AP Computer Science Principles Exam Review Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/67

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards for AP Computer Science Principles Exam Review.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

68 Terms

1
New cards

Computing Innovation

Includes a program as an integral part of its function; can be physical, non-physical software, or a non-physical computing concept.

2
New cards

Collaboration in Computing Innovations

Improves innovations by incorporating multiple perspectives and avoiding bias.

3
New cards

Program

A collection of program statements that performs a specific task when run by a computer (often referred to as software).

4
New cards

Code Segment

A collection of program statements that is part of a program.

5
New cards

Behavior of a Program

How a program functions during execution, often described by how a user interacts with it.

6
New cards

Program Inputs

Data sent to a computer for processing by a program, which can be tactile, audio, visual, or text.

7
New cards

Event

Associated with an action and supplies input data to a program, triggered by key presses, mouse clicks, etc.

8
New cards

Program Outputs

Data sent from a program to a device in various forms, usually based on input or prior state.

9
New cards

Iterative Development Process

Requires refinement and revision based on feedback, testing, or reflection.

10
New cards

Incremental Development Process

Breaks the problem into smaller pieces and ensures each piece works before adding it to the whole.

11
New cards

Program Requirements

Describe how a program functions, including user interactions.

12
New cards

Program Documentation

Written description of the function of code segments, events, procedures, or programs, and how they were developed.

13
New cards

Comments

A form of program documentation written into the program to be read by people and do not affect how a program runs.

14
New cards

Logic Error

A mistake in the algorithm or program that causes it to behave incorrectly or unexpectedly.

15
New cards

Syntax Error

A mistake in the program where the rules of the programming language are not followed.

16
New cards

Run-time Error

A mistake in the program that occurs during the execution of a program.

17
New cards

Overflow Error

An error that occurs when a computer attempts to handle a number that is outside of the defined range of values.

18
New cards

Testing

Uses defined inputs to ensure that an algorithm or program is producing the expected outcomes.

19
New cards

Bit

Shorthand for binary digit and is either 0 or 1.

20
New cards

Byte

8 bits.

21
New cards

Abstraction

The process of reducing complexity by focusing on the main idea, hiding irrelevant details.

22
New cards

Analog Data

Data that have values that change smoothly, rather than in discrete intervals, over time.

23
New cards

Sampling Technique

Measuring values of the analog signal at regular intervals called samples.

24
New cards

Data Compression

Reduces the size (number of bits) of transmitted or stored data.

25
New cards

Lossless Data Compression

Algorithms that can reduce the number of bits stored or transmitted while guaranteeing complete reconstruction of the original data.

26
New cards

Lossy Data Compression

Algorithms that can significantly reduce the number of bits stored or transmitted but only allow reconstruction of an approximation of the original data.

27
New cards

Information

The collection of facts and patterns extracted from data.

28
New cards

Metadata

Data about data, such as the date of creation or file size of an image.

29
New cards

Cleaning Data

A process that makes the data uniform without changing their meaning.

30
New cards

Variable

An abstraction inside a program that can hold a value.

31
New cards

List

An ordered sequence of elements.

32
New cards

Element (in a list)

An individual value in a list that is assigned a unique index.

33
New cards

Index

A common method for referencing the elements in a list or string using natural numbers.

34
New cards

String

An ordered sequence of characters.

35
New cards

Algorithm

A finite set of instructions that accomplish a specific task.

36
New cards

Sequencing

The application of each step of an algorithm in the order in which the code statements are given.

37
New cards

Code Statement

A part of program code that expresses an action to be carried out.

38
New cards

Expression

Can consist of a value, a variable, an operator, or a procedure call that returns a value.

39
New cards

Boolean Value

Either true or false.

40
New cards

Iteration

Repeating a portion of an algorithm. Repeats a specified number of times or until a given condition is met.

41
New cards

Procedure

A named group of programming instructions that may have parameters and return values.

42
New cards

Parameters

Input variables of a procedure.

43
New cards

Arguments

Specify the values of the parameters when a procedure is called.

44
New cards

Procedural Abstraction

Provides a name for a process and allows a procedure to be used only knowing what it does, not how it does it.

45
New cards

Software Library

Contains procedures that may be used in creating new programs.

46
New cards

API (Application Program Interface)

Specifications for how the procedures in a library behave and can be used.

47
New cards

Simulation

Abstractions of more complex objects or phenomena for a specific purpose; a representation that uses varying sets of values to reflect a changing state.

48
New cards

Heuristic

An approach to a problem that produces a solution that is not guaranteed to be optimal.

49
New cards

Computing Device

A physical artifact that can run a program such as computers, tablets, servers, routers, and smart sensors.

50
New cards

Computing System

A group of computing devices and programs working together for a common purpose.

51
New cards

Computer Network

A group of interconnected computing devices capable of sending or receiving data.

52
New cards

Protocol

An agreed-upon set of rules that specify the behavior of a system.

53
New cards

Packet

Contain a chunk of data and metadata used for routing the packet between the origin and the destination on the Internet, as well as for data reassembly.

54
New cards

Redundancy

The inclusion of extra components that can be used to mitigate failure of a system if other components fail.

55
New cards

Sequential Computing

A computational model in which operations are performed in order one at a time.

56
New cards

Parallel Computing

A computational model where the program is broken into multiple smaller sequential computing operations, some of which are performed simultaneously.

57
New cards

Distributed Computing

A computational model in which multiple devices are used to run a program.

58
New cards

Digital Divide

Differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics.

59
New cards

Citizen Science

Scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices.

60
New cards

Crowdsourcing

The practice of obtaining input or information from a large number of people via the Internet.

61
New cards

Personally Identifiable Information (PII)

Information about an individual that identifies, links, relates, or describes them.

62
New cards

Encryption

The process of encoding data to prevent unauthorized access.

63
New cards

Certificate Authorities

Issue digital certificates that validate the ownership of encryption keys used in secure communications and are based on a trust model.

64
New cards

Computer Virus

A malicious program that can copy itself and gain access to a computer in an unauthorized way.

65
New cards

Malware

Software intended to damage a computing system or to take partial control over its operation.

66
New cards

Phishing

A technique that attempts to trick a user into providing personal information.

67
New cards

Keylogging

The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.

68
New cards

Rogue Access Point

A wireless access point that gives unauthorized access to secure networks.