Data in AP Computer Science Principles
When designing a database for secure storage of user information, what feature should be included?
Encryption of sensitive user data fields.
Unrestricted access permissions for all users.
Use of common admin passwords across multiple databases.
Plain text storage of credit card details.
When considering the ethical implications of facial recognition technology used in public spaces, what is a potential negative consequence from a privacy perspective?
Faster processing at airports leading to reduced waiting times for passengers.
Unwarranted surveillance and loss of anonymity for individuals.
Improved convenience in unlocking personal devices and services access.
Enhanced security measures that could deter criminal activities.
What is a key principle of data encryption?
Storing all sensitive information in one centralized location.
Sending data over unsecured networks frequently to test security measures.
Making multiple copies of data to avoid loss.
Converting information into code to prevent unauthorized access.
How can cleaning data help in dealing with non-uniformity?
By creating invalid and incomplete data
By introducing biases in the data
By increasing the size of the data sets
By eliminating differences and making the data uniform
Which of the following examples best illustrates the use of abstraction in managing data complexity?
Creating a user profile object that includes only relevant attributes like username and password.
Writing detailed comments explaining every line of code in a program.
Manually reviewing each data entry in a large database to ensure accuracy.
Increasing the number of features in an application to provide more functionality.
What is the first step in software development?
Coding
Planning
Testing
Debugging
What kind of search is most appropriate when dealing with an unordered list of items where no assumptions about distribution can be made?
Binary search
Depth-first search
Breadth-first search
Linear search

How are we doing?
Give us your feedback and let us know how we can improve
How does conserptual model represent abstract representation real world system?
Displayng full range possible behaviors scenario
Portraying physical appearance objects involved
Depictting each minutt detail operationl processes
Highlighting critical relationships interactions among entities
Which of the following is an example of a secure data practice?
Writing down passwords on a sticky note attached to the monitor.
Using the same password for all accounts.
Sharing passwords with trusted friends.
Using strong, unique passwords for different accounts.
What role do algorithms play in content delivery platforms like YouTube or Netflix?
Increasing subscription fees over time
Personalizing user recommendations based on past viewing habits
Restricting bandwidth usage during peak hours
Limiting the variety of videos available for streaming