100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

AP CSP Final Exam Questions and Answers Solved 100% Correct

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
10-02-2023
Written in
2022/2023

AP CSP Final Exam Questions and Answers Solved 100% Correct 8 bits is enough to represent 256 different numbers. How many total bits do you need to represent 512 (twice as many) numbers? - ANSWER-9 bits A bakery collects data on sales. Each sales record includes the date of the sale and some metadata about the items that were part of the sale. The data includes: the names of the items sold, the types of items sold, the number of each item sold, and the price of each item sold. Which of the following CANNOT be determined from the bakery's data set? - ANSWER-Which customer most frequently purchases bread. A certain social media Web site allows users to post messages and to comment on other messages that have been posted. When a user posts a message, the message itself is considered data. In addition to the data, the site stores the following meta data. The time the message was posted The name of the user who posted the message The names of any users who comment on the message and the times the comments were made For which of the following goals would it be more useful to analyze the data instead of the metadata? - ANSWER-To determine the topics that many users are posting about A compression scheme for long strings of bits called run-length encoding is described as follows: Rather than record each 0 and 1 individually, instead record "runs" of bits by storing the number of consecutive 1s and 0s that appear. Since it's binary, any run of 0s must be followed by a run of 1s (even if the run is only 1- bit long) and vice versa. Thus, you can store a list of small numbers that represents the alternating runs of 0s and 1s. Here is an example: (See C Unit 2 Chapter 1 Assessment Question 7) To uncompress the data back into its original binary state, you simply reverse the process. This technique is an example of what type of compression? - ANSWERLossless compression This study source was downloaded by from CourseH on :26:12 GMT -06:00 A middle school is expanding to open a high school next year, doubling the total number of students. The school keeps a database in which each student's unique ID number is stored as an 8 bit number called studentID. Before the arrival of the new students almost every 8 bit number has already been assigned to a student. Of the options This study source was downloaded by from CourseH on :26:12 GMT -06:00 provided below, which is the smallest change to the way studentID is represented necessary to ensure each incoming student receives a unique ID? - ANSWER-Add a bit to studentID to double the number of IDs that the database can represent. A programmer is writing a system that is intended to be able to store large amounts of personal data. As the programmer develops the data system, which of the following is LEAST likely to impact the programmer's choices in designing the structure of the system? - ANSWER-The frequency of a particular item occurring in a data set. A raw digital sound file samples a sound wave at some interval and measures the height of the wave at each point. Thus, raw sound is recorded as a list of numbers. In very broad terms the MP3 audio compression algorithm identifies frequencies and volume levels - low and high - that are outside the range of human hearing and removes the data representing these frequencies from the original. This technique results in a smaller audio file that sounds exactly the same to the human ear. This technique is an example of what type of compression? - ANSWER-Lossy compression A school starts tracking which websites each computer in the school is visiting by monitoring the packets leaving the school. A sample of the information they have collected appears below: IP Address Time URL ... ... ... 1.1.1.1 11:05:23.22 1.5.1.8 11:05:29.71 1.1.5.1 11:06:13.48 1.5.1.8 11:08:09.95 ... ... ... 1.1.5.1 17:04:29.20 Which of the following is MOST likely to be answerable using all the data collected by this monitoring? - ANSWER-Which websites are most frequently visited before and after school hours from a school computer A user clicks on a website, and it begins to load immediately, but it takes a long time to load completely and pictures appear slowly, one by one. Which of the following is demonstrated through this situation? - ANSWER-Low bandwidth, low latency A video-streaming Web site uses 32-bit integers to count the number of times each video has been played. In anticipation of some videos being played more times than can be represented with 32 bits, the Web site is planning to change to 64-bit integers for the counter. Which of the following best describes the result of using 64-bit integers instead of 32-bit integers? - ANSWER-2^32 times as many values can be represented. This study source was downloaded by from CourseH on :26:12 GMT -06:00 According to the domain name system (DNS), which of the following is a subdomain of the domain ? - ANSWER- An artist makes an RGB raster image in which each pixel color is encoded with 12-bits --- 4 bits each for red, green and blue. Which of the following correctly shows the hexadecimal value for Red as a 12-bit representation. - ANSWER-F00 Approximately how much bigger (how many more bytes) is a megabyte than a kilobyte? - ANSWER-1,000 times bigger ASCII is a character-encoding scheme that uses a numeric value to represent each character. For example, the uppercase letter "G" is represented by the decimal (base 10) value 71. A partial list of characters and their corresponding ASCII values are shown in the table below. (See Code.Org Unit 1 Ch 1 Assessment Question 9) ASCII characters can also be represented by binary numbers. According to ASCII character encoding, which of the following letters is represented by the 8-bit binary value: - ANSWER-ASCII Character: B Biologists often attach tracking collars to wild animals. For