ap Computer Science exam questions
How many bits are used in theaddress of an IPv4 packet? (A) 4 (B) 16 (C) 32 (D) 128
32
Which two of the following statements are true about routing on the Internet? Select two answers. (A) Your router receives all the traffic of the Internet and delivers to your computer only the messages intended for you. (B) A packet travelling between two computers on the Internet may be rerouted many times along the way. (C) A packet contains addressing information to allow routers to decide how best to forward along that packet towards its destination. (D) Information travelling between two computers over the Internet will always take the same path.
A packet travelling between two computers on the Internet may be rerouted many times along the way AND A packet contains addressing information to allow routers to decide how best to forward along that packet towards its destination
A crime investigator is accessing an online database of crimes within a certain radius of the city center. The database contains the following information: Date of crime Name of offender Neighborhood of crime The investigator is looking for other crimes that occurred in a certain area on a certain date. Which of the following algorithms can be used to find all crimes that occurred in a certain neighborhood on a certain day? I. Make a new list by filtering the data so only the crimes from a certain neighborhood are on the list. Perform multiple binary searches to find all crimes that occurred in that neighborhood on a certain day, adding each new occurrence to a final list. II. Make a new list by filtering the data so only the crimes from a certain neighborhood are on the list. Perform multiple linear searches to find all crimes that occurred on the given day, adding each new occurrence to a final list. (A) Both algorithms work correctly (B) Algorithm I always works correctly, but Algorithm II only works correctly when the date data is sorted. (C) Algorithm II always work correctly, but Algorithm I only works correctly when the date data is sorted. (D) Neither algorithm will correctly find all crimes.
Algorithm II always work correctly, but Algorithm I only works correctly when the date data is sorted.
Which of the following is true of algorithms? Select two answers. (A) Algorithms are composed of commands which implement sequencing, iteration, and selection by which a task can be completed on a computer. (B) When implementing a solution to a problem there is only one algorithm which will typically complete the task. (C) Algorithms are very specific to the language in which they are implemented. (D) Clarity and readability are important considerations when expressing an algorithm in a language
Algorithms are composed of commands which implement sequencing, iteration, and selection by which a task can be completed on a computer AND clarity and readability are important considerations when expressing an algorithm in a language
Consider the following numbers. Binary 1101 Decimal 14 Hexadecimal F Which of the following lists them from least to greatest? (A) Decimal 14, Binary 1101, Hexadecimal F (B) Hexadecimal F, Decimal 14, Binary 1101 (C) Binary 1101, Decimal 14, Hexadecimal F (D) Decimal 14, Hexadecimal F, Binary 1101
Binary 1101, Decimal 14, Hexadecimal F
Which of the following statements is NOT correct regarding abstraction as applied to computer science: (A) Higher level languages utilize abstraction to hide details of the CPU instructions from the programmer. (B) A computer chip is often an abstraction of many lower level logic gates and memory combined to perform a specific function. (C) Binary sequences are abstractions which are used to represent colors in an image. (D) Smaller programs and apps can be combined into large programs to create higher level abstractions.
Binary sequences are abstractions which are used to represent colors in an image
You write an algorithm in your program to that calculates and prints the total miles traveled during a road trip. When you test your algorithm, it does not print the correct value. Which of the following would NOT be a productive way to debug the code? (A) Go through each line of your algorithm and make sure each one is logical and makes sense. (B) Print the value of miles after each calculation (C) Ask a colleague to look at your algorithm to see if they can debug the code. (D) Delete the entire algorithm and start over
Delete the entire algorithm and start over
You decide you are going to take your internet privacy seriously. Which of the following action poses the greatest risk to your internet privacy? (A) Sharing your email address with those who request it. (B) Connecting to secured networks using the provided network name and password when visiting hotels. (C) Encrypting your files and sharing your private key to ensure others who you choose to share files with can read them. (D) Using cloud storage to ensure access to your files from all your devices.
