AP CSP Exam Prep
Categories: LessonAP Computer Science Principles (CSP) Study Prep Guide
A complete prep resource for the AP CSP exam — covering Big Ideas, vocabulary, example questions, pseudocode, and strategies.
Table of Contents
- Exam Overview
- Big Ideas
- Unit-by-Unit Breakdown
- Unit 1: Digital Information
- Unit 2: The Internet
- Unit 3: Algorithms & Programming
- Unit 4: Big Data & Privacy
- Unit 5: Impacts of Computing
- Essential Vocabulary
- Pseudocode & Algorithms
- FRQ Practice & Strategy
- MCQ Practice Tips
- Exam Day Advice
- Additional Resources
Exam Overview
- Format
- Multiple Choice: 70 questions, 2 hours
- Create Task: Submit before exam (30%)
- Weight
- Multiple Choice (70%)
- Create Task (30%)
- Skills Tested
- Algorithms, Programming, Data, Internet, Global Impact
Big Ideas
- Creative Development — How programs are developed & improved.
- Data — Storing, representing, and analyzing information.
- Algorithms & Programming — Designing and implementing solutions.
- Computer Systems & Networks — Internet, protocols, and cybersecurity.
- Impact of Computing — Ethics, bias, digital divide, and global effects.
Unit-by-Unit Breakdown
Unit 1: Digital Information
- Key Ideas
- Binary (base 2), bits/bytes
- Lossless vs. lossy compression
- Representing text, images, audio
- Vocabulary
- Bit, Byte, Overflow error, Round-off error, Sampling
- Practice Q
- Q: What is the main difference between lossy and lossless compression?
- Answer: Lossless preserves all data; lossy discards some data to save space.
- Q: What is the main difference between lossy and lossless compression?
Unit 2: The Internet
- Key Ideas
- IP addresses (IPv4 vs IPv6)
- DNS, TCP/IP, Packets
- Cybersecurity basics (encryption, HTTPS, phishing)
- Vocabulary
- Bandwidth, Latency, Protocol, Fault tolerance
- Practice Q
- Q: What protocol guarantees delivery of data packets?
- Answer: TCP
- Q: What protocol guarantees delivery of data packets?
Unit 3: Algorithms & Programming
- Key Ideas
- Variables, conditionals, iteration
- Procedures with parameters
- Searching (linear, binary) & sorting algorithms
- Vocabulary
- Abstraction, Algorithm, Selection, Iteration, Efficiency
- Practice Q
- Q: What is the difference between a parameter and an argument?
- Answer: A parameter is defined in the procedure; an argument is the value passed in.
- Q: What is the difference between a parameter and an argument?
Unit 4: Big Data & Privacy
- Key Ideas
- Data collection, storage, analysis
- Moore’s Law
- Encryption (symmetric vs asymmetric)
- Vocabulary
- Metadata, Public key encryption, Digital certificate
- Practice Q
- Q: Why is metadata valuable in large datasets?
- Answer: It provides context about data (time, source, etc.), enabling deeper analysis.
- Q: Why is metadata valuable in large datasets?
Unit 5: Impacts of Computing
- Key Ideas
- Digital divide
- Bias in computing
- Intellectual property & ethics
- Vocabulary
- Crowdsourcing, Open source, Digital divide, Creative Commons
- Practice Q
- Q: What is the “digital divide”?
- Answer: The unequal access to computing resources across different groups.
- Q: What is the “digital divide”?
Essential Vocabulary
- Abstraction — Reducing complexity by hiding details.
- Algorithm — A set of instructions to solve a problem.
- API — A collection of commands/functions made available to a programmer.
- Iteration — Repeating a set of instructions (loops).
- Packet — Small chunk of data sent over a network.
- Symmetric vs Asymmetric encryption — Single key vs. public/private key pairs.
- Heuristic — Problem-solving approach that finds an approximate solution when exact solution is impractical.
FRQ Practice & Strategy
- Tips
- Always explain reasoning in words + pseudocode.
- Define procedures with parameters clearly.
- Trace through code to predict outputs.
MCQ Practice Tips
- Eliminate obvious wrong answers first.
- Watch out for off-by-one errors in iteration.
- If you see “most efficient,” think binary search, sorting, or abstraction.
- Cybersecurity questions often ask about encryption or fault tolerance.
Exam Day Advice
- Sleep well — don’t cram last minute.
