Big Idea 1- Creative Development
Big Idea 2-
Data
Big Idea 3-
Algorithms and Programming
Big Idea 4-
Computing Systems and Networks
Big Idea 5-
Impact of Computing
100

What is the purpose of a development process in programming?


A. To make programs harder to understand
B. To avoid user feedback
C. To help design, test, and improve programs
D. To copy other programs 

C. To help design, test, and improve programs


100

What is a byte? 

A. A large number
B. 8 bits
C. 100 bits
D. A computer

B. 8 bits

100

What is an algorithm?

A. A step-by-step solution
B. A coding error
C. A type of computer
D. A problem

A. A step-by-step solution

100

What is the Internet?


A. A single computer
B. A software program
C. A network of networks
D. A video game

C. A network of networks

100

What is a benefit of computing innovation?


A. Makes communication easier
B. Increases errors
C. Reduces information access
D. Deletes jobs

A. Makes communication easier

200

Working as a network engineer, you write a script to monitor network traffic, but it fails to start. What is the first type of error you should check for?

A- Runtime Error

B- Syntax Error

C- Logic Error

D- Overflow Error


D- Adding two maximum integer values causing an overflow.

200

Which of the following is considered metadata?


A. The size of the file and the date it was taken
B. A camera lens
C. A photo
D. The colors in a photo

A. The size of the file and the date it was taken

200

Which is an example of a Boolean expression?
A. 10 + 4
B. "hello"
C. x > 5
D. 3.14

C. x > 5

200

What does a router do?


A. Stores passwords
B. Connects devices and forwards data
C. Deletes data
D. Creates software

B. Connects devices and forwards data

200

What is a digital divide?


A. A break in your device
B. A type of virus
C. Unequal access to technology
D. A coding error

C. Unequal access to technology

300

Which of the following is an example of an overflow error not involving multiplication?

A-Subtracting two numbers without exceeding data type limits

B-Assigning a boolean value without any errors

C-Correctly using a data type to store a small number

Adding two maximum integer values causing an overflow

D- Adding two maximum integer values causing an overflow.

300

Which method is best for finding patterns in big data? 

A. Guessing
B. Manual search
C. Visualization or filtering
D. Ignoring outliers

C. Visualization or filtering

300

What does a loop do in a program?


A. Ends the program
B. Repeats a section of code
C. Changes your computer settings
D. Adds variables

B. Repeats a section of code

300

What is the purpose of IP addresses?


A. To hide your identity
B. To identify devices on a network
C. To improve battery life
D. To store images

B. To identify devices on a network

300

Which of these is a negative impact of social media algorithms?


A. Better content filtering
B. Data privacy and echo chambers
C. Faster typing
D. Improved resolution

B. Data privacy and echo chambers

400

Which of the following is an example of a repeat until loop?

A- while(x > 10)

B- for x in range(10)

C- if(x > 10)

D- repeat until (x > 10)

D- repeat until (x > 10)

400

What is lossy compression?

A. A way to store data with no loss
B. Compressing files without changing them
C. Removing some data to reduce file size
D. Duplicating data  

C. Removing some data to reduce file size

400

What is a selection in programming?


A. A way to store data
B. A command that always runs
C. A decision-making structure like if
D. A type of hardware

C. A decision-making structure like if

400

A team is developing a new application that must remain operational and accessible even during high traffic periods. Which system characteristic is most critical for this application?

A- Scalability

B- Cybersecurity Measures

C- High Bandwidth

D- Fault Tolerance

A- Scalability

400

What is open-source software?


A. Secret software
B. Software with limited users
C. Software where source code is public and can be modified
D. Software that cannot be shared

C. Software where source code is public and can be modified

500

A student is creating a program to analyze text data. They decide to use a hash table to count the frequency of each word. What is a positive impact of this decision?

A- It decreases the memory usage by storing only unique words, rather than all instances.

B- It simplifies the code by avoiding the need for complex data structures and algorithms.

C- It allows for efficient retrieval and updating of word frequencies, improving the program's performance.

D- It reduces the execution time by eliminating the need to sort the words alphabetically.

C- It allows for efficient retireval and updating of word frequencies, improving the program's performance.

500

Why is it hard to keep personal data private on the internet? 

A. Data can be collected, shared, and sold easily
B. People never use the internet
C. The internet is always private
D. Data is never stored

A. Data can be collected, shared, and sold easily

500

Which is true about procedural abstraction?

A. It makes code harder to debug
B. It means every line is written twice
C. It organizes code into reusable blocks (functions)
D. It replaces variables  

C. It organizes code into reusable blocks (functions)

500

A large organization is planning to upgrade its network to support increased data transfer rates. Which metric is most relevant to this upgrade?

A- Routing

B- Fault Tolerance

C- Scalability

D- Bandwidth

D- Bandwidth

500

An online retailer implements a system to analyze customers' shopping cart abandonment. What could be a positive impact of this analysis?

A- Higher marketing costs associated with data analysis

B- Decreased sales due to intrusive marketing tactics

C- Increased privacy concerns due to tracking of shopping habits

D-Improved understanding of customer behavior and preferences

D-Improved understanding of customer behavior and preferences

M
e
n
u