Encrypting your files and sharing your private key to ensure others who you choose to share files with can read them
Digital data can be compressed in order to reduce file size, and speed of transmission through a network. While some compression techniques are lossy, others preserve the original data in the compressed form. Compression techniques (lossy or lossless) can do the following, EXCEPT: (A) Combine multiple files to create a single, compressed file that can be restored to its original form (B) Compress a high resolution photo to a low resolution format such as .jpg (C) Extract a compressed zip file to its original size (D) Enlarge a file in order to increase the resolution in the original, thereby increasing the file size
Enlarge a file in order to increase the resolution in the original, thereby increasing the file size
When building internet networks it is important to consider redundancy. Which of the following is an example of redundancy? (A) Optimizing the system so that a single request has the shortest time between request and receipt (B) Optimizing the system so that as much data as possible can be transferred in a given amount of time (C) The hierarchical nature of the internet allows for massive growth (D) Ensuring that if any single node in the network were to stop working, packets can still be delivered
Ensuring that if any single node in the network were to stop working, packets can still be delivered
Which of the following statement about algorithmic efficiency is correct? (A) Any algorithm that correctly solves a problem will have the same efficiency as any other algorithm that correctly solves that same problem. (B) If an algorithm is considered efficient, it will always be rather simple and contain little code. (C) When determining the overall efficiency of an algorithm, time is the only factor considered. (D) Formal reasoning can be used to determine the efficiency of an algorithm
Formal reasoning can be used to determine the efficiency of an algorithm
The various protocols used on the internet operate in layers in which the protocol at each layer rely on the protocols at the lower layers to do their jobs, and higher layers (higher level of abstraction) are built on top of the lower layers (lower level of abstraction). From the list provided choose the two (2) answers that correctly describe the relative levels of abstraction of the internet protocols. For example: if protocol A relies on protocol B, it means that A is a higher level of abstraction than B. Select two answers. (A) TCP/IP is a higher level of abstraction than HTTP (B) HTTP is a higher level of abstraction than TCP/IP (C) DNS is a higher level of abstraction than TCP/IP (D) TCP/IP is a higher level of abstraction than DNS
HTTP is a higher level of abstraction than TCP/IP AND DNS is a higher level of abstraction than TCP/IP
Which one of the following is NOT a benefit of the HTTPS protocol? (A) HTTPS ensures that only the client and the server can view the packets sent during their communication and they cannot be intercepted by a third party. (B) HTTPS verifies the identity of the server through a Certificate Exchange. (C) HTTPS encrypts the data before it is broken into packets to ensure its privacy. (D) HTTPS provides reasonable assurance by which the user can assume minimal cybersecurity risk of transactions carried out on that site
HTTPS ensures that only the client and the server can view the packets sent during their communication and they cannot be intercepted by a third party.
