Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

AP Computer Science Principles Qs & As 2023/2024, Exercises of Computer Applications

A comprehensive overview of key concepts and terminology related to computer science principles, including high-level and low-level programming languages, machine learning, cryptography, network protocols, and more. It covers a wide range of topics that are commonly tested in the ap computer science principles exam, making it a valuable resource for students preparing for the 2023/2024 academic year. The document delves into the differences between various programming languages, the fundamentals of machine learning, the principles of cryptography, and the inner workings of network protocols like tcp/ip and http. By studying this document, students can gain a deeper understanding of the core concepts and principles that underpin modern computer science, which will not only help them succeed on the ap exam but also provide a solid foundation for further study in the field.

Typology: Exercises

2023/2024

Available from 10/25/2024

Fortis-In-Re
Fortis-In-Re 🇺🇸

1

(1)

2.3K documents

1 / 6

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
AP Computer Science Principles Qs & As 2023/2024
Heuristic - ans-a technique designed for solving a problem more quickly when classic methods are too
slow, or for finding an approximate solution when classic methods fail to find any exact solution
High-Level Programming Language - ans-A high-level language (HLL) is a programming language such as
C, FORTRAN, or Pascal that enables a programmer to write programs that are more independent of a
type of computer. Languages are considered high-level since they are closer to human languages and
further from machine languages.
Low level programming language - ans-Low-level languages those languages which are extremely close
to machine language. aka Assembly languages. The closest languages after Assembly to Machine
language are C and C++. Machine code is known as low level because unlike high level programming
languages it doesn't need anything else like compilers or something. It runs directly on the processor
and they are extremely architecture specific.(not like english)
natural language - ans-Natural-language processing (NLP) is an area of computer science and artificial
intelligence concerned with the interactions between computers and human (natural) languages, in
particular how to program computers to fruitfully process large amounts of natural language data.
machine code - ans-the elemental language of computers. It is read by the computer's central
processing unit (CPU), is composed of digital binary numbers and looks like a very long sequence of
zeros and ones. Ultimately, the source code of every human-readable programming language must be
translated to machine language by a compiler or an interpreter, because binary code is the only
language that computer hardware can understand.
machine learning - ans-Machine learning is a field of computer science that uses statistical techniques to
give computer systems the ability to "learn" (e.g., progressively improve performance on a specific task)
with data, without being explicitly programmed.
lossy - ans-permanently eliminating certain information, especially redundant information. When the
file is uncompressed, only a part of the original information is still there
pf3
pf4
pf5

Partial preview of the text

Download AP Computer Science Principles Qs & As 2023/2024 and more Exercises Computer Applications in PDF only on Docsity!

AP Computer Science Principles Qs & As 2023/

Heuristic - ans-a technique designed for solving a problem more quickly when classic methods are too slow, or for finding an approximate solution when classic methods fail to find any exact solution

High-Level Programming Language - ans-A high-level language (HLL) is a programming language such as C, FORTRAN, or Pascal that enables a programmer to write programs that are more independent of a type of computer. Languages are considered high-level since they are closer to human languages and further from machine languages.

Low level programming language - ans-Low-level languages those languages which are extremely close to machine language. aka Assembly languages. The closest languages after Assembly to Machine language are C and C++. Machine code is known as low level because unlike high level programming languages it doesn't need anything else like compilers or something. It runs directly on the processor and they are extremely architecture specific.(not like english)

natural language - ans-Natural-language processing (NLP) is an area of computer science and artificial intelligence concerned with the interactions between computers and human (natural) languages, in particular how to program computers to fruitfully process large amounts of natural language data.

machine code - ans-the elemental language of computers. It is read by the computer's central processing unit (CPU), is composed of digital binary numbers and looks like a very long sequence of zeros and ones. Ultimately, the source code of every human-readable programming language must be translated to machine language by a compiler or an interpreter, because binary code is the only language that computer hardware can understand.

