APCSP Mock Exam Flash Cards

Ace your homework & exams now with Quizwiz!

Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system?

A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user's computer using the recorded data.

Individuals sometimes attempt to remove personal information from the Internet. Which of the following is the LEAST likely reason the personal information is hard to remove?

All personal information is stored online using authentication measures, making the information hard to access.

Which of the following best explains how an analog audio signal is typically represented by a computer?

An analog audio signal is measured at regular intervals. Each measurement is stored as a sample, which is represented at the lowest level as a sequence of bits.

Which of the following research proposals is most likely to be successful as a citizen science project?

Collecting pictures of birds from around the world that can then be analyzed to determine how location affects bird size.

Which of the following best explains how data is transmitted on the Internet?

Data is broken into packets, which can be sent along different paths.

The figure below represents a network of physically linked devices labeled A through I. A line between two devices indicates that the devices can communicate directly with each other. Any information sent between two devices that are not directly connected must go through at least one other device. For example, in the network represented below, information can be sent directly between A and B, but information sent between devices A and G must go through other devices. Which of the following statements is true about the network?

If devices B and F fail, then device A will not be able to communicate with device G

A city maintains a database of all traffic tickets that were issued over the past ten years. The tickets are divided into the following two categories. *Moving violations *Nonmoving violation The data recorded for each ticket include only the following information. *The month and year in which the ticket was issued *The category of the ticket Which of the following questions CANNOT be answered using only the information in the database?

In the past ten years, were nonmoving violations more likely to occur on a weekend than on a weekday?

Which of the following is a true statement about the use of public key encryption in transmitting messages?

Public key encryption enables parties to initiate secure communication through an open medium, such as the Internet, in which there might be eavesdroppers.

Which of the following best describes a direct benefit in using redundant routing on the Internet?

Redundancy often allows messages to be sent on the network even if some network devices or connections have failed.

Each student at a school has a unique student ID number. A teacher has the following spreadsheets available. * Spreadsheet I contains information on all students at the school. For each entry in this spreadsheet, the student name, the student ID, and the student's grade point average are included. * Spreadsheet II contains information on only students who play at least one sport. For each entry in this spreadsheet, the student ID and the names of the sports the student plays are included. * Spreadsheet III contains information on only students whose grade point average is greater than 3.5. For each entry in this spreadsheet, the student name and the student ID are included. *Spreadsheet IV contains information on only students who play more than one sport. For each entry in this spreadsheet, the student name and the student ID are included. The teacher wants to determine whether students who play a sport are more or less likely to have higher grade point averages than students who do not play any sports. Which of the following pairs of spreadsheets can be combined and analyzed to determine the desired information?

Spreadsheets I and II

In which of the following situations would it be most appropriate to choose lossy compression over lossless compression?

Storing music files on a smartphone in order to maximize the number of songs that can be stored

Which of the following best explains how symmetric encryption algorithms are typically used?

Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

Which of the following statements about the Internet is true?

The Internet is designed to scale to support an increasing number of users.

An Online gaming company is introducing several new initiatives to encourage respectful communication between players of online games. Which of the following best describes a solution that uses crowdsourcing?

The company allows individual players to endorse fellow players based on courteous interactions. Once a player receives enough endorsements, the player is given free rewards that can be used during gameplay.

A video-streaming Web site keeps count of the number of times each video has been played since it was first added to the site. The count is updated each time a video is played and is displayed next to each video to show its popularity. At one time, the count for the most popular video was about two million. Sometime later, the same video displayed a seven-digit negative number as its count, while the counts for the other videos displayed correctly. Which of the following is the most likely explanation for the error?

The count for the video became larger than the maximum value allowed by the data type used to store the count.

Which of the following best explains the ability to solve problems algorithmically?

There exist some problems that cannot be solved algorithmically using any computer.

RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone's GPS unit to track a user's location, running speed, and distance traveled. Users can use the application to review information and statistics about their previous runs. At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application shares the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other's contact lists or if they typically run at similar speeds. A basic RunRoutr account is free, but it displays advertisements that are targeted to individual users based on data collected by the application. For example, if a user's running route begins or ends near a particular store, the application may display an advertisement for that store. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application. Which of the following is most likely to be a benefit to users of the application?

Users of the application may see health benefits as a result of the application encouraging them to exercise with each other.

Delivery trucks enter and leave a depot through a controlled gate. At the depot, each truck is loaded with packages, which will then be delivered to one or more customers. As each truck enters and leaves the depot, the following information is recorded and uploaded to a database. The truck's identification number The truck's weight The date and time the truck passes through the gate Whether the truck is entering or leaving the depot Using only the information in the database, which of the following questions CANNOT be answered?

What is the average number of customer deliveries made by each truck on a particular day.

A scientist wants to investigate several problems. In which of the following situations is using a simulation LEAST suitable for solving a problem?

When the solution to the problem requires real-world data inputs that are continually measured a regular intervals.

A code segment is intended to transform the list utensils so that the last element of the list is moved to the beginning of the list. For example, if utensils initially contains ["fork", "spoon", "tongs", "spatula", "whisk"], it should contain ["whisk", "fork", "spoon", "tongs", "spatula"] after executing the code segment. Which of the following code segments transforms the list as intended?

len ←\leftarrow← LENGTH (utensils) temp ←\leftarrow← utensils [len] REMOVE (utensils, len) APPEND (utensils, temp)


Related study sets

Health Insurance Policy Provisions (6) end questions

View Set

A&P Module 6 - Heart and Vessels Dissection Homework

View Set

Chapter 19- Vital Signs (Part 2)

View Set

54. English Phrasal Verbs in Use Advanced, Unit 54, Technology

View Set

Type of reproduction by which offspring are produced from _________________________ parents.

View Set

Chapter 12: The Postpartum Woman

View Set

Network Layer - The Internet Protocol - part 2 - Slide# 13

View Set

Chapter 1.1-1.5, Chapter 3.1-3.4, 7.1-7.5, Chapter 11.1-11.7 Econ 105 Cypress College

View Set

Chapter 9 - Molecular Diagnostics

View Set