Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

AP Computer Science Principles Theory & Concepts Exam With Correct Answers Version 2026/2027

Beoordeling
-
Verkocht
-
Pagina's
5
Cijfer
A+
Geüpload op
16-05-2026
Geschreven in
2025/2026

Question 1 An internet service provider (ISP) is upgrading a city’s network infrastructure. The engineers are choosing between a hierarchical routing architecture and a fully mesh-connected network architecture. Explain how the internet utilizes redundant routing to ensure fault tolerance. Describe what happens to data packets when a primary router or physical fiber-optic cable is suddenly severed during data transmission. Correct Answer: The internet is designed as a distributed, redundant network where multiple paths exist between any two points. This redundancy establishes fault tolerance, meaning the network can continue to function properly even when individual components fail. Data is broken down into small units called packets, each containing routing metadata (such as sender and receiver IP addresses). Routers constantly evaluate network traffic and topology dynamically using routing protocols. If a primary router or physical cable is severed, the surrounding routers automatically detect the loss of connection and re-route the remaining packets along alternative paths. Packets may arrive out of order or via different routes, but the receiving device reassembles them into the original file using transmission protocols (TCP). ________________________________________ Question 2 A software development team is designing an online multiplayer game. They need to choose between using the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) for different components of the application. Contrast the operational mechanisms of TCP and UDP. Explain which protocol is best suited for loading the player's account inventory data, and which protocol is best suited for transmitting real-time player position coordinates during a match. Correct Answer: TCP is a connection-oriented, reliable protocol that guarantees all packets arrive in order and without errors by using a "three-way handshake" to establish a connection, tracking packet sequence numbers, and requiring the receiver to acknowledge receipt. If a packet is lost, TCP triggers a retransmission. UDP is a connectionless, lightweight protocol that sends packets (datagrams) continuously without establishing a formal connection, tracking order, or checking for delivery verification. For loading inventory data, TCP is mandatory because every single item asset must load without error; missing data would corrupt the inventory state. For real-time player position coordinates, UDP is ideal because speed and low latency are prioritized over absolute reliability; if a position packet is dropped, it is immediately made obsolete by a newer position packet a fraction of a second later. ________________________________________ Question 3 The digital divide remains a significant challenge for global technology equity. Define the concept of the digital divide, noting that it is not purely an issue of physical infrastructure. Discuss three distinct socioeconomic or cultural factors that contribute to this divide even within geographic regions that have functional internet access, and explain

Meer zien Lees minder
Instelling
AP Computer Science Principles
Vak
AP Computer Science Principles

Voorbeeld van de inhoud

AP Computer Science Principles Theory & Concepts Exam With
Correct Answers Version 2026/2027
Question 1

An internet service provider (ISP) is upgrading a city’s network infrastructure. The engineers are
choosing between a hierarchical routing architecture and a fully mesh-connected network
architecture. Explain how the internet utilizes redundant routing to ensure fault tolerance. Describe
what happens to data packets when a primary router or physical fiber-optic cable is suddenly
severed during data transmission.

Correct Answer: The internet is designed as a distributed, redundant network where multiple paths
exist between any two points. This redundancy establishes fault tolerance, meaning the network can
continue to function properly even when individual components fail. Data is broken down into small
units called packets, each containing routing metadata (such as sender and receiver IP addresses).
Routers constantly evaluate network traffic and topology dynamically using routing protocols. If a
primary router or physical cable is severed, the surrounding routers automatically detect the loss of
connection and re-route the remaining packets along alternative paths. Packets may arrive out of
order or via different routes, but the receiving device reassembles them into the original file using
transmission protocols (TCP).



Question 2

A software development team is designing an online multiplayer game. They need to choose
between using the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) for
different components of the application. Contrast the operational mechanisms of TCP and UDP.
Explain which protocol is best suited for loading the player's account inventory data, and which
protocol is best suited for transmitting real-time player position coordinates during a match.

