AP CSP Big Idea 4 Computer Systems Networks
AP CSP Big Idea 4: Computing Systems & Networks — Complete Study Guide (2025–2026)
By Tanner Crow | AP Computer Science Teacher, Blue Valley North | 11+ Years Experience | Updated March 2026
Big Idea 4: Computing Systems and Networks covers how the internet works, how data travels across networks, what makes systems resilient to failure, and how parallel computing speeds up complex tasks. This Big Idea accounts for 11–15% of the AP CSP exam (approximately 8–11 questions), making it the smallest of the five Big Ideas. However, the questions are highly conceptual and require precise vocabulary — students who confuse TCP with IP, or misunderstand fault tolerance, tend to miss most of the questions in this section.
This guide covers every AP CSP Computing Systems and Networks topic systematically, with emphasis on the specific question types and common misconceptions that appear most frequently on the AP exam.
Exam weight: 11–15% — Questions: ~8–11 of 70 — Difficulty: Conceptual, no code or pseudocode required — Most missed topics: Fault tolerance network diagrams, parallel vs sequential computing, and the distinction between the internet and the World Wide Web.
Table of Contents
- How the Internet Works: The Basics
- Protocols: TCP/IP, HTTP, HTTPS, DNS
- Packet Switching and Data Transmission
- Fault Tolerance and Network Redundancy
- Parallel and Distributed Computing
- Cybersecurity Fundamentals
- Hardware, Software, and Operating Systems
- Complete Big Idea 4 Vocabulary
- AP Exam Practice Questions
- Frequently Asked Questions
How the Internet Works: The Basics
The internet is the global system of interconnected computer networks that communicate using the TCP/IP protocol suite. It is not owned or controlled by any single government, company, or organization — it is a decentralized network of independently operated networks that have agreed to communicate using shared standards. This decentralized architecture is intentional and is the source of both its resilience and its openness.
The Internet vs. The World Wide Web
The internet is the infrastructure: the physical cables (fiber optic, copper, coaxial), wireless networks, routers, switches, and the protocols (TCP/IP) that allow data to travel between any two connected devices anywhere in the world. The internet has existed since the 1960s as ARPANET.
The World Wide Web is one application that runs on top of the internet. It is a system of interlinked documents (web pages) and resources accessed via web browsers using the HTTP or HTTPS protocol. Tim Berners-Lee invented the World Wide Web in 1989 — more than 20 years after the internet itself. The web is a subset of what the internet enables. Email, FTP file transfers, video streaming, online gaming, and instant messaging also run on the internet but are not part of the web.
Common AP Exam Trap: Many students use “internet” and “World Wide Web” interchangeably. The AP CSP exam tests this distinction directly. The internet = the infrastructure. The web = one application on top of that infrastructure. Know both definitions cold.
How Data Gets from One Device to Another
When you load a web page, your device sends a request that travels through multiple networks and routers before reaching the web server. The server sends back the page data, which also travels through multiple networks. Each intermediate device (router) decides the best next step for the data based on the destination address. This process happens in milliseconds and involves dozens of network hops across the globe.
IP addresses are unique numerical labels assigned to every device on a network. They serve as the “address” that routers use to direct data to the correct destination. IPv4 addresses use four 8-bit numbers separated by dots (e.g., 192.168.1.1). IPv6 addresses are longer to accommodate the explosive growth in connected devices.
DNS (Domain Name System) translates human-readable domain names (like google.com) into numeric IP addresses. When you type a URL in your browser, your device first queries a DNS server to find the corresponding IP address, then connects to that address. DNS is often described as the “phone book of the internet.”
Protocols: TCP/IP, HTTP, HTTPS, and DNS
A protocol is a standardized set of rules that define how data is formatted, transmitted, and received between computing devices. Without agreed-upon protocols, devices made by different manufacturers running different operating systems could not communicate. Protocols are what make the open, interoperable internet possible.
TCP/IP: The Foundation of the Internet
TCP/IP is not a single protocol but a suite of protocols that work together. The two most important are:
IP (Internet Protocol) handles addressing and routing. Every packet of data is labeled with source and destination IP addresses so that routers along the network path can direct it toward the destination. IP is a “best effort” protocol — it does not guarantee delivery or order.
TCP (Transmission Control Protocol) provides reliable delivery on top of IP. TCP breaks data into packets, numbers them so they can be reassembled in order, sends acknowledgment signals when packets are received, and requests retransmission of any packets that were lost or corrupted. TCP is what makes email and web browsing reliable — if a packet is lost, TCP detects this and resends it.
