AP Computer Science Principles Exam Quizlet

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the error that results when the number of bits is not enough to hold the number?

  • Lossless
  • Round-off
  • Lossy
  • Overflow (correct)

What type of error results when the number of bits is not sufficient to represent the actual number?

  • Lossless
  • Overflow
  • Round-off (correct)
  • Lossy

What does lossy compression mean?

  • High fidelity
  • Preserves all data
  • Data is irretrievably lost (correct)
  • Good compression (correct)

What does lossless compression allow?

<p>Full recovery of the original data (C)</p> Signup and view all the answers

What is metadata?

<p>Data about data</p> Signup and view all the answers

What is sequencing in programming?

<p>Code flows line by line</p> Signup and view all the answers

What does selection refer to in algorithms?

<p>A boolean condition determining the path taken</p> Signup and view all the answers

What does iteration mean in programming?

<p>Using a looping control structure</p> Signup and view all the answers

What is reasonable time in terms of algorithm performance?

<p>Polynomial in the number of steps</p> Signup and view all the answers

What is not reasonable time in algorithmic terms?

<p>Exponential in the number of steps</p> Signup and view all the answers

What is a heuristic?

<p>A rule to guide an algorithm</p> Signup and view all the answers

What does undecidable refer to?

<p>A problem that cannot have a definitive yes or no answer for all inputs</p> Signup and view all the answers

What is a linear search?

<p>Going one by one through a list</p> Signup and view all the answers

What is a binary search?

<p>Cutting the list in half</p> Signup and view all the answers

What does API stand for?

<p>Application Programming Interface</p> Signup and view all the answers

What is citizen science?

<p>Lots of people helping with a scientific project</p> Signup and view all the answers

What is cloud computing?

<p>Using distributed calculations/storage for big data</p> Signup and view all the answers

What is crowdsourcing?

<p>Asking many users online for help</p> Signup and view all the answers

What is Creative Commons?

<p>An alternative to copyright</p> Signup and view all the answers

What is open access?

<p>Read access to information</p> Signup and view all the answers

What is Moore's Law?

<p>The number of transistors on a chip doubles every two years</p> Signup and view all the answers

What are peer-to-peer networks?

<p>Direct connections between users' computers</p> Signup and view all the answers

What is the digital divide?

<p>Some communities have less access to computing</p> Signup and view all the answers

What does ISP stand for?

<p>Internet Service Provider</p> Signup and view all the answers

How does internet communication arrive at its destination?

<p>Goes from source to ISP, into the cloud, out to another ISP, and to the destination</p> Signup and view all the answers

How can the government control speech on the internet?

<p>By controlling the speaker, listener, or intermediaries</p> Signup and view all the answers

How can internet posters evade conviction for defamation?

<p>By ensuring anonymity or lack of jurisdiction</p> Signup and view all the answers

Flashcards

Overflow

Occurs when a computer tries to store a number that is too large for the available memory space. Imagine a car's odometer rolling over.

Round-off

A process of approximating numbers due to limited memory space. Like representing pi as 3.14 instead of its infinite digits.

Lossy Compression

A type of data compression that discards some data to reduce file size, making it nearly impossible to recover the original completely. Like compressing a JPEG image.

Lossless Compression

A type of data compression that keeps all the original data, allowing full recovery of the original file. Like compressing a PNG image.

Signup and view all the flashcards

Metadata

Data that describes other data, like the camera settings used to take a photo. It provides context and information about a piece of data.

Signup and view all the flashcards

Sequencing

A coding structure where instructions are executed in a specific order, one after the other. Like following a recipe.

Signup and view all the flashcards

Selection

A coding structure that uses conditions to choose between different paths in an algorithm. It uses if-then statements to make decisions.

Signup and view all the flashcards

Iteration

A coding structure that uses loops to execute code multiple times. It uses constructs like "while", "for", or "repeat" to repeat a block of code.

Signup and view all the flashcards

Reasonable Time

Algorithms that run in polynomial time, meaning the time it takes to run grows relatively slowly with the size of the input in the worst case. It indicates a manageable execution time.

Signup and view all the flashcards

Not Reasonable Time

Algorithms that run in exponential time, meaning the time it takes to run grows very rapidly with the size of the input. It becomes very inefficient for larger inputs.

Signup and view all the flashcards

Heuristic

A guiding principle that helps solve problems by providing a direction or suggestion, like navigating by the North Star.

Signup and view all the flashcards

Undecidable Problems

Problems that are extremely complex and don't have algorithms that can solve them for all inputs. Like determining if a program will ever stop.

Signup and view all the flashcards

Linear Search

A search method that goes through a list one item at a time until it finds the target value. Like searching for a word in a dictionary.

Signup and view all the flashcards

Binary Search

A more efficient search method that requires a sorted list. It repeatedly divides the list in half until the target value is found. Like a binary search on a sorted list of numbers.

Signup and view all the flashcards

API (Application Programming Interface)

A set of rules that allows software applications to communicate with each other. It defines how they exchange data and commands.

