APCSP Big Idea 5

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/60

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:15 AM on 5/12/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

61 Terms

1
New cards

Which of the following actions is most likely to help reduce the digital divide?

Deploying satellites and other infrastructure to provide inexpensive Internet access to remote areas of Earth

2
New cards

Which of the following actions is most likely to raise legal or ethical concerns?

A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song.

3
New cards

A state government is attempting to reduce the digital divide. Which of the following activities has the greatest potential to contribute to the digital divide rather than reducing it?

Requiring applicants for government jobs to apply using an online platform

4
New cards

Which of the following activities is most likely to be successful as a citizen science project?

Collecting pictures of plants from around the world that can be analyzed to look for regional differences in plant growth.

5
New cards

Which of the following is NOT an advantage of using open-source software?

The original developer of open-source software provides free or low-cost support for users installing and running the software.

6
New cards

Which of the following applications is most likely to benefit from the use of crowdsourcing?

An application that allows users to view descriptions and photographs of local landmarks

7
New cards

A certain social media application is popular with people across the United States. The developers of the application are updating the algorithm used by the application to introduce a new feature that allows users of the application with similar interests to connect with one another. Which of the following strategies is LEAST likely to introduce bias into the application?

Inviting a random sample of all users to try out the new algorithm and provide feedback before it is released to a wider audience

8
New cards

The developers of a music-streaming application are updating the algorithm they use to recommend music to listeners. Which of the following strategies is LEAST likely to introduce bias into the application?

Making recommendations based on listening data gathered from a random sample of users of the application

9
New cards

A bank customer receives an e-mail from a sender claiming to be a bank employee. The e-mail asks the customer to provide personal information and to call a phone number if he or she has any questions. The customer suspects the e-mail might be a phishing attempt. Which of the following responses is most likely to be a privacy risk for the bank customer?

Calling the phone number given in the e-mail and providing the personal information over the phone

10
New cards

Which of the following is most likely to be a beneficial effect of using MeeReader?

Users with visual impairments may be able to more easily read or listen to books and articles.

11
New cards

From the perspective of the application's developers, which of the following is most likely to be a benefit of storing all user data in a database?

The developers can analyze the data to make improvements to the application based on user behavior.

12
New cards

A researcher wants to publish the results of a study in an open access journal. Which of the following is a direct benefit of publishing the results in this type of publication?

The researcher can allow the results to be easily obtained by other researchers and members of the general public.

13
New cards

Which of the following is most likely to be a benefit to users of the application?

Users of the application may see health benefits as a result of the application encouraging them to exercise with each other.

14
New cards

Businesses have the ability to target advertisements to different groups of people who use RunRoutr. Which of the following groups is LEAST likely to receive targeted advertisements?

Individuals who sign up for a premium account

15
New cards

Which of the following is most likely to be a data privacy concern for RunRoutr users?

Users of the application may have the ability to determine information about the locations of users that are not on their contact lists.

16
New cards

A mobile game tracks players' locations using GPS. The game offers special in-game items to players when they visit real-world points of interest. Which of the following best explains how bias could occur in the game?

Points of interest may be more densely located in cities, favoring players in urban areas over players in rural areas.

17
New cards

A small team of wildlife researchers is working on a project that uses motion-activated field cameras to capture images of animals at study sites. The team is considering using a "citizen science" approach to analyze the images. Which of the following best explains why such an approach is considered useful for this project?

The image analysis is likely to take a longer time for the research team than for a distributed group of individuals.

18
New cards

A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet. Which of the following activities is LEAST likely to be effective in this purpose?

Putting all government forms on the city Web site

19
New cards

Which of the following statements describe how cloud computing has affected Internet communication?

Select two answers.

Cloud computing has helped enhance collaboration.

Cloud computing has introduced new data-security concerns.

20
New cards

A free online encyclopedia contains articles that can be written and edited by any user. Which of the following are advantages the online encyclopedia has over a traditional paper-based encyclopedia?

Select two answers.

