4.4 Multiple Choice Questions

5 min readmarch 13, 2023


AP Computer Science Principles ⌨️

80 resources
See Units

Multiple Choice Practice for Computer Systems & Networks

Welcome to Big Idea 4 AP Computer Science Principles Multiple Choice Questions! Grab some paper and a pencil 📄 to record your answers as you go. You can see how you did on the Big Idea 4 Practice Questions Answers and Review sheet once you're done. Don't worry, we have tons of resources available if you get stumped 😕 on a question. And if solo study is not your thing, join a group in Hours! Not ready to take a quiz yet? Take a look at the Intro to Big Idea 4.
https://cdn.pixabay.com/photo/2019/06/17/19/48/source-4280758_1280.jpg

Image courtesy of Pixabay

Facts about the test: The AP CS: Principles exam has 70 multiple choice questions and you will be given 2 hours (120 minutes) to complete the section. That means it should take you around 10 minutes to complete 6 questions. *The following questions were not written by College Board and, although they cover information outlined in the AP Computer Science Principles Course and Exam Description, the formatting on the exam may be different.

1. What causes a problem to be intractable?
A. There is not an algorithm that can solve it
B. It is solved most efficiently with large databases
C. Multiple algorithms exist with different levels of efficiency
D. The solution is too inefficient for large databases

2. How does the internet work with the different equipment in use?
A. Vendors follow the protocols established to enable data to be sent & received across any equipment
B. The routers adjust for the different equipment manufacturers by sending data on the same equipment brands
C. Specific companies are approved to make equipment for the Internet
D. The server farms handle the data once the data reach Regional ISP (Internet Service Provider)

3. What is the most common way computer viruses are spread?
A. From pop-up ads
B. Through network worms
C. By people clicking on an infected file
D. From random botnet attacks

4. What does Moore's Law indicate?
A. That the size of computers would decrease by half every two years
B. The power of the processors would double approximately every 2 years
C. That the price of computers would decrease by half every two years
D. That the cost of computer storage would decrease by half every two years

5. When would lossless data compression be preferred over a lossy one?
A. When you need to get back to the original file
B. When you do not need to get back to the original file
C. When you need to display the file on mobile devices and websites
D. When you have limited space available on your computer

6. When does cryptography enable the Internet to process transactions securely?
A. Symmetric keys are used to encrypt & decrypt messages for speed in processing to avoid being intercepted
B. Frequency analysis is used to disguise the use of common letters in encrypted messages keeping passwords secure
C. The public key encryption model is easy to use to encrypt data but intractable to decrypt for large numbers
D. Polynumeric alphabets are used to encrypt & decrypt messages to allow for use with different languages

7. A camera watching an eagle's nest starts recording when a motion detector starts. Which of the following is the metadata?
A. The number of eagles using the nest
B. The data & time the motion is detected
C. The latitude & longitude of the nest
D. The number of frames per second the camera records

8. Suzie's mother wants a copy of a photo from a family vacation they took. The picture is too large to email. How should she compress the image to print a large copy of it suitable for framing?
A. She should combine lossy & lossless compression to get enough compression to send the image
B. She should use lossy compression to get enough compression to send the image
C. She should use a lossless compression, which will help print a version with high enough quality to frame
D. Any compression will be sufficient in this case

9. When listening to an online music service, you request songs "like" a specific song. How does the music site determine which songs to play?
A. It plays the most requested songs from all listeners  
B. It plays songs you have played recently
C. It uses data-mining to determine patterns in the music that are similar
D. It plays a random selection

10. How do the world wide web and the Internet work together?
A. The internet has the "deep" net and "dark" net but the Web does not
B. The internet uses the web to connect devices to share data
C. The web uses HTTP to share computational artifacts using the Internet
D. They perform the same functionality

11. If a fire happens at a major Internet hub, what is the result?
A. Different IP addresses will be assigned to devices that were impacted by the unavailability of the hub
B. The part of the globe that is served by that hub will be down because of the end-to-end architecture of the Internet
C. Internet traffic will be routed a different way because of the redundancy built into the Internet
D. People can use dedicated phone lines as a backup with no change in service

12. In the following web address, how many domain levels are there?: http://anytime.anyway.anyplace.edu/lessons/notes/apex.docx
A. 3
B. 4
C. 5
D. 6

13. If a company is trying to determine whether to upgrade its bandwidth based on the following graph (see image), what should they measure?
A. Amount of data downloaded as it has the largest impact on the bandwidth
B. Frequency of the peak times
C. Amount of data uploaded as this includes strategic company backup data
D. Type of devices employees use on the network
https://firebasestorage.googleapis.com/v0/b/fiveable-92889.appspot.com/o/images%2F-6zn6fkLgqXQZ.png?alt=media&token=22879d8a-b954-4db3-9756-f074d06f8bc7

14. Which of the following is true about packets?
A. Packets are reassembled at their final destination
B. The receiving device acknowledges the first & last packets to indicate receipt of the data stream
C. Packets travel in order to their destination
D. Packets follow the shortest path to their destination

15. How do TCP and IP interact?
A. IP forwards the data to the DNS server to identify which TCP to use.
B. TCP creates packets from the data to be sent and transfers control to IP for routing. TCP then reassembles the packets at the destination
C. TCP hands off control to HTTP, which passes it to IP.
D. IP uses the SSL in conjunction with TCP to securely send data.

  • 🤝Connect with other students studying AP CS: Principles with Hours

Browse Study Guides By Unit
🕹Unit 1 – Creative Development
⚙️Unit 2 – Data
📱Unit 3 – Algorithms & Programming
⌨️Unit 5 – Impact of Computing
✏️Frequently Asked Questions
📝Exam Prep