Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

AP CSP FINAL EXAM REVIEW|2025-2026|ACTUAL 110Qs&As|ALREADY GRADED A+, Exams of Computer Science

AP CSP FINAL EXAM REVIEW|2025-2026|ACTUAL 110Qs&As|ALREADY GRADED A+

Typology: Exams

2024/2025

Available from 06/16/2025

purity-kauri
purity-kauri 🇺🇸

1.1K documents

1 / 19

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
AP CSP FINAL EXAM REVIEW|2025-2026|ACTUAL
110Qs&As|ALREADY GRADED A+
Decimal >>>ANS:->>>-a base-10 number system that uses ten distinct symbols
0-9 to represent numbers.
Binary >>>ANS:->>>-a way of representing information using only two options.
Bit >>>ANS:->>>-a contraction of "binary digit"; the single unit of
information in a computer, typically represented as a 0 or 1
Byte >>>ANS:->>>-the standard fundamental unit (or "chunk size") underlying
most computing systems today. One equals eight bits.
Overflow error >>>ANS:->>>-error from attempting to represent a number that
is too large.
Round-off error >>>ANS:->>>-error from attempting to represent a
number that is too precise. The value is rounded.
Rgb >>>ANS:->>>-the color model that uses varying intensities of red, green,
and blue light added together to produce a broad array of colors.
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13

Partial preview of the text

Download AP CSP FINAL EXAM REVIEW|2025-2026|ACTUAL 110Qs&As|ALREADY GRADED A+ and more Exams Computer Science in PDF only on Docsity!

AP CSP FINAL EXAM REVIEW|2025-2026|ACTUAL

110Qs&As|ALREADY GRADED A+

Decimal >>>ANS:->>>-a base- 10 number system that uses ten distinct symbols 0 - 9 torepresent numbers. Binary >>>ANS:->>>-a way of representing information using only two options. Bit >>>ANS:->>>-a contraction of "binary digit"; the single unit of information in acomputer, typically represented as a 0 or 1 Byte >>>ANS:->>>-the standard fundamental unit (or "chunk size") underlying most computing systems today. One equals eight bits. Overflow error >>>ANS:->>>-error from attempting to represent a number that is too large. Round-off error >>>ANS:->>>-error from attempting to represent a number that is tooprecise. The value is rounded. Rgb >>>ANS:->>>-the color model that uses varying intensities of red, green, and blue light added together to produce a broad array of colors.

Hexadecimal >>>ANS:->>>-a base- 16 number system that uses sixteen distinct symbols 0 - 9 and a-f to represent numbers from 0 to 15. Protocol >>>ANS:->>>-a set of rules governing the exchange or transmission of data between devices. Ascii >>>ANS:->>>-the universally recognized raw text format that any computer can understand. Abstraction >>>ANS:->>>-a simplified representation of something more complex. It allow you to hide details to help you manage complexity, focus on relevant concepts, and reason about problems at a higher level. Image >>>ANS:->>>-a type of data used for graphics or pictures. Pixel >>>ANS:->>>-short for "picture element" it is the fundamental unit of a digital image, typically a tiny square or dot which contains a single point of color of a larger image. Analog data >>>ANS:->>>-data with values that change continuously, or

which one may apply for a patent, copyright, and/or trademark. Creative commons >>>ANS:->>>-a collection of public copyright licenses that enable the free distribution of an otherwise copyrighted work, used when an author wants to give people the right to share, use, and build upon a work that they have created. Open access >>>ANS:->>>-online research output that is free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions. Open source >>>ANS:->>>-computer programs that are made freely available and may be redistributed and modified. Lossy compression >>>ANS:->>>-a compression method in which some of the information is lost or thrown away. This process is not reversible. Path >>>ANS:->>>-the series of connections between computing devices on a network starting with a sender and ending with a receiver. Bandwidth >>>ANS:->>>-the maximum amount of data that can be sent in a

fixed amount of time, usually measured in bits per second. Ip address >>>ANS:->>>-the unique number assigned to each device on the internet. Internet >>>ANS:->>>-a computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols. Router >>>ANS:->>>-a type of computer that forwards data across a network. Redundancy >>>ANS:->>>-the inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network. Fault tolerant >>>ANS:->>>-can continue to function even in the event of individual component failures. This is important because elements of complex systems like acomputer network fail at unexpected times, often in groups. Packet >>>ANS:->>>-a chunk of data sent over a network. Larger messages are divided into packets that may arrive at the destination in order, out-of-order, or not at all.

User interface >>>ANS:->>>-the inputs and outputs that allow a user to interact with apiece of software. Input >>>ANS:->>>-data that are sent to a computer for processing by a program. Output >>>ANS:->>>-any data that are sent from a program to a device. Program statement >>>ANS:->>>-a command or instruction. Sometimes also referred toas "code." Program >>>ANS:->>>-a collection of program statements. Sequential programming >>>ANS:->>>-a description of how program statements run in order, from top to bottom. Event >>>ANS:->>>-an action that occurs when a program is running and supplies input into the program. Comment >>>ANS:->>>-a form of program documentation written into the program to be read by people and which do not affect how a program runs

Pair programming >>>ANS:->>>-a collaborative programming style in which twoprogrammers switch between the roles of writing code and tracking progress. Bug >>>ANS:->>>-an error or deficiency in a computer program. Debugging >>>ANS:->>>-finding and fixing problems in an algorithm or program. Algorithm >>>ANS:->>>-a set of steps used to solve a problem Incremental development >>>ANS:->>>-a software development approach that breaks the process of developing an application into smaller parts. The system may include choosing a topic, designing the user interface, and adding functionality. Iterative development >>>ANS:->>>-a software development approach that uses a system to repeatedly refine your work. The system may include planning, designing, implementing, and testing steps. Bias >>>ANS:->>>-a tendency to believe that some things, people, ideas, etc., are better than others that may result in treating some people unfairly.