Imagine you are playing an online game with your friends. You are at a crucial stage in the basketball game and need just one more free throw to win the game. You see the entire complex scene display quickly. You aim at the hoop to shoot your free throw. You click the shoot button but there is a momentary freeze on your screen only to discover that you have lost the game. What is demonstrated by this situation? (A) High bandwidth, high latency (B) Low bandwidth, high latency (C) High bandwidth, low latency (D) Low bandwidth, low latency
High bandwidth, high latency
What are some of the advantages of using models and simulations to mimic a real-world process or system under study? I. Models and simulations mimic real-world events without the cost or danger of real world prototypes or testing. II. The results of models and simulations may generate new knowledge and new hypotheses related to the phenomena being modeled. III. We cannot change the model or simulation as rapidly as we can change the real-world process or system under study, therefore, it allows us to minimize iterations in a model or simulation. (A) I only (B) II only (C) I and II only (D) I, II and III
I and II only
You were hired as a manager of a set of new programmers because of your experience in generating quality code. One of your new programmers brings a solution which looks nothing like what you would generate for the same problem. Which of the following might be a good next step? I. Analyze the solution for correctness and readability. II. Realize that there are multiple ways to solve most problems and work to understand this employee's solution. III. If the program includes sequence, selection, and iterative statements, assume the solution is correct and congratulate her for her outstanding contribution. (A) I only (B) I and II only (C) II and III only (D) I, II and III
I and II only
The Domain Name System (DNS) is designed to I. Allow for nested domain naming (e.g., digitalportfolio.collegeboard.org ) II. Allow for centralized access and administration III. Use cache and redundant servers for quick matching of IP addresses to domain names IV. Use a static database for matching IP address to domain names (A) I only (B) II only (C) I and III only (D) II and IV only
I and III only
An architecture company is planning to build a tower in California but they are worried about earthquakes. They decide to use a computer simulation in order to test the safety of different designs when an earthquake occurs. Which of the following are reasons to use a simulation in this context? I. Using the simulation software can save the company money because it allows them to test building materials for safety without purchasing physical materials. II. Using the simulation software will perfectly predict what will happen in the event of an earthquake. III. Using the simulation software can help ensure the safety of the building during an earthquake without endangering people. (A) I only (B) III only (C) I and III only (D) I, II and III
I only
Which of the following can be represented by a sequence of 3 bits? I. The seven days of the week II. Between zero and eight pints of ice cream III. The nine innings in a standard baseball game (A) I only (B) I and II (C) I, II and III (D) None of the Above
I only
You are given a 32-bit word which was copied from computer RAM and are asked to determine what was represented by the word. Which of the following represents the most complete response? I. The 32-bit word could be integer data as binary is how data is always represented in RAM. II. The 32-bit word could be an instruction for the CPU as hardware processes binary words. III. We cannot be certain as to what the word represented without more information. (A) I only (B) II only (C) I and II (D) I, II and III
I, II and III
Since it is well known that you took AP CS Principles, your family decides to discuss the internet with you at a holiday party. I. Aunt Minnie says, "The Internet is wholly interesting because it is all about the documents and information in the documents enabling us to become smarter as a society". II. Uncle Jack says, "I love that the Internet connects all the devices such that data can be shared at the speed of light." III. Cousin Josiah comments, "Open standards have been instrumental in the growth of the Internet as multiple networks can be connected without concern so long as they implement established standards." Which of the above statements are correct? (A) II only (B) III only (C) I and II only (D) II and III only
III only
A student is taking a survey of her class in order to determine their average hours of sleep per night. She is tracking the number of students in her class that have replied. She sees that the number of students who have replied is represented by the digits "12" but she does not remember what base she used. Which of the following are possible bases that the number 12 could be in? I. Binary (base 2) II. Decimal (base 10) III. Hexadecimal (base 16) (A) I and II (B) I and III (C) II and III (D) I, II, and III
II and III
Several of your peers have conflicting viewpoints concerning what is, and is not, a creative artifact. Which of the statements listed below will you use to settle the conflict among your peers? I. For something to beconsidered a creative artifact, itmust include only original material generated by thecreator of the artifact. II. Creative artifacts can beproduced by combining existing artifacts in a new and novel way. III. Computing can facilitate the creation and modification of computational artifacts. (A) I only (B) II only (C) II and III (D) I and II
II and III
Which of the following statements about data analysis and processing are considered most true given modern computing technology? Select two answers. (A) Data scientists typically do not combine multiple data sources as more can be learned when each data source is analyzed independently. (B) Metadata is not included in modern data analysis as there is not useful information in metadata. (C) Information cleansing and classification are often employed in the processing of data by which patterns can emerge. (D) Storage, processing, or curation often present significant challenge when processing large datasets
