1/126
Vocabulary flashcards covering APCSP concepts from the lecture notes (Pages 1–10).
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
innovating
the process of imagining something that does not yet exist, with potential value, and making it real through design, implementation, and production.
iteration
repeatedly applying a process with the goal of coming closer to a solution.
iterative development process
the cycle in which computer programs are designed, developed, and tested in repeated cycles.
debug
to identify and remove errors from a computer program.
string
a linear sequence of characters, words, or other data.
dichotomous
something that can only be one thing or another (yes or no).
binary code
code represented with the two symbols 1 and 0.
bits
the foundation for digital computing (1s and 0s); short for binary digits.
digital
how information is stored, accessed, transformed and used by computers.
state space
the space of potential possibilities.
exponential growth
the rate of growth that rapidly increases in proportion to the growing total number or size.
fixed-point numbers
numbers where the decimal point is always in the same place.
floating-point numbers
numbers where the decimal point can float because there is no fixed number of digits before and after the decimal point; also called real numbers.
real numbers
numbers approximated by floating-point representations that do not necessarily have infinite precision.
scientific notation
the mathematical representation of a decimal number in floating-point form (examples: 4 x 10^3 for 4,000; 2.345 x 10^6 for 2,345,000).
algorithm
a finite set of instructions that accomplish a specific task.
sequencing
executes statements one at a time, in order.
selection
uses if…then to tell a computer how to select a step.
imperative statement
a command statement with a verb phrase that indicates an operation to perform.
descriptive qualifier
an adverb or adjective that further qualifiers or limits the meaning of a word.
natural language
a complex but structured language, spoken or written, that evolved naturally in humans. (ex. english, chinese hindi)
binary
machine code that is a direct, low-level translation from the high-level source code; a pattern of 0s and 1s.
abstraction
the process of removing or suppressing details to create a manageable level of complexity.
artificial language
a limited-size language usually developed by a small group for specific purposes; simpler and more structured.
ambiguity
uncertainty or having more than one possible interpretation.
visual programming language
a programming language that lets users drag and drop icons into organized blocks of code instead of typing.
high-level language
a programming language easier for humans to read, write, and parse; unambiguous and typically easier for machines to parse.
low-level language
a programming language with little or no abstraction that communicates closely to hardware; harder for humans to read.
compilation
the process of translating source code into machine code.
assembly language
a low-level programming language using mnemonic instructions; close to hardware.
machine language
directly related to the hardware circuitry of the processor; binary; unambiguous but hard for humans to read.
input
a user-initiated instruction that is compiled into low-level code (binary).
RAM
memory storage space used by a computer for quick read/write access.
CPU (central processing unit)
the central processing unit; the processor that calculates information.
output
the physical display of the calculated information.
flowchart
a simple diagram with symbols showing the flow of a process.
flow pattern
a pattern that can emerge when data is transformed using sequencing, selection, and iteration.
sequential execution
program instructions executed one at a time, in order.
pseudocode
an informal, non-syntax-specific way of writing algorithmic instructions; “false” code.
loop
the repetition of some code.
indefinite loop
a loop whose number of iterations is unknown, often waiting for an event.
definite loop
a loop that repeats a predetermined number of times.
procedure
a named collection of steps in an algorithm that can be reused; may have parameters and return values.
parameter
a special type of variable used within a procedure.
modularity
the subdivision of a computer program into separate subprograms.
Internet
a computer network consisting of interconnected networks using standardized, open protocols.
World Wide Web
a network of online content formatted in HTML and accessed via HTTP.
Tim Berners-Lee
the creator of the fundamental tools and technologies that make up the World Wide Web.
hyperlinks
clickable bits of text or images in HTML that link to other documents or locations.
web browser
a client application used to request and view web pages.
web server
a program on a remote computer that serves up web pages.
HTML
Hypertext Markup Language; formatting instructions for displaying web content.
URI
Uniform Resource Identifier; a unique address for resources on the web (also called URL).
HTTP
Hypertext Transfer Protocol; standards for requesting and receiving resources on the Web.