Function >>>ANS:->>>-a named group of programming commands. Function call >>>ANS:->>>-a command that executes code within a function. Variable scope >>>ANS:->>>-where in a program's code a variable may be accessed. Global variable >>>ANS:->>>-a variable that can be used anywhere in your code. Create them outside events and other functions at the top of the workspace. Local variable >>>ANS:->>>-can be used only in the part of the code where it was created, like an onevent or function. List >>>ANS:->>>-an ordered collection of data elements stored and accessed in aprogram. Element >>>ANS:->>>-an individual value in a list that is assigned a unique index. Index >>>ANS:->>>-a common method for referencing the elements in a list or string usingsequential numbers.

Append >>>ANS:->>>-add elements to the end of a list. Iterating >>>ANS:->>>-repeating a portion of an algorithm a specified number of times or until a given condition is met. Infinite loop >>>ANS:->>>-occurs when the ending condition of a loop will never evaluate to true Simulation >>>ANS:->>>-imitation of a real world situation that allow us to test solutions or run experiments in a way that is usually cheaper, safer, and often times faster. Traversal >>>ANS:->>>-the process of accessing each item in a list or string one element at a time. Substring >>>ANS:->>>-part of an existing string. Efficiency >>>ANS:->>>-a measure of how many steps are needed to complete an algorithm.

Reasonable time >>>ANS:->>>-algorithms with a polynomial efficiency or lower (constant, linear, square, cube, etc.) Are said to run in a reasonable amount of time. Unreasonable time >>>ANS:->>>-algorithms with exponential or factorial efficiencies are examples of algorithms that run in an unreasonable amount of time. Heuristic >>>ANS:->>>-provides a "good enough" solution to a problem when an actual solution is impractical or impossible. Optimization problem >>>ANS:->>>-a problem with the goal of finding the "best" solution among many (ex, what is the shortest path from a to b?) Undecidable problem >>>ANS:->>>-a problem for which no algorithm can be constructed that is always capable of providing a correct yes-or-no answer. Sequential computing >>>ANS:->>>-a model in which programs run in order, one command at a time. Parallel computing >>>ANS:->>>-a model in which programs are broken into small pieces, some of which are run simultaneously.

Distributed computing >>>ANS:->>>-a model in which programs are run by multiple devices. Speedup >>>ANS:->>>-the time used to complete a task sequentially divided by the time to complete a task in parallel. Application programming interface (api) >>>ANS:->>>-documentation that specifies how functions in a library behave and can be used. Correlation >>>ANS:->>>-a relationship between two things, typically referring to the amount that one varies in relation to the other. Causation >>>ANS:->>>-the action of causing something. Metadata >>>ANS:->>>-data about data Cleaning data >>>ANS:->>>-the process that makes data uniform without changing its meaning (e.g., replacing all equivalent abbreviations, spellings, and capitalizations with the same word).

Citizen science >>>ANS:->>>-scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices. Crowdsourcing >>>ANS:->>>-the practice of obtaining input or information from a large number of people via the internet. Machine learning >>>ANS:->>>-how computers recognize patterns and make decisions without being explicitly programmed. Data bias >>>ANS:->>>-data that does not accurately reflect the full population or phenomenon being studied. Computing innovation >>>ANS:->>>-includes a program as an integral part of its function. Can be physical (e.g. Self-driving car), non-physical computing software (e.g. Picture editing software), or non-physical computing concepts (e.g., e-commerce). Data mining >>>ANS:->>>-the practice of analyzing large databases in order to find patterns and relationships to generate some new information. Data mining may be used to access a user's password by guessing based on publicly available

information about the user. Decryption >>>ANS:->>>-the process that takes a secret message and reproduces the original plain text. Encryption >>>ANS:->>>-the process of encoding messages to keep them secret, so only "authorized" parties can read it. Keylogging >>>ANS:->>>-the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information. Malware >>>ANS:->>>-software intended to damage a computing system or to take partial control over its operation. Multi-factor authentication >>>ANS:->>>-a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access. Personally identifiable information (pii) >>>ANS:->>>-information about an individual that identifies, links, relates, or describes them.

Public key encryption >>>ANS:->>>-encryption method that pairs a public key for encryption and a private key for decryption. The sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message. Rogue access point >>>ANS:->>>-a wireless access point that gives unauthorized access to secure networks. Symmetric key encryption >>>ANS:->>>-encryption method that involves one key for both encryption and decryption. Virus >>>ANS:->>>-a malicious program that can copy itself and gain access to acomputer in an unauthorized way.