Pluchino's Real Study Guide
33. Which of the following is true of algorithms? Select two answers.
(A) Algorithms are composed of commands which implement sequencing, iteration, and selection by which a task can be completed on a computer. (D) Clarity and readability are important considerations when expressing an algorithm in a language.
35. Which one of the following is NOT a benefit of the HTTPS protocol?
(A) HTTPS ensures that only the client and the server can view the packets sent during their communication and they cannot be intercepted by a third party.
14. Imagine you are playing an online game with your friends. You are at a crucial stage in the basketball game and need just one more free throw to win the game. You see the entire complex scene display quickly. You aim at the hoop to shoot your free throw. You click the shoot button but there is a momentary freeze on your screen only to discover that you have lost the game. What is demonstrated by this situation?
(A) High bandwidth, high latency
11. An architecture company is planning to build a tower in California but they are worried about earthquakes. They decide to use a computer simulation in order to test the safety of different designs when an earthquake occurs. Which of the following are reasons to use a simulation in this context? I. Using the simulation software can save the company money because it allows them to test building materials for safety without purchasing physical materials. II. Using the simulation software will perfectly predict what will happen in the event of an earthquake. III. Using the simulation software can help ensure the safety of the building during an earthquake without endangering people.
(A) I only
9. Which of the following can be represented by a sequence of 3 bits? I. The seven days of the week II. Between zero and eight pints of ice cream III. The nine innings in a standard baseball game
(A) I only
27. Which of the following is NOT true regarding metadata?
(A) In photos, metadata is hidden within the image and is stripped out using pixel processing methods.
12. FOUR INDEPENDENT ALGORITHMS listed below can be executed on a row of NUMBER cards (Not FACE cards) on a table. There are an EVEN number of cards,and they are in no special order. Which of the Algorithms involves BOTH Selection and Iteration? For this question select TWO correct answers
(A) Look over all the cards to find the smallest one, and move it to the leftmost position. (C) Compare the values of each pair of cards. For example, compare cards 0 and 1, compare cards 2 and 3, and so on for all pairs. Swap positions when the first card is greater than the second of the pair.
43. You have been hired by a company to generate a simulation of a process within their multinational company. You try to convince them that there is significant value to starting with a simple model even though it might not model their process exactly. Which arguments below are viable supports for your position?
(A) Models and simulations often omit unnecessary features of the objects or phenomena under investigation. (C) Simple models and simulations will execute faster allowing more opportunity for rapid testing and development.
6. What is a disadvantage of the open standard of Internet addressing and routing? Select two answers.
(A) censorship (B) possibility of denial of service attacks
37. How many times will the following loop be executed? x ← 0 REPEAT UNTIL (x > 5) IF (x MOD 2 = 0) x ← x - 1 IF (NOT (x MOD 2) = 0) x ← x + 3
(B) 3
38. Which two of the following statements are true about routing on the Internet? Select two answers.
(B) A packet travelling between two computers on the Internet may be rerouted many times along the way. (C) A packet contains addressing information to allow routers to decide how best to forward along that packet towards its destination.
36. The various protocols used on the internet operate in layers in which the protocol at each layer rely on the protocols at the lower layers to do their jobs, and higher layers (higher level of abstraction) are built on top of the lower layers (lower level of abstraction). From the list provided choose the two (2) answers that correctly describe the relative levels of abstraction of the internet protocols. For example: if protocol A relies on protocol B, it means that A is a higher level of abstraction than B. Select two answers.
(B) HTTP is a higher level of abstraction than TCP/IP (C) DNS is a higher level of abstraction than TCP/IP
48. You were hired as a manager of a set of new programmers because of your experience in generating quality code. One of your new programmers brings a solution which looks nothing like what you would generate for the same problem. Which of the following might be a good next step? I. Analyze the solution for correctness and readability. II. Realize that there are multiple ways to solve most problems and work to understand this employee's solution. III. If the program includes sequence, selection, and iterative statements, assume the solution is correct and congratulate her for her outstanding contribution.
