Unit 1-3 AP Comp Sci

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

An ___________ is a sequence of steps that are usually performed by a computer. The ________ doesn't have to be written in any particular programming language or even in a programming language at all

Algorithm

Keylogging

A method of capturing and recording user keystrokes, providing a means to obtain passwords or encryption keys.

There is nothing like say gossip on the AP Exam because they don't have sprites or speech bubbles, but their way of showing this text is:

DISPLAY(gossip())

Strings:

Different characters put together could be words, punctuation marks, numbers, etc.

Paradoxes of Computing

Different media such as photographs, videos, text messages, all are bits Every copy is perfect. So much information online. However that doesn;t mean all information is online.Read friends Moore's law- computers are getting faster and faster as time goes on. Twice as fast every couple years, rising exponentially. Move quickly into the laps of consumers. Explosive growth and how numbers are growing exponentially and doubling at a steady rate. Nothing you put online can go away. Info is shared from company to company. So be careful Bit scan move fast and through many locations. Different countries

Expressions are evaluated to produce a single value. A value can be a number, string, sprite, costume, script, list.

For example 5 + 4 x 3 will be evaluated to a single value of 17.

>

Greater than

>=

Greater than or equal to

Abstraction:

Reducing complexity and simplifying a program.

Automated bots:

Search engines may copy pages they find online and keep a cached version, even if the page itself goes offline.

sms

Short Message Service

Reasons to give up privacy:

Some website you want to visit requires you to sign up, and sends you an email to verify that it's really you. You gain convenience from tailored ads and location services. People today care more about online friendships. Governments need to protect us against bad guys.

Phishing + Malware

Sometimes spam mail is just advertising for products that we don't want—the junk mail of the Internet—but often times spam mail is more sinister, containing phishing attempts and malware attachments. An unaware email user might accidentally reveal their private information or infect their machine, simply by reacting to an email.

Procedures

That's why all programming languages let you make your own procedures, also known as subroutines, functions, or methods. A procedure is a reusable collection of statements.

Web archiving services:

The Internet archive is a non-profit that attempts to make copies of all the pages on the Web, and anyone can use their WaybackMachine to browse their archives.

Secure connection

Uses https:// rather than http:// as its connection protocol, and a locked padlock icon appears on the Security Status bar on the right side of the Address bar.

A _______ is a date type that only has two values, like a light switch. On/off a ______ can only be True or False.

boolean

The _____ block sends out a message where another sprite can receive it and do an action.

broadcast

An ________ is either a constant value ("4" "winter") or a call to a reporter block with any input slots filled in. One or more constants strung together to produce one value.

expression

Using an ______ block changes the value of the counter by 1, beginning with the first input number and ending after the second.

index

A rogue access point

is an access point installed on a network without the network owner's permission. Why is this bad? If an attacker owns the access point, they can intercept the data (e.g. PII) flowing through the network. This is why the coffee shop provided the warning to its customers; they wanted to stop an unauthorized access point on their network from intercepting users' data.

A substring is

just a piece of some existing string. For example, "Hanna", "anna" are each sub-strings of the string "Hannah."

Concatenate

link together

Abstraction by generalization:

looking at chunks of code that are almost the same and writing a single block by using an input to distinguish among the different cases.

Forever block ______ blocks forever.

loops

Computers are really just simple ______ that perform _______ actions through many layers of abstraction.

machines,complex

An expression is a either a constant value (such as "4" or "winter") or a call to a reporter block with any input slots filled in. Such as:

number, 5 + 4 x 3, join who ___ does what ___ who <>

The bad news:

once anything has been published online, it can be very difficult or impossible to delete. That's because of the many copies that might exist, due to mechanisms such as:

||

or

A list is an

ordered set of items

A ________ is the input name, such as number of branches.

parameter

Some people call an algorithm written in human language ___________ or fake code.

pseudo code

You can comment in Snap by

right clicking in the Scripts area and choosing add comment. Best to put comment in hat block as a help message.

You can use _______ to get information about the state of your program while it's running.

say for

A bunch of blocks clicked together is called a _________

script

A string is a

sequence of characters (letters, digits, punctuation, etc.).

SMS

short message service (160 characters)

The good news:

social media networks pretty much always give users an options to delete their posts or their entire account. That should delete the data from the network's servers and from being viewed directly on your profile page.

Malware

software that is intended to damage or disable computers and computer systems.

To concatenate

strings means to make a bigger string by connecting two or more smaller strings.

Who is Claude Shannon?

CLAUDE SHANNON Claude Shannon (1916-2001) is the undisputed founding figure of information and communication theory. While working at Bell Telephone Laboratories after the Second World War, he wrote the seminal paper, "A mathematical theory of communication," which foreshadowed much of the subsequent development of digital technologies. Published in 1948, this paper gave birth to the now-universal realization that the bit is the natural unit of information, and to the use of the term.

Relational:

Compare relationship btw things

in Snap! the "join" block lets you concatenate strings.

(join ___ ___ < >)

Math:

+,1<*,% (MOD (modulus - remainder of a / problem; work w/ integers)

How to Protect Privacy

-Be careful where you click, what you share, make sure you are working in a secure website https, antivirus software, strong passwords,

Algorithms:

-Have a starting point -Have an input -Process something -Have an output -Have a stopping point

What are four debugging tips we learned about in this lab?

