_ap Computer Science Principles Ultimate Review Guide
_ap Computer Science Principles Ultimate Review Guide
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
🌟
- Do tons of practice and locate your weak points!
- And…even if you don’t get a 5, you're a 5 in my eyes
- I just studied all of this before my exam and got a 4!!
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
Collaboration can occur in the planning, testing or designing step of the process!!
Benefits of collaboration include:
🙌
Pair programming is when two programmers develop software side-by-side at one
computer on the same algorithm.
User interface: the inputs and outputs that allow a user to interact with a piece of
software
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
A code segments are smaller collection of statements that are a part of a program
————
Program event refers to an action or occurrence that takes place within a
computer program, such as a button click, mouse movement, or keyboard input. It
is used to trigger specific actions or behaviors in the program.
Event driven program: a type of program that respond to events triggered by user
actions, system events or other sources
Program Documentation
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
Benefits:
+ crucial for understanding how every part of program works
+ fosters collaboration
Syntax Errors: A syntax error occurs when the spelling and/or punctuation rules of the
programming language aren't followed. For example, forgetting to close a set of
parentheses or spelling a variable wrong, could cause your entire program to crash. A
syntax error could also be failing to indent properly. It’s that dumb semicolon thing.
Example:
a <— expression
display (A)
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
A is not the same as the variable ‘a’ because variables are case sensitive so it doesn’t
function properly.
Logic Errors: A mistake in a program's base logic that causes unexpected behavior.
a - 95
IF (a > 90)
DISPLAY("You got an A.")
IF
(a > 80)
DISPLAY("You got a B.")
IF
(a > 70)
DISPLAY("You got a C.")
This program is supposed to print out ‘You got an A’ but it prints out ‘You got an A’ ‘You
got a B’, ‘You got a C’.
Run-Time Errors: An error that occurs when the program is running. You'll be able to start
your program if you have a run-time error, but something will go wrong when you're
trying to use it.
Overflow Errors: an error that occurs when a computer tries to handle a number that’s
outside of its defined range of values.
Ex: x <— 2000*365
Display (x)
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
📊 22%
Debugging is the process of finding and fixing errors.
HOORAY YOU PASSED BIG IDEA 1!!!!
Number base: the number of digits or digit combos that a system uses to represent
values
Decimal system with a base 10: which only uses combinations of 0-9 to represent values
This represents the number 5,729
The 1 signifies that that’s what the number is made up of. In this case it is 4 and 1 which
add up to 5.
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
These binary digits are known as bits. Bit - smallest unit of info stored or manipulated
on a computer (0/1) - basic building blocks of storage just like amino acids for protein
- False/true, on/off….
If you want to measure ALL of this data, this is known as digital data.
Analog data can be represented digitally by using a sampling technique. The values of
the analog signal are measured and recorded at regular intervals. These intervals are
known as samples.
Sampling - recording an analog signal at regular discrete moments and converting them
or digital signals (can be stored on digital media)
Data Abstraction - filtering out specific details to focus on the info needed to process
the data.
Digital data must be formatted in a finite set of possible values while analog data can
be finite. For example watching a video on YouTube: you can see how long of a video you
are watching, like 10 minutes. That’s digital data, meanwhile seeing a live game at a
venue it’s continuous so it’s analog.
Digital data is a simplified representation that leaves out extra details as you wouldn’t
know the time down to the millisecond. Using digital data (leaves out details) to
approximate real world analog data is considered an abstraction.
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
-
Calculations :):
- To calculate the largest amount of numerical values you just do the power like 2
to the 8th which is 256. That’s because we count 0-255
DATA COMPRESSION
File types like mp3, mp4, jpg all use data compression, without it a 3 minute song would
be over 100MB.
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
● Data compression - set of steps of packing data into a smaller space while
allowing for the original data to be seen
Two way process - make a data package smaller or decompress packet to original form
Run length encoding works by replacing repeating data with a run that represents the
number and value of the repeated data.
