Home | Test Prep | Project Documentation | Create Task Documentation | Final Review |
TPT
Final
Quiz 1 Score: 39/50
Qui 2 Score: 41/50
Quiz Corrections
Finals Quiz 1
| Question # | Correction | | ————- | ——–| | 10 | Correct Answer: B. Storing information from the call session does not make it easier for individuals to trick the system. | | 20 | Correct Answer: C. Each list may contain the same book. When the lists are combined, there may be duplicates. Because the Combine procedure is called on newList after the RemoveDuplicates procedure, there is no assurance that newList has no duplicates. | | 25 | Correct Answer: D. Statement III indicates that it would be better for the author to use a Creative Commons license because the author wants to allow permission to use and modify the e-book. | | 26 | Correct Answer: C. To determine the topics that many users are posting about| | 27 | Correct Answer: A. In order to answer this question, the data set would need to include information from students with majors other than computer science and would need to store each student’s major.| | 28 | Correct Answer: D. There are trade-offs involved in choosing a compression technique for storing and transmitting data.| | 32 | Correct Answer: C. Moving the statement in line 5 so that it appears between lines 2 and 3| | 36 | Correct Answer: A. The database does not store information about individual sales, nor does it store information about gender.| | 37 | Correct Answer: D. x = 3, y = 2, z = 1| | 42 | Correct Answer: A. 1001 0100| | 50 | Correct Answer: C. By converting the red, green, and blue values in each pixel into a single number, information has been lost that cannot be restored.|
Finals Quiz 2
| Question # | Correction | | ————- | ——–| | 12 | Correct Answer: D. Conversion formulas between units are well known, so they would not require updates or contributions from a large number of users. | | 14 | Correct Answer: A. The two line graphs are roughly the same shape, indicating that the average amount of data stored per user remained about the same across all eight years.| | 18 | Correct Answer: D. After initializing result to 2, the code segment multiplies result by 5 a total of three times rather than multiplying result by 3 a total of five times. This yields the result 2(53). | | 26 | Correct Answer: A. Having a variety of perspectives represented on a team can help team members identify and address human biases that can occur in the algorithms or data used in the software.| | 31 | Correct Answer: A. The binary RGB triplet for neutral gray is (01111111, 01111111, 01110000).| | 35 | Correct Answer: C. While fractions are sometimes represented by decimal approximations that are subject to rounding errors, integers are not.| | 40 | Correct Answer: D. The work may be distributed to amateur or nonprofessional individuals, who are not likely to have training in complex research methods.| | 43 | Correct Answer: A. The desired information cannot be determined with these two spreadsheets because students with grade point averages of 3.5 or less cannot be identified.|
Overall Study Plan for the AP Exam
Main points 1) Colaborte with my team members and ask questions
2) Review all previous CollegeBoard notes
3) Review all previous CollegeBoard exams/quizzes, specifically missed questions
Daily Plan Monday: Watch a lecture video on CollegeBoard
Tuesday: In class MCQ
Wednesday: Watch a lecture video on CollegeBoard
Thursday: In class MCQ
Friday: Review past CollegeBoard assessments
5.1 and 5.2 Notes
5.1 Beneficial and Harmful Effects of Computing Innovations
- Accelerometers
-
- Part of the automobile industry; chip that detects acceleration, motion and orientation
-
- Used for Airbag deployment and lateral movement detection
-
- Wii controllers, iPhones and Drones use these
-
-
- Benefits : Deliveries, finding lost people
-
-
-
- Harm: Flying in unregulated zones, privacy concerns
-
- 3D printers
-
- Open-source software
-
- Present in schools and homes
-
- New classes developed for 3D printing
-
- Can create shoes, jewelry, etc.
5.2
- The internet originally made for scientists
-
- Now can lead to sleep deprivation, depression, anxiety
-
- COMPUTING INNOVATIONS CAN BE USED IN WAYS OTHER THAN INTENDED BY CREATORS
- Microtransactions
-
- Any purchase made in a game
-
- Typically in free games/apps
-
- These can cause a casino effect because you don’t realize how much money you are spending
-
- Loot boxes GAMBLING
5.1
Come up with three of your own Beneficial and corresponding Harmful Effects of Computing
Three benificial effects of computing could be making education more acessable, allowing the spread of information more easiliy, and creating jobs centered around computing. On the other hand, three harmful effects of computing could be information leaks, the quick spread of false information, and online scamming.
Talk about dopamine issues above. Real? Parent conspiracy? Anything that is impacting your personal study and success in High School?
Dopamine issues are a real thing and with computing, these issues are becoming much more widespread. Personally, I struggle with procrastination in school due to social media apps such as Tik Tok, Snapchat, and Instagram. These apps give me a rush of dopamine so instead of gettin gmy work done I continue to scroll untill the last minuite.
5.2
How does someone empower themself in a digital world?
Someone could empowe themself in a digital world through making connections, learning new information, and spreading their ideas. Computing and the digitial world has made a lot of these things much easier.
How does someone that is empowered help someone that is not empowered? Describe something you could do at Del Norte HS.
