Home | TPT Notes + Github Pages Actions | Key Learnings in Replit | Data Structures Project | Create Task Project | AP Testers Documentation |
Extra Credit for Acting/Skit/Improv (ASI): 0 to +2 in Seed, Everyone must participate, -1 for not participating. Teacher interested in evaluation by crossover on how the student did in this activity (0, .5, .75, 1) as team, (-1, .5, .75, 1) as individual. This should be in relation to other ASIs. Donuts to winning Team.
MCQ live result > 50%, (1 or 0)
- Score was 44/50, or 88%.
Github Pages Link: Link ———————————————————-
Study Plan Monday –> Finalize Create Task further Tuesday –> Take Quiz 3 MCQ Wednesday –> Do Quiz 3 MCQ Corrections, Finalize review ticket Thursday –> Finalize review ticket Friday –> Submit Create Task after Crossover Review ———————————————————————–
Create Task and Create Task Crossover Review comments (completed by Thu)
Reviewed By: Dylan Luo
Comments:
Quiz3 MCQ results and test corrections
Quiz 3 Corrections
Question 6: Which of the following algorithms display all integers between 1 and 20, inclusive, that are not divisible by 3 ? Correct Answer: A and D. C is not correct because it does not display all integers between 1 and 20 that are not divisible by 3.
Question 7: Which of the following best describes the value returned by the procedure? Correct Answer: D.
Question 12: Which of the following best describes the impact of Creative Commons? Correct Answer: Creative Commons gives creators of digital content the ability to indicate how their works can be legally used and distributed, enabling broad access to digital information.
Question 34: For which of the following situations would it be best to use a heuristic in order to find a solution that runs in a reasonable amount of time? Correct Answer: Finding the fastest route that visits every location among n locations, which requires n! possible routes be examined.
Question 46: Which of the following is an example of symmetric encryption? Correct Answer: Finn and Gwen develop a system that maps each letter of the alphabet to a unique symbol using a secret key. Finn uses the key to write a message to Gwen where each letter is replaced with the corresponding symbol. Gwen uses the key to map each symbol back to the original letter.
Study Plan:
Monday –> Begin Finalizing Create Task, Go through CollegeBoard videos Unit 1 and Unit 2
Tuesday –> Take Quiz 1 for whole period; at home finish up Create Task, Go through CollegeBoard videos Unit 3 and Unit 4
Wednesday –> Create Review Ticket, Do Quiz 1 Corrections, Go through CollegeBoard videos Unit 5
Thursday –> Take Quiz 2 for whole period
Friday –> Do Quiz 2 Corrections, Completely Finalize Create Task and be ready to submit on CollegeBoard
Weekend –> Finalize Create Task and Submit over Weekend
Quiz 1 Score: 41/50
Quiz 1 Corrections
Question 20:
Correct Answer: A. This is the correct answer as it firstly combines the two lists, then sorts them so that they are in alphabetical order, then removes the duplicates finally to meet the requirements. The other answers do not do this properly.
Question 21: Which of the following best describes the relationship between the World Wide Web and the Internet?
Correct Answer: C, the World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet. This is true because the Internet is a network and the Web contains data that can be accessed by it.
Question 23: Which of the folliwng has the greatest potential for compromising a user’s personal privacy?
Correct Answer: A, a group of cookies stored by the user’s Web browser. This is true because cookies store personal info and a public key is supposed to be public, so that is an incorrect answer.
Question 29:
Correct Answer: C. The conclusion is incorrect, using the test case [0,1,4,5] is not sufficient to conclude the program is correct. A test case that has numbers in increasing order still do not work, so the answer must be C.
Question 37:
Correct Answer: D is the correct answer. The max would be given as 3 as D (correct), but would also be given as 1 later in the function.
Question 39:
Correct Answer: C, this is correct because you can run the Y and Z processor, then run the Y processor again which will take 80 seconds.
Question 44: Which of the following is LEAST likely to indicate a phishing attack?
Correct Answer: A, an email from your bank is less likely to be a phishing attack than an email from a merchant.
Question 46: Which of the following is a primary reason for the use of open protocols on the Internet?
Correct Answer: D, Open protocols provide a way to standardize data transmission between different devices.
Question 48: What is the minimum number of connections that would need to be removed from the network in order for device A to not be able to communicate with device F?
Correct Answer: 2 connections
Quiz 2 Score: 48/50
Quiz 2 Corrections:
Question 24: Which of the following best describes a direct benefit in using redundant routing on the Internet?
Correct Answer: C, Redundancy often allows messages to be sent on the network even if some network devices or connections have failed. This is true because redundancy is like a backup related to fault tolerant networks, so that means that it will allow message to be sent even if some connections have failed.
Question 32: A video game character can face toward one of four directions: north, south, east, and west. Each direction is stored in memory as a sequence of four bits. A new version of the game is created in which the character can face toward one of eight directions, adding northwest, northeast, southwest, and southeast to the original four possibilities. Which of the following statements is true about how the eight directions must be stored in memory?
Correct Answer: D, Four bits are enough to store the eight directions. This is true because there are 8 directions and 2^4 = 16 so it would be able to store up to a max of 16 directions.