AP Computer Science Principles

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/124

flashcard set

Earn XP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

125 Terms

1
New cards

Abstraction

removing unnecessary details to focus on the important parts of a problem or system.

2
New cards

Algorithm

a step-by-step set of instructions to solve a problem or perform a task.

3
New cards

Analog data

continuous data that changes smoothly over time (like sound or light).

4
New cards

API

a set of rules that let programs communicate with each other (stands for Application Programming Interface).

5
New cards

Argument

a value passed to a procedure when it is called (can be a variable, constant, or expression).

6
New cards

Arithmetic operators

symbols used in math operations: +, −, *, /, MOD (remainder).

7
New cards

Assignment statement

stores a value in a variable using ← (e.g. x ← 5 means store 5 in x).

8
New cards

Authentication

verifying the identity of a user or system before allowing access.

9
New cards

Bandwidth

the amount of data that can be sent over a network in a set time.

10
New cards

Bias

unfair preference or discrimination in code or data that affects outcomes.

11
New cards

Binary number system

a way computers store and process data using only 0s and 1s.

12
New cards

Binary search

a fast search method that repeatedly checks the middle of a sorted list.

13
New cards

Bit

the smallest unit of data in a computer, either 0 or 1.

14
New cards

Boolean values

values that are only true or false.

15
New cards

Byte

a group of 8 bits.

16
New cards

Certificate Authority (CA)

trusted group that issues certificates to verify secure websites.

17
New cards

Citizen scientist

someone who helps scientists collect or analyze data (often online).

18
New cards

Clarity

how easy it is to understand and follow a program or code.

19
New cards

Classifying data

sorting data into categories to help find patterns or trends.

20
New cards

Cleaning data

fixing or removing errors, duplicates, or inconsistencies in a dataset.

21
New cards

Code segment

a small part of code from a bigger program.

22
New cards

Code statement

a single action in code that the computer runs.

23
New cards

Collaboration

working with others to complete a project or solve a problem.

24
New cards

Comments

notes in code for humans to read (ignored by the computer).

25
New cards

Computer virus

harmful code that spreads and can destroy or steal data.

26
New cards

Computing device

any tool that runs programs (like phones, laptops, or smartwatches).

27
New cards

Computing network

a group of connected devices that share data.

28
New cards

Computing system

a group of devices and programs working together for a task.

29
New cards

Concatenation

joining strings together to make a new one (like "Hi" + "Zain" = "HiZain").

30
New cards

Condition

a test in a program that checks if something is true or false.

31
New cards

Creative Commons Licensing

allows creators to give permission for others to use their work in specific ways.

32
New cards

Crowdfunding

raising money from many people (usually online) to support a project.

33
New cards

Crowdsourcing

getting help or ideas from a large group of people online to solve problems or contribute.

34
New cards

Cybersecurity

protecting devices, programs, and networks from digital attacks.

35
New cards

Data abstraction

using a list or data structure to manage values without needing to know how they're stored.

36
New cards

Data mining

analyzing large datasets to find useful patterns or insights.

37
New cards

Data stream

a continuous flow of data sent in packets over a network.

38
New cards

Debugging

finding and fixing errors in a program.

39
New cards

Decidable problem

a problem that can always be solved with a yes/no answer by an algorithm.

40
New cards

Decision problem

a problem that only needs a yes or no answer.

41
New cards

Decryption

converting encrypted (coded) data back into readable form.

42
New cards

Digital data

data shown as separate values (not continuous) like 0s and 1s.

43
New cards

Digital divide

the gap between people who have access to technology and those who don’t.

44
New cards

Distributed computing system

a system where many computers work together on different parts of a problem.

45
New cards

Efficiency

how well an algorithm uses resources like time or memory.

46
New cards

Element

a single item in a list (accessed using its index).

47
New cards

Encryption

turning readable data into a secret code to protect it.

48
New cards

Event-driven programming

a program that runs certain code when a specific event (like a click) happens.

49
New cards

Expression

a combination of values and operations that gives one result (like x + 5).

50
New cards

Fault-tolerant

a system that keeps working even if some parts fail (like the Internet).

