Home | Test Prep | Project Documentation | Create Task Documentation | Final Documentation |
TPT
Overall Study Plan for the AP Exam
Main points
1) Seek help by asking questions
2) Review all CollegeBoard notes I’ve taken so far from all trimesters
3) Review all CollegeBoard exams/quizzes I’ve taken so far from all trimesters
Daily Plan
Monday: Watch a lecture video on CollegeBoard (start at unit one day 1 and so forth)
Tuesday: In class MCQ
Wednesday: Watch a lecture video on CollegeBoard (start at unit one day 1 and so forth)
Thursday: In class MCQ
Friday: Review past CollegeBoard assessments (start at the first one and so forth)
Create Task Plan
Click to view my completed create task outline
Quiz Corrections
Finals Quiz 1
Question # | Problem | Correction |
---|---|---|
23 | Correct Answer: A. The aggregation of information in browser cookies can be used by websites that the user visits to track the user and collect information about the user. | |
26 | Correct Answer: C. To determine the topics that many users are posting about. | |
27 | Correct Answer: B. The data set stores information about an individual student’s gender and state. This information can be aggregated to extract information about the percentage of female majors in each state. | |
45 | Correct Answer: C. The cost of a given product is not tracked by the described search engine. | |
48 | Correct Answer: A. Removing the connections between C and F and between F and H will prevent devices A and F from communicating. |
Finals Quiz 2
Question # | Problem | Correction |
---|---|---|
35 | Correct Answer: C. Overflow errors occur when an arithmetic operation results in a value outside the range of numbers that can be represented by a fixed number of bits. | |
50 | Correct Answer: D. The average total points earned per student can be determined using the result of the total points calculation for each student. The average increase in total points per student as a result of the score replacement policy can be determined by calculating the differences between each student score before and after the replacement policy was applied. |
Finals Quiz 3
Question # | Problem | Correction |
---|---|---|
23 | Correct Answer: D. The average number of characters per message appears to decrease after the mobile app was released. | |
24 | Correct Answer: D. The algorithm continues past the first check if the time is during business hours, the algorithm continues past the second check if the gate sensor is activated, and the algorithm continues past the third check if the gate is not open. Performing the checks in this order will ensure that the gate is opened only under the appropriate conditions. | |
25 | Correct Answer: B. Devices B and C must be completely cut off from each other for them to no longer communicate. Removing any three connections will not prevent devices B and C from communicating. However, if connections B-A, B-D, B-E, and B-G are removed (or C-A, C-D, C-F, and C-I), then devices B and C can no longer communicate. | |
28 | Correct Answer: C. From years 1 to 5, the number of registered users roughly doubled each year. From years 5 to 8, the number of registered users increased by about 100 million each year. | |
35 | Correct Answer: D. If the album was purchased and downloaded through a licensed music store, the user will not be in violation of the DMCA. | |
50 | Correct Answer: A. The variable first is initially assigned the value 100 and the variable second is initially assigned the value 200. Next, temp is assigned the value of first, which is 100. Next, second is assigned the value of temp, which is 100. Last, first is assigned the value of second, which is 100. After execution, both first and second have the value 100. |
Topics
5.1
Notes
- Wii came before the iPhone and they both have accelerometers in them
-
- Accelerometers
-
-
- Automobile industry drove price down
-
-
-
- Used for airbag deployment and lateral movement detection
-
-
-
- Quadcopter “brain”
-
- Beneficial and Harmful Effects
-
- Multiroter
-
-
- Benefit: Deliveries, finding lost people, aerial photography is easy
-
-
-
- Harms: Flying in unregulated zones is dangerous and illegal, privacy concerns
-
-
- Wii Controller
-
-
- Benefit: Gets people active in playing video games
-
-
-
- Harms: Broken TVs and injuries
-
- 3D Printers
-
- Open-source software for the computer and printer
-
- In schools and homes
-
- New classes developed for 3D printing
-
- Special 3D printers can make
-
-
- Organs/Prosthetics
-
-
-
- Houses
-
-
-
- Shoes and jewelry
-
-
-
- Themselves
-
Questions
Come up with three of your own Beneficial and corresponding Harmful Effects of Computing
Three beneficial effects of computing are being able to contact to people all over the world, further your education online, and making money online. Three corresponding harmful effectss are meeting somebody dangerous online, recieving fake information, and getting hacked or scammed.
