- Study guides, Class notes & Summaries

Looking for the best study guides, study notes and summaries about ? On this page you'll find 387 study documents about .

Page 3 out of 387 results

Sort by

AP Computer Science Final Exam with Verified Answers
  • AP Computer Science Final Exam with Verified Answers

  • Exam (elaborations) • 3 pages • 2025
  • Rachel is planning on writing code that will have to do computations with very large numbers. Which of the following is most important issue she should check before writing her code? - Rachel should look up how many bits are used to store integers and floating point numbers in the programming language she is using. Which of the following can be represented by a single binary digit? - any integer modulus 2, & if a grade is passing or failing Which of the following is not a reason computers ...
    (0)
  • $7.99
  • + learn more
AP Computer Science Final Exam with Verified Answers
  • AP Computer Science Final Exam with Verified Answers

  • Exam (elaborations) • 29 pages • 2025
  • Available in package deal
  • A certain programming language uses 4-bit binary sequences to represent nonnegative integers. For example, the binary sequence 0101 represents the corresponding decimal value 5. Using this programming language, a programmer attempts to add the decimal values 14 and 15 and assign the sum to the variable total. Which of the following best describes the result of this operation? - An overflow error will occur because 4 bits is not large enough to represent 29, the sum of 14 and 15. ASCII is a...
    (0)
  • $13.49
  • + learn more
AP Computer Science Exam with Verified Answers
  • AP Computer Science Exam with Verified Answers

  • Exam (elaborations) • 122 pages • 2025
  • Available in package deal
  • A rectangular puzzle exists with all pieces being identically-sized squares. The main part of the puzzle has a total of 600 pieces and each row of this main part of the puzzle is 30 pieces wide. Additionally, there is a border of artistic icons completely surrounding this main puzzle area, and this border is exactly one piece wide, with each piece of the border being the same size as a main puzzle piece. Finally, at the bottom of the puzzle is one additional row of square pieces that spells...
    (0)
  • $22.99
  • + learn more
AP Computer Science Exam with Verified Answers
  • AP Computer Science Exam with Verified Answers

  • Exam (elaborations) • 18 pages • 2025
  • Available in package deal
  • Which of the following is true of algorithms? - C. Every algorithm can be constructed using combinations of sequencing, selection, and iteration The following algorithm is followed by a person every morning when they get up from bed to go to school Wake up Brush teeth Put on shirt Put on pants Put on socks Put on shoes Tie shoes - A. Sequencing 3. Which of these algorithms will move the robot along the same path as the algorithm below? REPEAT 2 TIMES { REPEAT 3 TIMES { MOVE_FORWARD...
    (0)
  • $11.49
  • + learn more
AP Computer Science Exam with Verified Answers
  • AP Computer Science Exam with Verified Answers

  • Exam (elaborations) • 7 pages • 2025
  • Available in package deal
  • The variable isOpen is to be used to indicate whether or not a store is currently open. Which of the following is the most appropriate data type for isOpen ? - boolean A teacher is writing a code segment that will use variables to represent a student's name and whether or not the student is currently absent. Which of the following variables are most appropriate for the code segment? - a string variable named StudentName and a boolean variable named isAbsent. r ← 1 s ← 2 t ← 3 r...
    (0)
  • $7.99
  • + learn more
AP Computer Science Exam with Verified Answers
  • AP Computer Science Exam with Verified Answers

  • Exam (elaborations) • 8 pages • 2025
  • Available in package deal
  • Which of the following is an example of a phishing attack? (A) Loading malicious software onto a user's computer in order to secretly gain access to sensitive information (B) Flooding a user's computer with e-mail requests in order to cause the computer to crash (C) Gaining remote access to a user's computer in order to steal user IDs and passwords (D) Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information - D) Phishing is a technique th...
    (0)
  • $9.49
  • + learn more
AP Computer Science Exam with Verified Answers
  • AP Computer Science Exam with Verified Answers

  • Exam (elaborations) • 61 pages • 2025
  • Which of the following is a valid string in Java? A. "a" B. "@#$" C. "hello" D. "123" E. All - E. All To output: HelloThere You would need to use: S._____ ("Hello");S("There"); A. Print B. println C. None of the options shown D. Println E. print - B. println
    (0)
  • $17.99
  • + learn more
AP Computer Science Exam with Verified Answers
  • AP Computer Science Exam with Verified Answers

  • Exam (elaborations) • 22 pages • 2025
  • Which of the following statements are true about the Internet? I - The Internet connects devices & networks all over the world II - There are no negative consequences of the Internet, it is purely positive III - The Internet helps people communicate IV - The Internet helps people collaborate to solve problems - I, III, & IV. Consider the following program code: var i = 1; var sum = 0; while(i < 5) { sum += i
    (0)
  • $11.49
  • + learn more
AP Computer Science Exam with Verified Answers
  • AP Computer Science Exam with Verified Answers

  • Exam (elaborations) • 20 pages • 2025
  • Creative development process - A strategy used to produce a applicable design. Computational artifact - Anything created by a human using a computer. Creative expression (digital) - Creative expressive creation using digital media. Computing tools - A program used for program development of system maintenance. Collaborate/collaboration - A joint effort between two parties working towards a common goal. Analyze - To assess and thoroughly inspect something, to draw information from it. Bina...
    (0)
  • $11.99
  • + learn more
AP Computer Science Exam with Verified Answers
  • AP Computer Science Exam with Verified Answers

  • Exam (elaborations) • 78 pages • 2025
  • The web is based on the ________ Protocol. A) Hypertext Translate B) Hypertext Transfer C) Hypertext Trade D) Hypertext Transmit - B) hypertext transfer The browser feature where tabs are independent of each other is known as ________. A) pinned tabs B)tab isolation C)privacy browsing D) free tabs - B) tab isolation Which of the following is NOT a precaution to take when shopping online? A) Avoid making online transactions on a public computer.
    (0)
  • $19.99
  • + learn more