AP CSP IN DEPTH EXAM NOTES

5.0(1)
studied byStudied by 21 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/77

flashcard set

Earn XP

Description and Tags

Flashcards to help review lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

78 Terms

1
New cards

Debugging

Finding and fixing errors in code.

2
New cards

Collaborative Development

Working together as a team.

3
New cards

Logic Error

An error that causes code to behave wrongly or unexpectedly.

4
New cards

Lossy Compression

Compressing data in a way that you loose some of it and revert to original fully

5
New cards

Lossless compression

Compression data in a way that you can compress decrease file size but you don’t loose data and your able to completely revert to original

6
New cards

Runtime Error

An error that occurs during the execution of the program.

7
New cards

Logic Error

Unexpected result of code, like division instead of multiplication

8
New cards

Syntax Error

Error before the code even starts, like using capital letter for variable instead of lowercase

9
New cards

Argument

A value that is passed to a procedure.

10
New cards

Parameter

A placeholder in a procedure that is replaced by an argument.

11
New cards

Procedural Abstraction

A built-in procedure.

12
New cards

Iteration

The repetition of an action until a certain requirement is met.

13
New cards

String

Text that is enclosed in quotation marks.

14
New cards

Variable

A data type that can do math (usually an Integer).

15
New cards

Traversal

Iterating through each item in a list.

16
New cards

Linear Search

Goes and checks through everything beginning to end.

17
New cards

Binary Search

Splits in 1/2 and uses middle index to check through; divides and rounds down; repeats until target is found.

18
New cards

Libraries

Tools or code that you already have.

19
New cards

API (Application Programming Interface)

Allows you to call other programs to get stuff you don't have.

20
New cards

Heuristic

A good enough, fast approach when finding the real one takes too long.

21
New cards

Decidable Program

A program where you can get a yes or no answer.

22
New cards

Modularity

The separation of your code into different functions that each do a part.

23
New cards

Nested Condition

An If statement within another If statement.

24
New cards

Data Abstraction

The simplified version of a more complex function; hiding content.

25
New cards

Internet

A network of networks; interconnection of computer networks; hardware-driven.

26
New cards

Routers

Computing devices along a path that send info along to the next stop.

27
New cards

Routing

The process of finding a path from the sender to the receiver.

28
New cards

Bandwidth

The amount of data that can be moved through a network at one time, measured in bits per second (bps).

29
New cards

Internet Protocol (IP)

Every device has an IP Address; handles the addressing and routing of data packets.

30
New cards

TCP (Transmission Control Protocol)

This is reliable and makes sure all data packets come in the right order. If a packet is missing, it's re-sent.

31
New cards

UDP (User Datagram Protocol)

This is faster than TCP but is not as reliable. Sends data without checking, mainly used in Video calls and games where speed matters more than perfection.

32
New cards

Scalability

Systems ability to handle growth, adapting the server when more users arrive so it doesn't crash.

33
New cards

Fault Tolerance

Systems ability to still work even if a part fails; finds a way to keep going.

34
New cards

Hardware Failure

When physical devices stop working.

35
New cards

Operational Failure

Systems or software don't work as expected.

36
New cards

Environmental Issues

Hurricanes, earthquakes, or floods can destroy physical infrastructure because most cables go through the land and sea.

37
New cards

Solar Flare

A burst of radiation from the sun that can disrupt satellites.

38
New cards

Cyberattacks

Intentional attacks on systems or data.

39
New cards

Phishing

Tricking people into giving passwords.

40
New cards

Malware

Damages or spies on systems.

41
New cards

DDos

Overloads website with fake traffic to make it crash.

42
New cards

SQL Injection

Hacks into data by inserting fake commands.

43
New cards

Man in the Middle

Eavesdrops or alters communication between 2 parties.

44
New cards

Parallel Computing

Breaking up big tasks into smaller parts in which the computer has different processors and runs them all at the same time.

45
New cards

Distributed Computing

Where a problem is split up among multiple computers. Not just one; each computer does its own thing then sends it back.

46
New cards

Protocol

An agreed-upon set of rules.

47
New cards

Redundancy

Extra paths to help with the fault tolerance of a system.

48
New cards

Latency

The delay between sending data.

49
New cards

DNS (Domain Name System)

Turns URIs into IP addresses.

50
New cards

HTTP

The set of rules that powers the World Wide Web.

51
New cards

Cloud Computing

Storing data to the Internet cloud at a different location other than the same location as your other files; makes teamwork access easier.

52
New cards

Open Access

Free access to research or datasets available to the public.

53
New cards

Open Source Software

Software that everyone has access to so people can contribute all over.

54
New cards

Creative Commons

A speaking license that lets you do what you want with the work and how can be reused.

55
New cards

World Wide Web

Access linked pages all over the Internet.

56
New cards

Crowdsourcing

Using large online groups to help solve a problem.

57
New cards

Citizen Science

Where the public helps in research purposes for scientists.

58
New cards

Data Analytics

Analytics tools to see what people are doing online.

59
New cards

Personally Identifiable Info

Data that can identify you.

60
New cards

Cookies

Small files that track your activity on Websites; make experience smoother but can invade privacy.

61
New cards

Digital Footprint

Tracks you leave behind on the Internet.

62
New cards

Bias

Favoring a certain face or group.

63
New cards

Data Mining

Digging through huge datasets to find patterns.

64
New cards

Cybersecurity

Protecting systems from attacks.

65
New cards

Multi-factor Authentication

Using multiple proofs like a password and code.

66
New cards

Encryption

Scrambling data so it can't be accessed without a key.

67
New cards

Symmetric Encryption

Same key is used for both encrypt and decrypt.

68
New cards

Public Key Encryption

Two different keys; public key to encrypt and you key to decrypt.

69
New cards

Phishing

A scam to trick people into giving info.

70
New cards

Virus

A malware that can copy and infect files.

71
New cards

Keyloggers

Records when you type; can be used to figure out passwords.

72
New cards

Rogue Access Point

A wireless point that provides with unauthorized access to traffic over network

73
New cards

Mod

Division with remainder.

74
New cards

Binary

Start at 2 to the 0, and go up by 1 power each 0, start from right to left.

75
New cards

Hexadecimal

Numbers go from 0-9, then start going by letter starting from 10 which is A is in base 16

76
New cards

Binary Code

Can be error prone, can be used for any code, harder for humans to read

77
New cards

Base

Ex) if base is 10 and number is 71 (7×10)+(10×1)

Ex) if base is 16 and number is 71 (7×16)+(1×16)

78
New cards

Incognito

Still allows for a admin to monitor your data not completely invisible, but doesn’t save cookies or data, like shopping carts.