Information cleansing and classification are often employed in the processing of data by which patterns can emerge AND Storage, processing, or curation often present significant challenge when processing large datasets
Which of the following is NOT true regarding metadata? (A) In photos, metadata is hidden within the image and is stripped out using pixel processing methods. (B) Metadata can be useful in producing new insights and knowledge when processed with the data itself. (C) Metadata is information about data. (D) Most objects contain metadata including images, audio, and video files
In photos, metadata is hidden within the image and is stripped out using pixel processing methods
If the post office delivered mail just as routers deliver messages on the Internet, which of the following statements would be true? Select two answers. A. One mailman would be responsible for delivering a letter from sender to receiver. B. Your mail could not be delivered if a road your mailman was planning to take were under construction. C. Letters would be written on the outside of envelopes for all to read instead of letters put inside envelopes. D. The mailman would sometimes take a different path to deliver each letter to your home
Letters would be written on the outside of envelopes for all to read instead of letters put inside envelopes AND The mailman would sometimes take a different path to deliver each letter to your home
FOUR INDEPENDENT ALGORITHMS listed below can be executed on a row of NUMBER cards (Not FACE cards) on a table. There are an EVEN number of cards,and they are in no special order. Which of the Algorithms involves BOTH Selection and Iteration? For this question select TWO correct answers (A) Look over all the cards to find the smallest one, and move it to the leftmost position. (B) Compare the first two cards. If the one on the left is greater, switch them (C) Compare the values of each pair of cards. For example, compare cards 0 and 1, compare cards 2 and 3, and so on for all pairs. Swap positions when the first card is greater than the second of the pair. (D) Find the middle card and switch it with the card in the rightmost position
Look over all the cards to find the smallest one, and move it to the leftmost position AND Compare the values of each pair of cards. For example, compare cards 0 and 1, compare cards 2 and 3, and so on for all pairs. Swap positions when the first card is greater than the second of the pair.
You have been hired by a company to generate a simulation of a process within their multinational company. You try to convince them that there is significant value to starting with a simple model even though it might not model their process exactly. Which arguments below are viable supports for your position? Select two answers. (A) Models and simulations often omit unnecessary features of the objects or phenomena under investigation. (B) Writing very detailed models and simulations will help minimize costs as they are easier to write than more abstract models and simulations. (C) Simple models and simulations will execute faster allowing more opportunity for rapid testing and development. (D) Less abstract models and simulations omit details to simplify the study of the objects or processes involved
Models and simulations often omit unnecessary features of the objects or phenomena under investigation AND Simple models and simulations will execute faster allowing more opportunity for rapid testing and development
You have been asked to create a computational artifact utilizing a set of tools which are unfamiliar to you. When creating the schedule for delivery, which would not be advised if you hope to deliver this product on time: (A) Building in time for multiple attempts at generating small pieces of the ultimate deliverable as well as integration time for all the small pieces. (B) Allotting a portion of the schedule to find the appropriate tool for the task. (C) Searching for existing public domain artifacts that can be combined to advance your project toward the deliverable. (D) Planning a set of sequential tasks with precise timing by which you can deliver exactly on the due date
Planning a set of sequential tasks with precise timing by which you can deliver exactly on the due date
A student draws a gorgeous digital image on her school computer. She decides she wants to show her brother, so she saves it and later downloads the image onto her home computer. When she opens and resizes the image at home, the quality is noticeably inferior to the original she saved. Which of the following is a reasonable explanation for the reduced quality? (A) Low bandwidth of her Wi-Fi connection caused a slow download. (B) High latency of her Wi-Fi connection caused a delay in starting the download. (C) The process she used to save the image utilized a "lossless" compression algorithm. (D) The process she used to save the image utilized a "lossy" compression algorithm.
The process she used to save the image utilized a "lossy" compression algorithm
Your school uses network filtering hardware and software to deny access to blacklisted websites and files. In the school's library there is a student accessing one of the blacklisted websites. Which of the following methods is the student most likely using to defeat the network filtering. Select two answers. (A) The student is using a personal device that is connected to the school's WiFi but since it is not running the network filtering software, the school is unable to filter the Internet traffic. (B) The student is using a personal mobile device that is connected to the Internet through a data plan. (C) The student is using a school device that allowed the configuration of a proxy server to encrypt the data of the blacklisted website. (D) The student used brute force attack methods on the filtering system and discovered the password that allows it to be disabled.