Talk about dopamine issues above. Real? Parent conspiracy? Anything that is impacting your personal study and success in High School?
Yes, personally, I struggle with procrastination. Pushing off my homework to keep my dopamine levels higher is something that I do almost every day. If I didn’t have this issue, I would be able to complete my schoolwork and homework faster,
5.2
Notes
- Digital Divide
-
- Socioeconomic
-
- Geographic
-
- Demographic include, but not limited to
-
-
- Age
-
-
-
- Religion
-
-
-
- Countries
-
-
- In some countries:
-
-
- Computers are not common in rural areas
-
-
-
- Only a small number of websites
-
-
-
- Internet is used to protect and advocate the government
-
-
-
- High level of surveillance on the internet to protect the government
-
Questions
How does someone empower themself in a digital world?
In a digital world, you can empower yourself by learning new things, meeting new people, and giving others some of your knowledge on the internet. You can then apply these skills in the real world.
How does someone that is empowered help someone that is not empowered? Describe something you could do at Del Norte HS.
Someone who is empowered can help someone who is not empowered by lending them some advice, help, or knowledge. Learning from each other is vital to lifting each other up and empowering each other. At Del Norte HS, I could help a confused classmate with their classwork or homework to make them feel more empowered.
Is paper or red tape blocking digital empowerment? Are there such barriers at Del Norte? Elsewhere?
Red tape is blocking digital empowerment. At Del Norte, I would say that there are very few barriers because we have a lot of access to the internet and technology. For instance, in our computer science classroom, we have extra computers that aren’t even in use. I would say that there are barriers elsewhere becasue some areas lack sufficient technology supplies to become digitally empowered.
5.3
Notes
- Computing Bias
-
- Netflix
-
-
- Explicit Data
-
-
-
-
- Thumbs
-
-
-
-
-
- Name, Address, etc.
-
-
-
-
- Implicit Data
-
-
-
-
- When you watch
-
-
-
-
-
- What you binge(d)
-
-
-
-
-
- Style of show frequently selected
-
-
-
-
- Bias
-
-
-
-
- Netflix exclusive features are ahead of most
-
-
-
-
-
- Subscriptions
-
-
-
- Hypotherical Loan Compay
-
-
- Creating software to assist loan officers
-
-
-
- Find trends in successful loans
-
-
-
- Reject those who don’t fit their trends:
-
-
-
-
- Age
-
-
-
-
-
- Gender
-
-
-
-
-
- Race/ethnicity
-
-
-
- Biases can be embedded at all levels of software development
-
-
- All software can be biased (intentionally or unintentionally)
-
-
-
-
- Casual vs Sweaty
-
-
-
-
-
- Youtube kids
-
-
-
-
-
- Facebook vs Instagram vs Snapchat/TikTok
-
-
-
-
-
- WeChat/KakaoTalk
-
-
-
-
- Questions to ask about bias:
-
-
-
-
- Enhancing or intentionally excluding?
-
-
-
-
-
- Intentionally hateful/harmful?
-
-
-
-
-
- Receiving feedback from a wide variety of people?
-
-
-
-
- Google home/amazon echo
-
Questions
Watch the video… HP computers are racist
Come up with some thoughts on the video and be ready to discuss them as I call on you. Here are some ideas…
Does the owner of the computer think this was intentional?
No, I believe the owner of the computer doesn’t think this was intentional, but he wants to bring light to the exclusion he’s facing.
If yes or no, justify you conclusion.
I think no because I believe the compuuter owner thinks that HP didn’t conduct enough testing on different types of people rather than HP being racist.
How do you think this happened?
I think this happened because HP didn’t test their camera software with a diverse group of people. This is what led to the software only working on lighter skin tones.
Is this harmful? Was it intended to be harmful or exclude?
Yes, this is very harmful. I believe it wasn’t intended to be harmful or to exclude, but it ended up excluding a large group of people just becausue of their skin color.
Should it be corrected?
Yes, this error should be corrected so that HP computers are inclusuive of all users.
