APCSP - Global Impacts of Computing Quiz

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/138

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:16 PM on 3/24/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

139 Terms

1
New cards

What does meta data allow?

Organizing big pieces of data easier

2
New cards

What can you do to data?

Collect it, use it, and exploit it

3
New cards

What are examples of data?

Surveys, sensors, websites, search engines, bank accounts, shopping recipes, and historical search

4
New cards

What are databases?

Large collections of data, sometimes from the same source and sometimes different sources

5
New cards

What do databases look like?

A spreadsheet with rows and columbns of numerical and categorical data

6
New cards

What is the Structured Query Language (SQL)?

Language that helps computers pull info from databases

7
New cards

Through data collection what can we gather?

Info about facts and patterns

8
New cards

What can data show?

Trends and similarities between events (can determine if human viruses are similar)

9
New cards

What may data not show?

Correlation between variables

10
New cards

What would searching local disk memory do?

Provide access to data only if it is stored locally on a device

11
New cards

What can data be stored on?

External or web based databases or on a separate piece of software

12
New cards

What happens to sensitive data?

Its encrypted

13
New cards

How many bits is the result of the process by which a piece of data is encoded?

Fewer bits than its original file

14
New cards

What have algorithms been designed to?

Compress and encode data

15
New cards

How does data compression work?

Works by algorithm locating repeating patterns in the data and then replacing the patterns with placeholders

16
New cards

What is computational power?

How quickly a computer can perform an operation

Greater computational power -> quicker a system can decompress and stream videos

t's the speed and capacity of a system to perform calculations

17
New cards

What is lossless compression algorithm?

No info is lost between compression of the original file to decompression/extraction of the file

Can identically reconstructs the original file

18
New cards

What is run length encoding?

A method of encodng text that has many repeated characters

19
New cards

What is run length encoding considered to be?

Lossless compression format as the original file can be reconstructed after being compressed

20
New cards

How does run length encoding work?

Specifying the number of times a character or pixel repeats followed by the value of a character/pixel

21
New cards

When is it most efficient to use compression method?

When there are many repetitive pieces of data

22
New cards

How can you compress bbbbcccceeef?

4b4c3e1f

23
New cards

What is Lossy Compression Algorithm?

Compresses file sizes to be much smaller than those compressed using a lossless algorithm

24
New cards

What happens to the original piece of data after the Lossy Compression Algorithm?

It cannot be identically reconstructed

25
New cards

When is Lossy Compression Algorithm used?

When shrinking data size or transmission time is the most important factor to data compression

26
New cards

What are examples of picture encoding formats?

Bitmap (BMP), Portable Network Graphics (PNG), and Joint Photographic Experts (Group - JPEG or JPG)

27
New cards

What are BMPs and PNGs considered as?

Lossless compression

28
New cards

What are the benefits of data compression?

Saves storage space

Enables a faster transmission of data since data is smaller

Storing compressed data is less expensive since less storage space is needed

29
New cards

What is processing data?

Manipulation of data to create meaningful info

30
New cards

What is an example of data organization?

Spreadsheets are one of the main places that programs like to gather input

31
New cards

What is a common way of processing data and why?

Programs because they are capable of gathering a large amount of data as input, searching through the data to see if its usable, and then clustering the data

32
New cards

What does it mean to cluster data?

Organizing the data into groups that have similar content or sources

33
New cards

What can programs create?

Smaller subsets of info from a set of data

34
New cards

What are trending topics?

Ones foudn by searching algorithm that are talked about most during a period of time on a website

35
New cards

What are data filtering systems important tools for?

Finding info and recognizing patterns in data

36
New cards

What are the challenges in processing data?

Data needs to be cleaned, data may be incomplete, data may be invalid, data may need to be combined with other sources

37
New cards

What is easily processed data?

Numbers

38
New cards

What does some data need to be?

Extracted/modified

39
New cards

What is data cleaning (aka data sanitization)?

Modification of data that does not meet the formatting requirements for that type of data

Ex: a number that needs to be a string

40
New cards

What must happen to data before it is used?

It must be cleaned.

41
New cards

What is incomplete data?

Users may abbreviate, shorten, or provide an incorrect type of input in which would then be unsuable in the program

42
New cards

What is an example of invalid data?

A user gave a number data as a string

43
New cards

What is sequential computing?

A model in which operations are performed in order on at a time

44
New cards

When is parallel computing and distributed computing used?

If data sets are too large

45
New cards

What is parallel computing?

Breaking a program into multiple smaller sequential computing operations, some of which are performed simultaneously

46
New cards

What is distributed computing?

Uses multiple devices to run a program

Once a task is completed, each system submits their results and are compiled together

Donate spare computing power to help calculations

47
New cards

What is the con about using sequential computing?

Takes the longest because everything is completed in order

48
New cards

What are the pros about using parallel computing?

Parallel computing is faster than sequential because it does some tasks at the same time

49
New cards

What is the total time when using parallel computing?

The total time is the time for the steps that must be done in order, plus the time for the slowest task being done at the same time

50
New cards

What is the speed up of a parallel solution measured in?

The time it took to complete the task sequentially divided by the time it took to complete the task when done in parallel

51
New cards

What does the size of the set of data that is being processed determine?

How much info can be extracted from it and must be matched by a computing device with enough processing power

52
New cards

What is data decompression/extraction?

Restores the compressed data to its original form

53
New cards

Why are compression and extraction algorithms necessary when working with data?

