Log in
Sign up for FREE
arrow_back
Library

AP CSP MOCK 2

star
star
star
star
star
Last updated 8 months ago
19 questions
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Question 1
1.

Question 2
2.

Question 3
3.

Question 4
4.

Question 5
5.

Question 6
6.

1
Question 8
8.

Question 9
9.

Question 10
10.

Question 11
11.

Question 12
12.

Question 13
13.

Question 14
14.

Question 15
15.

Question 16
16.

Question 17
17.

Question 18
18.

1
A group of environmental scientists is developing a simulation to predict the spread of wildfires in a forest. The model includes input variables such as wind speed, temperature, humidity, vegetation type, and elevation. The simulation is taking too long to run, so the scientists remove elevation and vegetation type from the model.

Which of the following is the most likely effect of simplifying the model?
A) The simulation will run faster, but the predictions may become less accurate.
B) The simulation will stop working because all variables are required.
C) The simulation will be more accurate since it uses fewer conflicting variables.
D) The simulation will run faster and produce more accurate predictions.
City planners are using a simulation to estimate traffic congestion caused by different road construction projects. The original simulation includes detailed variables like weather, time of day, road surface conditions, driver behavior, and number of vehicles. To improve performance, the planners simplify the model by removing road surface conditions and driver behavior.

What is the primary trade-off of this simplification?
A) The simulation will stop working due to lack of important variables.
B) The simulation will run more slowly and produce more detailed results.
C) The simulation will run more efficiently but may lose some accuracy in representing real-world conditions.
D) The simulation will produce the exact same results, just more quickly.
Which of the following best describes the role of a certificate authority in securing online communication?
A) A certificate authority scans websites for malware to ensure they are safe to visit.
B) A certificate authority creates and manages user passwords for secure login systems.
C) A certificate authority stores records that link website names to their IP addresses.
D) A certificate authority confirms the validity of public encryption keys to support secure data exchange.
Why is it important that a certificate authority digitally signs a website's SSL certificate?
A) To allow users to access the website without an Internet connection
B) To verify that the website’s public key truly belongs to the organization it claims to represent
C) To make it easier to find the website using search engines
D) To ensure that the website loads faster in all web browsers
When a user visits a secure website (e.g., one that uses HTTPS), how does the browser know that it can trust the website's public key?
A) The browser verifies the public key using a certificate issued by a trusted certificate authority.
B) The browser checks if the public key is stored locally on the user’s computer.
C) The browser sends a password to the server to check if the connection is secure.
D) The browser runs a virus scan on the website before allowing access.
Which of the following best explains the purpose of Creative Commons licensing?
A) Creative Commons allows content creators to specify how others may use and share their work, helping to promote wider access to digital materials.
B) Creative Commons allows anyone to freely use and share all copyrighted material without permission, making digital content more accessible.
C) Creative Commons ensures perfect accuracy when sending data, allowing for reliable sharing of digital information.
D) Creative Commons protects private communication by securing how digital content is transmitted.
Question 7
7.

Which two of the following statements best explain how cloud computing has influenced communication over the Internet?
A) Cloud computing has removed the need for backup paths in Internet routing systems.
B) Cloud computing has solved issues related to ownership and rights of digital content.
C) Cloud computing has created additional challenges related to keeping data secure.
D) Cloud computing has improved the ability for people to work together on shared projects.
Which of the following statements correctly explain how the Internet supports crowdsourcing?
I. The Internet gives participants access to tools, shared knowledge, and expert resources to contribute meaningfully.
II. The Internet helps eliminate distance barriers, allowing people from around the world to work on shared goals.
III. Crowdsourcing through the Internet makes it possible to solve even unreasonably difficult problems quickly by distributing the work to many users.
A group that is watching sea turtles nest records data about their nests. Which of the following is metadata?
A) Picture of the nest.
B) X-ray of the clutch.
C) Nest tags.
D) Number of data fields tracked.
When it comes to multifactor authentication, what category does a security code sent to your phone fall under?
A) Something you know (Knowledge)
B) Something you have (Position)
C) Something you inherit (Inheritance)
D) All of the above
How does data streaming work over the Internet?
A) Data follows the shortest route to minimize buffering.
B) Data packets are created by the sender and reassembled by the receiver.
C) HTML is used to display documents for users requesting them via web browsers on iOS.
D) Redundancies are built into the network to ensure data continues flowing even if one part fails.
What happens when analog data is converted into a digital format?
A) The data matches exactly.
B) The digital data is an approximation of the analog data.
C) The analog data is an approximation of the digital data.
D) The digital data contains more values than the analog data.
Which type of statement is required to identify all positive values in a list?
A) Sequential and iterative statements.
B) Selection and sequential statements.
C) Selection statement only.
D) Iterative and selection statements.
Besides funding projects, what is another common use of crowdsourcing today?
A) Diagnosing medical conditions by sharing symptoms with others.
B) Asking people who filed complaints to review new products.
C) Reducing costs by utilizing idle computational power.
D) Connecting people looking for work with available job opportunities.
Consider the following algorithms. Each algorithm operates on a list containing n elements, where n is a very large integer.

Select which of the algorithms is reasonable
An algorithm that accesses each element in the list twice
An algorithm that accesses each element in the list n times
An algorithm that accesses only the first 10 elements in the list, regardless of the size of the list
A company uses a numbering system to assign a unique ID to each of its 500 employees. The ID numbers are represented using binary sequences.
What is the minimum number of bits required to represent a unique ID for each employee?
A) 8
B) 9
C) 10
D) 11
The procedure BinarySearch (numList, target) correctly implements a binary search algorithm on the list of numbers numList. The procedure returns an index where target occurs in numList, or -1 if target does not occur in numList.
Which of the following conditions must be met in order for the procedure to work as intended?
The length of numList must be even.
The list numList must not contain any duplicate values.
The values in numList must be in sorted order.
The value of target must not be equal to -1.
Question 19
19.

A social media site allows users to send messages to each other. A group of researchers gathered user data for the first 10 years of the site’s existence. Some of the data are summarized in the table below, along with some of the company milestones.

The researchers noticed that the total number of registered users appears to be increasing at about a constant rate. If this pattern continues, which of the following best approximates the total number of registered users, in millions, in year 12 (two years after the last entry in the table) ?
30.6
31.2
31.8
32.4
The figure below shows two possible network configurations for devices P through V. A line between two devices indicates a connection. Devices can communicate only through the connections shown.

In configuration I, what is the minimum number of connections that must be broken or removed before device T can no longer communicate with device U?
1
2
3
4