View on GitHub

paigemccartin.github.io

Individual repository for Paige

Home Test Prep Data Structures Create Task

Corrections

Finals-Quiz3 (Score: 17/25)

Question Number Wrong Correct Reasoning
1 A B You need the code to match up to the circles center.
2 A B This was only for people under 18. So you can't have less then and 18.
6 D C Algorithm 1 will always work but Algorithm two only works when the max value is -1 or greater.
7 D A I put every number of count, not the final result.
12 C B Repreating it 3 times will cause it to be one square above the grey one.
21 A C It will eventually become 0 because -2 will lead down to 0 not 1.
23 C B I read it as two connections not as two computers.
25 B A This code does not work as intended. It gives the wrong amouunt of points.
Finals-Quiz3 (Score: 40/50)
Question Number Wrong Correct Reasoning
2 A D Not all problems can be validated by a human.
3 C B The first algorithm doesn't work because there is a chance that two people could pair together and have the earliest bday.
17 B C It would return 20 because it picks which is less than the first number on the list.
19 D A We do not have access to the other assignment scores, only the lowest.
23 C D I miss read the data, it is clear that the number of users increases after the mobile app.
29 A D It lands on tails but that doesn’t mean they equal each other.
30 B C World Wide Web is just information while the internet is interconnected computer networks
41 B D Need to decrypt it with the same key used to encrypt it.
45 D B If the user has no internet connection then the files will not be accessible.
47 C D The code segment will set the bonus to score when the score is greater than 100.
Finals-Quiz2 (Score: 44/50)
Question Number Wrong Correct Reasoning
7 A B Lossless compression algorithm and lossy compression algorithm do not relate to keeping data secure.
22 A B IPv6 allows for a greater number of IP addresses than IPv4 does so this means that more devices can be connected.
24 A C If the connection fails on one device then subsequent data will be sent via a different route.
26 C A I read the problem wrong and picked the question that would be the benefit of assembling the team.
35 D C Overflow errors occur when an arithmetic operation results in a value outside the range of numbers that can be represented by a fixed number of bits. So there weren't enough bits to display the value wanted.
46 A C With an online encyclopedia allows people all around the world to share their opinions. So C would be the best choice.
Finals-Quiz1 (Score: 41/50)
Question Number Wrong Correct Reasoning
1 D B I read the problem wrong and thought that it meant most effective.
13 B C The data mentions nothing about the weather so there is no way the data can relate to it.
18 D B Fault-tolerent meant when an error occurs there is a backup plan.
23 D A Cookies can be used to track and collect user information.
24 B A Packet of metadata containing information are transported over the internet.
29 A C Although that list works that is not enough to for a test case.
32 B C The count shouldn't be within the IF statement. So that is why you would switch it out of the function.
44 B A I read the question wrong and thought it said most likely to indicate a phishing attack.
49 C D The action will not affect how frequently visited pages are loaded into Web browsers.
### AP TEST PREP When: May 9th AP EXAM - review college board videos - go over notes from tri 1 and tri 2 - research online, take any practice tests Create Task - Complete create task - Make video to submit ### 5.5-5.6 notes questions 5.5 1. When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in GitHub pages. - Software needs a license - Opensource -> unprotected - Closedsorce -> protected - Creative commons means free and available 2. Make a license for your personal and Team project. Document license you picked and why. GNU GPLv3 license because it is free for everybody. You wouldn’t have to worry about “stealing” patents. 5.6 notes 1. Describe PII you have seen on project in CompSci Principles. PII is information about a person that can be used against you. For the about me pages we had to add in information about ourselves. Everyone put in different information but it was a little summary about us. 2. What are your feelings about PII and your exposure? It is important to know what information is out there and how that information can be used against you. I feel like social media is a big part of how I am exposed. Social media has everything from my name, where I was born, what school I go to, and my birthday. 3. Describe good and bad passwords? What is another step that is used to assist in authentication? Bad passwords are ones that are named after pets, dogs, or sports. Basically, anything that could be found on the internet. Good passwords are ones that are randomized and don't have patterns or anything. Two-step authentication is a good assist. It causes the user to have to confirm on a separate device to allow the first device to proceed. 4. Try to describe Symmetric and Asymmetric encryption. Asymmetric encryption is public where as symmetric encryption is more individual. They both can encrypt and decrypt different things like codes or texts. #### 5.Provide an example of encryption we used in deployment. When someone deploys at their house their IP address is linked to it. A person can go in and search for where that person is. 6. Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques. Phishing for information using what is on the internet. Someone can use a person's social media to get information about a person, This can be used to find out a lot about people, where they live, what school they go to, who their friends are. This is a perfect way for a stalker to get information. ### 5.3-5.4 notes questions 5.3 Racist HP computer The owner thinks that the computer intentionally did not read his face because of the color of his skin. I do not think that it was intentional bias because HP has no reason to do this. I think this happened because there weren’t enough people working on the project. The group working on it could all of been white which would lead to an unintentional bias. I think it could be harmful to something to not work on you for a reason you can’t help. Although that wasn’t the goal it is still hurtful. It should be corrected because it is important to include everyone. Next time to produce better outcomes HP can use crowdsourcing to figure out the problem before putting the product out into the world. 5.4 A type of crowdsourcing could be in our environment could be asking for feedback on a website. Although there is a chance that this could be biased there are still some ways that this relates to crowdsourcing. Del Norte crowdsourcing would be biased to Del Norte students. Although there will be more diversity because not every student is the same there is still a large bias due to the fact that they all go to the same school. This can be seen in a STATs class, they go to random different classes and ask students to complete a survey with classes. This eliminates the bias of picking the people who are taking your survey but still involves bias with the school. For my final project, I can have different students to look at our site and give input to make it better. We could also publish it online to get a bigger group of people to review the website. ### 5.1-5.2 notes questions 1. Come up with three of your own Beneficial and corresponding Harmful Effects of Computing
Three benefits to computing are growing your knowledge, technology, and communication. Computing can become a distraction from the real world. This distraction causes people to lose interest in things in their everyday lives and focus more on the simulations/games. Also if you spend more time on devices it can strain your eyes. One that happens often to teens use computing for social media. This leads to bigger issues of insecurities and comparing yourself to someone online. 2. Talk about dopamine issues above. Real? Parent conspiracy? Anything that is impacting your personal study and success in High School?
Dopamine is a naturally occurring thing that happens to people when they are happy. If a person is getting dopamine too much while playing video games this causes them to lose dopamine for other things. Making video games their only source of happiness. This is bad because the person will have no motivation to do other things that other people do for happiness. 3. How does someone empower themself in a digital world?
To empower yourself into a digital world it is important to stay in touch with everything. The digital world is constantly changing and improving. With it is our knowledge and education. Empowering ourselves into this world allows us to educate ourselves more. 4. How does someone that is empowered help someone that is not empowered? Describe something you could do at Del Norte HS.
Something at Del Norte one can do is when you are in a classroom and see that another student does not have a device you can offer to share your device with them. This allows you both to learn as much as you can even though there is a digital divide. 5. Is paper or red tape blocking digital empowerment? Are there such barriers at Del Norte? Elsewhere?
There is a lot of red tape blocking digital empowerment. Not every school and household are able to afford digital devices. This creates a huge divide between communities that have access and those that do not. At Del Norte, the school blocks a lot of websites that could potentially have educational services to them. This blocks digital empowerment because it doesn’t allow students to certain websites that could have furthered their education.