AP Computer Science Principles

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/114

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

115 Terms

1
New cards

Logic error

An error in a program that makes it do something other than what the programmer intended.

2
New cards

Pair programming

Involves two programmers at a single workstation. At any given point in time, one is writing code and the other is actively observing, watching for possible errors

but also thinking about the overall approach.

3
New cards

Runtime error

An error that occurs when the program is run using certain sets of data that result in some illegal operation, such as dividing by zero.

4
New cards

Syntax error

An error that occurs because a program statement fails to follow the correct rules of syntax.

5
New cards

Open source

Software whose source code is freely available and may be used, distributed, or modified by anyone.

6
New cards

Ethics

The study of how to decide if something is morally right or wrong.

7
New cards

Infinite loop

The repetitive execution of a block of operations that will never end. This is a fatal error when it occurs in an algorithm.

8
New cards

Sequential operation

An algorithmic operation that carries out a single task and then moves on to the next operation in sequence.

9
New cards

Conditional statements

a block of code that performs different actions or computations based on the value of a Boolean expression, or condition (same as selection - represented by if-else)

10
New cards

Input

the data or information that a computer receives to perform a task or process

11
New cards

Iteration

The repetitive execution of a block of operations.

12
New cards

Output

the information or data that a computer system generates as a result of processing input data

13
New cards

Pseudocode

a simplified, English-like way of writing code or algorithms before translating them into a specific programming language

14
New cards

Sorting

The task of putting a list of values into numeric or alphabetical order.

15
New cards

Boolean expression

An expression that can evaluate only to true or false.

16
New cards

Program

a set of instructions written in a programming language that a computer executes to perform a specific task

17
New cards

Event Driven Programming

a programming approach whereby the program's behavior is controlled by writing code that responds to various events that occur, such as Button clicks.

18
New cards

Hardware

the large and small physical components that make up a computers such as the computer's keyboard or its processor.

19
New cards

Software

the computer programs that make up a computer system such as the mobile apps we will be creating in this course.

20
New cards

Abstraction

the process of simplifying complex systems or concepts by hiding unnecessary details and focusing on relevant aspects

21
New cards

Binary Number

a number written in the binary system, a system that uses only two digits, 0s and 1s.

22
New cards

Data

is distinct information that is formatted in a special way. It exists in a variety of forms, like text on paper or bytes stored in electronic memory

23
New cards

Intellectual Property

refers to any property that is created using original thought. Including patents, copyrights, and trademarks.

24
New cards

Network

a group of two or more computer systems linked together

25
New cards

Social Networking

the use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself.

26
New cards

Analog

a device or system that represents changing values as continuously variable physical quantities

27
New cards

ASCII

a code for representing English characters as numbers, with each letter assigned a number from 0 to 127

28
New cards

Cloud Computing

the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

29
New cards

Cryptography

the art of protecting information by transforming it into an unreadable format, called cipher text

30
New cards

Digital

any system based on discontinuous data or events.

31
New cards

Spam

electronic junk mail or junk newsgroup postings

32
New cards

Bit

Single unit of information on a computer represent as a 0 or 1

33
New cards

Bit Rate

The number of bits that are conveyed or processed per unit of time

34
New cards

Latency

The time it takes for a signal to arrive (lag)

35
New cards

WiFi

A wireless networking technology that utilizes radio waves to transmit information/data

36
New cards

Bandwidth

The maximum amount of data that can be transmitted over a network in a given amount of time.

37
New cards

IP Address

A number assigned to any item that is connected to the Internet.

38
New cards

Packets

Small chunks of information that have been carefully formed from larger chunks of information.

39
New cards

Router

a device that forwards data packets between computer networks

40
New cards

Transmission Control Protocol (TCP)

Provides reliable, ordered, and error-checked delivery of a stream of packets on the internet.

41
New cards

Domain Name System (DNS)

the Internet's system for converting alphabetic names into numeric IP addresses.

42
New cards

Hypertext Transfer Protocol (HTTP)

The protocol used by the World Wide Web. It describes how messages are formatted and interchanged, and how web servers respond to commands.

43
New cards

Server

A computing device that awaits and responds to requests for data.

44
New cards

Client

A computing device that requests data stored on a server.

45
New cards

Net Neutrality

The principle that Internet service providers should enable access to all content and applications regardless of the source, and without favoring or blocking particular products or websites.

46
New cards

Internet Censorship

The control or suppression of what can be accessed, published, or viewed on the Internet.

47
New cards

Routing Table

A data table stored in a router that lists the routes to particular network destinations

48
New cards

Algorithm

A precise sequence of instructions for processes that can be executed by a computer

49
New cards

Function/Procedure

A piece of code that you can easily call over and over again.

50
New cards

Application Programming Interface (API)

a collection of commands made available to a programmer

51
New cards

Documentation

a description of the behavior of a command, function, library, API, etc.

52
New cards

Parameter

Variables defined in the heading of the function/procedure, if required, that allow input values to be sent into the function in its calling statement.

53
New cards

Loop

The action of doing something over and over again.

54
New cards

Byte

technical term for 8 bits of data

<p>technical term for 8 bits of data</p>
55
New cards

Heuristic

a problem solving approach (algorithm) to find a satisfactory solution where finding an optimal or exact solution is impractical or impossible.

<p>a problem solving approach (algorithm) to find a satisfactory solution where finding an optimal or exact solution is impractical or impossible.</p>
56
New cards

Metadata

Data that describes other data. For example, a digital image my include metadata that describe the size of the image, number of colors, or resolution.

