1/67
Vocabulary flashcards for AP Computer Science Principles Exam Review.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Computing Innovation
Includes a program as an integral part of its function; can be physical, non-physical software, or a non-physical computing concept.
Collaboration in Computing Innovations
Improves innovations by incorporating multiple perspectives and avoiding bias.
Program
A collection of program statements that performs a specific task when run by a computer (often referred to as software).
Code Segment
A collection of program statements that is part of a program.
Behavior of a Program
How a program functions during execution, often described by how a user interacts with it.
Program Inputs
Data sent to a computer for processing by a program, which can be tactile, audio, visual, or text.
Event
Associated with an action and supplies input data to a program, triggered by key presses, mouse clicks, etc.
Program Outputs
Data sent from a program to a device in various forms, usually based on input or prior state.
Iterative Development Process
Requires refinement and revision based on feedback, testing, or reflection.
Incremental Development Process
Breaks the problem into smaller pieces and ensures each piece works before adding it to the whole.
Program Requirements
Describe how a program functions, including user interactions.
Program Documentation
Written description of the function of code segments, events, procedures, or programs, and how they were developed.
Comments
A form of program documentation written into the program to be read by people and do not affect how a program runs.
Logic Error
A mistake in the algorithm or program that causes it to behave incorrectly or unexpectedly.
Syntax Error
A mistake in the program where the rules of the programming language are not followed.
Run-time Error
A mistake in the program that occurs during the execution of a program.
Overflow Error
An error that occurs when a computer attempts to handle a number that is outside of the defined range of values.
Testing
Uses defined inputs to ensure that an algorithm or program is producing the expected outcomes.
Bit
Shorthand for binary digit and is either 0 or 1.
Byte
8 bits.
Abstraction
The process of reducing complexity by focusing on the main idea, hiding irrelevant details.
Analog Data
Data that have values that change smoothly, rather than in discrete intervals, over time.
Sampling Technique
Measuring values of the analog signal at regular intervals called samples.
Data Compression
Reduces the size (number of bits) of transmitted or stored data.
Lossless Data Compression
Algorithms that can reduce the number of bits stored or transmitted while guaranteeing complete reconstruction of the original data.
Lossy Data Compression
Algorithms that can significantly reduce the number of bits stored or transmitted but only allow reconstruction of an approximation of the original data.
Information
The collection of facts and patterns extracted from data.
Metadata
Data about data, such as the date of creation or file size of an image.
Cleaning Data
A process that makes the data uniform without changing their meaning.
Variable
An abstraction inside a program that can hold a value.
List
An ordered sequence of elements.
Element (in a list)
An individual value in a list that is assigned a unique index.
Index
A common method for referencing the elements in a list or string using natural numbers.
String
An ordered sequence of characters.
Algorithm
A finite set of instructions that accomplish a specific task.
Sequencing
The application of each step of an algorithm in the order in which the code statements are given.
Code Statement
A part of program code that expresses an action to be carried out.
Expression
Can consist of a value, a variable, an operator, or a procedure call that returns a value.
Boolean Value
Either true or false.
Iteration
Repeating a portion of an algorithm. Repeats a specified number of times or until a given condition is met.
Procedure
A named group of programming instructions that may have parameters and return values.
Parameters
Input variables of a procedure.
Arguments
Specify the values of the parameters when a procedure is called.
Procedural Abstraction
Provides a name for a process and allows a procedure to be used only knowing what it does, not how it does it.
Software Library
Contains procedures that may be used in creating new programs.
API (Application Program Interface)
Specifications for how the procedures in a library behave and can be used.
Simulation
Abstractions of more complex objects or phenomena for a specific purpose; a representation that uses varying sets of values to reflect a changing state.
Heuristic
An approach to a problem that produces a solution that is not guaranteed to be optimal.
Computing Device
A physical artifact that can run a program such as computers, tablets, servers, routers, and smart sensors.
Computing System
A group of computing devices and programs working together for a common purpose.
Computer Network
A group of interconnected computing devices capable of sending or receiving data.
Protocol
An agreed-upon set of rules that specify the behavior of a system.
Packet
Contain a chunk of data and metadata used for routing the packet between the origin and the destination on the Internet, as well as for data reassembly.
Redundancy
The inclusion of extra components that can be used to mitigate failure of a system if other components fail.
Sequential Computing
A computational model in which operations are performed in order one at a time.
Parallel Computing
A computational model where the program is broken into multiple smaller sequential computing operations, some of which are performed simultaneously.
Distributed Computing
A computational model in which multiple devices are used to run a program.
Digital Divide
Differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics.
Citizen Science
Scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices.
Crowdsourcing
The practice of obtaining input or information from a large number of people via the Internet.
Personally Identifiable Information (PII)
Information about an individual that identifies, links, relates, or describes them.
Encryption
The process of encoding data to prevent unauthorized access.
Certificate Authorities
Issue digital certificates that validate the ownership of encryption keys used in secure communications and are based on a trust model.
Computer Virus
A malicious program that can copy itself and gain access to a computer in an unauthorized way.
Malware
Software intended to damage a computing system or to take partial control over its operation.
Phishing
A technique that attempts to trick a user into providing personal information.
Keylogging
The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
Rogue Access Point
A wireless access point that gives unauthorized access to secure networks.