Big Idea 1 - Creative Development!
Big Idea 2 - Data
Big Idea 3: A & P
Big Idea 4: Computing Systems & Networks
Big Idea 5: Impact of Computing
100

Name the term: Reducing information and detail to focus on essential characteristics.

What is abstraction?
100

Name the term:  A basic unit of information in computing and digital communications. Can have only one of two values. 

What is a bit?

100

Name the term: this search method starts at the beginning of the list and compares each element in turn with the required value until a match is found or the end of the list is reached. 

What is linear search?
100

Name the term: a small, formatted unit of data designed to travel across a network, such as the internet. 

What is a packet?

100

Name the term: the gap between individuals, households, businesses, and geographic areas at different socioeconomic levels regarding their opportunities to access information and communication technologies (ICT) and their use of the internet 

What is the digital divide?

200

Name a possible benefit of collaboration. 

Answers vary. 

200

Name the term: Converts IP addresses into domains 

What is Domain Name System or DNS. 

200

Name the shape in the flowchart that is used for input or output. 

What is a parallellogram?

200

Name the term: is a computer networking protocol that provides for automatic assignment of available Internet Protocol (IP) routers to participating hosts. This increases the availability and reliability of routing paths via automatic default gateway selections on an IP sub-network. (two terms)

What is routing redundancy?

200

Name the term: the voluntary participation of the general public in scientific research, collaborating with professional scientists to collect data, analyze information, or solve real-world problems  

What is citizen science?

300

A homework assignment consists of 10 questions. The assignment is graded as follows:

# Correct       Grade

9-10              check plus

7-8                check

Under 7          check minus

Let numCorrect represent the number of correct answers for a particular student. The following code segment is intended to display the appropriate grade based on numCorrect. The code segment does not work as intended in all cases. 

For which of the following values of numCorrect does the code segment NOT display the intended grade? (Select two answers.)

A. 9

B. 8

C. 7

D. 6

B. 8

D. 6

300

What are the two versions of Internet Protocol and what are their differences. Use the definition of Internet Protocol in your answer. 

Answers vary but include IPv4 & IPv6 & A number that uniquely identifies each computer or device connected to the Internet. 

300

A programmer completes the user manual for a video game she has developed and realizes she has reversed the roles of goats and sheep throughout the text. Consider the programmer’s goal of changing all occurrences of “goats” to “sheep” and all occurrences of “sheep” to “goats.” The programmer will use the fact that the word “foxes” does not appear anywhere in the original text.

Which of the following algorithms can be used to accomplish the programmer’s goal?

A. First, change all occurrences of "goats" to "sheep"

Then, change all occurrences of "sheep" to "goats"

B. First, change all occurrences of “goats” to “sheep.”

Then, change all occurrences of “sheep” to “goats.”

Last, change all occurrences of “foxes” to “sheep.”

C. First, change all occurrences of “goats” to “foxes.”

Then, change all occurrences of “sheep” to “goats.”

Last, change all occurrences of “foxes” to “sheep.”

D. First, change all occurrences of “goats” to “foxes.”

Then, change all occurrences of “foxes” to “sheep.”

Last, change all occurrences of “sheep” to “goats.”

C. First, change all occurrences of “goats” to “foxes.”

Then, change all occurrences of “sheep” to “goats.”

Last, change all occurrences of “foxes” to “sheep.”

300

Explain the difference and benefits/drawbacks of Parallel, distributed and sequential computing. 

Answers may vary. 

300

Name one benefit and one harm of the rise of the internet on society. 

Answers vary

400

In the following procedure, the parameters x and y are integers. 

Which of the following is the most appropriate documentation to appear with the calculate procedure? 

A. Displays the value of x+(y/x) - The value of the parameter x must not be 0. 

B. Displays the value of x+(y/x) - The value of the parameter y must not be 0. 

C. Displays the value of (x+y)/x - the value of the parameter x must not be 0.

D. Displays the value of (x+y)/x - the sum of the parameters x & y must not be 0.

C. Displays the value of (x+y)/x - the value of the parameter x must not be 0.

400

An online store uses 6-bit binary sequences to identify each unique item for sale. The store plans to increase the number of items it sells and is considering using 7-bit binary sequences. Which of the following best describes the result of using 7-bit sequences instead of 6-bit sequences? 

