AP Final Review
Quiz by Marva Burrell
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
20 questions
Show answers
- Q1Consider the following code segment, which uses the variables r, s, and t. What is displayed as a result of running the code segment?1 23 22 31 130s
- Q2Which of the following is a true statement about program documentation?Program documentation should not be changed after it is first written.Program documentation is useful during initial program development and also when modifications are made to existing programs.Program documentation is useful when programmers collaborate but not when a programmer works individually on a project.Program documentation is only needed for programs in development; it is not needed after a program is completed.30s
- Q3Which of the following best explains what happens when a new device is connected to the Internet?A packet number is assigned to the device.A device driver is assigned to the device.An Internet Protocol (IP) address is assigned to the device.A Web site is assigned to the device.30s
- Q4Consider the following code segment. Which of the following replacements for <MISSING CONDITION> will result in an infinite loop?j 6j = 6j > 7j = 730s
- Q5The algorithm below is used to simulate the results of flipping a coin 4 times. Consider the goal of determining whether the simulation resulted in an equal number of heads and tails. Following execution of the algorithm, which of the following expressions indicates that the simulation resulted in an equal number of heads and tails?flip_counter = 1flip_counter = 2heads_counter = 2coin_flip = 130s
- Q6An algorithm has been developed to compute the sum of all the elements in a list of integers. Which of the following programming structures must be added to the existing algorithm so that the new algorithm computes the sum of only the even integers in the list?SelectionSearchingSequencingIteration30s
- Q7Which of the following activities poses the greatest personal cybersecurity risk?Paying a bill using a secure electronic payment systemWithdrawing money from a bank account using an automated teller machine (ATM)Reserving a hotel room by emailing a credit card number to a hotelMaking a purchase at an online store that uses public key encryption to transmit credit card information30s
- Q8The code segment below uses the procedure IsFound (list, item), which returns true if item appears in list and returns false otherwise. The list resultList is initially empty. Which of the following best describes the contents of resultList after the code segment is executed?Only elements that appear in either inputList1 or inputList2 but not in both listsAll elements in inputList1 followed by all elements in inputList2Only elements that appear in inputList1 but not in inputList2Only elements that appear in both inputList1 and inputList230s
- Q9A programmer is writing a program that is intended to be able to process large amounts of data. Which of the following considerations is LEAST likely to affect the ability of the program to process larger data sets?How long the program takes to runHow many programming statements the program containsHow much memory the program requires as it runsHow much storage space the program requires as it runs30s
- Q10Which of the following is LEAST likely to indicate a phishing attack?An e-mail indicates that you have won a large sum of money and asks you to enter your bank account number so that the money can be transferred to youAn e-mail from your bank asks you to call the number on your card to verify a transactionAn e-mail from a utility company asks you to enter your date of birth and social security number for verification purposesAn e-mail from a merchant asks that you click on a link to reset your password30s
- Q11Which of the following is considered an unethical use of computer resources?Downloading freeware or shareware onto your home computerSearching online for an electronic version of a school textbookPurchasing a single-user copy of photo editing software and installing it on all the computers in a computer labPurchasing a game from an app store and downloading it directly to a mobile device30s
- Q12A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent to the user?The file is broken into packets for transmission. The packets must be reassembled upon receipt.The server repeatedly attempts to connect directly to the user’s computer until a connection is made. Once the connection is made, the entire file is sent.The file is broken into packets for transmission. The user’s browser must request each packet in order until all packets are received.The server attempts to connect directly to the user’s computer. If the connection is successful, the entire file is sent. If the connection is unsuccessful, an error message is sent to the user.30s
- Q13An Internet service provider (ISP) is considering an update to its servers that would save copies of the Web pages most frequently visited by each user. Which of the following is LEAST likely to occur as a result of the update?Privacy of users might be negatively affected.Average response time for user requests might decrease.Storage requirements for the servers might increase.Web sites that are not visited frequently might no longer be accessible to users.30s
- Q14Which of the following is a characteristic of the fault-tolerant nature of routing on the Internet?The ability to provide data transmission even when some connections have failedThe ability to resolve errors in domain name system (DNS) lookupsThe ability to use multiple protocols such as hypertext transfer protocol (HTTP), Internet protocol (IP), and simple mail transfer protocol (SMTP) to transfer dataThe ability to use a hierarchical naming system to avoid naming conflicts30s
- Q15Which of the following is a true statement about cloud computing?Cloud computing is convenient to implement but has a negative effect on the scalability of systems.Storing data using cloud computing improves security over storing data on a personal computer.Cloud computing is useful for large businesses but is not useful for individuals.Storing data using cloud computing can help ensure that data are not lost if a user’s computer stops functioning.30s