
AP CSP Unit 8 Review
Authored by Shane Chavez
Computers
11th Grade
Used 210+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
Includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
computing innovation
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Information about an individual that identifies, links, relates, or describes them.
Information about an individual that identifies, links, relates, or describes them.
sensitive data (SD)
private information (PI)
confidential details (CD)
personally identifiable information (PII)
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
Keyrecording
Keytracing
Keyphishing
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Software intended to damage a computing system or to take partial control over its operation.
Software intended to damage a computing system or to take partial control over its operation.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A wireless access point that gives unauthorized access to secure networks.
A wireless access point that gives unauthorized access to secure networks.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A process of encoding messages to keep them secret, so only "authorized" parties can read them.
A process of encoding messages to keep them secret, so only "authorized" parties can read them.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?