AP CSP questions about TCP/IP focus on the relationship between these two protocols, the concept of packet addressing and routing, and the reason that data can arrive out of order. Understand that IP provides addressing and routing while TCP provides reliability and ordering. Questions may also contrast TCP (reliable, ordered) with UDP (faster but unreliable — used for video streaming where a dropped frame is better than a pause).
HTTP and HTTPS
HTTP (HyperText Transfer Protocol) is the application-layer protocol that web browsers use to request and receive web pages from servers. When you type a URL starting with http://, your browser sends HTTP requests and receives HTTP responses.
HTTPS (HTTP Secure) adds a layer of encryption using TLS (Transport Layer Security). With HTTPS, the data transmitted between your browser and the server is encrypted, so even if someone intercepts the packets, they cannot read the content. Modern browsers display a padlock icon for HTTPS connections and warn users about unsecured HTTP sites.
The AP exam tests the difference between HTTP and HTTPS specifically in the context of privacy and security. HTTP transmits data in plaintext; HTTPS encrypts data so that intercepted packets are unreadable.
DNS: The Internet’s Address Book
The DNS (Domain Name System) is a hierarchical, distributed database that maps human-readable hostnames (like apcsexamprep.com) to machine-readable IP addresses (like 104.21.50.12). Without DNS, users would need to memorize IP addresses for every website they visit.
DNS queries flow through a hierarchy of servers: from your device’s cache, to your ISP’s DNS server, to root name servers, to top-level domain servers (for .com, .org, etc.), to authoritative name servers for the specific domain. This hierarchy distributes the load of billions of daily DNS queries.
Packet Switching and Data Transmission
Packet switching is the fundamental data transmission method of the internet. It was deliberately designed to be different from traditional telephone circuit switching, which established a dedicated connection between two parties for the duration of a call.
How Packet Switching Works
When you send data across the internet — whether it is an email, a web page request, or a video stream — that data is broken into small units called packets. Each packet contains:
- A header with the source IP address, destination IP address, packet number, and other routing information
- A payload with the actual data being transmitted
Packets from the same message may travel through entirely different routes across the network. A router receiving a packet examines the destination IP address and forwards the packet to the next router on the best available path toward that destination. This decision is made independently for each packet, based on current network conditions.
At the destination, TCP reassembles the packets in the correct order (using the packet numbers in their headers) and delivers the complete message to the application. If any packets are missing, TCP requests that the sender retransmit them.
Why Packet Switching Is Better Than Circuit Switching
Circuit switching works like a traditional phone call: a dedicated, continuous path is established between sender and receiver for the entire duration of the communication. The path is reserved even when no data is being transmitted (silence during a phone call still ties up the circuit).
Packet switching shares network capacity more efficiently because the path is only occupied when packets are actually being transmitted. Multiple communications can share the same physical links simultaneously. Additionally, packet switching is far more fault tolerant: if one router on the network goes down, packets can simply be rerouted through other paths. With circuit switching, a failure along the dedicated path terminates the connection.
The AP exam frequently asks about the advantages of packet switching over circuit switching. The two key advantages are (1) more efficient use of network resources through sharing, and (2) greater fault tolerance because packets can take different routes. Also remember: packets from the same message can arrive out of order — TCP is what reorders them correctly at the destination.
Bandwidth and Latency
Bandwidth is the maximum amount of data that can be transmitted over a network connection per unit of time, measured in bits per second (bps), kilobits per second (Kbps), megabits per second (Mbps), or gigabits per second (Gbps). A network connection with higher bandwidth can transmit more data in the same amount of time. Bandwidth does not directly determine speed — it determines capacity.
Latency is the delay between when data is sent and when it is received. Latency is determined by the physical distance data must travel and the processing time at each intermediate router. High latency (slow response time) is noticeable in real-time applications like video calls and online gaming even when bandwidth is plentiful. Reducing latency requires either shorter physical paths (content delivery networks) or faster processing at intermediate nodes.
Fault Tolerance and Network Redundancy
Fault tolerance is one of the most heavily tested topics in Big Idea 4. A fault tolerant system continues to operate correctly even when one or more components fail. The internet was deliberately designed to be fault tolerant through redundancy — multiple paths between any two points so that the failure of one path does not sever communication.
Network Redundancy
Redundancy means having backup components or paths that can take over if the primary fails. In a network, redundancy is achieved by ensuring that there are multiple physical routes between important nodes. When a router or connection fails, routers detect the failure and update their routing tables to use alternative paths.
The degree of fault tolerance in a network is determined by how many connections or nodes must fail before two devices can no longer communicate. A network with many redundant paths can tolerate multiple simultaneous failures. A network with only one path between two points has zero fault tolerance for that connection — a single failure severs communication.
