click below
click below
Normal Size Small Size show me how
AP CSP
| Question | Answer | Examples |
|---|---|---|
| Variable and assignments | Stores a value that can change. | score = 10 score = score + 5 # score is now 15 |
| arithmetic expressions | Math using +, −, ×, ÷, etc. | total = 4 * (3+2) |
| Logical expressions (And, Or, Not) | Combines true/false values | age = 16 if age >13 and age <18: print("Teenager") |
| conditionals(If/Else) | Makes decisions in your code | if score >50: print("You pass") else: print("You Fail") |
| Loops(Repeat, while, for) | repeats code multiple times | for i in range(3): print("Hello") |
| LISTS | a group for values in one variable must use [] these brackets | |
| procedures (define, call, parameters, return) | reusable blocks of code (like a mini program) def greet (name): return "Hi" + name print (greet("Sam")) | |
| strings (basic manipulation | a series of characters (text) | word = "hello" print(word.upper()) print(len(word)) |
| code tracing and predicting output | figuring out what a program will do | x = 5 x = x + 3 print(x) |
| abstraction in programs | hides complexity by simplifying | def calculate_tax(price): return price * 0.07 # You don’t need to know how it works every time, just use it. total = calculate_tax(100) # returns 7.0 |
| Binary (bits, bytes) | computers use 1s and os (Called bits) to represent data. 8 bits = 1 byte | |
| Data types (numbers, booleans, strings) | type of data: number: for math boolean: true/false string: text | age = 16 # number is_student = True # boolean name = "Taylor" # string |
| Data storage and compression | saving sata and making it smaller to use less space | A high-res image is compressed before being sent so it loads faster. |
| Lossless vs lossy compression | lossless: no data lost, can restore exactly lossy: some data is lost, smaller file | PNG = lossless JPG = lossy (lower quality, smaller file) |
| Data abstraction (using lists or custom data structures) | organizing data is a simple way (like lists or tables) | student = ["Alice", 16, "A"] # one list holds name, age, grade |
| Filtering and transforming data | filter: keep only what matches a condition transform: change the data | filter: sow only test score > 80 transform: round all scores to nearest 10 |
| Identifying patterns in data | look for trends or repeated behavior | finding that sale for up every December - seasonal pattern |
| Data visualizations (charts, graphs, interpreting data) | showing data visually to make it easier to understand | bar chart of test score makes it easy to compare student performance |
| the internet | a network of connected devices that charge information | you send a message for your phone to a website |
| Ip, DNS, HTTP/HTTPS, TCP | IP (Internet Protocol): Every device has an address like "192.168.1.1". DNS (Domain Name System): Turns website names into IP addresses. HTTP/HTTPS: Rules for how web data is sent (HTTPS is secure). TCP : makes sure all data packets arrive crrcty | When you visit www.google.com, DNS finds its IP, HTTP sends the request, and TCP ensures everything loads fully. |
| Routing and packet-switching | Data is split into small packets and sent through different paths. Routers direct them. | A photo you send is broken into chunks and reassembled on your friend's phone. |
| Fault tolerance and redundancy | The internet keeps working even if part of it breaks, thanks to backup paths (redundancy). | If one router fails, data can still go another way — like GPS rerouting traffic. |
| Parallel and distributed computing (basic understanding) | Parallel: Tasks split among multiple processors Distributed: Tasks split across multiple computers | Google uses many servers to handle billions of searches at once. |
| Cybersecurity | Protecting devices and data from attacks. | |
| Encryption (symmetric & public key) | Symmetric: Same key to lock and unlock data. Public Key: One public key to encrypt, one private key to decrypt. | Online shopping uses public key encryption to secure your payment info. |
| Threats: phishing, malware, DDoS | Phishing: Tricking you into giving personal info Malware: Software that harms your device DDoS: Overloading a website to shut it down | a fake email asks for your password(phishing); clicking it installs malware |
| Safe data practices | way to keep your data secure | Use strong passwords Don’t share personal info Use HTTPS websites Keep software updated |
| Computing innovations and their impact | new technologies that solve problems or improve life | a fitness app helps people track health but might also collect personal data |
| Legal and ethical concerns | rules and moral around how computing is used | it's illegal to copy software without permission; it' unethical to use AI to cheat |
| Data privacy and security | protecting people's personal information online | apps should ask for permission before accessing your location or contects |
| Digital divide and access to technology | the gap between people with and without internet or tech access | students in rural areas may struggle to do online hw due to slow internet |
| Bias in computing and data | when software or data treats some groups unfairly | A facial recognition system might work worse for people with darker skin if it wasn’t trained with diverse images. |
| Crowdsourcing and citizen science | using many people's input to solve problem or gather data | Wikipedia articles are written by volunteers; a bird tracking app collects sightings from the public. |
| Open vs. proprietary software | Open Source: Anyone can view, use, and change the code. Proprietary: Only the company owns and controls the code. | Open: Linux Proprietary: Microsoft Word |