Compression makes data easier to use because it saves storage space and is less expensive

Extraction algorithms are necessary to use when working with data because it restores the compressed data back to its original form

54
New cards

Explain how computation power relates to compression and extraction algorithms.

Computational power relates to compression and extraction because greater computational power means less time required to decompress and extract information

55
New cards

Explain the difference between lossless and lossy compression algorithms.

Lossless compression algorithms means no information is lost between compression of the original file to decompression of the file

Lossy compression algorithms compress file sizes to be smaller than the files of a lossless compression algorithm and the original file cannot be completely restored

56
New cards

Given the message below, what explains why it wouldn't benefit from being compressed using run length encoding?

bbvvcc

The encoded message would be the same length as the original message

57
New cards

Why is parallel processing so beneficial?

It is beneficial because it allows multiple tasks to be completed at the same time.

It also provides greater amounts of computational power to process large sets of data

58
New cards

What is not an advantage to using a computer to gather and process data?

A computer can hear a dialogue, detect a sarcastic remark, and transcribe the real meaning of the remark

59
New cards

What is NOT an example of a common challenge when processing data?

An age input value

60
New cards

What are examples of data visualizations?

Bar graphs, pie charts, line graphs, scatter plots, and images

61
New cards

What are skewed visualizations?

Visualizations of data can be skewed based on the number of scales plotted on the axes or by leaving out data

62
New cards

What is bias in marketing?

Can come from the company creating the visualization or from the group of programmers who developed the algorithm to express the visualization

63
New cards

What does bias in marketing show?

Info that highlights the positive aspects of their goods

64
New cards

What are limitations to programming?

If an algorithm has a low amount of sources, this limits the quality of data collected

If a program does not have enough data to draw a conclusive result, it will only output what it can

65
New cards

What is bias in programming?

A programmer's bias can sometimes cause inherent bias in the programs that they write

66
New cards

Where can bias in programming be seen?

In the types of inputs a program accepts/recognizes

67
New cards

What are examples of problems for algorithms?

Decidable problem

Unsolvable problem

Undecidable problem

68
New cards

What is a decidable problem?

When an algorithm can be constructed to find a correct solution for all inputs

Is this number even?

69
New cards

What is an unsolvable problem?

One where an algorithm cannot be constructed to find a solution

70
New cards

What is an undecidable problem?

Problem where there isn't an algorithm that could be constructed that will always give an accurate yes/no output for every input

71
New cards

What is an example of an undecidable problem?

Developing a program to find a matching vaccine for the flu vaccine

72
New cards

What is JPEG considered as?

Lossy compression

73
New cards

What is cryptography?

Writing and solving codes

74
New cards

What was the first example of cryptography?

Hieroglyphics carved into monuments from the old kingdom in Ancient Egypt

75
New cards

What is modern cryptography?

Science of storing data securely

76
New cards

What does modern cryptography must have?

Confidentiality and Authenticity

Integrity and Ownership

77
New cards

What is Confidentiality and Authenticity?

Cryptography processes ensure that data is confidential to the parties who need it and can be authentically confirmed and authorized owner of the data

78
New cards

What is Integrity and Ownership?

Cryptography concepts also ensure that info can be controlled by the owners of the secure data and that the integrity remains as the data is viewed or used

79
New cards

Why does cryptography use encryption and decryption?

To store data in a way that makes it incomprehensible

80
New cards

What is encryption?

The process by which a message or a piece of info is changed to read/display something to hide the info's true meaning

81
New cards

What is plaintext turned into?

Ciphertext (encrypted message)

Encoded message will require a key in order to be decrypted

82
New cards

What do certificate authorities issue?

Digital certificates that validate the ownership of encryption used in secure communications

83
New cards

What does decryption do?

Takes the encrypted message and decodes it

84
New cards

What is encoding?

Designed to change the plain text to cipher text

85
New cards

What does decoding an algorithm require?

A cipher text

86
New cards

What are the advantages of symmetric key encryption?

If a large amount of data is being encrypted (and not decrypted by a different company) a symmetric key encryption is very effective

Symmetric key encryption is highly efficient, fast, and ideal for processing large volumes of data due to its use of a single shared key for both encryption and decryption

87
New cards

Where is symmetric key encryption used and why?

When data is encrypted in the hard drive

Hardware storage prevents the key from being exposed in memory, provides tamper-resistance, and allows for extremely fast encryption/decryption of large data volumes

88
New cards

What are the disadvantages of symmetric key encryption?

Keys can exist with multiple parties

Trust issues and key insecurity

89
New cards

Wha is public key encryption?

Different keys used for encryption and decryption

90
New cards

How do you encrypt a message with public key encryption?

A public key is known to everyone

91
New cards

What are encryption methods?

Transposition encryption and substitution encryption

92
New cards

What is transposition encryption?

Takes a message and rearranges the letters

93
New cards

What do you need to know for transposition encryption?

The pattern by which the letters are supposed to be ordered to decode the message

94
New cards

What is substitution encryption?

Replaces letters in the message with new letters, characters or numbers known as cipher text

95
New cards

What do you need to know for substitution encryption?

Need to know how letters are assigned in order to decode the message

96
New cards

In the Caesar Cipher Wheel, what do the letters in the inner circle represent?

Plain text

Work out to in

97
New cards

What is cybersecurity?

Protecting yourself and others from attacks carried out through and by computers

98
New cards

What does every computer and system have?

Vulnerabilities that can allow unauthorized access to personal info

99
New cards

What is a digital footprint?

One form of recorded data

100
New cards

What is personally identifiable info (PII)?

Your name, birthday, address, phone number, etc is part of your PII