the responsible person can be identified and fired 2. sensitive information like medical records for example could be accessible even if there is redaction 3. because data published on the internet never goes away, sensitive information can be shared or duplicated even if there is a redaction A) 2 and 3 only B) 1 and 2 only C) all of these are true D) 1 only

A

Attempting to access an invalid or missing index item in a list results in what type of error? A) Runtime B) Logic C) Overflow D) Syntax

A

Expressions on the AP Exam: Which expression will return a random even number between 1 and 10? A) 2 * RANDOM(1, 5) B) RANDOM(1, 10) / 2 C) RANDOM(2, 10) D) RANDOM(1, 5)

A

Expressions on the AP Exam: Which expression will simulate the rolling of two dice? A) RANDOM(1, 6) + RANDOM(1, 6) B) RANDOM(2, 12) C) 2 * RANDOM(1, 6) D) RANDOM(1, 12)

A

Hat blocks do not say what a script should do but when it should do it. A) True B) False

A

If your program executes without errors, but the results are incorrect or unexpected, what type of error do you likely have? A) Logic B) Syntax C) Rounding D) Runtime

A

It was observed that the density of integrated circuits seemed to double every couple of years. This observation is referred to as A) Moore's Law B) Data integration hypothesis C) Turing Test D) CS Law

A

One of the consequences feared by experts if net neutrality is eliminated is A) that the digital divide may deepen B) that Jeff Bezos will soon own the Internet C) that ISP's will make too much money D) that Communism might spread

A

Procedures are reusable blocks of code A) True B) False

A

Syntax is the set of rules that govern the structure and composition of statements in a language? A) True B) False

A

What are some of the ways that internet sites know who we are? 1. they have your IP address because the web server has to know where you are 2. you have logged into some app letting them know 3. the site has left a cookie based on a previous visit you made A) all of these are true B) 1 only C) 1 and 3 only D) 1 and 2 only

A

What do using surveys, interviews, and observations identify? A) User Requirements B) Device specifications C) Valid Program Input D) Program errors

A

What has Creative Commons provided? A) Licensing options by the owners of artifacts B) illegal ways to share other people's creations C) cooperative copyright arbitration D) free use of other people's work

A

What type of error breaks the rules of the programming language, like a grammatical error? A) Syntax B) Overflow C) Runtime D) Logic

A

Which of the following best describes one of the benefits of using an iterative and incremental process of program development? A) It helps programmers identify errors as components are added to a working program. B) It allows programmers to implement algorithmic solutions to otherwise unsolvable problems. C) It enables programmers to create programs that use the lowest-level abstractions available. D) It eliminates the need for programmers to test completed programs.

A

Which phase in the development process determines the "what" of application requirements? A) Investigation B) Programming C) Design D) Testing

A

Are the 2 conditional statements below equivalent? age > 50 NOT ( age< 50) A) Yes B) No

B

How would you best describe a logic error? A) errors that deal with missing or incorrect punctuation, symbols and / or typos B) errors that occur when a program produces unexpected results C) errors that occur because of code duplication D) errors that occur when a program is executing

B

Professional programmers work mostly in isolation. A) True B) False

B

The best way to define pair programming is: A) a way to make sure there is equal credit given for intellectual property B) writing programs in teams of two to help plan and catch errors C) give one supervisor a way to get the best work out of their subordinate D) a way to program that is required by your teacher but super annoying

B

The correct order of the software development life cycle (SDLC) is... A) reflect, create, design, test and document B) investigate, design, prototype, test and document C) design, create, document and test D) plan, design, debug and document

B

What is a crucial step in an iterative development process? A) Meeting deadlines B) Feedback C) Preparing prototypes D) Meeting budget constraints

B

What is a reason to use a procedure? A) to avoid a loop B) to avoid duplicating code C) to use with a condition D) when you need a section of code once in a program

B

What is a smaller representation of something, such as an event or process that can be used to determine what could happen in the real world? A) a miniature B) a model C) an image D) a plan

B

What is the name for programing code that is available to anyone to use or modify? A) executable only software B) open source software C) licensed software D) compiled software

B

What is the output of the algorithm written in pseudocode below at 7:00 a.m. Thursday? If Monday - Friday at 8:00 a.m. Set thermostat to 68 If Saturday - Sunday Set thermostat to 60 If time is 6:00 p.m. Set thermostat to 62 A) 68 B) 62 C) unknown D) 60

