Data in AP Computer Science Principles
Which type of program can be used to record, modify, and organize data and perform operations on numerical data?
Spreadsheet program
Data mining program
Text analysis program
Search tool
Which approach prioritizes customer satisfaction in assessing whether software meets business requirements during final stages before release?
User Acceptance Testing (UAT)
Beta Testing
Alpha Testing
Contract Acceptance Testing (CAT)
Which of the following refers to the process of examining large data sets to find useful information, such as patterns or relationships?
Data filtering
Data analysis
Data mining
Data transformation
Which principle of security is primarily concerned with ensuring that data is accessible to authorized users when needed?
Integrity
Availability
Confidentiality
Non-repudiation
In distributed computing projects that use volunteer devices for processing large sets of data what mechanism ensures each device's computations are reliable?
Checkpointing periodically saves project state allowing single device complete task over time INTERRUPTIONS
Load Balancing evenly distributes tasks among devices preventing any single point failure affecting outcome
Redundant Processing requires each device perform same computation multiple times independently
Consensus protocols verify computations across multiple devices before acceptance
In public-key cryptography, what enables only the intended recipient to read an encrypted message?
A shared symmetric key
The sender's public key
The recipient's private key
The recipientโs public key
What data structure should be utilized during breadth-first search (BFS) implementation on an undirected graph in order to efficiently maintain discovered nodes that have not yet been explored?
Stack
Queue
Set
Priority Queue

How are we doing?
Give us your feedback and let us know how we can improve
In a programming context, what does "debugging" refer to?
Backing up files for security purposes.
Enhancing existing features for performance.
Removing unwanted data from a database.
Fixing errors in code.
In lossless data compression algorithms, what key technique do they often employ to reduce file size without losing any original data?
Randomly discarding bits that exceed a certain threshold frequency.
Permanently deleting every other bit from the data stream.
Removing less significant bits from binary representations.
Identifying and encoding repeating patterns more efficiently.
In what way can deep learning algorithms revolutionize personalized medicine to better cater to individual health needs?
By streamlining administrative tasks in hospitals allowing for more direct patient care time.
By automating diagnosis procedures reducing the need for specialized diagnostic technicians.
By analyzing vast datasets to predict individual responses to different treatments, improving efficacy.
By increasing the availability of telemedicine services to rural areas lacking healthcare facilities.