Signup and view all the flashcards

Citizen Science

A research activity involving broad public participation. People contribute data or assist with scientific tasks. Like counting butterflies across the globe.

Signup and view all the flashcards

Cloud Computing

Using a network of distributed resources for processing, storage, or other computing tasks. Often used for large-scale data management or web applications. Like using Amazon Web Services.

Signup and view all the flashcards

Crowdsourcing

Gathering assistance from a large online community for completing tasks, such as funding projects or analyzing data. Like a crowdsourced translation project.

Signup and view all the flashcards

Creative Commons

A type of license that allows creators to specify how their work can be shared and used. It provides more control and flexibility than traditional copyright.

Signup and view all the flashcards

Open Access

A policy that provides unrestricted and free access to research, information, or other resources. Like open-source software.

Signup and view all the flashcards

Moore's Law

An observation stating that the number of transistors on a microchip roughly doubles every two years, leading to significant increases in computer performance and capability.

Signup and view all the flashcards

Peer-to-Peer Networks

A network where computers connect directly to each other over the internet without a central server. It bypasses intermediaries for communication.

Signup and view all the flashcards

Digital Divide

The unequal access to digital technologies and resources among different populations or communities. It can be based on income, location, or other factors.

Signup and view all the flashcards

ISP (Internet Service Provider)

A company that provides internet access to individuals and organizations. Like Comcast or Verizon.

Signup and view all the flashcards

Internet Communication Path

The path data takes when traveling from a source to its destination over the internet, involving ISPs, cloud infrastructure, and other intermediaries.

Signup and view all the flashcards

Government Control of Internet Speech

The ways in which governments can restrict online speech, including controlling the speaker, limiting listener access, and regulating intermediaries like social media platforms.

Signup and view all the flashcards

Legal Implications of Internet Posting

The legal implications of posting content online, including the potential for defamation and slander. It can also involve copyright infringement and other issues.

Signup and view all the flashcards

Study Notes

Important Terms in Computer Science Principles

  • Overflow: Occurs when the number of bits is insufficient to hold a number, exemplified by a car's odometer rolling over.
  • Round-off: Results from limited bits causing an approximation of numbers, such as representing Ï€ as 3.14 with only three digits.
  • Lossy Compression: Data compression method that discards some data, making it nearly impossible to restore the original—commonly used in JPEG images.
  • Lossless Compression: Preserves all original data during compression, allowing full recovery, typically resulting in less compression efficiency compared to lossy methods, like PNG images.
  • Metadata: Descriptive data about other data, such as a camera's settings stored alongside a digital photo.

Code Structures and Algorithms

  • Sequencing: A coding structure where instructions are executed in order, similar to how one follows a recipe.
  • Selection: Utilizes boolean conditions to choose between two paths in an algorithm, often implemented with if-then statements.
  • Iteration: Involves looping constructs like while, for, or repeat-structures to execute code multiple times.

Algorithm Efficiency

  • Reasonable Time: Algorithms that operate in polynomial time based on input size in the worst case, indicating manageable growth in execution steps.
  • Not Reasonable Time: Characterized by exponential growth in execution steps, such as doubling steps for each additional input element.

Problem-Solving Techniques

  • Heuristic: A guiding principle that aids problem-solving, e.g., navigating towards the North Star when lost.
  • Undecidable Problems: Extremely complex problems without an algorithmic solution for all inputs, e.g., predicting if a program will halt for any given input.

Searching Algorithms

  • Linear Search: Sequential search method where items are checked one at a time, akin to searching for a word in a dictionary.
  • Binary Search: A more efficient method that requires a sorted list, repeatedly dividing the list in half to find a target value.

Internet and Computing Concepts

  • APIs (Application Programming Interface): Set of rules for how software applications communicate.
  • Citizen Science: Involves broad public participation in scientific research, like counting butterflies globally.
  • Cloud Computing: Leveraging distributed resources for processing or storage, often used for extensive data management or web applications.
  • Crowdsourcing: Gathering assistance from a large online community for tasks like funding projects or analyzing data.
  • Creative Commons: Licensing alternative that allows creators to specify terms for sharing and use of their work.
  • Open Access: Policy that provides unrestricted access to research and information.
  • Moore's Law: Observation that the number of transistors on a microchip doubles approximately every two years, leading to increased performance.
  • Peer-to-Peer Networks: Direct connections between individual computers over the internet, bypassing centralized intermediaries.
  • Digital Divide: The disparity in access to digital technologies among different communities or populations.
  • ISP (Internet Service Provider): A company providing access to the internet.

Online Communication and Regulation

  • Internet Communication Path: Data travels from source to ISP, through the cloud, onto another ISP, and finally to its destination.
  • Government Control of Internet Speech:
    • Controlling the speaker or their ISP through laws.
    • Regulating listener access to certain materials, such as illegal possession of copyrighted content in the U.S.
    • Exercising control over intermediaries facilitating communication.
  • Defamation and Slander Online: Internet users can avoid conviction for slander if certain legal defenses apply, such as proving truth or lack of malicious intent.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Use Quizgecko on...
Browser
Browser