(B) I and II only
34. Since it is well known that you took AP CS Principles, your family decides to discuss the internet with you at a holiday party. I. Aunt Minnie says, "The Internet is wholly interesting because it is all about the documents and information in the documents enabling us to become smarter as a society". II. Uncle Jack says, "I love that the Internet connects all the devices such that data can be shared at the speed of light." III. Cousin Josiah comments, "Open standards have been instrumental in the growth of the Internet as multiple networks can be connected without concern so long as they implement established standards." Which of the following statements are correct?
(B) III only
55. A photo editing business uses software to compress images as they are stored to a hard drive and automatically uncompress images as they opened in the photo editing software. Every photo that is saved to disk is retrieved with lower image quality as compared to the original picture. What is the most likely reason for the reduced quality?
(B) The compression software uses a lossy compression technique.
21. Consider the following algorithms to store a color digital image. Which algorithms are examples of "lossy" compression? Select two answers:
(B) The image is divided into squares that are 2 by 2 pixels each. Each square is translated into a single pixel whose color is the average of the color values from the 4 pixels in the square. (D) The algorithm translates a color image into a grayscale version of the color original storing only averages of the data used to store the original colors in the picture.
42. Your school uses network filtering hardware and software to deny access to blacklisted websites and files. In the school's library there is a student accessing one of the blacklisted websites. Which of the following methods is the student most likely using to defeat the network filtering.
(B) The student is using a personal mobile device that is connected to the Internet through a data plan. (C) The student is using a school device that allowed the configuration of a proxy server to encrypt the data of the blacklisted website.
49. How many bits are used in the address of an IPv4 packet?
(C) 32
13. A crime investigator is accessing an online database of crimes within a certain radius of the city center. The database contains the following information: Date of crime Name of offender Neighborhood of crime The investigator is looking for other crimes that occurred in a certain area on a certain date. Which of the following algorithms can be used to find all crimes that occurred in a certain neighborhood on a certain day? I. Make a new list by filtering the data so only the crimes from a certain neighborhood are on the list. Perform multiple binary searches to find all crimes that occurred in that neighborhood on a certain day, adding each new occurrence to a final list. II. Make a new list by filtering the data so only the crimes from a certain neighborhood are on the list. Perform multiple linear searches to find all crimes that occurred on the given day, adding each new occurrence to a final list.
(C) Algorithm II always work correctly, but Algorithm I only works correctly when the date data is sorted.
29. Consider the following numbers. Binary 1101 Decimal 14 Hexadecimal F Which of the following lists them from least to greatest?
(C) Binary 1101, Decimal 14, Hexadecimal F
46. Which of the following statements is NOT correct regarding abstraction as applied to computer science:
(C) Binary sequences are abstractions which are used to represent colors in an image.
50. Which one of these would be least likely to make programming code easily modifiable in the future?
(C) Creating more procedures for the program.
4. You decide you are going to take your internet privacy seriously. Which of the following action poses the greatest risk to your internet privacy?
(C) Encrypting your files and sharing your private key to ensure others who you choose to share files with can read them.
28. What are some of the advantages of using models and simulations to mimic a real-world process or system under study? I. Models and simulations mimic real-world events without the cost or danger of real world prototypes or testing. II. The results of models and simulations may generate new knowledge and new hypotheses related to the phenomena being modeled. III. We cannot change the model or simulation as rapidly as we can change the real-world process or system under study, therefore, it allows us to minimize iterations in a model or simulation.
(C) I and II only
15. The Domain Name System (DNS) is designed to I. Allow for nested domain naming (e.g., digitalportfolio.collegeboard.org ) II. Allow for centralized access and administration III. Use cache and redundant servers for quick matching of IP addresses to domain names IV. Use a static database for matching IP address to domain names
(C) I and III only
51. Several of your peers have conflicting viewpoints concerning what is, and is not, a creative artifact. Which of the statements listed below will you use to settle the conflict among your peers? I. For something to be considered a creative artifact, it must include only original material generated by the creator of the artifact. II. Creative artifacts can be produced by combining existing artifacts in a new and novel way. III. Computing can facilitate the creation and modification of computational artifacts.
