APCSP EXAM REVIEW 2025

4.0(1)
studied byStudied by 9 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/133

flashcard set

Earn XP

Description and Tags

Recommended to use answer with definition

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

134 Terms

1
New cards

Syntax Error

A mistake in typed code that violates the rules of the programming language.

2
New cards

Logic Error

A mistake in an algorithm or program that causes it to behave unexpectedly or return the incorrect value

3
New cards

Run-Time Error

A mistake in a program that happens only when the program is actually run

4
New cards

Overflow Error

Error that results when the number of bits is not enough to represent the number

5
New cards

Bit

A binary digit, either 0 or 1

6
New cards

Byte

A sequence of 8 bits

7
New cards

Round off

Error that results when the number of bits is not enough to represent the number with full precision

8
New cards

Analog Data

Values that change smoothly, rather than in discrete intervals, over time.

9
New cards

Digital Data

Values that change in discrete intervals, rather than changing smoothly.

10
New cards

Lossless

Compressing data in a way that preserves all data away and allows full recovery of the original

11
New cards

Lossy

Compressing data in a way that discards some data and makes it impossible to recover the original

12
New cards

metadata

Data about data, like descriptive information about a file or a row in a database

13
New cards

Sequencing

The execution of steps in an algorithm or code in a program (like steps in a recipe)

14
New cards

Selection

A Boolean condition to determine which of two paths are taken in an algorithm or program

15
New cards

Iteration

The repetition of steps in an algorithm or program for a certain amount of times or until a certain condition is met

16
New cards

linear search

algorithm that iterates through each item in a list until it finds the target value.

17
New cards

binary search

algorithm that searches a sorted list for a value by repeatedly splitting the list in half.

18
New cards

reasonable time

run time for an algorithm that doesn't increase faster than a polynomial function of the input size (10n, n², etc)

19
New cards

unreasonable time

run time for an algorithm that increases superpolynomially (2n, n!, etc)

20
New cards

heuristic

shortcut technique, helps an algorithm, that sacrifices accuracy and completeness, can find approximate solutions more quickly,

21
New cards

undecidable problem

should give a "yes" or "no" answer, but yet no algorithm exists that can answer correctly on all inputs

22
New cards

library

A collection of procedures that are useful in creating programs

23
New cards

API

Application Programming Interface, a library of procedures and a description of how to call each procedure

24
New cards

Modularity

The separation of a program into independent modules that are each responsible for one aspect of the program's functionality

25
New cards

traversal

The iteration over the items in a list

26
New cards

Full traversal

iterates over every item

27
New cards

Partial Traversal

iterates over a subset of the items

28
New cards

Computing Device

A physical device that can run a program

29
New cards

Computer Network

group of interconnected computing devices capable of sending or receiving data

30
New cards

Bandwidth

The maximum amount of data that can be sent in a fixed period of time over a network connection

31
New cards

Line coding

process of turning binary data into a electrical or optical pulses, which can be sent over a physical medium

32
New cards

Bit rate

the number of bits of data that are sent each second (ex: 10 Mbps)

33
New cards

Latency

measures how late the bits arrive (also called ping rate)

34
New cards

Protocol

An agreed upon set of rules that specify the behavior of a system

35
New cards

Open/nonpropietary protocol

not owned by any particular company and not limited to a particular company's products

36
New cards

Propietary protocol

Owned by a particular company, most cases limited to a particular company’s products

37
New cards

Scalability

The ability of a system to adjust in scale to meet new demands

38
New cards

IP (Internet Protocol)

determines how to address nodes on the network (using IP addresses), how to route data from one node to a destination node using routers.

39
New cards

TCP

Transmission Control Protocol, data transport protocol that includes mechanisms for reliably transmitting packets to a destination

40
New cards

UDP

User Datagram Protocol, lightweight data transport protocol with minimal error checking

41
New cards

World Wide Web

system of linked pages, media, and files, browsable over HTTP

42
New cards

HTTP

Hypertext Transfer Protocol, requests webpage contents from given IP address

43
New cards

URL

Uniform Resource Locator, web address used to access a specific webpage or file on the internet.