51
New cards

Filtering data

choosing specific data based on conditions to analyze.

52
New cards

Heuristic

a shortcut solution that isn’t perfect but works well enough, especially for hard problems.

53
New cards

Hypertext Transfer Protocol (HTTP)

rules for transferring web pages on the Internet.

54
New cards

Hypertext Transfer Protocol Secure (HTTPS)

a secure version of HTTP that encrypts your data (used when shopping online).

55
New cards

Incremental development process

building a program piece by piece and testing as you go.

56
New cards

Information

data that has been processed to give meaning or help decision-making.

57
New cards

Intellectual property

anything you create using a computer that you legally own.

58
New cards

Internet Protocol (IP) address

a unique number given to your device when it connects to the Internet.

59
New cards

Iterative

repeating steps in a loop until a condition is met.

60
New cards

Iterative development process

coding, testing, and refining over and over to improve your program.

61
New cards

Keylogging

malicious software that secretly records what you type and sends it to someone else.

62
New cards

Library

a collection of prewritten code you can import and use in your own program.

63
New cards

Linear search

checking each item in a list one by one to find a match.

64
New cards

Lists

a collection of values stored in one variable

65
New cards

Logic error

the program runs, but the output is wrong due to incorrect logic.

66
New cards

Logical operators

used in conditions:

67
New cards

AND (both must be true),

68
New cards

OR (at least one must be true),

69
New cards

NOT (reverses true/false).

70
New cards

Lossless data compression

reduces file size without losing any data — the original can be perfectly restored.

71
New cards

Lossy data compression

reduces file size by permanently removing some data — the original can't be fully restored.

72
New cards

Malware

software designed to damage or steal data from a device.

73
New cards

Metadata

data about data (e.g., author name, creation date).

74
New cards

Modularity

breaking a program into smaller parts (modules) that each do a specific task.

75
New cards

Modulus

a math operation that returns the remainder of a division (ex: 10 MOD 3 = 1).

76
New cards

Multifactor authentication

using more than one method to confirm identity (ex: password + text message code).

77
New cards

Open access

data that’s free to use without restrictions.

78
New cards

Open source

software that’s freely available to use, modify, and share.

79
New cards

Optimization problem

a problem where you’re trying to find the best or most efficient solution.

80
New cards

Overflow error

happens when a number is too big to be stored in the given memory space.

81
New cards

Packets

chunks of data sent over a network with info about where they’re going and how to reassemble them.

82
New cards

Parallel computing system

multiple computers or processors work on different parts of a task at the same time.

83
New cards

Parameter

a variable that gets its value from an argument when a procedure is called.

84
New cards

Patterns in data

trends or repetitions in data that help you make predictions or decisions.

85
New cards

PII (Personally Identifiable Information)

info that can identify you (like your name, address, ID, or email).

86
New cards

Phishing

tricking users into sharing private info through fake emails or websites.

87
New cards

Plagiarism

using someone else's work without giving credit or getting permission.

88
New cards

Procedural Abstraction

hiding the details of how a procedure works — just use the input/output and not worry about the internal code.

89
New cards

Procedure

a reusable block of code that performs a specific task — runs only when called.

90
New cards

Program

a complete set of code that performs a specific function.

91
New cards

Program behavior

how a program works when it runs and how users interact with it.

92
New cards

Program documentation

written explanation of what the program does and how to use or understand it.

93
New cards

Program input

data sent into a program (like from a keyboard, file, or sensor).

94
New cards

Program output

data the program produces (like text on a screen, a printed page, or stored data).

95
New cards

Proprietary software

software that is owned by a company, with restrictions on how it can be used, modified, or shared.

96
New cards

Pseudocode

a simplified way to plan a program using plain language and programming-like structure.

97
New cards

Public key encryption

uses two keys — a public one to encrypt and a private one to decrypt

98
New cards

Redundancy

having backup systems or pathways in case one part of a network or system fails.

99
New cards

Relational database

stores data in tables with rows and columns and connects data across tables using relationships.

100
New cards

Return

a command in a procedure that sends back a value to wherever the procedure was called.