machine learning - ans-Machine learning is a field of computer science that uses statistical techniques to give computer systems the ability to "learn" (e.g., progressively improve performance on a specific task) with data, without being explicitly programmed.

lossy - ans-permanently eliminating certain information, especially redundant information. When the file is uncompressed, only a part of the original information is still there

lossless - ans-every single bit of data that was originally in the file remains after the file is uncompressed

latency - ans-Latency is the amount of time a message takes to traverse a system. In a computer network, it is an expression of how much time it takes for a packet of data to get from one designated point to another.

public key - ans-A public key is created in public key encryption cryptography that uses asymmetric-key encryption algorithms. Public keys are used to convert a message into an unreadable format. Decryption is carried out using a different, but matching, private key. A public key may be placed in an open access directory for decryption of the digital signature of the sender.

private key - ans-A private key is a tiny bit of code that is paired with a public key to set off algorithms for text encryption and decryption. It is created as part of public key cryptography during asymmetric- key encryption and used to decrypt and transform a message to a readable format. Public and private keys are paired for secure communication, such as email.

undecideable - ans-a decision problem that no algorithm can decide, formalized as an undecidable language or undecidable set.

decidable - ans-capable of being decided. (computer science) describing a set for which there exists an algorithm that will determine whether any element is or is not within the set in a finite amount of time.

reasonable - ans-

unreasonable - ans-

solvable - ans-a problem that can be solved

unsolvable - ans-a problem that cannot be solved

Distributive Denial of Service(DDoS) - ans-Traffic attacks: Traffic flooding attacks send a huge volume of TCP, UDP and ICPM packets to the target. Legitimate requests get lost and these attacks may be accompanied by malware exploitation.

Bandwidth attacks: This DDos attack overloads the target with massive amounts of junk data. This results in a loss of network bandwidth and equipment resources and can lead to a complete denial of service.

Application attacks: Application-layer data messages can deplete resources in the application layer, leaving the target's system services unavailable.

Phishing - ans-a technique used to gain personal information for purposes of identity theft, using fraudulent e-mail messages that appear to come from legitimate businesses

Cache Posioning - ans-the corruption of an Internet server's domain name system table by replacing an Internet address with that of another, rogue address.

String - ans-an arbitrary-length sequence of ASCII characters

Substring - ans-A subset of an alphanumeric field or variable. The substring function in a programming language is used to extract the subset; for example, the programming expression substr(prodcode,4,3) extracts characters 4, 5 and 6 out of a product code field or variable.

crowdsourcing - ans-a process that involves outsourcing tasks to a distributed group of people. These tasks could be online or offline, paid or for free, and they are outsourced to an undefined public, in opposition to traditional outsourcing.

cloud computing - ans-a type of Internet-based computing, where different services —including servers, storage and applications — are delivered to an organization's computers and devices through the Internet.

citizen science - ans-research collaborations between scientists and volunteers, particularly (but not exclusively) to expand opportunities for scientific data collection and to provide access to scientific information for community members.

internet engineering task force - ans-the body that defines standard Internet operating protocols such as TCP/IP.

iterative process - ans-a mathematical procedure that uses an initial guess to generate a sequence of improving approximate solutions for a class of problems, in which the n-th approximation is derived from the previous ones.

incremental process - ans-a method of software development where the product is designed, implemented and tested incrementally (a little more is added each time) until the product is finished

high/low level abstractions - ans-The amount of complexity by which a system is viewed or programmed. The higher the level, the less detail. The lower the level, the more detail. The highest level of abstraction is the entire system. The next level would be a handful of components, and so on, while the lowest level could be millions of objects

Digital Millennium Copy Right - ans-a United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works (commonly known as digital rights management or DRM). It also criminalizes the act of circumventing an access control, whether or not there is actual infringement of copyright itself. In addition, the DMCA heightens the penalties for copyright infringement on the Internet.

Digital Divide - ans-the gap between demographics and regions that have access to modern information and communications technology, and those that don't or have restricted access.

Meta Data - ans-data that describes other data