The ability to have a larger number of perspectives reflected in the encyclopedia content

The ability to quickly update encyclopedia content as new information becomes available

21
New cards

Which of the following has the greatest potential for compromising a user's personal privacy?

A group of cookies stored by the user's Web browser

22
New cards

The author of an e-book publishes the e-book using a no-rights-reserved Creative Commons license. Which of the following best explains the consequences of publishing the book with this type of license?

Individuals can freely distribute or use the contents of the e-book without needing to obtain additional permissions from the author.

23
New cards

A user reads reviews of a popular artist's new album and then downloads the album from the Web site of a licensed online music seller. Which of the following is LEAST likely to be a consequence of this action?

The user will be in violation of the Digital Millennium Copyright Act (DMCA).

24
New cards

Which of the following is LEAST likely to be a contributing factor to the digital divide?

Some parents prefer to limit the amount of time their children spend using computing devices or the Internet.

25
New cards

Which of the following best describes the impact of Creative Commons?

Creative Commons gives creators of digital content the ability to indicate how their works can be legally used and distributed, enabling broad access to digital information.

26
New cards

An author is considering publishing an e-book using a Creative Commons license. In which of the following situations would it be better for the author to use a Creative Commons license instead of a traditional copyright?

I. The author wants to make the e-book available as a free download.

II. The author wants to prevent people from sharing copies of the e-book on peer-to-peer networks.

III. The author wants to allow people permission to use and modify the e-book.

I and III

27
New cards

A system is being developed to help pet owners locate lost pets. Which of the following best describes a system that uses crowdsourcing?

A mobile application that allows users to report the location of a pet that appears to be lost and upload a photo that is made available to other users of the application

28
New cards

Which of the following is most likely to be a data privacy concern for StreamPal users?

Users of the application may have the ability to determine information about the locations of users that are not on their contact list.

29
New cards

Which of the following statements is most likely true about the differences between the basic version and the premium version of StreamPal?

Users of the basic version of StreamPal indirectly support StreamPal by allowing themselves to receive advertisements.

30
New cards

Which of the following are true statements about how the Internet enables crowdsourcing?

I. The Internet can provide crowdsourcing participants access to useful tools, information, and professional knowledge.

II. The speed and reach of the Internet can lower geographic barriers, allowing individuals from different locations to contribute to projects.

III. Using the Internet to distribute solutions across many users allows all computational problems to be solved in reasonable time, even for very large input sizes.

I and II only

31
New cards

In public key cryptography, the sender uses the recipient's public key to encrypt a message. Which of the following is needed to decrypt the message?

The recipient's private key

32
New cards

Which of the following is an example of symmetric encryption?

Finn and Gwen develop a system that maps each letter of the alphabet to a unique symbol using a secret key. Finn uses the key to write a message to Gwen where each letter is replaced with the corresponding symbol. Gwen uses the key to map each symbol back to the original letter.

33
New cards

A software development company has created an application called FileCleanUp. When the application is run on a user device, it searches for all files (including pictures, videos, and documents) that have not been accessed in the past month, stores them on the company's Web server, and deletes them from the user device. The application runs once each day. Users have the ability to manually retrieve files from the server if they are needed.

Which of the following is most likely to be a harmful effect of using FileCleanUp?

It prevents users from accessing infrequently used files when there is no Internet connectivity.

34
New cards

A user unintentionally installs keylogging software on a computer. Which of the following is an example of how the keylogging software can be used by an unauthorized individual to gain access to computing resources?

The software records all user input on the computer. The recorded information is transmitted to an unauthorized individual, who analyzes it to determine the user's login passwords.

35
New cards

Which of the following would be the best use of citizen science?

An experiment that requires data measurements to be taken in many different locations

36
New cards

An individual receives an e-mail that appears to be from an insurance company. The message offers a low insurance rate, and prompts the recipient to click a link to learn more. Which of the following is most indicative that the e-mail is part of a phishing attempt?

After clicking the link, a Web page opens that prompts the recipient for personal information.

37
New cards

Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system?

A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user's computer using the recorded data.

38
New cards

Which of the following best exemplifies the use of multifactor authentication to protect an online banking system?

