What is computing innovation?
Ex) Physical: Robots, Tablets, smart te. Non-physical: Social Media, Video Games
An innovation that uses a program as a key part of its function.
How does a computer ream machine code?
Computers read machine code, which is usually in the binary system.
AP Pseudocode has an index that starts with what number?
AP Pseudocode has an index that starts at 1.
What is the Internet?
Interconnection and networks
What is the digital divide?
OR
What is an example of computing bias?
Digital divide: gaps between those who have access to the internet and those who do not
OR
(anything about a computer being biased)
Program Behavior
How a program will respond to a user interacting with it.
How do computing devices store data?
Computing devices store data in bits (binary digits)
What is an Algorithm?
An algorithm is a set of instructions that accomplishes a task or solves a problem; it is created using sequencing, selection, and iteration.
What does WWW stand for, and what is it?
World Wide Web: a system of web pages, programs, and files; runs on the Internet but is not the Internet.
Virus vs Worm
Viruses are attached to infected files and must be activated by the user; worms can operate independently.
Name one common logic error (other than a logic error).
Syntax Errors
Run-Time Errors
Overflow Errors
What is one byte equal to?
What is a Hexadecimal used for?
~8 Bits = 1 Byte
~Hexadecimal is used for RGB color codes & it uses Base 16
Give two examples of data types.
Strings (Text)
Lists (array of elements)
Booleans (True and False)
Loops (traverse through lists/arrays/strings)
What is fault tolerance and redundancy?
fault-tolerant: something can still function even w/ a partial malfunction
Redundancy: duplication of things; helps make the internet fault-tolerant
Define:
1-Copyright
2-Creative Commons
3-Intellectual Property
1-The person who created something determines who uses their creation
2-copyright license for creators to give others the ability to use their work
3-the work that people consider “theirs”
Name one "Methods of Fixing."
Hand tracing (manually tracking your variables' values)
OR
Print statements (printing out values)
What is Abstraction in coding?
Ex) You can call a procedure without knowing how it works
Abstraction: reduces complexity by only focusing on the most important parts & hiding the irrelevant parts from the user—important for AP CSP!!
What is/are Sequencing, Selection, and Iteration
1- Sequencing means that all of the code is executed in the order they are written.
2-Selection: if statements: have conditions that need to be met for the selection to run
3- Iteration: “repeat n times” or ”repeat until”; you can use NOT, AND, and OR to write loops
What is Routing and Paths?
Routing is the process of finding the best path to deliver information.
Path: sequences of connected computing devices that begin at the sender and end at the receiver.
Malware vs Phishing
Malware: Harmful software (e.g., viruses) that users must download, often operating in the background.
Phishing: Deceptive emails or links that trick users into revealing personal information through direct interaction.
Name and describe the steps in the development process.
1- Iterative development process: develop working prototypes of a program. 2- incremental development process: break a problem into small parts, then fix. 3- Program Documentation: Describe how something in your program works. 4- Comments: keep comments on your program
Name and describe the two types of compression.
~Lossless compression: less compression & better file quality
~Lossy compression: more compression & worse file quality
What Procedures, Parameters, and Arguements
Procedures are programming instructions that are also called methods or functions.
Parameters: input variables of a procedure.
Arguments: a procedure call with defined values.
What is a computer network? How is metadata used in the process?
When multiple computing devices (ex, computer, tablet) communicate with each other, Data on the internet is split into data packets that use...
Metadata that is attached to each packet to tell the routers information.
Define:
1: Encryption
2: Key
3: Symmetric Key Encryption
4: Public Key Encryption
Encryption: encoding data to prevent others from accessing
Key: a secret piece of information used to encrypt data
Symmetric Key Encryption: one key for both encrypting & decrypting
Public Key Encryption: public key to encrypt & private key to decrypt