2.5 Multiple Choice Questions

4 min readmarch 13, 2023


AP Computer Science Principles ⌨️

80 resources
See Units

Multiple Choice Practice for Data

Welcome to Big Idea 2 AP Computer Science Principles Multiple Choice Questions! Grab some paper and a pencil 📄 to record your answers as you go. You can see how you did on the Big Idea 2 Practice Questions Answers and Review sheet once you're done. Don't worry, we have tons of resources available if you get stumped 😕 on a question. And if solo study is not your thing, join a group in Hours!
Not ready to take a quiz yet? Take a look at the Intro to Big Idea 2.
https://cdn.pixabay.com/photo/2019/06/17/19/48/source-4280758_1280.jpg

Image courtesy of Pixabay

Facts about the test: The AP CS: Principles exam has 70 multiple choice questions and you will be given 2 hours (120 minutes) to complete the section. That means it should take you around 10 minutes to complete 6 questions.
*The following questions were not written by College Board and, although they cover information outlined in the AP Computer Science Principles Course and Exam Description, the formatting on the exam may be different.

1. A videographer stores videos on his laptop. In this case the videos are considered the data. Each video includes metadata such as: -Date: The date the video was shot. -Time: The time the video was shot. -Location: The location the video was shot. -Device: The camera the video was recorded with. Which of the following could the videographer NOT do based on this metadata?
A. Filter videos to those recorded within the city
B. Filter videos to those recorded in the last 3 months
C. Filter videos to those recorded in a particular city.
D. Filter videos to those recorded with his favorite camera

2. This type of data makes working with other data easier - allowing the user to sort or locate specific information. It is also referred to as "data about data". What type of data is this?
A. Quantitative Data
B. Programming Data
C. Metadata
D. Machine Data

3. A coffee shop is interested in learning about the beverage preferences of coffee drinkers living nearby to the coffee shop and intends to use survey data to help decide which new beverage options to add to the menu. Which of the following is LEAST likely to be part of the process used to analyze the data?
A. Filtering data to view responses based off of gender.
B. Cleaning data to remove inconsistencies.
C. Filtering data to view responses based off of age.

4. An ornithologist is interested in learning more about the different kinds of birds living in different areas of the state he lives in. The ornithologist creates an app that allows residents of the town to photograph birds in their area using a smartphone and record date, time, and location of the photograph. Afterwards the ornithologist will analyze the data to try to determine where different kinds of birds living in the state.
Which of the following does this situation best demonstrate?
A. Crowd Sourcing
B. Crowd funding
C. Citizen Science
D. Open Data

5. A local health department decides to publicize data it has collected about the spread of Covid-19 around the city. The data is freely available for all to use and analyze in the hopes that it is possible to identify more efficient strategies to avoid the spread of the virus.
Which of the following does this situation best demonstrate?
A. Open Data
B. Citizen Science
C. Crowd funding
D. Machine Data

6. A videographer stores videos on his laptop. In this case the videos are considered the data. Each video includes metadata such as: -Date: The date the video was shot. -Time: The time the video was shot. -Location: The location the video was shot. -Device: The camera the video was recorded with. Filtering the data to analyze specific portions of the metadata would be considered what?
A. Machine Data
B. Data Filtering
C. Crowd funding
D. Crowd Sourcing

7. Data that showed Individuals who smoked 5 packs of cigarettes a week all developed lung cancer was an example of what?
A. Machine Data
B. Correlation
C. Open Data
D. Citizen Science

8. Providing users to read-only access to data is an example of
A. Security
B. Privacy
C. Encryption
D. Filtering

9. Which data compression technique comes at the expense of losing data?
A. Classification
B. Filtering
C. Lossless
D. Lossy

10. Information about the location of a photograph within the data of a picture is
A. Content
B. Open Data
C. Metadata
D. Maxdata

11. The ability to add or remove resources to store large data sets is called
A. Filtering
B. Metadata
C. Scalability
D. Routing

12. This process ensures that incomplete data does not hid or skew results, it repairs bad or incomplete data. What is this process called?
A. Scalability
B. Cleaning Data
C. Filtering
D. Encryption

13. Why is it important to analyze big data?
A. It helps humans to identify patterns that humans cannot see or consistently discover naturally
B. It verifies existing issues and solutions within the internet
C. It increases the speed and protection of internet access.
D. It increases redundancy, liability, and scalability

14. This compression technique requires no data to be lost and ensures that the original image can be restored.
A. Data Storage 
B. Lossless
C. Lossy
D. Ciphering

15. Large data sets can be defined by grouping data with common features and values based on criteria provided by the data analysts. This process is called
A. Cleaning   
B. Patterns
C. Classifying
D. Filtering

  • 🤝Connect with other students studying AP CS: Principles with Hours

Browse Study Guides By Unit
🕹Unit 1 – Creative Development
📱Unit 3 – Algorithms & Programming
🖥Unit 4 – Computer Systems & Networks
⌨️Unit 5 – Impact of Computing
✏️Frequently Asked Questions
📝Exam Prep