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
- Packs data in such a way that the compressed package can be decompressed and
the data can be pulled out the same way it was given.
- Very important ^^ for programs that if a small change happens it can make it
unusable.
⬆️ ⬇️
noise/quantity
- Amount of compression Size of resulting file
-The amount of size reduction from compression depends on both the amount of
redundancy in the original data representation and the compression algorithm applied
There could also be outliers: data points that significantly deviate from the overall
pattern or trend
Metadata is data about data. IT DOES NOT AFFECT THE DATA ITSELF!! Changes and
deletions made to metadata do not change the primary data
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
Data may not be uniform so you have to clean data. Cleaning data creates a uniform of
data.
Large data sets are difficult to process using a single computer and may require parallel
systems. Problems of bias are often created by the type or source of data being
collected. Bias is not eliminated by simply collecting more data
The process of examining very large data sets to find useful information such as patterns
is known as data mining.
Programs such as spreadsheets help efficiently organize and find trends in information
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
Scatter plots
- uses dots to represent values for two different numeric variables
- Use correlation to compare the relationship between two variables. (Pearson r)
- Causation ≠ Correlation
- Strong = 1 Weak = 0 Negative/Positive .
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
Line graphs
- Use lines to represent the values
Histogram/Bar graph
- Uses bars to represent values
- Usually use frequency and ranges
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
🧑💻 👩💻
BIG IDEA 3: ALGORITHMS AND
PROGRAMMING 35%
EVERYTHING IN THIS UNIT IS IMPORTANT!!
A variable is a placeholder in your program for a value. It’s usually represented by letters
or words.
Global Variable:
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
varclicks = 0
Onevent (‘button’, ‘click’)
clicks = clicks +1
Local variable:
- used only in part of the code it was created, deleted once onevent is done.
- Variable is inside an event
Example:
onEvent(‘button’, ‘click’)
varclicks=1
Each variable can only hold one data value at a time. It can be reassigned.
Example:
Animal = “cat”
Animal = “dog”
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
Data types are different categories of data that your computer can represent. For
example: integers, strings, lists and booleans.
Example: 5
- Slice (str, start, length) returns the substring split up of character from the string
at the staring and what length.
Example: Slice(cat,1,2) : ca t
Boolean can only represent two values: true or false : computers use this to make
decisions inside conditionals (if then)
If it’s true, we execute the code segments if not then the else is executed!!
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
The NOT operator is used to reverse what the condition evaluates to. If a condition is
true, the operator will evaluate to false, and vice versa.
NOT OPERATOR: !
The AND operator is used to combine two conditions. The operator will only evaluate to
true if both conditions are met
The OR operator also involves two conditions. In this case, the operator will evaluate to
true if one condition or the other is met.
OR OPERATOR: ||
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
IF (age=40)
{
ticket = 20
}
else
{
If (age = 20)
ticket = 30
Else
ticket = 25
So basically if the age was 30, the first if would be completely ignored then we would go
to the else, and we would again ignore the if (age=20) so the ticket is 25.
If statement (conditionals)
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
Else statement
Lists:
An element is an individual value in a list. In the picture above, value 1, value 2 and value
3 I are all elements. Each element is assigned an index value.
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
Using a list can allow you to work easily with individual elements.
Accessing an element by index
This operation allows you to single out an element in a list based on its index number!
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
grocery_list[0] = grocery_list[2]
print (grocery_list)
This allows you to insert a value into the index position you want. It will increase the
length of the list and shift everything greater than or equal to that index down by one
place.
For example if you insert a new value to the index value 4, what was originally there will
move to the index value 5.
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
You can also use loops to transverse or go through a list. This can be a complete or
partial transversal.
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
Filter a List
An example is the linear search which checks each element of a list in order until the
desired value is found or all elements in the list have been checked.