How the AP Exam Tests Fault Tolerance
The AP exam presents network diagrams showing nodes (devices) connected by edges (network connections). A typical question looks like this:
“The figure below shows a network. If the connection between node C and node D is removed, which of the following is true?”
To answer these questions, trace the possible paths between the relevant devices after removing the specified connection. If at least one path still exists, the devices can still communicate. If no path exists, they cannot. Key insight: you are looking for alternative paths, not whether the direct connection still exists.
1. Identify the two devices the question asks about. 2. List all possible paths between them before the removal. 3. Remove the specified connection or node. 4. Determine whether any complete path still exists from one device to the other. 5. If yes → the network remains connected. If no → communication is broken.
Redundancy vs. Efficiency
Adding redundancy to a network improves fault tolerance but also increases cost and complexity. There is always a trade-off between resilience and efficiency. The AP exam may test this trade-off directly — asking why a network designer might choose not to add maximum redundancy, or why redundant systems cost more to operate.
Parallel and Distributed Computing
Parallel computing is the practice of using multiple processors or computing nodes to work on parts of a problem simultaneously. It is one of the key methods for handling tasks that would take too long on a single processor.
Sequential vs. Parallel Computing
In sequential computing, instructions are executed one at a time, in order. Each instruction must complete before the next begins. This is the simplest model of computation — but it can be slow for large problems because every step must wait for the previous step to finish.
In parallel computing, a problem is divided into sub-tasks that can execute simultaneously on different processors. The total wall-clock time (the time from start to finish as measured by a clock on the wall) is reduced because multiple pieces of work happen at the same time. However, the total amount of work does not decrease — all the same steps still need to be completed.
Parallel computing reduces time but NOT the total amount of work. This is a frequent AP exam distinction. Also critical: not all problems can be parallelized. If Step B requires the output of Step A, then B cannot start until A finishes, regardless of how many processors are available. These are called sequential dependencies and they set a lower bound on how fast a problem can be solved even with unlimited processors.
Identifying Tasks That Can Be Parallelized
A task can be parallelized if it can be divided into independent subtasks that do not depend on each other’s results. Examples of parallelizable tasks:
- Searching different sections of a large database simultaneously
- Rendering different frames of a video animation on different processors
- Running the same simulation with different starting parameters on different machines
- Performing spell-check on different sections of a document in parallel
Examples of tasks that cannot be fully parallelized (sequential dependencies):
- Computing a value where each step depends on the previous result (e.g., a running total)
- Sending the next packet before confirming the previous one arrived (TCP acknowledgment sequence)
- Making a decision based on the results of multiple prior calculations
Calculating Speedup from Parallel Computing
The AP exam may present a scenario like: “Task X requires 3 steps that each take 1 second and cannot be parallelized. Task Y requires 4 steps that each take 1 second and can all run in parallel. How long does the whole job take with 4 processors?”
The approach: identify which steps have sequential dependencies and must run in order (these determine the minimum time), and which steps can run simultaneously. The total time is the sum of the sequential segments plus the longest parallel segment.
If a job has a sequential portion that takes time S and a parallel portion that takes time P with unlimited processors, the minimum total time = S + P/N where N = number of processors. But if N is large enough and P is large enough relative to S, the sequential portion S becomes the bottleneck and adding more processors provides diminishing returns.
Distributed Computing
Distributed computing extends parallel computing to systems where processors are in different physical locations, connected over a network. In distributed computing, multiple computers (often many thousands) collectively work on a problem too large for any single machine.
Examples of distributed computing: SETI@home (searching for extraterrestrial intelligence by distributing signal analysis to volunteer computers), protein folding simulations (Folding@home), and modern cloud computing platforms (AWS, Google Cloud, Azure). Distributed computing enables solving problems at a scale that would be impossible or prohibitively expensive on any single supercomputer.
Cybersecurity Fundamentals
While AP CSP’s most detailed cybersecurity content is in Big Idea 5 (Impact of Computing), Big Idea 4 introduces the foundational technical concepts of how systems are protected — or exploited.
Encryption
Encryption converts data (plaintext) into an unreadable form (ciphertext) using a mathematical algorithm and a key. Only parties with the correct key can decrypt the ciphertext back into readable plaintext. Encryption protects data confidentiality during transmission — even if an attacker intercepts encrypted packets, they cannot read the content without the key.
Symmetric encryption uses the same key for both encryption and decryption. It is fast but requires that both parties securely share the key in advance — which is difficult over an open network.
