Big Idea #1: Creative Development
Big Idea #2: Data
Big Idea #3: Algorithms and Programming
Big Idea #4: Computer Systems and Networks
Big Idea #5: Impact of Computing
100

Which of the following best describes the purpose of using procedures (also called functions) in a program?

A. To store large amounts of data
B. To make the program run faster
C. To break a program into smaller, reusable parts
D. To check for errors in a program

C. To break a program into smaller, reusable parts

100

Which of the following is the smallest unit of data used in computing?

A. Byte
B. Character
C. Bit
D. Integer

C. Bit

100

Which of the following best describes a sequence in programming?

A. Repeating a block of code until a condition is false
B. Running code only if a condition is met
C. Executing instructions in the order they appear
D. Choosing one of several paths to follow in a program

C. Executing instructions in the order they appear

100

What is the primary purpose of the Internet Protocol (IP)?

A. To encrypt messages before sending
B. To assign addresses to devices and route data across networks
C. To display webpages in a browser
D. To check for viruses in transmitted data

B. To assign addresses to devices and route data across networks

100

Which of the following is an example of a computing innovation?

A. A paper notebook
B. A hammer
C. A smartphone app that tracks exercise
D. A bicycle

C. A smartphone app that tracks exercise

200

A team of students is working together to build a mobile app. One student is designing the user interface, another is writing the code, and a third is testing for bugs.
Which of the following best describes this type of development?

A. Iterative development
B. Parallel development
C. Independent development
D. Agile deployment

B. Parallel development

200

A student is analyzing how many times each response appears in a survey about favorite programming languages.
Which of the following best describes the data they are working with?

A. Compressed data
B. Metadata
C. Frequency distribution
D. Randomized data

C. Frequency distribution

200

A student writes a program that asks the user to input a number. If the number is greater than 10, it displays “Too high!” Otherwise, it displays “OK.”
What programming concept is the student using?

A. Iteration
B. Boolean logic
C. Selection
D. Procedure definition

C. Selection

200

Which of the following best describes how data is transmitted over the internet?

A. Data is stored in a central location and accessed directly by all users.
B. Data travels in one large stream from sender to receiver.
C. Data is sent in small packets that may take different paths to the destination.
D. Data must be sent from one computer directly to another without intermediaries.

C. Data is sent in small packets that may take different paths to the destination.

200

Which of the following is a potential positive impact of widespread social media use?

A. It guarantees user privacy.
B. It spreads misinformation more easily.
C. It improves face-to-face communication skills.
D. It allows people to stay connected across long distances.

D. It allows people to stay connected across long distances.

300

A student is developing a program and notices that the same group of instructions is repeated in multiple places. The student decides to write the instructions once and call them when needed.

Which of the following best describes what the student is doing?

A. Initializing a variable
B. Creating a loop
C. Defining a procedure
D. Implementing recursion

C. Defining a procedure

300

Which of the following is a characteristic of lossy data compression?

A. The original data can always be perfectly reconstructed.
B. It adds redundant bits to improve accuracy.
C. It reduces file size by removing some information.
D. It is only used for text-based files.

C. It reduces file size by removing some information.

300

Which of the following situations is best solved using iteration?

A. A program that determines whether a number is positive or negative
B. A program that finds the largest number in a list
C. A program that asks the user for their name and displays a greeting
D. A program that checks if a value is equal to 100

B. A program that finds the largest number in a list

300

Which of the following best explains why the Internet is considered fault tolerant?

A. It can store multiple copies of files in the cloud.
B. It uses secure encryption to prevent data loss.
C. It has redundant paths, so data can still be delivered even if parts of the network fail.
D. It restricts user access to sensitive information.

C. It has redundant paths, so data can still be delivered even if parts of the network fail.

300

A mobile app collects location data from users and shares it with advertisers.
Which of the following is the primary ethical concern raised by this practice?

A. File compression
B. Data security
C. Open source licensing
D. Intellectual property rights

B. Data security

400

A programmer creates a procedure to perform a calculation. Later, the programmer updates the calculation, but only changes the code inside the procedure and not in the rest of the program.
Which of the following explains why the program still works as expected?

A. The program uses recursion
B. The procedure was compiled independently
C. The procedure uses parameters
D. The program relies on procedural abstraction

D. The program relies on procedural abstraction

400

A researcher removes names, addresses, and phone numbers from a dataset before sharing it publicly.
What is the researcher most likely trying to do?

A. Perform a simulation
B. Anonymize the data
C. Convert the data to binary
D. Compress the dataset

B. Anonymize the data

400

What is the main benefit of using procedural abstraction in a program?

A. It allows code to be run faster by the computer.
B. It prevents syntax errors during compilation.
C. It makes the code easier to read, test, and reuse.
D. It ensures the code uses fewer variables.

C. It makes the code easier to read, test, and reuse.

400

Which protocol is responsible for reliable, ordered, and error-checked delivery of data over the internet?

A. IP
B. DNS
C. TCP
D. HTML

C. TCP

400

A researcher publishes a dataset that includes medical information but removes names and addresses.
Which of the following concerns might still exist?

A. The dataset will not work without names.
B. The data cannot be compressed.
C. Individuals may still be identifiable through other attributes.
D. The dataset is now encrypted and secure.

C. Individuals may still be identifiable through other attributes.

500

A student develops a program to calculate grades. During testing, the student realizes that one procedure sometimes returns incorrect results. The student adds print statements to display intermediate values and reruns the program to observe how the data changes during execution.

Which practice is the student using to identify the issue?

A. Testing edge cases
B. Algorithm development
C. Debugging
D. Data abstraction

C. Debugging

500

An app tracks user behavior and uses that data to target advertisements. Which of the following is a potential concern with this practice?

A. The data cannot be stored in binary.
B. Users may lose access to the internet.
C. It may violate user privacy without informed consent.
D. It improves search engine algorithms too quickly.

C. It may violate user privacy without informed consent.

500

A student writes an algorithm that searches through a list of 1,000 items by checking each item one at a time until it finds the target. What is the worst-case number of steps the algorithm may take?

A. 1
B. 10
C. 100
D. 1,000

D. 1,000

500

A user connects to a website using HTTPS. What is the main benefit of HTTPS over HTTP?

A. It makes websites load faster.
B. It ensures users do not access restricted content.
C. It encrypts communication to protect privacy and security.
D. It bypasses firewalls for quicker access to servers.

C. It encrypts communication to protect privacy and security.

500

Which of the following best explains how bias can appear in a machine learning algorithm?

A. The algorithm uses too much memory.
B. The training data reflects real-world biases.
C. The algorithm is tested using encrypted data.
D. The computer’s hardware limits performance.

B. The training data reflects real-world biases.