
Impact of Computing #1 (AP CSP)
Authored by Michael Buwalda
Computers
9th - 12th Grade
Used 14+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Users may have a reduced risk of the application being used in unintended ways.
Users may have a reduced risk of their biometric data being misused.
Users with limited Internet access may be able to more easily obtain books and articles.
Users with visual impairments may be able to more easily read or listen to books and articles.
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The developers of a music-streaming application are updating the algorithm they use to recommend music to listeners. Which of the following strategies is LEAST likely to introduce bias into the application?
Making recommendations based on listening data gathered from a random sample of users of the application
Making recommendations based on the most frequently played songs on a local radio station
Making recommendations based on the music tastes of the developers of the application
Making recommendations based on a survey that is sent out to the 1,000 most active users of the application
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following actions is most likely to help reduce the digital divide?
Adding a requirement that all users of a popular social media site link their accounts with a phone number.
Deploying satellites and other infrastructure to provide inexpensive Internet access to remote areas of Earth.
Digitizing millions of books from university libraries, making their full text available online.
Offering improved Internet connections to Internet users who are willing to pay a premium fee for more bandwidth.
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet. Which of the following activities is LEAST likely to be effective in this purpose?
Holding basic computer classes at community centers
Providing free wireless Internet connections at locations in low-income neighborhoods
Putting all government forms on the city Web site
Requiring that every city school has computers that meet a minimum hardware and software standard
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following activities is most likely to be successful as a citizen science project?
Collecting pictures of plants from around the world that can be analyzed to look for regional differences in plant growth.
Designing and building a robot to help with tasks in a medical laboratory.
Sorting scientific records and removing duplicate entries in a database with a large number of entries.
Using a simulation to predict the impact of a construction project on local animal populations.
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following actions is most likely to raise legal or ethical concerns?
An analyst writes a program that scans through a database of open-access scientific journals and creates a document with links to articles written on a particular topic.
A computer scientist adds several features to an open-source software program that was designed by another individual.
A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song.
A public interest group alerts people to a scam that involves charging them for a program that is available for free under a Creative Commons license.
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?
The activities of a user browsing in an anonymous window will not be visible to people who monitor the user's network, such as the system administrator.
Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer.
A user will not be able to log in to e-mail or social media accounts during the anonymous browsing session.
A user browsing in an anonymous window will be protected from viruses launched from any Web sites visited or file downloaded.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?