each animal, the following geolocation data is collected at frequent intervals. The time The date The location of the animal Which of the following questions about a particular animal could NOT be answered using only the data collected from the tracking collars? - ANSWER-Do the movement patterns of the animal vary according to the weather? Consider the following numbers given in Binary (BIN), Decimal (DEC), and Hexadecimal (HEX) representations: BIN: 1110 DEC: 13 HEX: F Which of the following lists the numbers in order from least to greatest? - ANSWERDEC: 13, BIN: 1110, HEX: F Consider the following three binary numbers: This study source was downloaded by from CourseH on :26:12 GMT -06:00 01010 1110 Which of the following lists the numbers in order from least to greatest? - ANSWER01010 1110 For this scenario related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions) to handle the task: Drawing 100 tiny dots in a line - ANSWER-Loop For this scenario related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions) to handle the task: Drawing a circle of any size at any point on the screen - ANSWER-Function(s) For this scenario related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions) to handle the task: Drawing a hexagon (six-sided shape) - ANSWER-Loop For this scenario related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions) to handle the task: Drawing out the letters of a word "HELLO" - ANSWER-Function(s) How does a computer resolve a domain name into an IP address? - ANSWER-It asks a DNS server for the corresponding IP address Number systems with different bases such as binary (base-2), octal (base-8), decimal (base-10), and hexadecimal (base-16), are all used to view and represent digital data. Which of the following is NOT true about representing digital data? - ANSWER-When data is large enough computers switch to using decimal representation instead of binary, because you can represent larger numbers with fewer digits. Programming languages have some similarities and differences to the "natural" language you use in everyday speech. Select the two true statements about programming languages: - ANSWER-Ambiguities in natural language necessitate the creation of programming languages for controlling a computer This study source was downloaded by from CourseH on :26:12 GMT -06:00 Compared to the number of words in a natural language, the number of defined words in a programming language is very small. Select the answer that lists the units of bytes in ascending order (from smallest to largest) - ANSWER-kilobyte, gigabyte, terabyte The AP CS Principles framework contains the following statement: 7.1.1G Search trends are predictors. Which of the following is the most accurate statement about using search trends as predictors of future events? - ANSWER-Search trends are imperfect predictors of future events that may not fully represent society at large. The Chart below from Google Trends shows the prevelance of some search terms in the United States between 2004 and the present. Which of the following is the most accurate statement of what this chart is showing. (See C Unit 2 Chapter 2 Assessment Question 6) - ANSWER-Generally speaking, since 2009 more people use "red" in their search terms more than they use "blue", "yellow", "green", or "purple" The colors of the pixels in a digital image are often represented by red, green, and blue values between 0 and 255 (an RGB triplet). A photographer is manipulating a digital image to lighten it because all of the RGB values in the image are less than 100, making it very dark. He does this by adding 20 to the R, G, and B values of each pixel, then overwriting the original image. What type of transformation is the photographer using on the digital image? - ANSWER-Lossless transformation The figure (See C Unit 1 Lesson 2 Assessment Question 9) represents a network of physically linked computers labeled A through F. A line between two computers indicates that the computers can communicate directly with each other. Any information sent between two computers that are not directly connected must go through at least one other computer. The weight or cost of sending information from one computer to another is indicated by the number above the line. For example, information can be sent directly between computers A, and B and will cost 5. Information sent between computers A and D must go through either computer C (with total cost 5), or through computer B (with total cost 8) Computer A sends a packet intended to reach computer F. Along its path it arrives at Computer C. Which computer should Computer C forward the packet to in order to use the most cost effective path? - ANSWER-Computer D The image below shows an encoding for a black and white pixel image. The first two bytes of the data (circled in red) are used to encode the width and height of the image. This study source was downloaded by from CourseH on :26:12 GMT -06:00 What is the best term for this type of "data about the data"? (See C Unit 2 Chapter 1 Assessment Question 10) - ANSWER-metadata The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works. The members of the IETF are: - ANSWER-A loosely organized collection of citizens and engineers. The next 3 questions all refer to data collected in a hypothetical survey of high school seniors, and a student, Amara, who is working with this data. The survey of high school seniors asked: What state do you live in? How likely are you to attend college in your home state? (on a scale of 1-5, 5 meaning "very likely") What do you plan to study? Amara does an initial computation on the data to make a summary table. A small segment is shown below. (See C Unit 2 Chapter 2 Assessment Question 8) Amara is tasked with cleaning the data to prepare it for further analysis. Which of the following would be the least appropriate modifications to make to the data to prepare it for further analysis? - ANSWER-Round up all non-integer values for "Likelihood of staying