ArrayList in AP Computer Science A
Which term describes the process of converting data into a secret code to prevent unauthorized access?
Serialization.
Concatenation.
Tokenization.
Encryption.
When designing a new app how should a developer approach the process if sensitive personal data collection?
Store excess data separately for potential sale
Use a broad definition of 'sensitive' to justify extensive collection practices
Only collect what is essential for functionality.
Record as much data as possible for analytics purposes
Which of the following statements is true about hash functions?
Hash functions are used to encrypt data so that it can't be read or understood by outside sources
Hash functions encrypt data using complex mathematical functions that can be reversed with the key
Hash functions are non-reversible and are used for integrity to verify the authenticity of data
Hash functions allow data to be accessed and modified in any way, without any restrictions
What is the simplest datatype used to store true or false values in Java?
Boolean.
Double.
Integer.
String.
Which of the following is a logical operator in Java that could be used to check if both conditions are true?
++
--
&&
||
If you want to run different blocks of code based on the value of a single variable, what should you use in Java?
switch statement
do-while loop
break statement
continue statement
What kind of sophisticated auditing mechanism would create maximum computational overhead while providing robust oversight over personal data usage across different systems?
Static code analysis tools conducting routine scans detecting vulnerabilities pertaining exclusively towards securing PII repository areas
A decentralized blockchain ledger recording immutable logs for all individual's consent changes and accessed records across multiple platforms
Automated anomaly detection systems flagging unusual patterns in personal data requests within single ecosystems
Periodic centralized logging where external audits review random samples for compliance verification purposes

How are we doing?
Give us your feedback and let us know how we can improve
Which object-oriented concept involves designing classes for generic use so that they can be extended or overridden for specific needs?
Polymorphism
Encapsulation
Inheritance
Abstraction
Could you tell me why would someone opt for linear search instead of binary search when implementing a feature within a privacy-focused app?
Option two relies more heavily upon constant-time insertion deletion features.
Option one utilizes more CPU resources regardless of list size.
Linear search doesn’t involve rearranging data which can help maintain user privacy settings.
Option three guarantees complete absence errors corner cases.
In a data collection application, how should you appropriately handle sensitive information entered incorrectly causing a SecurityException?
Ignore exceptions for quicker data entry process
Log the incident and prompt for re-entry of data securely
Terminate application without logging or notifying user
Store all inputted information regardless of correctness