๐Ÿ“š

ย >ย 

โŒจ๏ธย 

ย >ย 

โŒจ๏ธ

5.7 Multiple Choice Questions

5 min readโ€ขmarch 13, 2023


AP Computer Science Principlesย โŒจ๏ธ

80ย resources
See Units

Multiple Choice Practice for The Impact of Computing

Welcome to Big Idea 5 AP Computer Science Principles Multiple Choice Questions! Grab some paper and a pencil ๐Ÿ“„ to record your answers as you go. You can see how you did on the Big Idea 5 Practice Questions Answers and Review sheet once you're done. Don't worry, we have tons of resources available if you get stumped ๐Ÿ˜• on a question. And if solo study is not your thing, join a group in Hours! Not ready to take a quiz yet? Take a look at the Intro to Big Idea 5.
https://cdn.pixabay.com/photo/2019/06/17/19/48/source-4280758_1280.jpg

Image courtesy of Pixabay

Facts about the test: The AP CS: Principles exam has 70 multiple choice questions and you will be given 2 hours (120 minutes) to complete the section. That means it should take you around 10 minutes to complete 6 questions. *The following questions were not written by College Board and, although they cover information outlined in the AP Computer Science Principles Course and Exam Description, the formatting on the exam may be different.

1.ย Which of the following is a good definition of fault tolerant?
A.ย The acceptance of fault (errors) between calculations
B. The ability to communicate even when part of the connection is down.
C. the amount of tolerance that will be allowed between programmer experiences
D. the difference between significant digits & the answer calculated in a program

2.ย You are designing a user interface that will be used by people traveling internationally. As the creator how can you explain the options & features to potential users?
A.ย use images to show program features
B. write the Interface in Spanish & Chinese (most common worldwide)
C. use an Application Programming Interface to work with a translation site as needed
D. give a link to an online dictionary

3.ย Which is an example where analyzing a lot of data would NOT uncover valuable information?
A.ย help banks decrease the % of customers who default on loans
B. helping medical professionals use patterns in health issues to benefit standard of life for their patients
C. help companies make a replacement schedule for parts & equipment to decrease the amount of downtime for repairs
D. help a business predict what to make & when to maximize profit

4.ย Why do businesses & scientists analyze big data?
A.ย to confirm patterns from small data sets
B. to gain insight that smaller subsets of data might not provide
C. to help predict problems in the metadata
D. to obtain economies of scale with hardware needed to store the data based on Moore's law

5.ย What is anti-virus software?
A.ย kind of like a vaccine for a computer
B. instructions for the user to follow in the case of a vius on their machine
C. program that searches hard drives to find/prevent adware and spyware
D. software that never needs to be updated... it catches problems on the computer

6. What happens in a DDoS attack?
A.ย ย bots search for malware-detecting software that is out of date & prevents the uploading of new versions without the owner knowing
B. the targeted site is flooded with too many false requests and crashes
C. firewalls are deactivated so malware can enter the network
D. sensitive data is not encrypted before being transmitted over the Internet, making it vulnerable to interception

7.ย What does API stand for?
A.ย Application Programming Interface
B. Automated Program Interface
C. Automatic Problem Interaction
D. Application Primary Interaction

8.ย If an organization wants to change its website from .org to .edu, what do they need to do to ensure they can still be found on the Web?
A.ย notify IETF, the organization that maintains names on the internet
B. the organization can start using the new name immediately since only the top-level domain changed
C. register the new name with a DNS (Domain name system) site
D. post the new name on the organization's website up to 10 days prior to the switchover

9.ย Which of the following is a relevant aspect of data mining?
A.ย it is risky for decision making if the data is interpreted incorrectly
B. it tells companies what customers want to see on the website, whether true or not
C. it makes train staff on mining strategies necessary
D. allows companies to process large amounts of data to look for patterns or connections.

10.ย Computers have enables new innovations in many industries. In the entertainment business it has become much easier to purchase & share new music. What concerns have been raised as a result?
A.ย people are sharing content without the author/owner's permission
B. people are modifying other people's creations & claiming the Creative Commons licensing allows it
C. people are being discovered for their music because others are posting it to music-sharing sites
D. artists are adding their music to streaming services with Creative Commons licensing

11.ย Which of the following are legal & ethical concerns of DMCA?
A.ย controlled intellectual property sharing
B. licensing stipulations that allow incorporating music into other artforms
C. music & movie downloads & streaming services not charging enough for their services
D. peer-to-peer networks used for illegal file sharing

12.ย Which of the following may require more than a single binary digit to represent its value?
A.ย The sum of two binary digits
B. a value to represent if a switch is on or off
C. the MOD value when dividing a whole number by 2
D. the outcome of a boolean calculation

13.ย What benefit does an API provide?
A.ย it connects software companies providing pre-written & tested code available for use
B. it allows programmers to share their code via the API for others to test
C. it provides algorithms for difficult code to be reviewed
D. it provides documentation programmers can use for their programs rather than creating their own

14.ย Why should public key encryption be used?
A.ย it is shorter than other ciphers
B. it uses an asymmetric key, making it easier to decrypt
C. it used a symmetric key, making it harder to decrypt
D. It cannot be broken with brute force techniques

15.ย What is cloud computing?
A.ย storing information "up in the clouds" so everyone can access information
B. shares resources rather than having local servers handle the applications
C. local servers are used but can communicate as needed
D. personal devices must be carried around to access information

  • ๐ŸคConnect with other students studying AP CS: Principles with Hours

Browse Study Guides By Unit
๐Ÿ•นUnit 1 โ€“ Creative Development
โš™๏ธUnit 2 โ€“ Data
๐Ÿ“ฑUnit 3 โ€“ Algorithms & Programming
๐Ÿ–ฅUnit 4 โ€“ Computer Systems & Networks
โŒจ๏ธUnit 5 โ€“ Impact of Computing
โœ๏ธFrequently Asked Questions

Fiveable
Fiveable
Home
Stay Connected

ยฉ 2024 Fiveable Inc. All rights reserved.


ยฉ 2024 Fiveable Inc. All rights reserved.