HTTPS
HTTP secured with SSL/TLS to encrypt data in transit.
cybersecurity
measures to protect computer systems from unauthorized access or attack.
confidentiality
restricting information access to authorized users.
integrity
ensuring information is accurate and unaltered.
availability
reliability of access to information.
firewall
a security system that blocks unauthorized access while allowing legitimate communication.
DDoS attack
Distributed Denial of Service; overwhelming a service with traffic to make it unavailable.
viruses
self-replicating code that can corrupt or damage a system.
social engineering
psychological manipulation of people into divulging confidential information or actions.
malware
software intended to damage or disable computers or systems.
phishing
tricking people into revealing confidential information by posing as legitimate entities.
encryption
transformation of data into a code to prevent unauthorized access.
decryption
decoding encrypted data.
symmetric key system
an encryption method where both parties share a single secret key.
asymmetric key system
an encryption method using different keys to encrypt and decrypt.
public-key encryption
an asymmetric method using a public key for encryption and a private key for decryption.
high-level programming
uses common English words, numbers and symbols. Guaranteed to be unambiguous. Easy for humans to read, write, and parse. Easy for machines to parse. (ex. Java, C++, Python, BASIC, Scratch)
low-level programming (assembly)
A direct translation of machine language using an abbreviated syntax. Guaranteed to be unambiguous. Less natural for humans, but still readable to the trained eye.
low-level programming (machine)
Directly related to the hardware circuitry of the processor. Guaranteed to be unambiguous. Difficult for humans to read and write.
certificate authorities
CA's issue digital certificates that validate ownership of
encrypted keys used in secured communications and are based on a trust
model.
trust model
validation of one's identity necessary for an event or transaction
to occur.
open platforms
software based on open standards where there is no single
ownership and is freely available through open license.
closed platform
proprietary software where the provider has control over the
application and content and can restrict access
open standard
a standard where documentation and specifications are open
to the public.
closed standard
a standard where documentation and specifications are not
available to the public.
open source
publicly available information that is free to use, distribute,
modify, and study.
closed source
privately owned information that is proprietary
Secure Sockets Layer (SSL)
The standard security technology for establishing
an encrypted link between a web server and a browser, typically indicated
with padlock icon in the address bar.Internet protocol: the protocol by which
data is sent from one computer to another on the Internet.
IPv6
Internet Protocol, Version 6 - 128-bit Internet address consisting of eight
4-character hexadecimal numbers to handle routing of many more devices.
IPv4
Internet Protocol, Version 4 - A 32-bit Internet address consisting of four
numbers each between 0 through 255, separated by periods (represents 8
bits).
domain
a group of devices connected on a network using the same protocol
to access and administer web pages.It is often associated with a specific IP address and used to identify a website or service on the Internet.
hierarchy
an arrangement of elements in a ranking of superiority. The
Internet and systems are built from the top (root) down.
packet switching
digital data is sent by breaking the data into blocks of bits
called packets, which contain both the data being transmitted and control
information for routing the data.
data stream
Information is passed through the Internet as a data stream.
Data streams contain chunks of data, which are encapsulated in packets.
SMTP
Email communication standard developed and overseen by
the Internet Engineering Task Force (Simple Mail Transfer Protocol)
TCP/IP
standard for packets and routing (Transmission Control
Protocol/Internet Protocol)
SMS
Short Message Services. Text messaging allows the user to send up to
160 characters to another device. If the message is longer it may truncate,
concatenate and/or split up into several individual messages
interface
a user-friendly picture-oriented way to interact with technology,
contributing to the widespread use of the Internet
Application Program Interfaces (APIs)/Libraries
a set of routines, protocols,
and tools for building software applications which simplify complex
programming tasks.
network
connection of devices and networks to communicate using
addresses and protocols.
client-server model
the client(s) are the end-user(s) and communicates with
the server (a centralized computer) that services the clients.
routing
the process of moving information (or packets) over a network via a
device called a router.
latency
the time elapsed between the transmission and the receipt of a
request in a system.
routing redundancy
having multiple options between two points increases the
reliability of the Internet and helps it scale to more devices and more people.
cloud computing
storing, accessing and processing data using remote
servers over a network rather than a local server or computer.
search tools
directories and search engines on the Internet that are essential
for finding information efficiently on the Web.