AP CSP FLASHCARDS

studied byStudied by 7 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 76

flashcard set

Earn XP

Description and Tags

ALL vocab from AP Computer Science Principles *NOTE* these flashcard sets are constantly being updated when "updates" are needed. *NOTE* definitions with highlighted-bolded words are IMPORTANT and are keys to memorizing the vocab more easily and efficently

77 Terms

1

Pair Programming

a collaborative programming style in which two programmers switch between the roles of writing code and designing user interface

New cards
2

Multifactor authentication

another layer of added security when logging in to personal information


ex: after entering a password for an online bank account, a user must also enter a code that is sent to the user’s phone via text message

New cards
3

Cybersecurity

protects our electronic devices and networks from attacks and unauthorized use

New cards
4

Phishing

technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources

ex: fake bank emails attempting to steal your bank info

New cards
5

Keylogging

use of a program to record every keystroke made by a computer user

New cards
6

Encryption

process of encoding messages to keep them secret, so only “authorized” parties can read it

New cards
7

Decryption

process that reverses encryption, taking a secret message and reproducing the original plain text

New cards
8

Public Key Encryption

uses a public key for encryption AND a private key for decryption.

NOTE: the receivers public key is required for encryption and private key for the decryption

New cards
9

Router

a type of computer that forwards data across a network

New cards
10

Routing

is the process of finding a path from sender to receiver

New cards
11

Bandwidth

is a measure of the maximum amount of data that can be transferred through a channel or network connection.

New cards
12

Protocol

an agreed-upon set of rules that specify the behavior of some system

New cards
13

Internet protocol (IP)

a protocol for sending data across the internet that assigns unique numbers to each connected device

New cards
14

Domain Name System (DNS)

the system responsible for translating domain names like example.com into IP addresses

New cards
15

Hypertext Transfer Protocol (HTTP)

a protocol for computers to request and share the pages that make up the WWW on the internet

New cards
16

Cyberattacks

are malicious attempts to damage or disrupt computer systems, networks, and data.

New cards
17

Program

collection of program statements

New cards
18

Program Statement

a command or instruction (code)

New cards
19

Programming

A collaborative and creative process that brings ideas to life through the development of software.

New cards
20

Comments

form of program documentation written into the program, DOESN’T affect how the program will run

purpose: to be read by other people, help you in the the development of your program

New cards
21

Computing Innovation

includes a program as an integral part of its function

ex: self-driving cars or a picture editing software

New cards
22

Internet

network of interconnected networks. Designed to SCALE

New cards
23

World Wide Web (WWW)

system of linked pages, programs, or files that is accessed via the Internet

New cards
24

Syntax Error

The code does not work properly because it is written incorrectly

New cards
25

Runtime Error

A mistake that occurs during the execution of a program that ceases the execution.

New cards
26

Logic Error

A mistake in the algorithm or program that causes it to behave incorrectly or unexpectedly.

New cards
27

Overflow Error

when the numbers are too big for the computer

New cards
28

Round-Off Error

caused by imprecise values or results

New cards
29

Bit

The smallest unit of information stored or manipulated on a computer; consists of either zero or one.

New cards
30

Analog Signal

signal that’s measured at regular intervals

New cards
31

Digital Signal

A sequence of discrete symbols

New cards
32

Sampling

Recording an analog signal at regular discrete moments and converting them to a digital signal.

New cards
33

Lossless Algorithms

a process for reducing the number of bits needed to represent something without loosing any information

New cards
34

Lossy Algorithms

a process for reducing the number of bits needed to represent something in which some information is lost or thrown away

New cards
35

Algorithm

A set of steps to do a task, often implemented with software.

New cards
36

List

data type that holds a collection of values

ex: a grocery list or spotify playlist

New cards
37

Elements (List)

Individual items in a list

New cards
38

Index (List)

a number referring to their placement in the list. Index starts at 0 and increases by 1

ex: var classList = ["Jacob", "Alex", "April"];

Jacob = Index 0

Alex = Index 1

April = Index 2

New cards
39

Append (List)

adds a new element to the end of the list. The size of the list increases by one.

New cards
40

Insert (List)

inserts an element into a list at the index given

New cards
41

Length (List)

number of elements in the list

New cards
42

Strings

sequence of characters and can contain letters, numbers, symbols and even spaces and are denoted with quotes

New cards
43

Boolean Values

can only be either true or false

New cards
44

Iterations/Loops

a repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met

New cards
45

Procedures/Functions

sections of code that will be executed only when they are called upon

ex:

callFunction();

function myFunction() {

New cards
46

Selection/ IF statement

Set of statements to execute under a certain condition.

ex: IF cats have wings, then statement will run, if it doesn’t, the code won’t run

New cards
47

Parameter/Placeholder

a variable in a function definition. Used as a placeholder for values that will be passed through the function

