ArrayList in AP Computer Science A
Which term describes the process of converting data into a secret code to prevent unauthorized access?
Serialization.
Concatenation.
Tokenization.
Encryption.
What is the simplest datatype used to store true or false values in Java?
Boolean.
Double.
Integer.
String.
Which of the following is a logical operator in Java that could be used to check if both conditions are true?
++
--
&&
||
In a data collection application, how should you appropriately handle sensitive information entered incorrectly causing a SecurityException?
Ignore exceptions for quicker data entry process
Log the incident and prompt for re-entry of data securely
Terminate application without logging or notifying user
Store all inputted information regardless of correctness
What are some ways to achieve proper safeguarding of sensitive data?
Allowing unrestricted access to sensitive data
Storing sensitive data in publicly accessible databases
Sharing sensitive data with unauthorized individuals
Implementing strong security measures like encryption and authentication
Which of the following statements is true about hash functions?
Hash functions are used to encrypt data so that it can't be read or understood by outside sources
Hash functions encrypt data using complex mathematical functions that can be reversed with the key
Hash functions are non-reversible and are used for integrity to verify the authenticity of data
Hash functions allow data to be accessed and modified in any way, without any restrictions
If you want to run different blocks of code based on the value of a single variable, what should you use in Java?
switch statement
do-while loop
break statement
continue statement

How are we doing?
Give us your feedback and let us know how we can improve
Which object-oriented concept involves designing classes for generic use so that they can be extended or overridden for specific needs?
Polymorphism
Encapsulation
Inheritance
Abstraction
Could you tell me why would someone opt for linear search instead of binary search when implementing a feature within a privacy-focused app?
Option two relies more heavily upon constant-time insertion deletion features.
Option one utilizes more CPU resources regardless of list size.
Linear search doesn’t involve rearranging data which can help maintain user privacy settings.
Option three guarantees complete absence errors corner cases.
When designing a new app how should a developer approach the process if sensitive personal data collection?
Store excess data separately for potential sale
Use a broad definition of 'sensitive' to justify extensive collection practices
Only collect what is essential for functionality.
Record as much data as possible for analytics purposes