AP Computer Science Principles Practice Exam

AP Computer Science Principles Practice Exam

9th - 12th Grade

40 Qs

quiz-placeholder

Similar activities

REMEDIAL DASAR-DASAR KEAHLIAN DKV

REMEDIAL DASAR-DASAR KEAHLIAN DKV

10th Grade

40 Qs

ATS INFORMATIKA Kelas 9

ATS INFORMATIKA Kelas 9

9th Grade

40 Qs

Informatika

Informatika

10th Grade

35 Qs

EmTech Quiz

EmTech Quiz

11th Grade

40 Qs

try out word kelas 7

try out word kelas 7

12th Grade

40 Qs

Latihan Soal Ujian Kelas X Informatika

Latihan Soal Ujian Kelas X Informatika

10th Grade

40 Qs

Ulangan Harian 1 (struktur kontrol)

Ulangan Harian 1 (struktur kontrol)

10th Grade

35 Qs

BÀI TẬP CHƯƠNG III TIN HỌC 10

BÀI TẬP CHƯƠNG III TIN HỌC 10

10th Grade

44 Qs

AP Computer Science Principles Practice Exam

AP Computer Science Principles Practice Exam

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

William Preston

Used 68+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is LEAST likely to indicate a phishing attack?

An e-mail from your bank asks you to call the number on your card to verify a transaction

An e-mail from a merchant asks that you click on a link to reset your password

An e-mail from a utility company asks you to enter your date of birth and social security number for verification purposes

An e-mail indicates that you have won a large sum of money and asks you to enter your bank account number so that the money can be transferred to you

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following activities poses the greatest personal cybersecurity risk?

Making a purchase at an online store that uses public key encryption to transmit credit card information

Paying a bill using a secure electronic payment system

Reserving a hotel room by e-mailing a credit card number to a hotel

Withdrawing money from a bank account using an automated teller machine (ATM)

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following best describes a Distributed Denial of Service (DDoS) attack?

An attempt by a country to deny its citizens access to the Internet

An attempt to deny users access to a Web site's resources by flooding the Web site with requests from multiple systems

An attempt by one user to deny service to another user by posting material on a social network

An attempt by a user of the Internet to get private information from a secure database

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A program is expressed in a programming language. Which of the following is true of the program?

The program can also be expressed as binary code, but will be more easily understood by humans when expressed in a higher-level programming language.

The program can also be expressed as binary code, which will reduce the likelihood of errors.

The program cannot be expressed as binary code, because binary code can only be used to represent data.

Some parts of the program can be expressed as binary code, but operations must be expressed using a higher-level programming language.

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following statements best describes the properties of public key encryption?

Public key encryption is an encryption method which relies on separate keys for encrypting and decrypting information.

Public key encryption is a highly secure encryption scheme that in which a single key is used by both the sender and receiver of the message.

Public key encryption makes use of certain types of problems which are easier for humans to solve than computers.

Public key encryption makes use of mathematical problems which no algorithm can be used to solve.

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

A flowchart is a way to visually represent an algorithm. The flowchart above uses the building blocks from the table above.


Which of the following statements best describes the behavior of the algorithm depicted in the flowchart?

Assume a always starts greater than b.

It displays the sum of a and b.

It displays the difference between a and b.

It displays the product of a and b

It runs in an infinite loop.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

Consider the process of encoding and decoding a message using the following Caesar cipher encoding scheme in which the plaintext and ciphertext alphabets are offset by four positions, as shown above.


Which of the following encoded ciphertext strings decodes to an original plaintext message of “secret”?

ersecr

wigvix

kwujwl

oaynap

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?