AP Computer Science Principles Lecture Notes

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/66

flashcard set

Earn XP

Description and Tags

Vocabulary terms and definitions related to AP Computer Science Principles, including internet architecture, security, algorithms, and development processes.

Last updated 4:07 AM on 4/30/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

67 Terms

1
New cards

The Internet

A computer network that uses open protocols to standardize communication.

2
New cards

Computing Device

A physical object that can run a program, such as computers, tablets, cell phones, and smart sensors.

3
New cards

Computing System

A group of computing devices and programs working together for a common purpose.

4
New cards

Computer Network

An interconnected computing system that is capable of sending or receiving data.

5
New cards

World Wide Web

A collection of interlinked website documents that can be viewed using a web browser.

6
New cards

HTML

HyperText Markup Language; used for writing most web pages.

7
New cards

HTTP

HyperText Transfer Protocol; used by browsers to interpret HTML instructions for web page formatting.

8
New cards

ARPANET

An early form of the Internet developed in 1969 with a speed of 56 kbps56\,kbps.

9
New cards

Router

A computer or machine that passes information from one network to another.

10
New cards

Hypertext

Invented in 1989, it allows links to connect different parts of an electronic document or different documents.

11
New cards

IETF

The Internet Engineering Task Force; a standards organization responsible for the technical standards of the Internet protocol suite (TCP/IP).

12
New cards

ISPs

Internet Service Providers; companies that sell Internet access to homes and institutions.

13
New cards

The Cloud

Storing data somewhere on the Internet where the storage location is managed by a service provider (e.g., Google, Dropbox, Amazon).

14
New cards

Bandwidth

The maximum amount of data that can be sent in a fixed amount of time, measured in bits per secondbits\,per\,second for digital data.

15
New cards

DNS

Domain Name System; translates domain names like www.example.com into IP addresses, acting like the phonebook of the internet.

16
New cards

Path

A sequence of directly connected computing devices that connect a sender to a receiver.

17
New cards

Routing

The process of finding a path from sender to receiver.

18
New cards

Scalability

The ability of the Internet to keep working as it grows.

19
New cards

Redundancy

The inclusion of back-up elements in case one part fails, such as carrying an extra tube for a flat tire.

20
New cards

Fault Tolerance

The ability of a system to work around problems, such as running a bike with tubeless tires that still functions after a small puncture.

21
New cards

Protocol

A set of rules that specify the behavior of a system.

22
New cards

IP Address

A unique number assigned to each device on a computer network.

23
New cards

Packet

A small chunk of data and metadata (information about the data) passed through the Internet as a data stream.

24
New cards

Packet Switching

The Internet sends information in short bursts rather than long continuous strings.

25
New cards

IP (Internet Protocol)

A protocol that transmits packets from one IP address to another, allowing computers to simulate a direct connection.

26
New cards

TCP

Transmission Control Protocol; divides data into packets, ensures reliable transmission by tracking received packets, resending lost ones, and reassembling them in order.

27
New cards

UDP

User Datagram Protocol; a lightweight, fast transport protocol that detects corrupt data but does not address lost or out-of-order packets.

28
New cards

Malware

Software designed to harm or take partial control over a computer.

29
New cards

Keylogging

Type of malware that records every key pressed by a user.

30
New cards

Computer Virus

A type of malware that spreads and infects other computers by attaching to legitimate programs.

31
New cards

Firewall

A security system that controls the connections between a computer/network and the outside world.

32
New cards

Phishing

A security attack where the victim is tricked into giving up personal information or downloading malware.

33
New cards

DDoS Attack

Distributed Denial of Service; uses a virus to flood a server with requests so users are denied service.

34
New cards

Rogue Access Point

A wireless access point that gives unauthorized access to a secure network.

35
New cards

HTTP Cookie

A small amount of text that helps a website track information about a user and personalize their experience.

36
New cards

Citizen Science

Scientific research conducted by distributed individuals who contribute data using their own computing devices.

37
New cards

Crowdsourcing

The general term for using the Internet to get a large number of people to help solve a problem.

38
New cards

Digital Divide

Unequal access to computers and the Internet based on factors like poverty, racism, age, and isolation.

39
New cards

Encryption

The process of transforming original information into a scrambled format to obscure its meaning.

40
New cards

Symmetric Encryption

Any technique where the same key is used to both encrypt and decrypt data.

41
New cards

Asymmetric Encryption

Also known as public key encryption; uses different keys for encryption and decryption.

42
New cards

SSL/TLS

Secure Sockets Layer/Transport Layer Security; the standard for cryptographically secured information transfer on the Internet.

43
New cards

Certificate Authorities

Organizations that issue digital certificates to verify the ownership of encryption keys.

44
New cards

MFA

Multi-factor authentication; requires two or more verification factors (something you know, something you have, or something you are).

45
New cards

Decidable Problem

A problem for which an algorithm exists that will always terminate with a correct answer for any input.

46
New cards

Undecidable Problem

A problem for which no algorithm can determine the answer for all possible inputs, such as the Halting Problem.

47
New cards

Exponential Efficiency

Represented by 10n10^n permutations relative to the number of digits.

48
New cards

Heuristic

A problem-solving shortcut that is not always perfect but is good enough when a full analysis takes too long.

49
New cards

Lossless Compression

Reduces file size without losing information, allowing the original data to be perfectly reconstructed.

50
New cards

Lossy Compression

Reduces file size by discarding less important information, which affects file quality.

51
New cards

Run Length Encoding (RLE)

A lossless compression method where redundant sequences are stored as a single data value and a count of repetitions.

52
New cards

Analog Data

A continuous stream of varying data.

53
New cards

Digital Data

Finite data in a binary representation used by computers.

54
New cards

Sampling

The process of converting analog data to digital by recording data at regular time intervals.

55
New cards

Overflow Error

An error that occurs when attempting to represent a number that is too large for the fixed number of bits.

56
New cards

Round-off Error

An error that occurs when attempting to represent a number that is too precise, requiring the value to be rounded.

57
New cards

Sequential Computing

A model where programs run in order, one command at a time.

58
New cards

Parallel Computing

A model where programs are broken into small pieces and some are run simultaneously.

59
New cards

Distributed Computing

A model where programs are run by multiple devices.

60
New cards

Speedup

The sequential completion time divided by the parallel completion time.

61
New cards

Simulation

An abstraction of infinitely complex natural phenomena that removes unnecessary or difficult details.

62
New cards

Iterative Development

A process of continuous refinement and revision based on feedback, testing, or reflection.

63
New cards

Modular Development

Breaking a program into smaller pieces and ensuring each works before adding it to the whole.

64
New cards

Program Documentation

A description of how something in a program works, most commonly in the form of comments.

65
New cards

Identify

In the CSP course, to provide a name for a specific topic without elaboration or explanation.

66
New cards

Demonstrate

In the CSP course, to provide sufficient evidence for an answer or point being made.

67
New cards

Describe

In the CSP course, to provide the relevant features or characteristics of what the program code represents.