B

When an integer is larger than the programming language can hold, it is referred to as a __________ error. A) syntax B) overflow C) runtime D) logic

B

When the scientific community uses crowdsourcing to gather or share data, participants are often called ___________________. A) nosy Nellies B) citizen scientists C) Wikipedia contributors D) Pseudoscientists

B

Where is the "cloud" of cloud computing located? A) many locations provided by the Apple corporation B) a server location other than where the owner of the files is C) New Jersey D) at an undisclosed location due to national security

B

Which of the following is NOT a benefit of cloud computing? A) people can access the "cloud" from most any device B) it is safer than other forms of storage C) it eliminates the need to keep track of multiple versions of any document D) it alows for multiple people to update a document at the same time

B

Why is a binary (divide and conquer) search more efficient than a linear search? A) you only look at half the data set B) you eliminate half the data set with each iteration C) it is less efficient with large data sets D) you have to search all the values

B

With Boolean, what does "A OR B" mean? A) Both A and B must be true for the condition to be true. B) If A is true, then the condition is true. C) can be true for the condition to be true. D) If B is not true, then the condition is true.

B

Finding patterns in large amounts of data is called... A) collaboration B) data reading C) data mining D) classifying

C

How would you best describe a runtime error? A) errors that occur because of code duplication B) errors that occur when a program produces unexpected results C) errors that occur when a program is executing D) errors that deal with missing or incorrect punctuation, symbols, and/or typos

C

How would you best describe a syntax error? A) errors that occur because of code duplication B) errors that occur when a program produces unexpected results C) errors that deal with missing or incorrect punctuation, symbols and / or typos D) errors that occur when a program is executing

C

In Snap, locations on the stage (the white rectangle where sprites perform their scripts) are specified by A) a rule of thirds grid B) boolean expression C) x and y coordinates D) hat blocks

C

Pseudocode can best be described as... A) a simplistic programming language read by some systems. B) something required in order to write any algorithm. C) a combination of natural and programming languages. D) a type of flowchart.

C

Some ways to aid a programmer in debugging would be to a) use temporary print or DISPLAY statements b) use procedures to prevent code duplicates c) send arguments to procedures A) a & c B) all of these C) a & b D) a only

C

The World Wide Web is a(n) ______________________ that runs the Internet. A) server B) converter C) application D) cloud storage

C

The bottom and top edges of the stage (y coordinate) are represented by which numbers? A) 240, 240 B) 360, -360 C) -180, 180 D) no clue

C

The process of finding and fixing errors in a program is called... A) runtime error fix B) process return C) debugging D) stringing

C

What are variables used for in programs? A) they indicate how long the fraction part of a real number is B) they link libraries of programs to the current program C) they hold values, numbers or strings D) they hold the indices for a list

C

What is one way to ensure testing is thorough? A) Collect data during the Investigation phase B) Create a diagram of the program's processing C) Establish a testing strategy during the design phase D) Add temporary DISPLAY statements to see intermediate results in the program

C

When you see https:// at the beginning of a URL, you know that the traffic between your computer and the website is encrypted. What type of encryption is being used? A) decipher key B) private key C) public key D) cipher key

C

Which coordinates represent the center of the stage in Snap? A) (-240, -180) B) (240, 180) C) (0,0) D) (3, 9)

C

Which development process breaks the requirements down into small modules and adds the code, once working, to the project as a whole? A) Additive B) Iterative C) Incremental D) Spiral

C

Which of the following are KEY aspects of the software development process? a) Documentation b) Collaboration c) Prototype A) a & b B) a only C) a & c D) all of these

C

Which of the following is not a common step in many software development processes? A) testing B) investigating C) identifying patterns D) designing

C

You write a program in which the proper motions are carried out the correct number of times but they are executed in an incorrect order. This is a most likely a problem in the ________ of the program. A)selection B)boolean C)sequencing D)iteration

C

Collaboration can provide A) duplication of effort B) clean data C) several points of failure D) insights we may never discover otherwise

D

A small text filed placed when you access a site and used by websites to track your activity on their site is called a

Cookie

How do event-driven programs process? A) They run in a linear function from start to end B) The code executes sequentially C) The code runs iteratively D) The code executes when an action occurs that it is programmed to recognize

