AP Computer Science Principles

AP Computer Science Principles

10th Grade

33 Qs

quiz-placeholder

Similar activities

AP CSP 9-30 - 2.3 - MONDAY

AP CSP 9-30 - 2.3 - MONDAY

9th - 12th Grade

34 Qs

CSP Unit 1-4 Vocabulary

CSP Unit 1-4 Vocabulary

9th - 12th Grade

35 Qs

Cambridge Technicals Unit 1

Cambridge Technicals Unit 1

7th - 12th Grade

31 Qs

Computer Translators

Computer Translators

8th - 10th Grade

28 Qs

CS20 Chapter-1 Test

CS20 Chapter-1 Test

10th Grade

33 Qs

Data Representation

Data Representation

9th - 12th Grade

30 Qs

GCSE Computer Science - 2.1: Algorithms

GCSE Computer Science - 2.1: Algorithms

9th - 11th Grade

31 Qs

Unit 1 - Fundamentals of Algorithms

Unit 1 - Fundamentals of Algorithms

9th - 11th Grade

30 Qs

AP Computer Science Principles

AP Computer Science Principles

Assessment

Quiz

Computers

10th Grade

Medium

Used 670+ times

FREE Resource

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of DNS?
It assigns a unique address to every device on the Internet.
It returns the IP address given the name of a website.
It forwards a message from one machine to another.
It has more bits so you can make a longer, unique address.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is IP v4 going to be replaced by IP v6?
IP v6 is easier to use.
IP v4 does not work on old hardware.
IP v4 was not encrypted.
We are running out of IP v4 addresses.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an IP address?
www.google.com
192.168.2.25
1024.2048.64.512.256
A5:D4:23:56:FF:A4

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an Event?

An action that causes something to happen

An action that doesn’t do anything in the App

An action that will allow you to look up and event

Something that is happening in the calendar

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

According to the domain name (DNS), which of the following is a subdomain of the domain example.com?
about.example.com
example.co.uk
example.com.org
example.org

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following activities poses the greatest personal cybersecurity risk?
Making a purchase at an online store that uses public key encryption to transmit credit card information
Paying a bill using a secure electronic payment system
Reserving a hotel room by e-mailing a credit card number to a hotel.
Withdrawing money from a bank account using an automated teller machine (ATM)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is LEAST likely to indicate a phishing attack?
An e-mail from your bank asks you to call the number on your card to verify a transaction
An e-mail from a merchant asks that you click on a link to reset your password
An e-mail from a utility company asks you to enter your date of birth and social security number for verification purposes.
An e-mail indicates that you have won a large sum of money and asks you to enter your bank account number so that the money can be transferred to you

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?