APCSP Final 1

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:08 AM on 3/26/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

29 Terms

1
New cards

Algorithm

An ordered set of clearly defined instructions used to accomplish a specific task. An expression of any task as a sequence of detailed steps.

2
New cards

Abstraction

A technique or process that manages complexity in a program or computer system by hiding details; creating modular code to execute specific desired functionality.

3
New cards

Variable

A place inside a program that can hold a value.

4
New cards

Loop

A programming construct used to repeat code. An infinite loop occurs when the ending condition will never evaluate to true.

5
New cards

Conditional Statement

Constructs that evaluate a relation as true or false. A block of statements indented under an "if" statement will execute if the condition is true.

6
New cards

Function / Procedure

A named group of programming instructions. In Python, procedures are known as functions.

7
New cards

Parameter

A value you can give to a method or function (e.g., in painter.forward(5), the 5 is the parameter).

8
New cards

Debugging*

The process of finding and fixing errors or bugs in a program's source code.

9
New cards

Decomposition

When a programmer breaks down code into smaller, more manageable chunks.

10
New cards

Creative Computing*

The practice of using computing and programming to create expressive, interactive, and visually engaging digital projects.

11
New cards

Packet

Small units of data transmitted on a network.

12
New cards

Metadata

Data about data; it is found in the header of a packet and includes things like IP addresses and packet size.

13
New cards

IP Address*

A unique numerical identifier assigned to a computing device to allow it to communicate over the Internet.

14
New cards

DNS (Domain Name System)

A system that provides client machines with the IP address of a server by turning human

15
New cards

TCP (Transmission Control Protocol)

A reliable, connection

16
New cards

UDP (User Datagram Protocol)

A lightweight and connectionless protocol that sends packets faster without checking for missing pieces.

17
New cards

TCP/IP*

The foundational suite of communication protocols used to interconnect network devices on the internet.

18
New cards

Redundancy

Having many machines ready to respond to a web request. It makes systems fault

19
New cards

Routing*

The process of transmitting data packets across networks from a source to a specific destination.

20
New cards

Encryption (Public Key)

A system using two paired keys: one key is used to encrypt, one to decrypt. One is shared publicly, and the other is kept private.

21
New cards

HTTPS (Hypertext Transfer Protocol Secure)*

A secure protocol used for exchanging web page content securely over the Internet using encryption.

22
New cards

Firewall*

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

23
New cards

Password Safety*

The practice of protecting online accounts, primarily by using different, complex passwords for every platform to prevent unauthorized access.

24
New cards

Phishing

Tricking a user into providing personal information (e.g., a scammer sending an email or text that makes you enter data).

25
New cards

PII (Personally Identifiable Information)

Information about an individual that is unique to them, such as their age, SSN, or medical info.

26
New cards

Bandwidth

The maximum amount of data that can be sent over a network connection in a given amount of time.

27
New cards

Latency

A measure of the delay in communication between two devices over a network.

28
New cards

Data Privacy*

The appropriate handling, protection, and use of sensitive personal information (like PII) to keep it safe from unauthorized access.

29
New cards

Ethical Impacts*

The broader societal and moral consequences of computing innovations, including issues of bias, accessibility, and privacy.