UNIT 1
UNIT 2
UNIT 3
UNIT 4
UNIT 5
100

What is computing innovation?

Ex) Physical: Robots, Tablets, smart te. Non-physical: Social Media, Video Games

An innovation that uses a program as a key part of its function.



100

How does a computer ream machine code?

Computers read machine code, which is usually in the binary system.

100

AP Pseudocode has an index that starts with what number?

AP Pseudocode has an index that starts at 1.

100

What is the Internet?

Interconnection and networks

100

What is the digital divide?

OR

What is an example of computing bias?

Digital divide: gaps between those who have access to the internet and those who do not

OR

(anything about a computer being biased)

200

Program Behavior

How a program will respond to a user interacting with it.

200

How do computing devices store data?

Computing devices store data in bits (binary digits)

200

What is an Algorithm?

An algorithm is a set of instructions that accomplishes a task or solves a problem; it is created using sequencing, selection, and iteration.

200

What does WWW stand for, and what is it?

World Wide Web: a system of web pages, programs, and files; runs on the Internet but is not the Internet.

200

Virus vs Worm

Viruses are attached to infected files and must be activated by the user; worms can operate independently.

300

Name one common logic error (other than a logic error).

Syntax Errors

Run-Time Errors

Overflow Errors

300

What is one byte equal to?

What is a Hexadecimal used for?

~8 Bits = 1 Byte

~Hexadecimal is used for RGB color codes & it uses Base 16

300

Give two examples of data types.

Strings (Text)

Lists (array of elements)

Booleans (True and False)

Loops (traverse through lists/arrays/strings)


300

What is fault tolerance and redundancy?

fault-tolerant: something can still function even w/ a partial malfunction

Redundancy: duplication of things; helps make the internet fault-tolerant

300

Define: 

1-Copyright

2-Creative Commons 

3-Intellectual Property

1-The person who created something determines who uses their creation

2-copyright license for creators to give others the ability to use their work

3-the work that people consider “theirs”

400

Name one "Methods of Fixing."

Hand tracing (manually tracking your variables' values)

OR 

Print statements (printing out values)

400

What is Abstraction in coding?


Ex) You can call a procedure without knowing how it works

Abstraction: reduces complexity by only focusing on the most important parts & hiding the irrelevant parts from the user—important for AP CSP!!

400

What is/are Sequencing, Selection, and Iteration

1- Sequencing means that all of the code is executed in the order they are written.

2-Selection: if statements: have conditions that need to be met for the selection to run

3- Iteration: “repeat n times” or ”repeat until”; you can use NOT, AND, and OR to write loops

400

What is Routing and Paths?

Routing is the process of finding the best path to deliver information.

Path: sequences of connected computing devices that begin at the sender and end at the receiver.

400

Malware vs Phishing

Malware: Harmful software (e.g., viruses) that users must download, often operating in the background.

Phishing: Deceptive emails or links that trick users into revealing personal information through direct interaction.

500

Name and describe the steps in the development process.

1- Iterative development process: develop working prototypes of a program. 2- incremental development process: break a problem into small parts, then fix. 3- Program Documentation: Describe how something in your program works. 4- Comments: keep comments on your program

500

Name and describe the two types of compression.

~Lossless compression: less compression & better file quality

~Lossy compression: more compression & worse file quality

500

What Procedures, Parameters, and Arguements

Procedures are programming instructions that are also called methods or functions.

Parameters: input variables of a procedure.

Arguments: a procedure call with defined values.

500

What is a computer network? How is metadata used in the process?

When multiple computing devices (ex, computer, tablet) communicate with each other, Data on the internet is split into data packets that use...

Metadata that is attached to each packet to tell the routers information.

500

Define:

1: Encryption

2: Key

3: Symmetric Key Encryption

4: Public Key Encryption

Encryption: encoding data to prevent others from accessing 

Key: a secret piece of information used to encrypt data

Symmetric Key Encryption: one key for both encrypting & decrypting

Public Key Encryption: public key to encrypt & private key to decrypt

M
e
n
u