New cards
48

Arguments

the value passed to the parameter

New cards
49

Digital Certification

certificates that validates the ownership of encryption keys used in secure communications and are based on a trust model

New cards
50

Malware

software indented to damage a computing system or to take partial control over its operation

New cards
51

Rouge Access Point

a wireless access point that gives unauthorized access to secure networks

New cards
52

Redundancy/Fault-Tolerant

the inclusion of extra components so that a system can continue to work even if individual components fail

ex: having more than one path between any 2 connected device in a network

New cards
53

Abstraction

process of reducing complexity by focusing on the main idea

New cards
54

Byte

group of 8 bits

New cards
55

Converting Binary to Decimal

  1. Create the following flippy-do

  2. Implement your binary to the table where the last number of your binary starts at the end of the flippy-do

  3. For the boxes you got “0” in the bottom row, ignore them

  4. For the boxes you got a “1” in the bottom row, add ALL the value given above these boxes

<ol><li><p><strong>Create the following flippy-do</strong></p></li><li><p>Implement your binary to the table where the last number of your binary starts at the end of the flippy-do</p></li><li><p>For the boxes you got <strong>“0”</strong> in the bottom row,<strong> ignore them</strong></p></li><li><p>For the boxes you got a <strong>“1”</strong> in the bottom row, add <strong>ALL</strong> the value given above these boxes</p></li></ol>
New cards
56

Converting Decimal to Binary

  1. Create the following flippy-do

  2. subtract the decimal by the highest value that’s less than your decimal in the flippy-do

  3. The sum you get will need to be subtracted again by the highest value in the flippy-do

  4. Repeat step 2 until you get a sum of 0

  5. For the values you subtracted your decimal with, put a “1” on the table, for those you didn’t, put “0”

<ol><li><p><strong>Create the following flippy-do </strong></p></li><li><p>subtract the decimal by the highest value that’s less than your decimal in the flippy-do</p></li><li><p>The sum you get will need to be subtracted again by the highest value in the flippy-do </p></li><li><p><strong>Repeat step 2</strong> until you get a sum of 0</p></li><li><p>For the values you subtracted your decimal with, put a <strong>“1”</strong> on the table, for those you didn’t, put <strong>“0”</strong></p></li></ol>
New cards
57

Symmetric Key Encryption

involves one key for both encryption and decryption. Since the key can be used to unlock data, should be kept secret

New cards
58

Asymmetric Key Encryption

when the key to encrypt a message is different from the private key used to decrypt the message

New cards
59

Packets

a chunk of data sent over a network. Larger messages are divided into packets that may arrive at the destination in order, out-of-order, or not at all

New cards
60

Transmission Control Protocol (TCP)

a protocol for sending packets slowly; does error-checking to ensure all packets are received and properly ordered

New cards
61

User Datagram Protocol (UDP)

a protocol for sending packets quickly with minimal error-checking and no resending of dropped packets

New cards
62

Digital Divide

differing access to computing devices and the internet, based on socioeconomic, geographic, or demographic characteristics

New cards
63

Crowdsourcing

practice of using input or information obtained from a large number of people via the Internet

New cards
64

Citizen Science Project

the involvement of ordinary people in scientific research and data collection

ex: people all over the world count birds they see at local feeders for scientific research

New cards
65

Creative Common License

license that allows Individuals to freely distribute or use the contents of others without needing to obtain additional permissions from the author

New cards
66

Parallel Computing

where the program is broken into multiple smaller sequential computing operations, some of which are performed simultaneously

NOTE: parallel computing is executed at the same time AND are interdependent

New cards
67

Algorithmically

process of designing and implementing a solution to a problem using an algorithm

New cards
68

Metadata

data that describes other pieces of data

New cards
69

Input

Data that are sent to a computer for processing by a program

ex: clicking a mouse or clicking a button

New cards
70

Output

any data sent from a computer to device

ex: text, images, sounds, or video displayed after input

New cards
71

Return

used to return the flow of control to the point where the function was called and to return the values of expression

New cards
72

Personal Identifiable Information (PII)

information about an individual that identifies, links, relate, or describe them

New cards
73

MOD

the remainder that is left after a number is divided by another number

ex: 3 MOD 2 = 1

New cards
74

Open Protocol

protocols not owned by any particular company and not limited to a particular company’s products

purpose: allows all connected hardware and software to communicate in a standard way

New cards
75

Internet Engineering Task Force (IETF)

develops and oversees standards such as hypertext transfer protocol (HTTP), Internet protocol (IP), and simple mail transfer protocol (SMTP).

New cards
76

Heuristic

A problem solving approach (algorithm) to find a satisfactory solution where finding an exact solution is impossible

New cards
77

Floating-Point Representation (FPR)

a number with a decimal point

ex: 5.5 and 0.25 would be FPR, but 91 and 0 won’t be

New cards
robot