-Use pause all to place breaks in your code to see where you went wrong -Keep your space organized delete blocks you don't need and put the codes in groups -Use comments to remind yourself of what each block does -Can use say for to get info about the state of the program

Phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

Cybercrime

An attacker can use PII revealed in public posts to help them steal the identity of a social media user or hack into their accounts. They could also use geolocation information from public posts to physically stalk an individual.

&&

And

An _________ is the input value, such as 6 for a hexagonal pinwheel. The input value is given each time the block is run; it can be a different value each time.

Argument. Input value

Cybercrime

Attackers can use information from public posts to steal identities.

Protect Privacy

Avoid discrimination (e.g., based on HIV status) Allow anonymous political speech Protect personal security (e.g., against stalkers) Restrain exercise of state power (e.g., require warrants) Prevent spread of incorrect information Part of human dignity

!=

Not equal

What are bits?

It is all being reduced to zeroes and ones—"bits." The bits are stashed on disks of home computers and in the data centers of big corporations and government agencies.The disks can hold so many bits that there is no need to pick and choose what gets remembered.

Lists:

Items connected with each other

<

Less than

<=

Less than or equal to

Operators-

Logic operators including tools to perform match functions, select a random number, boolean, etc.

Operators ->

Math, Relational, + - / *

Orange Blocks/Hat Blocks

Orange boxes can be used to detect an event such as clicking on the sprite, pressing a key, or clicking the green flag button. They tell the script to start when that event occurs. Using events to contorl a program is called event-driven programming.

Reporter blocks report messages/values.

Oval shaped blocks

A ________ is the input name, such as number of branches. The input name is set in the block definition. It never changes.

Parameter. Ex. pinwheel, branches

PII

Personally identifiable information, is any data that could potentially be used to identify a particular person.

Automated bots

Search engines can copy stuff too

A procedure is a named sequence of instructions that may take inputs and may report a value. Some languages call procedures methods or functions. Here are two types of procedures you have seen in Snap!:

Reporters- have an oval shape. They report a value. ___ + _____. pick random ___ to ____> list ___ Commands- have a jigsaw puzzle shape. They tell the computer to do something without reporting a value. Say ____. Point in direction ____. broadcast ____

Reputation damage

Reputation can be damaged by what you put online

Echo Chambers

Researchers are also concerned about echo chambers. On social media, people tend to be connected to people with similar ideologies and thus are more likely to see content that aligns with their beliefs. They're also less likely to apply a rigorous accuracy check to that ideologically aligned content, so they are more apt to share it.

Concatenation:

The action of putting together strings.

Web Archiving Services

The internet archive is a non profit that attempts to make copies of all the pages on the Web.

Snap! Window

The whole white rectangle-Stage The character/actor on the stage -Sprite Where you write the code- Scripting Area

Innovations around us that collect data about us.

There are even companies whose sole business is to collect information about you from other companies, large or small, that you use online. (One of the authors looked himself up at Acxiom, one of those companies, and here's what he found. The information circled in red is incorrect.) But the biggest data gatherers are Google, cell phone carriers, Facebook, and the US government.

An ________ is the input value, such as 6 for a hexagonal pinwheel.

argument

A procedure is

a named sequence of instructions that may take inputs and may report a value. Acts like a hat block

Selection:

a. Allows decisions b. All decisions are yes/no c. if;else;switch

Iteration:

a. Repeats conditions b. ex. for, do

Sequencing

a. steps in ordered process b. more than 1 line of code c. call to the library function

Sprite is like an _______.

actor

Looks-

affects the appearance of your sprite such as color and costume.

An ____________ is a sequence of steps that are usually performed by a computer.

algorithm

Control-

allows you to specify things such as what starts and stops your sprites, how you can move the object, conditional operators such as if/then and repetition.

Access points

connect to the Internet via a wired connection but share it wirelessly with many devices like your computer. You can think of access points as translators between the languages of wireless and wired signals.

Motion-

controls the up, down, left, right, and rotation movement of the sprites.

Sensing-

controls to sense if your sprite is touching the edge, another color, another sprite, at a specific X or Y coordinate, the sound volume, etc.

This process of testing, finding problems, and fixing them is called __________.

debugging

Commands:

do something without reporting a value. Each command block corresponds to an action that Snap! already knows how to carry out.

==

equal

Privacy enables us:

to create boundaries and protect ourselves from unwarranted interference in our lives, allowing us to negotiate who we are and how we want to interact with the world around us. Privacy protects us from arbitrary and unjustified use of power by states, companies and other actors.

Change ghost effect by ____ controls...

transparency

Procedural abstraction:

use a procedure to name the idea. For example, given the name who to the idea "pick an item at random from this list of people."

Snap! Has a tool called ______________ that allows you to control how quickly Snap! steps through the blocks of your code.

visible stepping

Echo Chambers

when our sources of information and commentary have all been selected to support our opinions and preferences, we are said to be in an echo chamber. This includes the phenomenon that social media and even search engines tailor what we see using an algorithm designed to please us (what Eli Pariser calls a "filter bubble").


Kaugnay na mga set ng pag-aaral

Chapter 8 TEST: Cellular Respiration:How CEells Make ATP: Energy-Releasing Pathways Biology 1306

View Set

Rounding to the nearest thousand

View Set

Homework 7.1 Explicit and Implicit Costs, and Accounting and Economic Profit

View Set

Sexual Assault Prevention for Undergraduates Post-Course Exam

View Set

Distribution of Sample Means & The Central Limit

View Set

African American History-VT Final Exam

View Set