AP COMPUTER SCIENCE PRINCIPLES COLLEGE
BOARD
Which of the following best explains what happens when a new device is connected to
the Internet? - Answers -An Internet Protocol (IP) address is assigned to the device.
Which of the following is a characteristic of the fault-tolerant nature of routing on the
Internet? - Answers -The ability to provide data transmission even when some
connections have failed
Which of the following are true statements about digital certificates in Web browsers?
I. Digital certificates are used to verify the ownership of encrypted keys used in secured
communication.
II. Digital certificates are used to verify that the connection to a Web site is fault tolerant.
- Answers -I only
Under which of the following conditions is it most beneficial to use a heuristic approach
to solve a problem? - Answers -When the problem cannot be solved in a reasonable
time and an approximate solution is acceptable
When a cellular telephone user places a call, the carrier transmits the caller's voice as
well as the voice of the person who is called. The encoded voices are the data of the
call. In addition to transmitting the data, the carrier also stores metadata. The metadata
of the call include information such as the time the call is placed and the phone
numbers of both participants. For which of the following goals would it be more useful to
computationally analyze the metadata instead of the data?
I. To determine if a caller frequently uses a specific word
II. To estimate the number of phone calls that will be placed next Monday between
10:30 A.M. and noon.
III. To generate a list of criminal suspects when given the telephone number of a known
criminal - Answers -II and III only
Which of the following best describes a Distributed Denial of Service (DDoS) attack? -
Answers -An attempt to deny users access to a Web site's resources by flooding the
Web site with requests from multiple systems
A programmer is writing a program that is intended to be able to process large amounts
of data. Which of the following considerations is LEAST likely to affect the ability of the
program to process larger data sets? - Answers -How many programming statements
the program contains
A certain social media Web site allows users to post messages and to comment on
other messages that have been posted. When a user posts a message, the message
itself is considered data. In addition to the data, the site stores the following metadata.
, The time the message was posted
The name of the user who posted the message
The names of any users who comment on the message and the times the comments
were made
For which of the following goals would it be more useful to analyze the data instead of
the metadata?
A
To determine the users who post messages most frequently
B
To determine the time of day that the site is most active
C
To determine the topics that many users are posting about
D
To determine which posts from a particular user have received the greatest number of
comments - Answers -C
To determine the topics that many users are posting about
Which of the following is a true statement about data compression? - Answers -There
are trade-offs involved in choosing a compression technique for storing and transmitting
data.
Consider the following numbers.
Binary 1100
Decimal 11
Hexadecimal D
Which of the following lists the numbers in order from least to greatest? - Answers -
Decimal 11, Hexadecimal D, Binary 1100
Digital images are often represented by the red, green, and blue values (an RGB triplet)
of each individual pixel in the image. A photographer is manipulating a digital image and
overwriting the original image. Which of the following describes a lossless
transformation of the digital image? - Answers -Creating the gray scale of an image by
averaging the amounts of red, green, and blue in each pixel and assigning this new
value to the corresponding pixel in the new image. The new value of each pixel
represents a shade of gray, ranging from white to black.
A program is expressed in a programming language. Which of the following is true of
the program? - Answers -The program can also be expressed as binary code, but will
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller GEEKA. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.49. You're not tied to anything after your purchase.