AP Computer Science Principles Vocabulary Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/96

flashcard set

Earn XP

Description and Tags

Flashcards for AP Computer Science Principles vocabulary review.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

97 Terms

1
New cards

Binary

A base-2 numeral system that uses only 0 and 1.

2
New cards

Bit

A single unit of information in a computer, typically represented as 0 or 1.

3
New cards

Byte

A unit of digital information that most commonly consists of eight bits.

4
New cards

Overflow Error

An error that occurs when a calculation produces a result that is greater than the capacity of the storage.

5
New cards

Round-off Error

The difference between an approximate value and the exact value.

6
New cards

Analog Data

Data represented in a continuous manner.

7
New cards

Digital Data

Data represented using discrete values.

8
New cards

Sampling

The process of converting analog data into digital data by taking discrete samples.

9
New cards

Lossless Compression

A data compression technique that allows the original data to be perfectly reconstructed from the compressed data.

10
New cards

Lossy Compression

A data compression technique that loses some data in order to achieve higher compression rates.

11
New cards

Intellectual Property

Creations of the mind, such as inventions, literary and artistic works, designs, and symbols, names, and images used in commerce.

12
New cards

Creative Commons

A set of licenses that allow creators to share their work while retaining some rights.

13
New cards

Computing Device

A physical artifact that can run a program.

14
New cards

Computing System

A group of computing devices and programs working together for a common purpose.

15
New cards

Computing Network

A group of interconnected computing devices capable of sending or receiving data.

16
New cards

Path

A sequence of connections between computing devices in a network.

17
New cards

Bandwidth

The maximum rate of data transfer across a network.

18
New cards

Protocol

A set of rules governing the exchange or transmission of data between devices.

19
New cards

IP Address

A unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

20
New cards

Internet Protocol (IP)

The primary protocol for routing data packets across network boundaries.

21
New cards

Router

A networking device that forwards data packets between computer networks.

22
New cards

Packet

A formatted unit of data carried by a network.

23
New cards

Redundancy

The inclusion of extra components so that a system can continue to work even if some components fail.

24
New cards

Fault Tolerant

The ability of a system to continue operating properly in the event of the failure of some of its components.

25
New cards

HTTP

The protocol used for transmitting web pages over the Internet.

26
New cards

Internet

A global network of interconnected computer networks that use the Internet Protocol Suite (TCP/IP) to communicate.

27
New cards

World Wide Web

An information system on the Internet that allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another.

28
New cards

Digital Divide

The gap between demographics and regions that have access to modern information and communications technology.

29
New cards

User Interface

The means by which a user interacts with a computer system or application.

30
New cards

Input

Data that is entered into a computer system or program.

31
New cards

Output

Data that is produced by a computer system or program.

32
New cards

Program Statement

A single instruction in a computer program.

33
New cards

Program

A set of instructions that tells a computer what to do.

34
New cards

Sequential Programming

A programming paradigm where program statements are executed in a linear order.

35
New cards

Event Driven Programming

A programming paradigm in which the flow of the program is determined by events.

36
New cards

Documentation

Written material that explains how a program works.

37
New cards

Comment

A programmer-readable explanation or annotation in the source code of a computer program.

38
New cards

Pair Programming

A software development technique in which two programmers work together at one workstation.

39
New cards

Debugging

The process of finding and fixing errors in a computer program.

40
New cards

Development Process

The steps or phases used to create software.

41
New cards

Event

An action or occurrence recognized by a software, often originating asynchronously from the external environment, that may be handled by the software.

42
New cards

Expression

A combination of values, variables, operators, and function calls that can be evaluated to produce a result.

43
New cards

Assignment Operator

A symbol used to assign a value to a variable.

44
New cards

Variable

A storage location in a computer's memory that is used to hold a value.

45
New cards

String

A sequence of characters.

46
New cards

Boolean Value

A data type that has one of two possible values (usually denoted true and false).

47
New cards

Comparison Operators

Operators used to compare two values (e.g., ==, !=,

48
New cards

Logical Operator

Operators used to perform logical operations (e.g., AND, OR, NOT).

49
New cards

Conditional Statement

A statement that executes a block of code only if a certain condition is true.