Asymmetric encryption (public key cryptography) uses two mathematically related keys: a public key (shared openly) for encryption, and a private key (kept secret) for decryption. Anyone can encrypt a message using your public key, but only you can decrypt it with your private key. HTTPS uses asymmetric encryption to establish a secure session, then switches to symmetric encryption for speed.
Common Cybersecurity Threats
Phishing is a social engineering attack in which an attacker impersonates a trusted entity (bank, employer, government agency) via email, text, or fake website to trick the victim into revealing passwords, financial information, or other sensitive data. Phishing is one of the most common attack vectors because it exploits human psychology rather than technical vulnerabilities.
Malware (malicious software) is software designed to gain unauthorized access, disrupt operations, or steal data. Types include viruses (self-replicating programs that attach to legitimate files), ransomware (encrypts the victim’s data and demands payment for the decryption key), spyware (secretly monitors user activity), and trojans (disguised as legitimate software).
Denial of Service (DoS) attacks overwhelm a server with so many requests that it cannot respond to legitimate users. A Distributed Denial of Service (DDoS) attack uses many compromised computers (a botnet) to flood the target simultaneously, making it much harder to block.
Defense Strategies
Firewalls monitor incoming and outgoing network traffic and block traffic that violates defined security rules. Antivirus software detects and removes known malware. Strong authentication (multi-factor authentication, MFA) requires users to provide multiple forms of verification before granting access. Security patches and software updates close known vulnerabilities that attackers exploit.
Hardware, Software, and Operating Systems
Hardware refers to the physical components of a computing system: the CPU (Central Processing Unit, which executes instructions), RAM (Random Access Memory, which stores data being actively used), storage devices (hard drives and SSDs), input devices (keyboard, mouse, microphone), and output devices (monitor, speakers, printer). Hardware is tangible and wears out over time.
Software is the set of instructions that tell hardware what to do. Software is stored on hardware (disk or memory) and falls into two broad categories:
- System software: The operating system (Windows, macOS, Linux, Android, iOS) manages hardware resources and provides the platform on which application software runs. The OS handles memory management, process scheduling, file systems, and device drivers.
- Application software: Programs designed for end-users (web browsers, word processors, video games, streaming apps). Application software runs on top of the operating system and requests hardware resources through the OS.
The operating system’s role on the AP exam is tested in the context of how it abstracts hardware complexity from applications. An application does not need to know the specifics of the hard drive it is writing to — the OS handles that. This is another example of abstraction, connecting Big Idea 4 back to Big Idea 1.
Complete Big Idea 4 Vocabulary
Every term in this table has appeared on at least one AP CSP released exam or practice test. Know all of them.
| Term | Definition |
|---|---|
| Bandwidth | Maximum data that can be transmitted over a network connection per unit of time (bits/second). |
| Client | A device or application that requests resources or services from a server. |
| Cybersecurity | Practices and technologies that protect systems, networks, and data from unauthorized access or attack. |
| Denial of Service (DoS) | An attack that overwhelms a server with requests, preventing it from responding to legitimate users. |
| DNS (Domain Name System) | A hierarchical system that translates human-readable domain names (google.com) into IP addresses. |
| Encryption | Converting plaintext into unreadable ciphertext using a key; only those with the key can decrypt it. |
| Fault Tolerant | A system that continues to function correctly even when individual components fail. |
| Firewall | A security system that monitors and controls network traffic based on defined rules. |
| Hardware | The physical components of a computer system (CPU, RAM, storage, I/O devices). |
| HTTP | HyperText Transfer Protocol; the application-layer protocol for transmitting web pages. |
| HTTPS | HTTP with TLS encryption added; protects data in transit between browser and server. |
| Internet | A global system of interconnected networks communicating via TCP/IP; not owned by any single entity. |
| IP Address | A unique numerical label assigned to each device on a network for routing purposes. |
| Latency | The delay between sending a request and receiving a response over a network. |
| Malware | Malicious software designed to damage, disrupt, or gain unauthorized access to systems. |
| Network | A group of connected computing devices that can communicate and share resources. |
| Operating System | System software that manages hardware resources and provides a platform for applications. |
| Packet | A unit of data transmitted across a network, containing a header (routing info) and payload (data). |
| Packet Switching | Transmitting data by breaking it into independently-routed packets that are reassembled at the destination. |
| Parallel Computing | Using multiple processors simultaneously to reduce the wall-clock time needed to complete a task. |
| Phishing | A social engineering attack using deceptive messages or fake websites to steal credentials. |
| Protocol | A standardized set of rules governing how data is formatted and transmitted between devices. |
| Redundancy | Having multiple components or paths so the system continues working if one fails. |
| Router | A networking device that reads packet destination addresses and forwards them toward their destination. |
| Sequential Computing | Executing instructions one at a time, in order; each must complete before the next begins. |
| Server | A device or software that provides resources or services to clients on a network. |
| Software | Programs and instructions that direct hardware; includes system software and application software. |
| TCP (Transmission Control Protocol) | Provides reliable, ordered delivery of data packets on top of IP; handles acknowledgment and retransmission. |
| TCP/IP | The foundational protocol suite of the internet; IP handles addressing/routing, TCP ensures reliability. |
| World Wide Web | A system of interlinked web documents and resources accessed via the internet using HTTP/HTTPS. |
AP Exam Practice Questions
A web developer is deciding whether to use HTTP or HTTPS for their new e-commerce website. Which of the following BEST describes why HTTPS is preferred over HTTP for transmitting customer payment information?
