Unit 6 APCSP

Unit 6 Innovative Technologies

Computing Innovations

  • Definition by College Board

    • Includes computer or program code

    • Examples: self-driving cars, phone apps, smartwatches

  • Not computing innovations

    • Internet cables, Bluetooth technology

Impact of the Internet

  • Changes in society

  • Internet as utility or luxury

  • Commerce changes

    • E-commerce, online storefronts, crowdfunding

  • News consumption changes

Cloud Computing

  • Definition and function

  • Server explanation

  • Advantages of cloud computing

    • Portability, off-site storage

  • Disadvantages

    • Privacy concerns, data transmission issues

Digital Divide

  • Definition and causes

  • Lack of internet access in rural areas

  • Efforts to bridge the digital divide

The Internet

  • Definition and components

  • Ownership and control

  • Bandwidth and scalability

  • Distinction from the World Wide Web

Communication Protocols

  • Definition and purpose

  • Application Layer standards

  • HTTP vs HTML

  • Link Layer and Internet Layer standards

Internet Protocols

  • IP address and its significance

  • Internet Protocol versions (IPv4 and IPv6)

  • Domain name system (DNS) function

Conclusion

  • Importance of understanding innovative technologies and their impact

  • Role of internet and communication protocols in modern society

Page 31

  • Encryption

    • Cryptography is about securing information from third parties.

    • Encryption converts data into a code to prevent unauthorized access.

    • Decryption reverses encryption to reveal the original text.

Page 32

  • Caesar Cipher

    • Example of encryption method.

    • Key: change every letter by 13.

    • Example: "free pizza in the cafeteria" encrypted as "serr cvmmn va gur pnsrgrevn".

Page 33

  • Types of Encryption

    • Symmetric Key Encryption: uses one key for both encryption and decryption.

Page 34

  • Types of Encryption

    • Public Key Encryption: uses a public key for encryption and a private key for decryption.

    • Sender needs recipient's public key to encrypt but recipient uses private key to decrypt.

Page 35

  • Public Key Encryption

    • Recipient knows both public and private keys.

    • Sender only knows recipient's public key.

Page 36

  • Certificate Authorities

    • Issue digital certificates certifying ownership of a public key.

Page 37

  • Cybersecurity

    • Measures to protect computers from unauthorized access.

    • Includes encryption, passwords, and multi-factor authentication.

    • Multi-Factor Authentication requires multiple pieces of evidence for access.

Page 38

  • Net Neutrality

    • Ensures free and open access to information on the internet.

    • ISPs should not control access to websites.

    • Ongoing debate and legal actions on net neutrality.

Page 39

  • Distributed Computing

    • Programs run on multiple devices for complex problems.

    • Parallel Computing breaks programs into smaller pieces for faster processing.

Page 40

  • Sequential vs. Parallel

    • Sequential: steps performed in order.

    • Parallel: some steps performed simultaneously.

Page 41

  • Closed Source vs. Open Source

    • Closed Source: privately owned and proprietary.

    • Open Source: publicly available and free to use.

    • Creative Commons Licensing allows specified use of works.

Page 42

  • Keylogging and Rogue Access Point

    • Keylogging: records keystrokes for data retrieval.

    • Rogue Access Point: gives unauthorized network access.

Page 44

  • Algorithmic Efficiency

    • Measure of computational resources used by an algorithm.

    • Efficiency varies with input size.

    • Polynomial and linear efficiencies run in reasonable time.

Page 46

  • Solvability

    • Problems algorithms aim to solve.

    • Decision and Optimization problems.

    • Some problems are undecidable.

Page 48

  • Undecidable Problems

    • Halting Problem: cannot determine if programs will halt.

    • Some problems have no algorithmic solution for all instances.

Page 49

  • Heuristics

    • Method for deriving approximate solutions.

    • Not perfect but provides a sufficient result.

Page 50

  • Traveling Salesman Problem

    • Requires massive computing power for exhaustive search.

    • Heuristic solutions offer quicker but not optimal results.

Page 52

  • Overflow Errors

    • Occur when a program calculates a number outside the allocated range.

    • Different from rounding errors caused by

robot