The student is using a personal mobile device that is connected to the Internet through a data plan AND the student is using a school device that allowed the configuration of a proxy server to encrypt
Which of the following is a characteristic of the fault-tolerant nature of communication on the Internet? A. The ability of users to trust that the software they download is free of viruses if it says it is free of malware. B. The ability to provide data transmission even when some connections have failed. C. The ability to resolve errors in domain name server lookups. D. The ability to transfer data using multiple protocols such as hypertext transfer protocol (HTTP), Internet Protocol (IP), and simple mail protocol (SMTP)
The ability to provide data transmission even when some connections have failed
In the process of engineering a piece of software, which of the following statements would generally be considered to be most accurate? (A) Software engineering places much greater emphasis on using the correct set of software commands than it does the sequence of the commands. (B) Having multiple people collaborating on the engineering of a piece of software is not very productive as the creation of software is best left to a single person and vision. (C) The end user of the software must be considered in the design, implementation, and release of the software. (D) Software engineers should not concern themselves with choosing any particular development tool or program
The end user of the software must be considered in the design, implementation, and release of the software
A high school surveys all of its 1,750 students to determine the average number of hours U.S. high school students sleep per night. Which of the following is a true statement? (A) The high school should not use the data from this study because it is based on direct observation. (B) The high school can use this data to determine the average number of hours U.S. high school students sleep per night. (C) The high school cannot draw meaningful conclusions from this data because the sample size is too small. (D) The high school can use the results of this survey to conclude that U.S. high school students do not get enough sleep.
The high school cannot draw meaningful conclusions from this data because the sample size is too small
Consider the following algorithms to store a color digital image. Which algorithms are examples of "lossy" compression? Select two answers: (A) The algorithm breaks the image into quadrants, and those quadrants into sub-quadrants creating 16 uniformly sized parts. The parts are saved in separate smaller files along with the information needed to completely reassemble the original image. (B) The image is divided into squares that are 2 by 2 pixels each. Each square is translated into a single pixel whose color is the average of the color values from the 4 pixels in the square. (C) The algorithm find runs of identical pixels. It saves the same information by saving the pixel value once and then the number of consecutive identical pixels. (D) The algorithm translates a color image into a grayscale version of the color original storing only averages of the data used to store the original colors in the picture.
The image is divided into squares that are 2 by 2 pixels each. Each square is translated into a single pixel whose color is the average of the color values from the 4 pixels in the square AND The algorithm translates a color image into a grayscale version of the color original storing only averages of the data used to store the original colors in the picture
If Alice wishes to send Bob an encrypted message using public-key encryption, she should encrypt her message with ________________, (A) her private key (B) her public key (C) Bob's private key (D) Bob's public key
bob's public key
What is a disadvantage of the open standard of Internet addressing and routing? Select two answers. (A) censorship (B) possibility of denial of service attacks (C) redundancy (D) hierarchy
censorship and possibility of denial of service attacks
In the process of digging, a landscaping company cuts a fiber line. Transmission of Internet traffic is still possible through additional pathways that provide alternate routes between the source and destination. The additional pathways describe a concept known as: (A) bandwidth (B) hierarchy (C) latency (D) redundancy
redundancy
Which type of chart would best display the individual data from 1,000 individuals' daily time spent in social media? (A) Pie Chart (B) Bar Chart (C) Line Chart (D) Scatter Plot
scatter plot
Which one of these would be least likely to make programming code easily modifiable in the future? (A) Using meaningful variable names which reflect the purpose of the data that is stored in them. (B) Combining duplicated code into one procedure. (C) Creating more procedures for the program. (D) Increasing the number of comments in your code by which others can understand the program and why you implemented it that way.