Someone that is empowered could help someone that is not empowered by sharing information. At Del Norte, I could help a classmate that is struggling by providing them with my solutions to their issues. For example, in computer science, I could show my classmates how I solved a problem.
Is paper or red tape blocking digital empowerment? Are there such barriers at Del Norte? Elsewhere?
I belive red tape is blocking digital empowerment. At Del Norte we might not experience this as much as we are in a very privaleged position when is comes to technology, but in other places many students don’t have the same acess to computers, therefore they can not be digitally empowered.
5.3 and 5.4 Notes
5.3
- Effects and Digital Divide
-
- Differing access to computing devices and the internet
-
-
- Socioeconomic groups
-
-
-
- Geographic characteristics
-
-
-
- Demographic characteristics
-
-
-
- Age
-
-
-
- Religion
-
-
-
- Between countries
-
-
-
- Protect government
-
5.4
- Library - A collection of functions you can use in your own program
-
- Python libraries default
-
- Imports are usually libraries
- Random Values
-
- Computer able to generate a random value
-
- Random (a,b)
- Simulations
- Algorithm
-
- You can make a simulation algorithm, churn data in, computer churns data out
5.3
Does the owner of the computer think this was intentional?
No, the owner of the computer does not think this was intentional. He recognizes that this was most likley an oversight but wants to call out the company on their mistake.
How do you think this happened?
I think this happened because HP didn’t croudsource and test the feauture on different demographics/skintones.
Is this harmful? Was it intended to be harmful or exclude? Should it be corrected?
This could be harful as an entire group of people can not use a feature on the computer. I don’t think HP intended for this to be harmful and exlude people, I belive this was most likley an accident. This feature should be corrected as soon as possible, it is unprofessional to make a mistale like this but it happens.
What would you or should you do to produce a better outcome?
To produce a better outcome, you should croudsource and test features will all sorts of people.
5.4
CompSci has 150 principles students. Describe a crowdsource idea and how you might initiate it in our environment?
One croud source idea I have is getting everybodys favorite subject to find the most popular subject at our school. I could initiate this in our enviornment by setting up a database to hold all the information and having people insert their name and favorite subject.
What about Del Norte crowdsourcing? Could your final project be better with crowdsourcing?
For Del Norte croudsourcing I could do something similar, with our final project, we could use croudsourcing to have people test the site on different computers and look for bugs.
5.5
Notes
- Legal and ethical concerns
-
- Intellectual property (IP)
-
-
- A work of invention that is the result of creativity to which one has rights
-
-
- Copyright
-
-
- Protects your IP and keeps anyone from using it, unless you give them your permission
-
-
-
- Plagarism: presenting material as your own
-
-
-
- Legal ways to use something not your own:
-
-
-
-
- Creative Commons
-
-
-
-
-
-
- Provides free licenses that you can use to tell others how to use your creation
-
-
-
-
-
-
-
- Clearly tells others what they can/cannot do with your IP
-
-
-
-
-
-
- Open source
-
-
-
-
-
-
- Programs made freely available for anyone to use and may be redistributed and modified
-
-
-
-
-
-
- Open access
-
-
-
-
-
-
- Online research output free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions
-
-
-
-
-
-
- Digital divide: unequal distribution of access to technology
-
-
Questions
When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in GitHub pages.
Make a license for your personal and Team project. Document license you picked and why.
The license our team picked was the Creative Commons Zero v1.0 Universal because we want this project to help people with code and using snippets of our code is a good tool to have. We like the fact that it will be in public domain. The document license we picked was the Open Source MIT License because it allows us to use other code and distribute closed source versions.
5.6
Notes
- Personally Identifiable Information (PII)
- Websites maintain a history of what you search
-
- Used to suggest other websites you may like or for targeted marketing
-
- Location may be collected
- Risk to Privacy
-
- Information on the internet is hard to delete
Questions
Describe PII you have seen on project in CompSci Principles.
PII stands for Personally Identifiable Information. An example of this in CompSci Principles is the CRUD database where we stored students emails, names, counsours, etc.
What are your feelings about PII and your exposure?
I think that PII can be very dangerours when it comes to sensitive information, personal information, for example, it is not good to have online. At the same time PII can be very usful in a number of different ways.
Describe good and bad passwords? What is another step that is used to assist in authentication.
Good passwords are a mix of numbers, symbols, and letters. When you have a good password it should be hard to guess and lengthy enough to rule out anything simple. A bad password is any sort of information related to you or your life, you should not have any personal information in a password. Another step used to assist in authentication is email verification.
Try to describe Symmetric and Asymmetric encryption.
Symmetric encyroption is when theres one key that is used to encrypt and decyrpt electronic data. On the other hand, Asymmetric encryption is when there is a pair of keys, one private and one public, that can encrypt and decyrpt information and secure the data.
Provide and example of encryption we used in deployment.
An example of encryption we used in deployment is SSL, using both symmetric and asymmetric encryption.
Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.
I have never learned about a phishing scheme the hard way. One phicing technique that could be used is “download” buttons that instead download malware on your computer.