44
New cards

Parallel Computing

computational model which splits a program into multiple tasks, some of which can be executed simultaneously

45
New cards

Speedup

the ratio of the time taken to run the program sequentially to the time taken to run the parallelized program

46
New cards

Distributed Computing

computational model which uses multiple devices to run different parts of a program

47
New cards

Digital Divide

idea that some communities or populations have less access to computing than others

48
New cards

Crowdsourcing

model in which many online users combine efforts to help fund projects, generate ideas, or create goods or services

49
New cards

Citizen Science

The participation of volunteers from the public in a scientific research project (crowdsourcing in science)

50
New cards

Creative Commons

set of licenses that allows creators to share their work with others while specifying how it can be used—like for copying, modifying, or distributing—while still keeping some rights

51
New cards

Open access

policy that allows people to have access to documents (like research papers) for reading or data (like government datasets) for analysis

52
New cards

PII

Personally Identifiable Information, Info about an individual that can be used to uniquely identify them

53
New cards

Linkable PII

data that can be combined from separate sources to identify individuals

54
New cards

MFA

Multifactor Authentication, method of authentication, requires user to present multiple pieces of evidence in multiple categories (such as knowledge and possession)

55
New cards

Knowledge (MFA)

Something you know

56
New cards

Possession (MFA)

Something you have

57
New cards

Inherence (MFA)

Something you are

58
New cards

Encryption

process of scrambling data to prevent unauthorized access

59
New cards

Symmetric Encryption

technique for encrypting data where the same key is used to both encrypt and decrypt data

60
New cards

Public Key Encryption

asymmetric encryption technique, uses different keys for encrypting versus decrypting data

61
New cards

Cookie

A small amount of text that tracks information about a user visiting a website

62
New cards

Trojan Horse

Harmful program that pretends to be a legit program, often downloaded by unknowing users. Starts inflicting damage once run

63
New cards

Virus

Self replicating: contains code that copies itself into other files on the system. May hide in the code of a legitimate program

64
New cards

Worm

Self Replicating: copies itself into entirely different computers within the network via networked protocols. Usually don’t have any harmful actions except duplicating itself

65
New cards

Spyware

steals data and sends it back to the malware creators

66
New cards

Adware

pops up advertisements to users

67
New cards

Ransomware

holds a computer hostage by encrypting user data or blocking access to applications, demands payment to malware creators

68
New cards

Cryptomining Malware

utilizes a computer's resources to mine for cryptocurrency

69
New cards

Security Patch

update to the code of an application or the entire operating system, often fixes a bug that's been exploited by malware.

70
New cards

Firewall

system that monitors incoming and outgoing network traffic to a computer or internal network, determines what traffic to allow

71
New cards

Antivirus Software

rotects an individual computer by constantly scanning files and identifying malware

72
New cards

Phishing

attack where a user is tricked into revealing private information

73
New cards

Rogue Access Point

wireless access point that provides an attacker with unauthorized access to the traffic going over the network

74
New cards

Routing

Process of finding path from sender to reciever

75
New cards

packet

small amount of data sent over a network

76
New cards

Computer System

group of computing devices and programs working together for a common purpose

77
New cards

Computer Network

a group of interconnected computing devices able to send and recieve data

78
New cards

OSI

Open Systems Interconnect, the layers you have to go through to communicate. 7 groups of protocols.

79
New cards

IETF

Internet Engineering Task Force, manages the development of standards and technical discussions concerning the internet

80
New cards

Local Area Network (LAN)

physical connections, limited by hardware and physics

81
New cards

Intranet

LANs connected by routers, within an organization

82
New cards

Floating-Point Precision

Similiar to Scientific Notation, used to represent non integers in computers

83
New cards

Sampling

taking data at regular time intervals

84
New cards

Sampling rate

frequency measured in Hz, good sampling rate is anything larger than twice the highest frequency of the signal

85
New cards

Quantization

reduces analog data to discrete levels

86
New cards

Binary Encoding

process of representing data using binary digits

87
New cards

Bit Depth

number of bits per sample in binary encoding

88
New cards

Fair Use

allows limited use of copyrighted materials for use in education, critism, comment, news, or research

89
New cards

DRT

Digital rights movement, tool that restricts where and how user can use copyrighted media

90
New cards

DMCA

Digital Millenium Copyright Act, Using DMCA, owner of a product can send takedown notices to unlawful distribution

91
New cards

Open Source

software engineers use it to build off the work of others, using a MIT lisencse.

92
New cards

Public Domain

Creative works not protected by copyright

93
New cards

WAN

Wide Area network, network that extends over a very large distance, comprised of many LANs

94
New cards

Network Topology

Each arrangement in a computer network

95
New cards

Internet Speed

combination of bandwidth and latency

96
New cards

DNS

Domain Name System, converts domain name into IP address

97
New cards

TLS

Transfer layer security, protocol which has the website over a secure and encrypted connection

98
New cards

Domain name

Human-friendly address for a website

99
New cards

Load testing

simulating high amounts of traffic in a short period to see if the system breaks

100
New cards

Digital literacy

basic ability to use input & output devices