Binary Search
Most basic way to search through a list: called a linear or sequential search algorithm
and it checks each value of a list in order until the result is found
Binary search algorithm starts in the middle of a sorted data set and eliminates half of
the data based on what it’s looking for. It repeats the process until the desired value is
found. THE LIST HAS TO BE IN ORDER
Example:
1, 1, 2, 3, 3, 4, 5, 7, 9, 11, 12
5, 7, 9, 11, 12
Value 9 now but it’s less than 12 so eliminates everything before and including that value
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
11, 12…
The process would go on until the program either found 12 or went through all values in
the list
PROCEDURES
A procedure is a group of programming instructions. They are also called methods or
functions. You can use a procedure to use the same set of instructions again and again
without having to rewrite the code.
Procedures often require some sort of parameter in order to work. Parameters are the
input variables of a procedure.
When you call a procedure, your program acts like those lines of codes are written out.
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
You can use the return statement which you can then use without printing it. It is used in
a function to specify the value that should be returned when the function is called.
RETURNS terminate the program.
Procedural Abstraction
- Procedures allow you to solve a large problem based on the solution to smaller
subproblems.
- Procedures can help you simplify your code and improve its readability.
Instead of this:
first_number = 7
second_number = 5
print (sum_value)
first_number = 8
second_number = 2
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
print (sum_value)
first_number = 9
second_number = 3
print (sum_value)
print (sum_value)
summing_machine(5, 7)
summing_machine(8, 2)
summing_machine(9, 3)
THE ALGORITHM
An algorithm is a set of instructions used to accomplish a specific task or solve a
problem.
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
Iteration: (Loop) Iteration refers to the repetition of a set of instructions until a specific
condition is met. It allows programs to perform tasks repeatedly without having to write
repetitive code.
The second type of loop is a Repeat Until condition loop (for loop) where the loop will
continue to run until a condition is met. We know how many times the loop will run.
While loops run while a condition is met and end when that condition is no longer true.
It checks the condition before executing the code block. We don’t know how many times
the code will run.
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
A for loop
Infinite loops are loops that continue to repeat indefinitely because the condition
controlling the loop is always true or there is no condition at all.
EXPRESSIONS
MOD operator: modulo: a Mod b: a is divided by b and MOD gives you what the
remainder would be.
27 mod 4: 3
PEMDAS EXISTS!! DO MATHEMATICAL EXPRESSIONS WITH PEMDAS
Developing Algorithms
Algorithms are step-by-step instructions or procedures used to solve a problem or
complete a task. They provide a clear set of instructions that can be followed to achieve
a specific goal.
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
Disadvantages: may include bias based on what the simulation creator chose to include
or exclude. It can also be out of scale
Algorithmic Efficiency:
A problem is a task that an algorithm is trying to solve while an instance of the problem
is a problem with a specific input.
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
Optimization problem: wants the best answer! example: finding the shortest path
between two cities
When finding the max number of list elements find the closest 2 to the power of
The halting problem asks that if a computer is given a random program, can an algorithm
ever be written that will answer the question, will this program ever stop running?, for
all programs? By proving that there wasn't, Turing demonstrated that some problems
can't be completely solved with an algorithm
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
🖥️
BIG IDEA 4: COMPUTER SYSTEMS AND
NETWORKS 15%
+ Open network meaning any computing device can join as long as they follow
the rules (protocol).
A computing device is a physical machine that can run a program. They connect
with other computing devices to form a computing system.
A computing network is a group of computing devices that can share data with
each other.
A computing system: a group of computing devices and programs working together for a
common purpose
When you send or receive data from the internet, you have to get data from one place or
another but sometimes it’s too much data so…the data is broken up into packets.
Packets contain a section of the data you want to send and comes with a header that
contains metadata (data about data) to tell the routers where the packet is from, where
it’s going and how it should be reassembled.
Computing devices create these packets and send them out through paths. Paths are
sequences of connected computing devices known as ROUTERS.
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
Bandwidth: the rate of data transfer it allows from one device to another
Or
In simple words: the maximum amount of data a network connection can move in a
certain amount of time
Internet Protocol:
In order for computing devices to communicate with each other over the internet, they
all have to use the same protocol!