- Use the reference sheet for pseudocode (provided by College Board).
- Manage time: ~1.7 min per MCQ.
- For FRQs, focus on clarity, not fancy code.
Additional Resources
Progress Tracker
- Unit 1 studied
- Unit 2 practiced
- Unit 3 coding practice complete
- Unit 4 FRQs reviewed
- Unit 5 notes memorized
AP CSP Practice Multiple Choice Quiz
Big Ideas 1, 2, 4, and 5
20 Questions — Practice for Exam
Instructions
- Select ONE best answer per question.
- Covers: Creative Development (BI1), Data (BI2), Algorithms & Programming Concepts (BI4, but no coding required), and Impact of Computing (BI5).
Questions
1. Which of the following best describes an abstraction?
- A specific set of code instructions
- A simplified representation of something complex
- The physical hardware of a computer
- A unique identifier for internet communication
2. A team is designing an app that tracks exercise habits. Using a flowchart instead of writing detailed text is an example of:
- Data compression
- Visualization
- Iteration
- Abstraction
3. Which of the following is the smallest unit of digital data?
- Byte
- Megabyte
- Kilobyte
- Bit
4. Which scenario best represents crowdsourcing?
- A single researcher collects data about climate change.
- Volunteers worldwide contribute photos to help train an AI system.
- A company hires contractors to work on a mobile app.
- A student creates a personal website.
5. Which of the following is a potential harm of digital data collection?
- It enables personalization in online services.
- It can introduce bias in decision-making algorithms.
- It allows compression of files for faster transfer.
- It increases accessibility of educational resources.
6. A large image is compressed before being sent over email. Which is most likely true about the compression?
- It removes all colors from the image.
- It may lose some detail but reduces file size.
- It increases the file size.
- It changes the image into text form.
7. Which is an example of an algorithm?
- The order of steps to bake a cake
- The physical ingredients used in baking
- The oven that heats the cake
- The flavor of the finished cake
8. Which of the following demonstrates the digital divide?
- A student in a rural area lacks reliable internet access.
- A website is written using multiple programming languages.
- A file is saved in both .docx and .pdf formats.
- An app is updated with new features.
9. A health organization collects daily step counts from thousands of participants. Which benefit of large data sets does this show?
- They eliminate all possible errors.
- They allow researchers to identify patterns and trends.
- They prevent data privacy issues.
- They are impossible to visualize.
10. Which statement about online security is true?
- Using the same password everywhere increases safety.
- Strong encryption helps protect sensitive information.
- Public Wi-Fi is always safe for banking.
- Data breaches are impossible with cloud storage.
11. A city uses simulations to predict traffic flow. Which is a limitation of such simulations?
- They can only run on paper.
- They may not account for all real-world variables.
- They cannot be based on real data.
- They always give perfectly accurate predictions.
12. Which of the following is an example of iteration?
- A student writes a paper once without revising.
- A loop repeats until a condition is met.
- A phone sends a single text message.
- A diagram shows the steps of a process.
13. Which computing innovation most directly supports global collaboration?
- A local-only text editor
- Cloud-based document sharing
- A standalone calculator
- An offline video game
14. Which of the following is an example of metadata?
- The words in an email
- The time and date the email was sent
- The meaning of the email
- The opinion expressed in the email
15. Which best explains why Internet protocols are layered (like TCP/IP)?
- To make data less secure
- To reduce abstraction
- To allow systems to be designed independently but work together
- To ensure that only one company controls the Internet
16. Which of these is a trade-off of using a lossy compression technique?
- Smaller file size but permanent loss of some data
- Larger file size but better image quality
- Slower transmission but identical copy
- No change in file size but faster processing
17. Which of the following is an example of bias in computing?
- An AI system produces different results for different demographic groups.
- An app correctly translates text into multiple languages.
- A photo-sharing platform compresses images for speed.
- A database includes millions of rows of data.
18. Which statement best explains why open data sets are valuable?
- They always guarantee privacy.
- They allow many people to analyze and build on the same information.
- They prevent crowdsourcing.
- They can never contain errors.
19. A social media app sends notifications when friends post updates. Which computing concept does this demonstrate?
- Simulation
- Event-driven programming
- Sequencing
- Data compression
20. Which of the following is a safe computing practice?
- Using personal data without user consent
- Regularly updating software to patch vulnerabilities
- Sharing login credentials with multiple people
- Disabling all security features for faster access