D

In computing, the mathematical process called MOD can best be described as A) the decimal portion of the returned number B) any negative integer C) the addition of any numbers represented D) the return of just the remainder after dividing

D

The left and right edges of the stage (x coordinate) are represented by which numbers? A) 360, -360 B) -180, 180 C) no clue D) -240, 240

D

Using social media platforms to post anonymous, false, defamatory or otherwise negative information that can be spread is called ____________________. A) cyberstalking B) cyberextortion C) cyberterrorism D) cyberbullying

D

What are the elements in list "fruit" after the code below? fruit ["strawberries"] APPEND (fruit, "kiwi") APPEND (fruit, "oranges") APPEND (fruit, "grapes") REMOVE (fruit, 3) INSERT (fruit, 2, "mango") APPEND (fruit, "bananas") INSERT (fruit, 5, "apples") REMOVE (fruit, 4 ) A) mango, kiwi, oranges, grapes, bananas B) oranges, mango, kiwi, grapes, apples C) strawberries, mango, grapes, apples, bananas D) strawberries, mango, kiwi, apples, bananas

D

What is a benefit of using software development or engineering design process? A) by following the process, the code will work for the first time B) using the process, the code will be efficient regardless of a programmer's experience C) the code will be developed in 50% less time using a development/design process D) the process is iterative, resulting in a better program

D

What is one way to debug a program? A) test with different data values each time B) override the error with the correct value C) document the error in the user guide and online help text D) add temporary print messages to determine program values

D

What is the World Wide Web? A) a browser B) A collection of wires and cables to connect devices C) Another name for the Internet D) A way to search for and share documents and resources

D

When access to the Internet is unequal based on geographic or socioeconomic reasons, it's referred to as the: A) Distance divide B) Wealth inequality C) Internet divide D) Digital divide

D

Which is an example of event-driven programming? A) Initializing a program and it displays some text. B) A camera transmitting a video stream to a program C) Using constants for data values in place of variables D) When a sprite performs an action when clicked

D

Which method of finding errors is most useful to identify logic errors? A) Rerunning the program again with the same values just in case. B) Running a simulation C) Ask your teacher D) Continue with more test cases and then trace through to check for error

D

Which of the following are benefits of pair programming A) reduces workload B) helps solve problems C) makes it easier to find mistakes in your code D) all of these

D

Which of the following below BEST describes abstraction? A) combining procedures to make a new one B) a set of instructions to do something C) adding complexity so the concept can apply to more uses D) Simplifying complexity so the concept can be more general

D

Which of the following is NOT a benefit of using procedures during programming? A)the use of shorter blocks of code that do only a few tasks makes it more understandable B)It increases the ease of maintaining or fixing programs C)reuse of code reduces the length and complexity of programs by eliminating duplication D)it ensures that you will have less debugging

D

Which of the following is an example of plagiarism? 1. Writing about an idea you have read about 2. Making minor changes to wording in a paragraph 3. Retyping text rather than copying and pasting it into a document A) 1 and 2 B) 1 and 3 C) 2 and 3 D) all of these are plagiarism

D

Which of the following is an intger? A) 7/8 B) 3.14 C) a to z D) 22

D

Why is documentation important in programming? A)to make it easier to understand and modify the code later B)to be useful for training people on how to use the program C)to explain a program's purpose and functionality D) all of these are true

D

You were hired as a manager of a set of new programmers because of your experience in generating quality code. One of your new programmers brings a solution which looks nothing like what you would generate for the same problem. Which of the following might be a good next step? Analyze the solution for correctness and readability. Realize that there are multiple ways to solve most problems and work to understand this employee's solution. If the program includes sequence, selection, and iterative statements, assume the solution is correct and congratulate her for her outstanding contribution. A) 2 and 3 only B) 2 only C) 1, 2 and 3 D) 1 and 2 only

D

A binary digit, the smallest unit of information in a computer is referred to as a

bit


Set pelajaran terkait

ISDS Database Exam Prep - SQL and DB Design

View Set

Political beliefs and behaviors test

View Set

Ch 104 client centered experience

View Set

Chemical Bonding and Compounds folder

View Set

Basic and Optional Parts of a Professional Business Letter

View Set