50
New cards

Function

A block of organized, reusable code that performs a specific task.

51
New cards

Function Call

An expression that invokes a function, executing the code within that function.

52
New cards

List

An ordered collection of elements.

53
New cards

Element

An item in a list.

54
New cards

Index

The position of an element in a list or array.

55
New cards

Iteration

The repetition of a process or block of code.

56
New cards

Infinite Loop

A loop that never terminates because its condition is always true.

57
New cards

Traversal

The process of accessing each element in a list or data structure.

58
New cards

Data Abstraction

Hiding complex implementation details and exposing only essential information to the user.

59
New cards

Problem

A question or difficulty that needs a solution.

60
New cards

Algorithm

A step-by-step procedure for solving a problem.

61
New cards

Efficiency

A measure of how well an algorithm uses resources, such as time and memory.

62
New cards

Linear Search

A search algorithm that checks each element in a list until the target value is found or the end of the list is reached.

63
New cards

Binary Search

A search algorithm that repeatedly divides a sorted list in half until the target value is found or the sublist is empty.

64
New cards

Reasonable Time

An amount of time that is practical and acceptable for an algorithm to complete.

65
New cards

Unreasonable Time

An amount of time that is impractical and unacceptable for an algorithm to complete.

66
New cards

Heuristic

A problem-solving approach (algorithm) that employs a practical method.

67
New cards

Decision Problem

A problem with a yes or no answer.

68
New cards

Optimization Problem

A problem that requires finding the best solution from a set of possible solutions.

69
New cards

Undecidable Problem

A problem for which no algorithm can be constructed that is always capable of providing a correct yes-or-no answer.

70
New cards

Sequential Computing

A computational model in which operations are performed in a sequential order.

71
New cards

Parallel Computing

A computational model in which operations are performed simultaneously.

72
New cards

Distributed Computing

A computational model in which operations are performed on multiple computers connected over a network.

73
New cards

Speedup

The ratio of the time it takes to solve a problem using a single processor to the time it takes to solve the same problem using multiple processors.

74
New cards

Parameter

A variable that is passed into a function.

75
New cards

Argument

The actual value passed to a function when it is called.

76
New cards

Return

To send a value back to the caller from a function.

77
New cards

Procedural Abstraction

The process of hiding the implementation details of a procedure and exposing only its interface.

78
New cards

Library

A collection of pre-written code that can be used in a program.

79
New cards

API

A set of functions and procedures that allow the creation of applications that access the features or data of an operating system, application, or other service.

80
New cards

Citizen Science

Scientific research conducted, in whole or in part, by amateur or nonprofessional scientists.

81
New cards

Cleaning Data

The process of correcting or removing inaccurate, incomplete, or irrelevant data.

82
New cards

Correlation

A statistical measure that expresses the extent to which two variables are linearly related.

83
New cards

Crowdsourcing

The practice of obtaining needed services, ideas, or content by soliciting contributions from a large group of people, especially from the online community.

84
New cards

Information

Data that has been processed and organized in a meaningful way.

85
New cards

Data Bias

A systematic error that skews results in a certain direction.

86
New cards

Data Filtering

The process of selecting a subset of data based on specific criteria.

87
New cards

Computing Innovation

A new computer artifact or computing technique.

88
New cards

Personally Identifiable Information (PII)

Any information that can be used to identify an individual.

89
New cards

Phishing

A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.

90
New cards

Keylogging

The practice of recording the keys pressed on a keyboard, typically without the user's knowledge.

91
New cards

Malware

Software that is intended to damage or disable computers and computer systems.

92
New cards

Rogue Access Point

A wireless access point that has been installed on a secure network without explicit authorization from a local network administrator.

93
New cards

Encryption

The process of converting data into a form that cannot be easily understood by unauthorized people.

94
New cards

Decryption

The process of converting encrypted data back into its original form.

95
New cards

Symmetric Key Encryption

An encryption method in which the same key is used to encrypt and decrypt data.

96
New cards

Public Key Encryption

An encryption method that uses a pair of keys: a public key for encryption and a private key for decryption.

97
New cards

Multi-factor Authentication

An authentication method that requires the user to provide multiple pieces of evidence to verify their identity.