<p>Data that describes other data. For example, a digital image my include metadata that describe the size of the image, number of colors, or resolution.</p>
57
New cards

Pixel

Short for "picture element" it is the fundamental unit of a digital image, typically a tiny square or dot which contains a single point of color of a larger image.

<p>Short for "picture element" it is the fundamental unit of a digital image, typically a tiny square or dot which contains a single point of color of a larger image.</p>
58
New cards

Lossless Compression

A compression scheme in which every bit of the original data can be recovered from the compressed file.

<p>A compression scheme in which every bit of the original data can be recovered from the compressed file.</p>
59
New cards

Lossy Compression

A compression scheme in which "useless" or less-than-totally-necessary information is thrown out in order to reduce the size of the data. The eliminated data is unrecoverable.

<p>A compression scheme in which "useless" or less-than-totally-necessary information is thrown out in order to reduce the size of the data. The eliminated data is unrecoverable.</p>
60
New cards

RGB

the color model that uses varying intensities of (R)ed, (G)reen, and (B)lue light added together in order to reproduce a broad array of colors.

<p>the color model that uses varying intensities of (R)ed, (G)reen, and (B)lue light added together in order to reproduce a broad array of colors.</p>
61
New cards

Heuristic

A problem that can not be solved in a reasonable amount of time. Often used to create an approximate or good enough solution.

62
New cards

Innovation

A novel or improved idea, device, product, etc. or the development thereof

63
New cards

Big Data

a broad term for datasets so large or complex that traditional data processing applications are inadequate.

64
New cards

Cipher

the generic term for a technique (or algorithm) that performs encryption

65
New cards

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text

66
New cards

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

67
New cards

Public Key Encryption

An asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.

68
New cards

Digital Divide

the gulf between those who have ready access to computers and the Internet, and those who do not.

69
New cards

Filter

tool/technique using dynamic parameters for reducing a data set to viewing only similar items in a row or column.

70
New cards

Protocol

A set of rules governing the exchange or transmission of data between devices.

71
New cards

ASCIII

The universally recognized raw text format that any computer can understand

72
New cards

Redundancy

the presence of duplicated or unnecessary data, components, or functions within a system. This duplication is often intended to improve reliability and resilience, allowing the system to continue functioning even if some components fail

73
New cards

HTTPS

the secure version of HTTP, the standard protocol for transferring data on the web. The "S" signifies that the connection between a web browser and a website is encrypted and secure, protecting data transmitted between them

74
New cards

TCP

provides reliable, ordered and error checked delivery of a stream of packets in the internet

75
New cards

URL

an easy to remember address for calling a web page

76
New cards

Decimal

Traditional number system using digits 0-9.

77
New cards

Creative Commons

one of several public copyright licenses that enable the free distribution of an otherwise copyrighted work. A CC license is used when an author wants to give people the right to share, use, and build upon a work that they have created.

<p>one of several public copyright licenses that enable the free distribution of an otherwise copyrighted work. A CC license is used when an author wants to give people the right to share, use, and build upon a work that they have created.</p>
78
New cards

High Level Programming Language

A programming language that enables a programmer to write programs that are more or less independent of a particular type of computer. Such languages are considered high-level because they are closer to human languages and further from machine languages. Examples: JavaScript, Java, FORTRAN

79
New cards

Low Level Programming Language

A programming language that provides little or no abstraction from a computer's instruction set architecture—commands or functions in the language map closely to processor instructions. Generally this refers to either machine code or assembly language.

80
New cards

Fault tolerant network

a system's ability to continue operating correctly even in the presence of errors, faults, or failures in its components

81
New cards

Global Variable

A variable whose scope is "global" to the program, it can be used and updated by any part of the code. Its global scope is typically derived from the variable being declared (created) outside of any function, object, or method.

82
New cards

If Statement

The common programming structure that implements "conditional statements".

83
New cards

Local Variable

A variable with local scope is one that can only be seen, used and updated by code within the same scope. Typically this means the variable was declared (created) inside a function; includes function parameter variables.

84
New cards

User Interface

The visual elements of an program through which a user controls or communications the application. Often abbreviated UI.

85
New cards

Data Type

(ex: Number, Boolean, or String) a value's property that dictates how the computer will interpret it.

86
New cards

Variable

A placeholder for a piece of information that can change.

87
New cards

Debugging

Finding and fixing problems in your algorithm or program.

88
New cards

Conditionals

statements that run under only certain conditions

89
New cards

Selection

uses a Boolean condition to determine which of two or more parts of an algorithm are to be executed.

90
New cards

Concatentate

to link together or join. Typically used when joining together text Strings in programming (e.g. "Hello, "+name)

91
New cards

Binary Search

a search algorithm that starts at the middle of a sorted set of numbers and removes half of the data; this process repeats until the desired value is found or all elements have been eliminated.

92
New cards

Linear Search

a search algorithm which checks each element of a list, in order, until the desired value is found or all elements in the list have been checked.

93
New cards

Cleaning Data

a process that makes the data uniform without changing its meaning (replacing all equivalent abbreviations, spellings, and capitalizations with the same word).

94
New cards

Transforming Data

editing or modifying data (doubling every number/graphing data points)

95
New cards

Data Mining

the application of statistical techniques to find patterns and relationships among data for classification and prediction

96
New cards

Sampling

A process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples.

97
New cards

Base 2

The name given to the counting system for Binary (0-1)

98
New cards

Base 10

The name given to the counting system for Decimal Values (0 - 9)

99
New cards

Citizen Science

scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices.

100
New cards

Crowd Sourcing

A subfield of computer science that attempts to solve problems by using the ability of many humans to solve small subproblems and then using computers to combine those solutions into some meaningful results.