AP CSP MOCK 2

Last updated 3 months ago
19 questions
1

A group of environmental scientists is developing a simulation to predict the spread of wildfires in a forest. The model includes input variables such as wind speed, temperature, humidity, vegetation type, and elevation. The simulation is taking too long to run, so the scientists remove elevation and vegetation type from the model.

Which of the following is the most likely effect of simplifying the model?

1

City planners are using a simulation to estimate traffic congestion caused by different road construction projects. The original simulation includes detailed variables like weather, time of day, road surface conditions, driver behavior, and number of vehicles. To improve performance, the planners simplify the model by removing road surface conditions and driver behavior.

What is the primary trade-off of this simplification?

1

Which of the following best describes the role of a certificate authority in securing online communication?

1

Why is it important that a certificate authority digitally signs a website's SSL certificate?

1

When a user visits a secure website (e.g., one that uses HTTPS), how does the browser know that it can trust the website's public key?

1

Which of the following best explains the purpose of Creative Commons licensing?

1

A social media site allows users to send messages to each other. A group of researchers gathered user data for the first 10 years of the site’s existence. Some of the data are summarized in the table below, along with some of the company milestones.

The researchers noticed that the total number of registered users appears to be increasing at about a constant rate. If this pattern continues, which of the following best approximates the total number of registered users, in millions, in year 12 (two years after the last entry in the table) ?

1

Which two of the following statements best explain how cloud computing has influenced communication over the Internet?

1

Which of the following statements correctly explain how the Internet supports crowdsourcing?

1

A group that is watching sea turtles nest records data about their nests. Which of the following is metadata?

1

When it comes to multifactor authentication, what category does a security code sent to your phone fall under?

1

How does data streaming work over the Internet?

1

What happens when analog data is converted into a digital format?

1

Which type of statement is required to identify all positive values in a list?

1

Besides funding projects, what is another common use of crowdsourcing today?

1

Consider the following algorithms. Each algorithm operates on a list containing n elements, where n is a very large integer.

Select which of the algorithms is reasonable

1

A company uses a numbering system to assign a unique ID to each of its 500 employees. The ID numbers are represented using binary sequences.
What is the minimum number of bits required to represent a unique ID for each employee?

1

The procedure BinarySearch (numList, target) correctly implements a binary search algorithm on the list of numbers numList. The procedure returns an index where target occurs in numList, or -1 if target does not occur in numList.
Which of the following conditions must be met in order for the procedure to work as intended?

1

The figure below shows two possible network configurations for devices P through V. A line between two devices indicates a connection. Devices can communicate only through the connections shown.

In configuration I, what is the minimum number of connections that must be broken or removed before device T can no longer communicate with device U?