in state" The various protocols in use on the internet are said to operate in layers in which the protocol(s) at each layer solve one problem related to networked communication, and higher layers are built on top of, and rely on, the lower layers to do their jobs. From the list provided choose the two (2) answers that correctly describe which internet protocol relies on the other. For example: if protocol A relies on protocol B, it means that A is a higher level protocol than B, and thus protocol B must exist and work properly in order for protocol A to do its job. Select two answers. - ANSWER-HTTP relies on TCP/IP DNS relies on TCP/IP The world is currently in a transition to using IPv6, a newer version of the IP protocol that uses 128-bit addresses instead of 32-bit addresses used by IPv4. What is the main problem that IPv6 was created to solve? - ANSWER-32-bit addresses could not ensure that every internet-connected device can receive a unique IP address This study source was downloaded by from CourseH on :26:12 GMT -06:00 This question refers to the same data from the High School Survey about college plans from the previous question (See C Unit 2 Chapter 2 Assessment Question 8). Amara decides to make a visualization of a portion of the responses showing only a few states and a few areas of study. She wants to make an effective visualization that shows for comparison: Students' average likelihood of attending college in-state broken down by which state they live in and what they plan to major in. For example, in Illinois (IL) on average students who want to study economics are very likely to say they want to attend college in-state. Amara makes four different visualizations shown below (marked A, B, C, D). According to good principles of visualization, and for what Amara wants to show, which one of these would be considered the best visual representation? (See C Unit 2 Chapter 2 Assessment Question 10) - ANSWER-Chart B (Vertical Bar Chart) This question refers to the same data from the High School Survey about college plans from the previous question(See C Unit 2 Chapter 2 Assessment Question 8). Amara plans to use the survey data to create a visualization and short write up about students' plans for college, but first she wants to learn more about how the survey was conducted. Of the following things she might learn about the survey, which are the most likely sources of bias in the results based how it was collected? Choose two answers. - ANSWER-She learns that responses were collected only by mobile app. She learns that the survey was only available to students who scored at the top 10% on the PSAT. Two students have developed a protocol in which they send 4-bit messages to each other. They decide to modify their protocol to start sending 8-bit messages instead. How many more values can be represented in an 8-bit message than a 4-bit message? - ANSWER-2⁴= 16 times as many values Under which of the following conditions is it most beneficial to use a heuristic approach to solve a problem? - ANSWER-When the problem cannot be solved in a reasonable time and an approximate solution is acceptable What is one important naming convention of functions? - ANSWER-A function name should be as descriptive as possible to indicate what the function does. What is the 4-bit binary number for the decimal number Ten (10)? - ANSWER-1010 This study source was downloaded by from CourseH on :26:12 GMT -06:00 What is the best explanation for why digital data is represented in computers in binary? - ANSWER-It's easier, cheaper, and more reliable to build machines and devices that only have to distinguish between binary states. What is the minimum number of bits you would need to encode the 26 letters of the alphabet plus a space - a total of 27 characters? - ANSWER-5 bits When programmers work together, what is an example of how abstraction in programming can promote collaboration? - ANSWER-Programmers can use functions created by their partners, relying on the functionality without needing to know the specific details of how the function is implemented. Which of the following BEST describes how protocols on the Internet (e.g. IP, TCP, HTTP) make use of abstraction to accomplish their respective purposes? - ANSWERLow level protocols can provide functionality to high level protocols without revealing the details of how this is accomplished. Which of the following is a true statement about data compression? - ANSWER-There are trade-offs involved in choosing a compression technique for storing and transmitting data. Which of the following is NOT true about functions in programming? - ANSWERFunctions cannot make calls to other functions within the same program. Which of the following is NOT true about TCP/IP packets? - ANSWER-TCP guarantees that no packets are ever dropped Which of the following statements are true about routers and routing on the Internet. Choose two answers. - ANSWER-A packet traveling between two computers on the Internet may be rerouted many times along the way or even lost or "dropped". Routers act independently and route packets as they see fit. Which of the following will call the function drawStar? - ANSWER-drawStar(); Which one of the following statements about functions is TRUE? - ANSWER-Two functions in a single program can have different names but contain identical code. Why are parameters useful when programming? - ANSWER-Parameters allow for more flexible, generalized behaviors in functions

Show more Read less
Institution
AP CSP
Module
AP CSP









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
AP CSP
Module
AP CSP

Document information

Uploaded on
February 10, 2023
Number of pages
9
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BRIGHTERSTUDIES STUVIA
View profile
Follow You need to be logged in order to follow users or courses
Sold
40
Member since
3 year
Number of followers
30
Documents
454
Last sold
5 days ago

4.5

2 reviews

5
1
4
1
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions