Score: 29/70 (I only attempted 53 questions)
Q3: What are the values of first and second as a result of executing the code segment?
I picked: D
Correct Answer: A
I picked D because I did not know how collegeboard notation worked as I’m only involved with equal signs. By this I knew second was 100, but then I mistakened first to be 200 because of the way it said first <- second. I should’ve known that second was already 100 and that first would be also be 100 this way.
Q4: Which of the following best explains the relationship between the Internet and the World Wide Web?
I picked: C Correct Answer: D
I picked C knowing that the internet is a bunch of interconnected devices, so I was able to eliminate A and B. I knew that the Internet has files and links inside of it, however I picked C as it sounded more complex and and it “made more sense”. D was correct as it correctly interprets that the WWB is full of links and files that is connected to the internet.
Q5: If a game is begun by placing the game piece on the rightmost black space for step 1, what will be the value of the counter at the end of the game?
I picked: B Correct Answer: C
I calculated everything correctly until the green spaces. I did not read the question properly as I thought green also moved 2 to the left. I didn’t increase the counter after that and I got stuck at 3. If I increased the counter properly I would’ve had 3+1 = 4 which is the correct answer.
Q12: Which of the following replacements for can be used to move the robot to the gray square?
I picked: D Correct Answer: C
I picked D as I misinterpreted to if it can rotate left, it rotates left, but in reality the code works that if there is a black square on the left, then it it moves forward otherwise it rotates left. Because of this misinterpretation, I picked D instead of C, as I already elminated A and B.
Q15: Which of the following code segments can be used to draw the figure?
I picked: C Correct Answer: A
I picked C as I calculated it in my head and thought it works when going backwards. Turns out every Y-value segment is exactly five segments long which means that answer is incorrect. Since the y-value isn’t changing, it would not be C and A would make the most sense since its iterating correctly. I didn’t check that y-value changing so it meant that A would be correct.
Q16: Which of the following code segments can be used to draw the figure?
I picked: D Correct Answer: B
This one I guess on, even though we went over this in class. I misinterpreted no-rights to mean “no one has rights” but in reality its quite the opposite of that. This is something I have to review on and study the past team teaches in order to remember this information.
Q19: Which of the following code segments can be used to draw the figure?
Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are used?
I picked: D Correct Answer: C
This one again, I did not keep in mind and I have to relearn the team teaches to better prepare for the AP Exam. Data mining is related to extracting data username and passwords if they are insecure and I will keep that in mind later on for the next few AP Practice Exams.
Q20: A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best explains the result of this configuration as compared to a configuration in which the router does not limit the bandwidth?
I picked: B Correct Answer: D
Since bandwith deals with data, I eliminated A and C. It was D because if many users are to connect to the Internet, some large files cannot send over the network because bandwith limits the amount of data transfer. So D would be correct as users would have to send less data to make the Internet not crash.
Q23: Which of the following statements about the Internet is true?
I picked: C Correct Answer: B
The internet was not designed to be completely secure, but to be scalable for every user created in order to better support every user. Open Protocols help scale the internet to many users created.
Q25: In the following procedure, the parameter n is an integer greater than 2.
I picked: A Correct Answer: D
This one I completely guessed as I wanted to attempt as many questions as possible. This one iterates and increased the result my one and same with j, because of this, every result is increasing by 1 after repeating.
Q26: Which of the following best describes a challenge involved in using a parallel computing solution?
I picked: C Correct Answer: A
In parallel computing, it is required that there is an output from the step before. This is important beause parallel means that it works in a “straight line” with using outputs from before and uses this in order to execute and benefit from parallel computing to give a definite answer or single output.
Q29: In the flowchart below, assume that j and k are assigned integer values.
I picked: C Correct Answer: D
This is C, I did not work through the code in my head, which is something I should work on. I got to 10, but I forgot to do the last step in which I add 3 to the 9 which would get 12. I got a bit lost in the code trying to calculate the code in my head.
Q32: Which of the following is a true statement about the use of public key encryption in transmitting messages?
I picked: C Correct Answer: A
Since it is public-key encryption, it is used for the public, so the correct answer would be A as it says open-medium such as social media sites and any informational websites such as Wikipedia for encryption.
Q37: Which of the following is NOT a possible value displayed by the program?
I picked: D Correct Answer: C
The correct answer is C because every value thats going to be greater than or equal to 10 is going to go through the if statement and not the else statement. Daikon is only displayed if the value is less than 10, which I didn’t consider. The if statement in the else statement won’t even be running because of the if statement before it.
Q38: Which of the following is NOT a possible value displayed by the program?
I picked: D Correct Answer: C
For this one, I need to re-read tri 1 team teach on simulations. Simulations simulate real world environments, and thus don’t require or need real world values. D is less suitable for a simulation as it says “real world inputs are needed” which is not practical for a simulation.
Q39: A store uses binary numbers to assign a unique binary sequence to each item in its inventory. What is the minimum number of bits required for each binary sequence if the store has between 75 and 100 items in its inventory?
I picked: B Correct Answer: C
This one I miscounted the number of bits. I should’ve realized this, but I wasn’t able to and the correct answer was C. Since 2^7 is 128 it allows for more bits to be placed.
Q42: What value is displayed as a result of executing the code segment?
I picked: C Correct Answer: A
I did not do the math correctly, and since the time was also getting close to being done, I guessed this one and the answer is 3 because there are 3 numbers that have a remainder of one in the list.
Q43: Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system?
I picked: C Correct Answer: A
I did not know the exact definition of keylogging, but it had to with confidential information and passwords so A would make the most sense as the rest seem like phishing and hacking.
Q46: A large spreadsheet contains the following information about local restaurants. A sample portion of the spreadsheet is shown below.
I picked: C Correct Answer: D
I was able to figure out that II and III are correct, but I is also correct because the filtering process can either go before or after the spreadsheet is sorted.
Q47: Same scenario as above.
I picked: B Correct Answer: D
It should be an AND logic gate because both of them are true, I was in rush, but I had B and C eliminated and I picked D. Everything was right except the logic gate.
Q48: Which of the following is an example of an attack using a rogue access point?
I picked: C Correct Answer: A
I need to review my vocabulary again because I did not know what a rogue access point is. A rogue access point is where a user can view network traffic on an unsecure network that has no security measures.
I got 49 and 50 correct, 51,52,53 I guessed due to very little time (about 2 minutes left) so I can get more questions done.