What would you or should you do to produce a better outcome?
To produce a better outcome, I believe HP should test their camera software on all races and skin colors. This will ensure the software works for all different types of people, regardless of skin color.
5.4
Notes
- Crowdsourcing: where individuals obtain goods/information from a service of a large amount of people
-
- Public Data Sets
-
-
- Kaggle
-
-
-
- Google Public Datasets
-
-
-
- Data.gov
-
-
-
- Your local government
-
-
- Distributed Computing
-
-
- Donate spare computer power to help calculations
-
-
- Innovations made possible
-
-
- Spotify
-
-
-
-
- Collaborative playlists
-
-
-
-
-
- Algorithm
-
-
-
-
-
- Meta-data write in
-
-
Questions
CompSci has 150 principles students. Describe a crowdsource idea and how you might initiate it in our environment?
A crowdsource idea could be determining the most popular school lunch food. I could initiate this by conducting a web survey in our classroom and then input the responses into a database.
What about Del Norte crowdsourcing? Could your final project be better with crowdsourcing?
Yes, my final product could be better with crowdsourcing because I could get input from other students. I could also get ideas that I may have never been able to think of.
5.5
Notes
- Legal and ethical concerns
-
- Intellectual property (IP)
-
-
- A work of invention that is the result of creativity to which one has rights
-
-
- Copyright
-
-
- Protects your IP and keeps anyone from using it, unless you give them your permission
-
-
-
- Plagarism: presenting material as your own
-
-
-
- Legal ways to use something not your own:
-
-
-
-
- Creative Commons
-
-
-
-
-
-
- Provides free licenses that you can use to tell others how to use your creation
-
-
-
-
-
-
-
- Clearly tells others what they can/cannot do with your IP
-
-
-
-
-
-
- Open source
-
-
-
-
-
-
- Programs made freely available for anyone to use and may be redistributed and modified
-
-
-
-
-
-
- Open access
-
-
-
-
-
-
- Online research output free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions
-
-
-
-
-
-
- Digital divide: unequal distribution of access to technology
-
-
Questions
When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in GitHub pages.
(notes above)
Make a license for your personal and Team project. Document license you picked and why.
Our team project chose Creative Commons Zero v1.0 Universal because we liked that it dedicates it to the world-wide public domain. For my personal project, I chose the Open Source MIT License because I liked that it allows using code freely and making/distributing closed source versions.
5.6
Notes
- Personally Identifiable Information (PII)
- Websites maintain a history of what you search
-
- Used to suggest other websites you may like or for targeted marketing
-
- Location may be collected
- Risk to Privacy
-
- Information on the internet is hard to delete
Questions
Describe PII you have seen on project in CompSci Principles.
PII is Personally Identifiable Information. I have seen PII on projects its CompSci Principles in passwords, names, emails, and phone numbers in the CRUD database.
What are your feelings about PII and your exposure?
I feel that PII is important for identification and personal use, but I feel like it can sometimes be dangerous to have your PII available to other users on the internet. For example, a credit card would be bad PII for the public to see.
Describe good and bad passwords? What is another step that is used to assist in authentication.
Good passwords have uppercase, lowercase, symbol, and number characters. Bad passwords have only one form of characters or have something that identifies you in them; for example, a pet or your mom’s name. Another step that is used to assist in authentication is multi factor authentication (using another device to verify your identity) or biometrics.
Try to describe Symmetric and Asymmetric encryption.
Symmetric encrytion happens when there’s only one key, which is secret, and this key is used to decrypt and encrypt electronic data/information. Asymmetric encryption/cryptography happens when there’s a pair of related keys, including one private and one public. These are used to decrypt and encrypt information to protect it from unauthorized use/access.
Provide and example of encryption we used in deployment.
In deployment, an example of encryption we used in deployment is SSL, which uses both symmetric and asymmetric encryption.
Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.
A phishing scheme I’ve learned about the hard way happened when I tried to watch a movie on a poor website. When I clicked on the movie, an “ad” popped up and asked me to download the movie, so I clicked it. Then, malware was downloaded onto my computer. Another phishing technique could be fake websites that steal your credit card information/other PII after you enter it.