After entering a password for an online bank account, a user must also enter a code that is sent to the user's phone via text message.

39
New cards

A musician is creating a song using audio samples. Which of the following actions will minimize the risk of a copyright violation when creating sample-based music?

Using samples published with a no-rights-reserved Creative Commons license

40
New cards

Which of the following activities poses the greatest personal cybersecurity risk?

Reserving a hotel room by e-mailing a credit card number to a hotel

41
New cards

Which of the following is LEAST likely to indicate a phishing attack?

An e-mail from your bank asks you to call the number on your card to verify a transaction

42
New cards

Which of the following is an example of a phishing attack?

Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information

43
New cards

Which of the following scenarios best exemplifies a phishing attack?

A user receives an e-mail from a sender offering technical help with the user's computer. The e-mail prompts the user to start a help session by clicking a provided link and entering the username and password associated with the user's computer.

44
New cards

A city's police department has installed cameras throughout city streets. The cameras capture and store license plate data from cars driven and parked throughout the city. The authorities use recorded license plate data to identify stolen cars and to enforce parking regulations.

Which of the following best describes a privacy risk that could occur if this method of data collection is misused?

The vehicle location data could be used to monitor the movements of city residents.

45
New cards

A programmer created a piece of software and wants to publish it using a Creative Commons license. Which of the following is a direct benefit of publishing the software with this type of license?

The programmer can specify the ways that other people are legally allowed to use and distribute the software.

46
New cards

Which of the following best describes the purpose of machine learning programs?

To analyze large data sets, recognize patterns, and make predictions based on data

47
New cards

A software company is designing a mobile game system that should be able to recognize the faces of people who are playing the game and automatically load their profiles. Which of the following actions is most likely to reduce the possibility of bias in the system?

Testing the system with people of different ages, genders, and ethnicities

48
New cards

Which of the following actions are likely to be helpful in reducing the digital divide?

Select two answers.

Designing new technologies to be accessible to individuals with different physical abilities

Having world governments support the construction of network infrastructure

49
New cards

Which of the following actions is most likely to be effective in reducing the digital divide at a local level?

Providing free community access to computers at schools, libraries, and community centers

50
New cards

Which of the following best explains how a certificate authority is used in protecting data?

A certificate authority verifies the authenticity of encryption keys used in secured communications.

51
New cards

A mobile application is used to display local traffic conditions. Which of the following features of the application best exemplifies the use of crowdsourcing?

Users can submit updates on local traffic conditions in real time.

52
New cards

An Internet user has a need to send private data to another user. Which of the following provides the most security when transmitting private data?

Sending the data using public-key encryption

53
New cards

Which of the following is considered an unethical use of computer resources?

Purchasing a single-user copy of photo editing software and installing it on all the computers in a computer lab

54
New cards

A student purchases a single-user license of a copyrighted application and wants other students to be able to use it at the same time. Under which of the following conditions is it considered acceptable for the student to share the application?

When the student gets permission from the copyright owner of the application

55
New cards

Which of the following is an example of an attack using a rogue access point?

An unauthorized individual gains the ability to view network traffic by connecting to a network router that uses weak or no security measures.

56
New cards

An online gaming company is introducing several new initiatives to encourage respectful communication between players of online games. Which of the following best describes a solution that uses crowdsourcing?

The company allows individual players to endorse fellow players based on courteous interactions. Once a player receives enough endorsements, the player is given free rewards that can be used during gameplay.

57
New cards

Which of the following best exemplifies the use of multifactor authentication?

A Web site requires a user to enter a password as well as a numeric code received via text message before the user can log in to an account

58
New cards

Which of the following best explains how symmetric encryption algorithms are typically used?

Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

59
New cards

Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are used?

Unauthorized individuals can use data mining and other techniques to guess a user's password.

60
New cards

Individuals sometimes attempt to remove personal information from the Internet. Which of the following is the LEAST likely reason the personal information is hard to remove?

All personal information is stored online using authentication measures, making the information hard to access.

61
New cards

Which of the following is an example of a phishing attack?

Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information