zuai-logo
zuai-logo
  1. AP Computer Science Principles
FlashcardFlashcard
Study GuideStudy GuideQuestion BankQuestion Bank

What are the differences between lists and dictionaries?

Lists: ordered collections, accessed by index | Dictionaries: unordered, accessed by keys.

Flip to see [answer/question]
Flip to see [answer/question]
Revise later
SpaceTo flip
If confident

All Flashcards

What are the differences between lists and dictionaries?

Lists: ordered collections, accessed by index | Dictionaries: unordered, accessed by keys.

What are the differences between linear search and binary search?

Linear Search: Checks each element one by one | Binary Search: Efficient for sorted lists, divides search space in half.

What are the differences between functions and procedures?

Functions: Return values | Procedures: Don't always return values.

What are the differences between HTTP and HTTPS?

HTTP: Transfers web pages without encryption | HTTPS: Secure version with encryption.

What are the differences between TCP and IP?

TCP: Ensures reliable data delivery | IP: Handles addressing.

What are the differences between iteration and sequence?

Iteration: Repeats a block of code | Sequence: Instructions executed in order.

What are the differences between syntax and logic errors?

Syntax Errors: Mistakes in code's grammar | Logic Errors: Mistakes in program's logic.

What are the differences between encryption and hashing?

Encryption: Reversible | Hashing: Not reversible.

What are the differences between positive and negative impacts of computing?

Positive: Improved communication, productivity | Negative: Privacy concerns, job displacement.

What are the differences between bubble sort and merge sort?

Bubble Sort: Simpler, less efficient | Merge Sort: More complex, more efficient for large datasets.

How is encryption applied in real-world scenarios?

Protecting sensitive data like passwords and credit card numbers.

How are firewalls applied in real-world scenarios?

Securing networks by preventing unauthorized access.

How are searching algorithms applied in real-world scenarios?

Finding data in databases or on the internet.

How are sorting algorithms applied in real-world scenarios?

Organizing data in a specific order, like alphabetically or numerically.

How is data abstraction applied in real-world scenarios?

Using functions to simplify complex operations in software.

How are lists/arrays applied in real-world scenarios?

Storing collections of items, such as a list of student names.

How are dictionaries/maps applied in real-world scenarios?

Storing key-value pairs, such as a phone book (name: phone number).

How are loops applied in real-world scenarios?

Automating repetitive tasks, such as processing each item in a list.

How are conditional statements applied in real-world scenarios?

Making decisions in a program, such as determining if a user is logged in.

How is the concept of time complexity applied in real-world scenarios?

Choosing the most efficient algorithm for a specific task to optimize performance.

What is an IP address?

A unique address for every device on the internet.

What is DNS?

Domain Name System: translates domain names to IP addresses.

What is TCP/IP?

The fundamental communication protocol suite for the internet.

What is encryption?

Scrambling data to make it unreadable without a decryption key.

What is a firewall?

A security system that monitors and controls network traffic.

What is malware?

Harmful software that can damage your computer or steal data.

What is phishing?

Tricking users into revealing personal information via fake emails/websites.

What is a primitive data type?

Basic data types: integers, floats, booleans, characters.

What is an algorithm?

A step-by-step procedure for solving a problem.

What is data abstraction?

Hiding complex implementation details and showing only essential information.