A. 2 more items can be uniquely identified.

B. 10 more items can be uniquely identified.

C. 2 times as many items can be uniquely identified.

D. 10 times as many items can be uniquely identified.

C. 2 times as many items can be uniquely identified.

400

Which of the following best explains how algorithms that run on a computer can be used to solve problems? 

A. All problems can be solved with an algorithm that runs in a reasonable amount of time. 

B. All problems can be solved with an algorithm, but some algorithms might need a heuristic to run in a reasonable amount of time. 

C. All problems can be solved with an algorithm, but some algorithms might run in an unreasonable amount of time. 

D. Some problems cannot be solved by an algorithm.

D. Some problems cannot be solved by an algorithm.

400

The figure below represents a network of physically linked devices, labeled A through F. A line between two devices indicates a connection. Devices can communicate only through the connections shown.

 

Which of the following statements are true about the ability for devices A and C to communicate. Select two answers.

A. If devices B and D were to fail, then information sent from device A could not reach device C.

B. If devices B and F were to fail, then information sent from device A could not reach device C. 

C. If devices D and F were to fail, then information sent from device A could not reach device C.

D. If devices E and F were to fail, then information sent from device A could not reach device C. 

A. If devices B and D were to fail, then information sent from device A could not reach device C.

C. If devices D and F were to fail, then information sent from device A could not reach device C.  

400

Which of the following actions is most likely to raise legal or ethical concerns? 

A. An analyst writes a program that scans through a database of open-access scientific journals and creates a document with links to articles written on a particular topic. 

B. A computer scientist adds several features to an open-source software program that was designed by another individual. 

C. A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song.

D. A public interest group alerts people to a scam that involves charging them for a program that is available for free under a Creative Commons license. 

C. A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song.

500

A student is creating an application that allows customers to order food for delivery from a local restaurant. Which of the following is LEAST likely to be an input provided by a customer using the application? 

A. The address where the order should be delivered

B. The cost of a food item currently available for order

C. The credit card or payment information for the purchaser

D. The name of a food item to be included in the delivery.

B. The cost of a food item currently available for order

500

Each student that enrolls at a school is assigned a unique ID number, which is stored as a binary number. The ID numbers increase sequentially by 1 with each newly enrolled student. If the ID number assigned to the last student who enrolled was the binary number 1001 0011, what binary number will be assigned to the next student who enrolls? 

A. 1001 0100

B. 1001 0111

C. 1101 0100

D. 1101 0111

A. 1001 0100

500

The code segment below uses the procedure IsFound (list, item), which returns true if item appears in list and returns false otherwise. The list resultList is initially empty. 

Which of the following best describes the contents of resultList after the code segment is executed? 

A. All elements in inputList1 followed by all elements in inputList2 

B. Only elements that appear in both inputList1 and inputList2

C. Only elements that appear in either inputList1 or inputList2 but not in both lists 

D. Only elements that appear in inputList1 but not in inputList2 

B. Only elements that appear in both inputList1 and inputList2

500

Which of the following is a characteristic of the fault-tolerant nature of routing on the Internet? 

A. The ability to use a hierarchical naming system to avoid naming conflicts 

B. The ability to provide data transmission even when some connections have failed 

C. The ability to resolve errors in domain name system (DNS) lookups

D. The ability to use multiple protocols such as hypertext transfer protocol (HTTP), Internet protocol (IP), and simple mail transfer protocol (SMTP) to transfer data 

C. The ability to resolve errors in domain name system (DNS) lookups C. The ability to resolve errors in domain name system (DNS) lookups

500

A user reads reviews of a popular artist’s new album and then downloads the album from the Web site of a licensed online music seller. Which of the following is LEAST likely to be a consequence of this action? 

A. Advertisements for the artist’s other albums will be displayed when the user visits a different Web site. 

B. Album reviews from other people who live nearby will be displayed to the user. 

C. Similar artists will be recommended to the user based on the user’s download selection. 

D. The user will be in violation of the Digital Millennium Copyright Act (DMCA).

D. The user will be in violation of the Digital Millennium Copyright Act (DMCA).

M
e
n
u