A protocol is a standard set of rules that everyone agrees on. They are OPEN or
NONPROPRIETARY.
TCP/IP:
Transmission Control Protocol/Internet Protocol:
The TCP governs how packets are created and reassembled while the IP moves packets
to their destinations. It also dictates how devices are given addresses to communication
with each other (IP ADDRESSES: unique numerical label assigned to each device)
- reliable, ordered and error checked delivery of data packets
- It MAY be received out of order but the computer double checks and makes sure
to add instructions to reassemble it on the other side
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
- Some MAY not be delivered but the computer checks to be redelivered again
⭐️ IPv6:
Ex: 2001:0db8:0000:0042:8a2e….
These are hexadecimal numbers.
2 to the 128 possible values
UDP:
Used Datagram Protocol
Offers a way to deliver a faster stream of information by eliminating error checking
which TCP/IP does.
- does not guarantee delivery or order of packets
🌟 TCP, IP and UDP are used to transmit data over a variety of NETWORKS while HTTP is
used to transmit data over THE WORLD WIDE WEB (pls don’t get it mixed up :))
Scalability: the capacity for the system to change in size and scale to meet new demands
+ Fault tolerance: it can function properly even in the event of one part failing 🔥
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
One major aspect of a fault tolerant system is the presence of redundancy: the inclusion
of extra components that can be used to mitigate failure of a system of other
components fail
COMPUTING
Advantages:
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
Distributed computing: multiple DEVICES are used to run a program : allows users to
share information
Advantages:
+ allows people to solve problems that they wouldn’t be able to due to lack of
storage or too much processing time
The word problem we are using: For example if a program has three steps that take 40,
50 ,and 80 seconds then…
I. Sequential: a sequential solution takes as long as the sum of all steps in the
program. The sequential solution would take 170 seconds to complete.
II. Parallel Computing: depends on the number of cores (individual processing unit) .
The more cores the faster the solution. You have to find the fastest two processors
40 + 50: 90
40 + 80: 120
50 + 80: 130
You would find the longest out of the first two and second two which is 50 and 80 then
add them so it is 130.
III. The speed up: this is calculated by dividing the time it took to complete the task
sequentially by the time it took to complete the task in parallel
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
Speedup is the measure of how much faster one solution or algorithm performs
compared to another solution or algorithm when solving the same problem.
Speed limits:
Before you start a speed calculation problem, make sure you know whether or not all
steps are independent. Don't just assume they all are. (The question should tell you if
they are or not.)
It’s those khan academy questions that goes like ok the startup takes 5 seconds so you
would add 5 seconds to the total.
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
+ Safe computing: risks in dad to day computing use such as being infected with a
virus
+ Loss of privacy
+ Replacement of humans by computing innovations leading to unemployment
+ Dependence on technology
+ Negative health outcomes
● Targeted advertising is intended to help businesses turn a profit, but it incentivizes the
collection of private information and has the potential to be abused.
● Machine learning and data mining have greatly benefitted many fields, but their findings are
also susceptible to biases and may unintentionally contribute to discrimination.
- Socioeconomic
a. people with higher incomes are more likely to be able to purchase and maintain
technology
- Geographic
a. Some areas allow more internet access than another
Educational opportunities
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
- During the 2020 COVID pandemic many schools across the US shifted to virtual
learning systems. Some students without stable internet connections suffered
educationally.
Employment Opportunities
- Those without internet access may be at a disadvantage in terms of finding and
applying for jobs. They also may be hindered from being able to do their jobs or
access resources.
COMPUTING BIAS
Biases are tendencies or inclinations, especially those that are unfair or prejudicial.
Examples of bias:
- Criminal risk assessment tools are used to determine that a defendant will
commit another crime . The algorithms are trained to pick out patterns and make
decisions based on historical data.
- Facial recognition systems are trained on data sets that contain fewer images of
women and minorities.
- Recruiting algorithms can be biased against certain races of gender.
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
CROWDSOURCING
Citizen science: scientific research that the general population helps to conduct.
