placeholder image to represent content

AP Final Review

Quiz by Marva Burrell

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
20 questions
Show answers
  • Q1
    Consider the following code segment, which uses the variables r, s, and t. What is displayed as a result of running the code segment?
    Question Image
    1 2
    3 2
    2 3
    1 1
    30s
  • Q2
    Which of the following is a true statement about program documentation?
    Program documentation should not be changed after it is first written.
    Program documentation is useful during initial program development and also when modifications are made to existing programs.
    Program documentation is useful when programmers collaborate but not when a programmer works individually on a project.
    Program documentation is only needed for programs in development; it is not needed after a program is completed.
    30s
  • Q3
    Which of the following best explains what happens when a new device is connected to the Internet?
    A packet number is assigned to the device.
    A device driver is assigned to the device.
    An Internet Protocol (IP) address is assigned to the device.
    A Web site is assigned to the device.
    30s
  • Q4
    Consider the following code segment. Which of the following replacements for <MISSING CONDITION> will result in an infinite loop?
    Question Image
    j 6
    j = 6
    j > 7
    j = 7
    30s
  • Q5
    The algorithm below is used to simulate the results of flipping a coin 4 times. Consider the goal of determining whether the simulation resulted in an equal number of heads and tails. Following execution of the algorithm, which of the following expressions indicates that the simulation resulted in an equal number of heads and tails?
    Question Image
    flip_counter = 1
    flip_counter = 2
    heads_counter = 2
    coin_flip = 1
    30s
  • Q6
    An algorithm has been developed to compute the sum of all the elements in a list of integers. Which of the following programming structures must be added to the existing algorithm so that the new algorithm computes the sum of only the even integers in the list?
    Selection
    Searching
    Sequencing
    Iteration
    30s
  • Q7
    Which of the following activities poses the greatest personal cybersecurity risk?
    Paying a bill using a secure electronic payment system
    Withdrawing money from a bank account using an automated teller machine (ATM)
    Reserving a hotel room by emailing a credit card number to a hotel
    Making a purchase at an online store that uses public key encryption to transmit credit card information
    30s
  • Q8
    The code segment below uses the procedure IsFound (list, item), which returns true if item appears in list and returns false otherwise. The list resultList is initially empty. Which of the following best describes the contents of resultList after the code segment is executed?
    Question Image
    Only elements that appear in either inputList1 or inputList2 but not in both lists
    All elements in inputList1 followed by all elements in inputList2
    Only elements that appear in inputList1 but not in inputList2
    Only elements that appear in both inputList1 and inputList2
    30s
  • Q9
    A programmer is writing a program that is intended to be able to process large amounts of data. Which of the following considerations is LEAST likely to affect the ability of the program to process larger data sets?
    How long the program takes to run
    How many programming statements the program contains
    How much memory the program requires as it runs
    How much storage space the program requires as it runs
    30s
  • Q10
    Which of the following is LEAST likely to indicate a phishing attack?
    An e-mail indicates that you have won a large sum of money and asks you to enter your bank account number so that the money can be transferred to you
    An e-mail from your bank asks you to call the number on your card to verify a transaction
    An e-mail from a utility company asks you to enter your date of birth and social security number for verification purposes
    An e-mail from a merchant asks that you click on a link to reset your password
    30s
  • Q11
    Which of the following is considered an unethical use of computer resources?
    Downloading freeware or shareware onto your home computer
    Searching online for an electronic version of a school textbook
    Purchasing a single-user copy of photo editing software and installing it on all the computers in a computer lab
    Purchasing a game from an app store and downloading it directly to a mobile device
    30s
  • Q12
    A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent to the user?
    The file is broken into packets for transmission. The packets must be reassembled upon receipt.
    The server repeatedly attempts to connect directly to the user’s computer until a connection is made. Once the connection is made, the entire file is sent.
    The file is broken into packets for transmission. The user’s browser must request each packet in order until all packets are received.
    The server attempts to connect directly to the user’s computer. If the connection is successful, the entire file is sent. If the connection is unsuccessful, an error message is sent to the user.
    30s
  • Q13
    An Internet service provider (ISP) is considering an update to its servers that would save copies of the Web pages most frequently visited by each user. Which of the following is LEAST likely to occur as a result of the update?
    Privacy of users might be negatively affected.
    Average response time for user requests might decrease.
    Storage requirements for the servers might increase.
    Web sites that are not visited frequently might no longer be accessible to users.
    30s
  • Q14
    Which of the following is a characteristic of the fault-tolerant nature of routing on the Internet?
    The ability to provide data transmission even when some connections have failed
    The ability to resolve errors in domain name system (DNS) lookups
    The ability to use multiple protocols such as hypertext transfer protocol (HTTP), Internet protocol (IP), and simple mail transfer protocol (SMTP) to transfer data
    The ability to use a hierarchical naming system to avoid naming conflicts
    30s
  • Q15
    Which of the following is a true statement about cloud computing?
    Cloud computing is convenient to implement but has a negative effect on the scalability of systems.
    Storing data using cloud computing improves security over storing data on a personal computer.
    Cloud computing is useful for large businesses but is not useful for individuals.
    Storing data using cloud computing can help ensure that data are not lost if a user’s computer stops functioning.
    30s

Teachers give this quiz to your class