Which of the following is LEAST likely to indicate a phishing attack?
AP Computer Science Principles Practice

Quiz
•

undefined undefined
•
Computers
•
10th Grade
•
2K plays
•
Medium
Student preview

40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
An e-mail from your bank asks you to call the number on your card to verify a transaction
An e-mail from a merchant asks that you click on a link to reset your password
An e-mail from a utility company asks you to enter your date of birth and social security number for verification purposes
An e-mail indicates that you have won a large sum of money and asks you to enter your bank account number so that the money can be transferred to you
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following activities poses the greatest personal cybersecurity risk?
Making a purchase at an online store that uses public key encryption to transmit credit card information
Paying a bill using a secure electronic payment system
Reserving a hotel room by e-mailing a credit card number to a hotel
Withdrawing money from a bank account using an automated teller machine (ATM)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes a Distributed Denial of Service (DDoS) attack?
An attempt by a country to deny its citizens access to the Internet
An attempt to deny users access to a Web site's resources by flooding the Web site with requests from multiple systems
An attempt by one user to deny service to another user by posting material on a social network
An attempt by a user of the Internet to get private information from a secure database
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A program is expressed in a programming language. Which of the following is true of the program?
The program can also be expressed as binary code, but will be more easily understood by humans when expressed in a higher-level programming language.
The program can also be expressed as binary code, which will reduce the likelihood of errors.
The program cannot be expressed as binary code, because binary code can only be used to represent data.
Some parts of the program can be expressed as binary code, but operations must be expressed using a higher-level programming language.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements best describes the properties of public key encryption?
Public key encryption is an encryption method which relies on separate keys for encrypting and decrypting information.
Public key encryption is a highly secure encryption scheme that in which a single key is used by both the sender and receiver of the message.
Public key encryption makes use of certain types of problems which are easier for humans to solve than computers.
Public key encryption makes use of mathematical problems which no algorithm can be used to solve.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A flowchart is a way to visually represent an algorithm. The flowchart above uses the building blocks from the table above.
Which of the following statements best describes the behavior of the algorithm depicted in the flowchart?
Assume a always starts greater than b.
It displays the sum of a and b.
It displays the difference between a and b.
It displays the product of a and b
It runs in an infinite loop.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Consider the process of encoding and decoding a message using the following Caesar cipher encoding scheme in which the plaintext and ciphertext alphabets are offset by four positions, as shown above.
Which of the following encoded ciphertext strings decodes to an original plaintext message of “secret”?
ersecr
wigvix
kwujwl
oaynap
8.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best defines confidentiality in context with information and data?
The ability to limit access to information to a certain set of users
The certainty that information is accurate
The confirmation that a company will not sell your information to others
The reliability of access to information
9.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is true about low level computer languages?
I. Low level languages give the programmer more control over how system resources are used.
II. Code in a programming language is often translated into code in another (lower level) language to be executed on a computer.
III. Low level programming languages are designed to be easier for people to read and write.
II only
I and III only
I and II only
ii and III only
10.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Consider the above code segment that is designed to print all numbers from a list of integer values, called grades, that are between 90 and 100, inclusive.
Which of the following modifications can be made to the code to allow it to also print numbers from a variety of different ranges of values (e.g., 70 to 80, 85 to 95, 1 to 50, etc.)?
userPassword = "swordfish"
"swordfish"
userPassword != "swordfish"
userPassword ← INPUT
Explore all questions with a free account
Similar Resources on Quizizz
39 questions
G12_End of Term2_Revision

Quiz
•
9th - 12th Grade
44 questions
Algorithms and Pascal Programming

Quiz
•
9th - 10th Grade
40 questions
UNIT 2.3 ROBUST PROGRAMS

Quiz
•
10th Grade
45 questions
GCSE Computing

Quiz
•
10th - 11th Grade
40 questions
Computer Science Pre-Assessment Quiz

Quiz
•
9th - 12th Grade
44 questions
AP Computer Science Principles Units 1, 2 & 3

Quiz
•
10th - 12th Grade
37 questions
1.1.1 - 1.1.6 CSE REVIEW FOR ASSESSMENT

Quiz
•
9th - 12th Grade
41 questions
N5 Computing Science: Software Development Methodologies

Quiz
•
10th Grade
Popular Resources on Quizizz
17 questions
CAASPP Math Practice 3rd

Quiz
•
3rd Grade
15 questions
Grade 3 Simulation Assessment 1

Quiz
•
3rd Grade
20 questions
math review

Quiz
•
4th Grade
19 questions
HCS Grade 5 Simulation Assessment_1 2425sy

Quiz
•
5th Grade
16 questions
Grade 3 Simulation Assessment 2

Quiz
•
3rd Grade
21 questions
6th Grade Math CAASPP Practice

Quiz
•
6th Grade
13 questions
Cinco de mayo

Interactive video
•
6th - 8th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade