Search this site
Embedded Files
Skip to main content
Skip to navigation
AP Computer Science Principles
Home
0.00 Class Rules & Machinery
0.01 About Mrs. Kaddoura
0.03 About My Partners
0.04 Build Your Website
0.05 Preparing Your Android Device
0.06 Known Bugs in AI2
0.07 Installing the Emulator
0.08 Download Apps with QR Codes
0.10 How to Submit a Project
0.11 How to Submit an App Video
0.12 Android Life Cycle
Important Links
Quizzes and Tests
Syllabus_2017_2018
Blown to Bits Book
2.01 B2B Chapter 1 Vocabulary
2.11 B2B Chapter 1 Homework
3.01 B2B Chapter 3 Vocabulary
3.11 B2B Chapter 3 Homework
4.01 B2B Chapter 2 Vocabulary
4.11 B2B Chapter 2 Homework
5.01 B2B Chapter 4 Vocabulary
5.09 B2B Chapter 4 Homework
6.01 B2B Chapter 6 Vocabulary
6.10 B2B Chapter 6 Homework
7.01 B2B Chapter 5 Vocabulary
7.08 B2B Chapter 5 Homework
Grading Rubrics: Create & Explore
Homework
Performance Tasks
Create #1
Create #2
Explore #1
Explore #2
Unit 1 Getting Started
Example: Model Project
Example:I have a Dream
Unit 2 Intro to Mobile Apps
2.02 I Have a Dream Tutorial
2.07 I Have a Dream Projects
Unit 3 Creating Graphics & Images
3.02 Paint Pot Tutorial
3.04 Paint Pot Projects
3.05 Paint Pot Refactoring
3.06 Error Detection
3.07 Parity Error Checking
3.10 Map Tour Tutorial and Project
Unit 4 Exploring Computing
4.02 Lights Off
4.03 Light Off Projects
4.04 Logo 1
4.05 Coin Flip Simulations
4.06 Coin Flip Experiment
4.08 Coin Flip Projects
Unit 5 Algorithms & Procedural Abstraction
5.02 Logo 2
5.05 Ceasar Cipher
AP Computer Science Principles
6.01 B2B Chapter 6 Vocabulary
Blown to Bits Chapter 6 Vocabulary
centralized systems
: collect files at a central computer for people to download
commons
: a system of sharing that minimizes the need for fine-grained property restrictions
DRAM
: dynamic random access memory
DRM
: digital rights management
flooding
: each computer in a file-sharing network maintains a list of other computers in the network.
gigabyte
: 1,024 megabytes or 1,073,741,824 bytes
peer-to-peer architecture
: a type of network in which each workstation has equivalent capabilities and responsibilities
piracy
: the unauthorized use or reproduction of another’s work
sealed storage
: an application that lets you encrypt files in such a way that they can be decrypted only on particular computers that you specify.
TPM
: trusted platform module
Google Sites
Report abuse
Google Sites
Report abuse