- HTTP is faster than HTTPS and can handle more transactions per second.
- HTTPS encrypts data in transit so that intercepted packets cannot be read by a third party.
- HTTP is not supported by modern web browsers, making HTTPS the only viable option.
- HTTPS compresses data, reducing the bandwidth required for payment transactions.
Show Explanation
HTTPS (HTTP Secure) adds TLS encryption to HTTP. When data is transmitted over HTTPS, each packet is encrypted so that even if an attacker intercepts it, the content is unreadable without the decryption key. This is essential for transmitting sensitive data like payment information. HTTP sends data as plaintext, which can be read by anyone who intercepts the packets.
A network diagram shows five nodes: A, B, C, D, and E. The connections are: A-B, A-C, B-D, C-D, and D-E. If the connection between B and D is removed, which statement is TRUE?
- Nodes A and E can no longer communicate because the only path between them is broken.
- Nodes A and E can still communicate through the path A-C-D-E.
- Node D becomes isolated from the rest of the network.
- All nodes except E can still communicate with each other.
Show Explanation
Before the removal, paths from A to E include: A-B-D-E and A-C-D-E. Removing B-D eliminates the first path but the second path (A-C-D-E) remains intact. So A and E can still communicate. Node D is still connected to C (via C-D) and to E (via D-E). This question tests fault tolerance: even after losing a connection, redundant paths keep the network connected.
Which of the following tasks would MOST benefit from parallel computing?
- Calculating compound interest over 30 years, where each year's value depends on the previous year's result.
- Checking the spelling of individual words in a 10,000-word document.
- Following a recipe where step 4 requires the output of step 3 and step 3 requires the output of step 2.
- Executing a bubble sort algorithm where each comparison depends on the result of the previous swap.
Show Explanation
Parallel computing benefits tasks that can be split into independent subtasks. Checking individual words for spelling has no dependency between words — the spell check for word 1 does not affect word 5,000. These checks can run simultaneously on different processors. The other options all have sequential dependencies where each step requires the result of the previous step, making parallelization impossible or severely limited.
Which of the following BEST describes packet switching?
- A dedicated connection is established between sender and receiver for the entire duration of data transmission.
- Data is transmitted as a continuous stream over a single fixed path.
- Data is broken into separately-addressed packets that may travel different routes and are reassembled at the destination.
- Data is compressed into a single packet and transmitted over the fastest available path.
Show Explanation
Packet switching breaks data into individual packets, each labeled with source and destination addresses. Packets from the same message may travel through entirely different routes and arrive in a different order than they were sent. TCP reassembles them correctly at the destination. This approach is more efficient and fault tolerant than circuit switching (option A), which reserves a dedicated path.
The term 'bandwidth' in the context of computer networks MOST specifically refers to:
- The physical length of the network cable connecting two devices.
- The maximum amount of data that can be transmitted over a network connection per unit of time.
- The delay experienced by data traveling from one device to another.
- The number of devices currently connected to a network.
Show Explanation
Bandwidth is a measure of network capacity: how much data can flow through a connection per second (measured in bits/second, Mbps, Gbps, etc.). It is distinct from latency (option C), which measures delay. High bandwidth means a wide channel for data; low latency means fast response. A network can have high bandwidth but high latency (satellite internet: fast downloads, slow response time).
Frequently Asked Questions
Get in Touch
Whether you're a student, parent, or teacher — I'd love to hear from you.
Just want free AP CS resources?
Enter your email below and check the subscribe box — no message needed. Students get daily practice questions and study tips. Teachers get curriculum resources and teaching strategies.
Message Sent!
Thanks for reaching out. I'll get back to you within 24 hours.
tanner@apcsexamprep.com
Courses
AP CSA, CSP, & Cybersecurity
Response Time
Within 24 hours
Prefer email? Reach me directly at tanner@apcsexamprep.com