Ordinary citizens help contribute data to research projects using computing devices.
It’s very easy to access and distribute intellectual property found on the internet but one
of the ways to protect it is through copyright
Public Domain: these are creative works that are free to use without permission
Copyright is the legal right that the creator of a work has to it.
Moral rights: the right to claim authorship or the right to prevent harmful changes
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
If you claimed the said content was your own you are guilty of PLAGIARISM!!
Plagiarism is when you take the content of someone else and claim it as your own.
Creative Commons is a public copyright license that creators use when they want to GIVE
others the right to use their work.
Fair Use allows the use of copyrighted material without permission for limited purposes
such as new reporting.
Open access refers to research available to the general public free of restrictions like
academic journals. They are often free of copyright.
SAFE COMPUTING:
- Search engines can track your search history and use it to suggest websites and
ads which is known as TARGETED MARKETING.
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
- Devices, websites and networks can collect information about a user’s location
like their IP address.
Personally Identifiable Information: This is the information that can be used to identify
you
It includes: age, race, phone number, medical info, biometric data, social security number
Benefits:
- helps enhance your experience online
- The Tik tok for you page rely on collection of personal information
Harms:
- your identity could be stolen
- You could be stalked!
- Companies that collect personal information could put their users at a risk if
they’re hit by a data breach
🦠🪱
program that can gain unauthorized access to something and copy itself. It must
be activated by the user. By contrast worms can operate independently.
- Computer viruses are a type of malware or malicious software that is intended to
damage. It includes ransomware (makes computer inaccessible until a ransom is
paid) and adware (displays unwanted ads to slow down computer)
Protection against malware
Security patch: update to app and fixes bugs
Firewall: monitors incoming traffic but cannot identify and block all malware
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
I. A strong password: string passwords often use a variety of characters such as
uppercase letters, number and symbols
II. Multi factor authentication: way to control who gets access to your accounts by
requiring multiple methods
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
Both of these encryption methods use a key to keep their messages secret
Symmetric key encryption uses one key for both encrypting and decrypting code.
Asymmetric or Public key encryption uses a public key to encrypt but a private key to
decrypt this message.
These are issued by Certificate Authorities (CAs) to trusted sites. They allow other
computers to verify that a website is what it says it is. These certificates are essential to
the public key encryption system because they foster trust between websites. Think of
the certificates to be a little like the signature on a check—once we see that signature,
we know that the check is trustworthy.
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
The sending computer uses the public key of the receiving computer. The sender must
verify the identity behind the public key. The certificate authority verifies their
ownership of the domain, signs it with their own name and public key and returns it.
The user trusts the client trusts the certificate authority trusts the server
Digital certificates contain a copy of the public key from the certificate holder and is
matched to the private key to verify if it’s real.
For example, a creator might have a specific watermark whether it’s a pen name or a
signature. So the digital certificate authorities have a copy of the real one cuz there are a
lot of copycats out there. So the digital certificate authorities fact check to see if they are
real and then lets the user know. :)
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
😉
● You can get like a minimum of 10 wrong and the FRQ exceptionally brilliant if you
want to get that 5 so you DON'T punch your computer
● When doing your practice tests, experiment with one piece of print paper
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
● FRQs should be 3-4 sentences and code SPECIFIC to your code. It’s like that college
essay thing where it should be as if you cover the name then you know whose it
is. DON'T MAKE IT GENERIC
Credits:
This compilation of notes is from our class notes, Princeton, Quizlet and Fiveable. Hats
off to them. By ME and (REDACTED).
∧,,,∧
( ̳• · • ̳)
∧,,,∧
( ̳• · • ̳)
/ づ♡ Ok here's my heart
∧,,,∧
( ̳• · • ̳)
∧,,,∧
( ̳• · • ̳)
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH
•───────•°•❀•°•───────••───────•°•❀•°•───────••───────•°•❀•°•───────•
GOOD LUCK!! :)
STUDY FOR THE AP STUDY FOR THE AP STUDY FOR THE AP STUDY AP OR PERISH