(C) II and III
8. A student is taking a survey of her class in order to determine their average hours of sleep per night. She is tracking the number of students in her class that have replied. She sees that the number of students who have replied is represented by the digits "12" but she does not remember what base she used. Which of the following are possible bases that the number 12 could be in? I. Binary (base 2) II. Decimal (base 10) III. Hexadecimal (base 16)
(C) II and III
44. Which of the following statements about data analysis and processing are considered most true given modern computing technology?
(C) Information cleansing and classification are often employed in the processing of data by which patterns can emerge. (D) Storage, processing, or curation often present significant challenge when processing large datasets.
40. In the process of engineering a piece of software, which of the following statements would generally be considered to be most accurate?
(C) The end user of the software must be considered in the design, implementation, and release of the software.
17. A high school surveys all of its 1,750 students to determine the average number of hours U.S. high school students sleep per night. Which of the following is a true statement?
(C) The high school cannot draw meaningful conclusions from this data because the sample size is too small.
7. If Alice wishes to send Bob an encrypted message using public-key encryption, she should encrypt her message with ________________,
(D) Bob's public key
41. You write an algorithm in your program to that calculates and prints the total miles traveled during a road trip. When you test your algorithm, it does not print the correct value. Which of the following would NOT be a productive way to debug the code?
(D) Delete the entire algorithm and start over
56. Digital data can be compressed in order to reduce file size, and speed of transmission through a network. While some compression techniques are lossy, others preserve the original data in the compressed form. Compression techniques (lossy or lossless) can do the following, EXCEPT:
(D) Enlarge a file in order to increase the resolution in the original, thereby increasing the file size
52. When building internet networks it is important to consider redundancy. Which of the following is an example of redundancy?
(D) Ensuring that if any single node in the network were to stop working, packets can still be delivered
26. Which of the following statement about algorithmic efficiency is correct?
(D) Formal reasoning can be used to determine the efficiency of an algorithm.
45. You are given a 32-bit word which was copied from computer RAM and are asked to determine what was represented by the word. Which of the following represents the most complete response? I. The 32-bit word could be integer data as binary is how data is always represented in RAM. II. The 32-bit word could be an instruction for the CPU as hardware processes binary words. III. We cannot be certain as to what the word represented without more information.
(D) I, II and III
32. You have been asked to create a computational artifact utilizing a set of tools which are unfamiliar to you. When creating the schedule for delivery, which would not be advised if you hope to deliver this product on time:
(D) Planning a set of sequential tasks with precise timing by which you can deliver exactly on the due date.
10. Which type of chart would best display the individual data from 1,000 individuals' daily time spent in social media?
(D) Scatter Plot
20. A student draws a gorgeous digital image on her school computer. She decides she wants to show her brother, so she saves it and later downloads the image onto her home computer. When she opens and resizes the image at home, the quality is noticeably inferior to the original she saved. Which of the following is a reasonable explanation for the reduced quality?
(D) The process she used to save the image utilized a "lossy" compression algorithm.
30. Which of the following is a characteristic of the fault-tolerant nature of communication on the Internet?
B. The ability to provide data transmission even when some connections have failed
31. If the post office delivered mail just as routers deliver messages on the Internet, which of the following statements would be true? Select two answers.
C. Letters would be written on the outside of envelopes for all to read instead of letters put inside envelopes. D. The mailman would sometimes take a different path to deliver each letter to your home.
3. In the process of digging, a landscaping company cuts a fiber line. Transmission of Internet traffic is still possible through additional pathways that provide alternate routes between the source and destination. The additional pathways describe a concept known as:
D) redundancy