Correct Answer: TCP is a connection-oriented, reliable protocol that guarantees all packets arrive in
order and without errors by using a "three-way handshake" to establish a connection, tracking
packet sequence numbers, and requiring the receiver to acknowledge receipt. If a packet is lost, TCP
triggers a retransmission. UDP is a connectionless, lightweight protocol that sends packets
(datagrams) continuously without establishing a formal connection, tracking order, or checking for
delivery verification. For loading inventory data, TCP is mandatory because every single item asset
must load without error; missing data would corrupt the inventory state. For real-time player
position coordinates, UDP is ideal because speed and low latency are prioritized over absolute
reliability; if a position packet is dropped, it is immediately made obsolete by a newer position packet
a fraction of a second later.



Question 3

The digital divide remains a significant challenge for global technology equity. Define the concept of
the digital divide, noting that it is not purely an issue of physical infrastructure. Discuss three distinct
socioeconomic or cultural factors that contribute to this divide even within geographic regions that
have functional internet access, and explain how a lack of access to computing tools harms an

, individual's economic mobility.

Correct Answer: The digital divide refers to the socioeconomic gap between populations that have
affordable, reliable access to modern information and communication technology (ICT) and those
who do not. Beyond physical infrastructure, factors contributing to the divide include: 1) Affordability
of hardware and subscription plans, 2) Digital literacy and education gaps that leave individuals
unable to navigate complex software, and 3) Language or accessibility barriers where digital content
is unavailable in native dialects or accessible formats for disabled individuals. A lack of computing
tools limits economic mobility by restricting access to online educational materials, preventing
individuals from developing modern job skills, and excluding them from the vast majority of
professional career postings and remote employment opportunities.



Question 4

A data science company uses machine learning algorithms to evaluate loan applications for a
commercial bank. The algorithm was trained on decades of historical lending data from the bank.
After deployment, auditors notice that the algorithm systematically denies loans to applicants from
specific historically marginalized zip codes, even when those applicants have high incomes and clean
credit histories. Explain how algorithmic bias occurs in this scenario despite the software engineers
not intentionally programming any discriminatory rules. Discuss how historical data can perpetuate
systemic biases.

Correct Answer: Algorithmic bias occurs when a computer program outputs systematically
prejudiced or unfair results due to biased assumptions made during the machine learning process or
flaws in the training data. Even though engineers did not write discriminatory code, the algorithm
was trained on historical lending data that reflected past human biases, discriminatory housing
policies (such as redlining), and socioeconomic disparities. The machine learning model identifies
statistical patterns within that historical data to predict loan default risks. Because historical
institutional biases linked specific zip codes to lower financial investment and higher default rates in
the past, the algorithm interprets the zip code as a negative predictive variable, thereby automating
and perpetuating systemic discrimination under the guise of an objective mathematical model.



Question 5

Public Key Cryptography (asymmetric encryption) is the mathematical backbone of secure
transactions on the modern internet, enabling protocols like HTTPS. Explain the operational
relationship between a public key and a private key. Detail the process of how a customer's web
browser securely sends a credit card number to an online retailer using this system, ensuring that
malicious actors intercepting the Wi-Fi traffic cannot read the sensitive data.

Correct Answer: Public key cryptography utilizes a mathematically linked pair of keys: a public key,
which can be shared openly with anyone, and a private key, which must be kept strictly confidential
by the owner. Data encrypted using a public key can only be decrypted by its corresponding private
key. When a customer inputs a credit card number into a browser, the online retailer sends its public
key to the browser. The browser uses this public key to encrypt the credit card data. Once encrypted,
the data becomes unreadable ciphertext. As the ciphertext travels across the internet or a public Wi-

Geschreven voor

Instelling
AP Computer Science Principles
Vak
AP Computer Science Principles

Documentinformatie

Geüpload op
16 mei 2026
Aantal pagina's
5
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$18.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
trmainanapoleon

Maak kennis met de verkoper

Seller avatar
trmainanapoleon Chamberlain College Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
3
Lid sinds
3 maanden
Aantal volgers
0
Documenten
176
Laatst verkocht
1 maand geleden
STUVIASUCCESS

Welcome to STUVIA SUCCESS Where well-researched,Clearly organized and exam-oriented study documents are designed to help students understand faster ,revise smarter and score better. My resources are created to give you real academic value. BUY WITH CONFIDENCE-YOUR SUCCESS IS THE GOAL.

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen