APCSP Exam Vocab

0.0(0)
studied byStudied by 19 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/149

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

150 Terms

1
New cards

Byte

8 bits

2
New cards

Binary Number

number represented with base 2 number system, 1 (on) or 0 (off), can represent some fractions using negative exponents

3
New cards

Bit

one piece of information that is 1 or 0, binary digit, smallest unit of data in a computer

4
New cards

Nibble

binary half byte, ½ byte or 4 bits

5
New cards

Hexadecimal

a base 16 number system using digits 0-9 and letters A-F representing values, used to represent digital data because it utilizes fewer digits than binary.

6
New cards

Decimal

a base-10 number system that uses digits from 0 to 9

7
New cards

Overflow Error

error from attempting to represent a number that is too large 

8
New cards

Rounding Off Error

mathematical miscalculation or error caused by altering a number to an integer or one with fewer decimals to fit into the format; error from attempting to represent a number that is too precise, the value is rounded

9
New cards

Sampling

process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples

10
New cards

Analog Data

data with values that change continuously, or smoothly, over time (music, colors of a painting, or position of a sprinter during a race)

11
New cards

Pixel

A pixel is one of the small discrete elements that makes up a digital image 

12
New cards

Digital Data

data that changes discreetly through a finite set of possible values, digital is more reliable when saving things 

13
New cards

Lossless Compression

process for reducing the number of bits needed to represent something without losing any info, this process is reversible 

Ex: Morse Code, text

14
New cards

Lossy Compression

process for reducing the number of bits needed to represent something in which some information is lost/thrown away, process is not reversible, results in smaller compressed files

EX: images, music, sound, video

15
New cards

Intellectual Property

creations of the mind, like inventions, literary and artistic works, and symbols, names, and images used in commerce, protected by patents, copyrights, trademarks

16
New cards

Creative Commons

public copyright license that enables creators to pre-approve certain uses of their copyrighted works by others

17
New cards

Computing System

group of computing devices and programs working together for a common purpose

18
New cards

Computing Device

machine that can run a program, including computers, tablets, servers, router and smart sensors

19
New cards

Computing Network

group of interconnected computing devices capable of sending or receiving data

20
New cards

Path

series of connections between computing devices on a network starting with a sender and ending with receiver

21
New cards

Bandwith

maximum amount of data that can be sent in through a channel or network in a fixed amount of time usually measured in bits/second, determines how quickly you can save and upload files fro internet

22
New cards

Topology

how computers are connected to each other (tree, bus, star)

23
New cards

Protocol

an agreed-upon set of rules that specify behavior of some system 

24
New cards

IP Address

temporary identifier for each interface, unique among the connected devices on that network, aka logical address of a device 

25
New cards

Internet Protocol (IP)

protocol for sending data across the internet that assigns unique numbers to each connected device 

26
New cards

Mac Address

Unique identifier for each networking device, assigned during manufacturing, aka physical address of device 

27
New cards

Router

computing devices along a path that send the information along to the next stop on the path

28
New cards

Redundancy

inclusion of extra components so that a system can continue to work even if individual components fail (having more than one path between any two connected devices in a network)

29
New cards

Fault Tolerant

Can continue to function even in the event of individual component failures, this is important because elements of complex systems like a computer network fail at unexpected times, often in groups 

30
New cards

User Data Protocol (UDP)

protocol for sending packets quickly with minimal error-checking and no resending of dropped packets, saves on time needed to retransmit missing packets

31
New cards

Transmission Control Protocol (TCP)

protocol for sending packets that does error-checking to ensure all packets are received and properly ordered

(how computers send packets of data to each other)

32
New cards

Packet

chunk of data sent over a network, larger messages are divided into packets that may arrive at the destination in order, out-of-order, or not at all

33
New cards

Datastream

information passed through the internet in packets

34
New cards

Pocket Metadata

Data added to packets to help route them through the network and assemble the original message

35
New cards

Scalability

capacity for the system to change in size and scale to meet new demands, capacity to increase services and products quickly with minimal interruption and cost

36
New cards

World Wide Web

system of linked pages, programs and files, World Wide Web is different from the Internet, the WWW are files, web pages and media (Internet is the network we use to access those files)

37
New cards

Domain Name System (DNS)

system responsible for translating domain names like example.com into IP addresses, important in helping the internet scale

38
New cards

Hypertext Transfer Protocol (HTTP)

A protocol for computers to request and share the pages that make up the world wide web on the internet

39
New cards

Digital Divide

the inequitable access to information and communication technologies (ICTs), including computers, the internet, and digital literacy skills.

40
New cards

User Interface

The inputs and outs that allow a user to interact with a piece of software

41
New cards

Input

data that are sent to a computer for processing by a program 

42
New cards

Output

 any data that are sent from a program to a device 

43
New cards

Documentation

written materials, such as user manuals or technical guides, that provide information about how to use and maintain a software program.

44
New cards

Comment

annotations within source code that programmers write for themselves or others working on the code.

45
New cards

Sequential Programming

Program statements run in order from top to bottom, No user interaction, Code runs the same way every time  

46
New cards

Debugging

the process of finding and fixing errors (bugs) in code so that it runs as intended

47
New cards

Pair Programming

a collaborative approach where two students work together on a single computer, sharing one keyboard and mouse, to develop a program

48
New cards

Expression

Combination of operators and values that evaluates to a single value 

49
New cards

Assignment Operators

allows a program to change value represented by a variable 

50
New cards

Variable

holds one value at a time, must be on left side and arrow must point left

51
New cards

String

sequence of ASCII characters, can store strings in variable just like a number, denoted with quotation marks around the string field, considered text so CAN’T be used in calculations

Only plus sign = concatenation (adding variables)  

52
New cards

Logical Operator

&& AND 

I I Or 

! NOT

symbol/word to connect 2 expressions, combines boolean expressions or values to produce a single boolean output

53
New cards

Conditional Statement

if/else statement, allows a program to make decisions based on a Boolean expression

54
New cards

Comparison Operator

compare values and return a boolean value (true, false), ==(equal to), != (not equal to), > (greater than), < (less than), >= (greater than or equal to), <= (less than or equal to).

55
New cards

Boolean Value

True or false; Can include logical operators (and or not), type of information so they can be evaluated in a Boolean expression 

56
New cards

Relational Operators

clue that we need to STOP and evaluate for a Boolean value

Examples: >, <, ==, =>, <=, ! (not equal to)

57
New cards

Function (procedure)

named group of programming instructions, also referred to as a “procedure”, only executed when called by program

58
New cards

Function (procedure) Call

command that executes the code within a function (when called will pause, execute code, once done control returns back to the line of code where the call occurred), modifies the sequential flow of the program

59
New cards

Correlation

Correlation (similarities, patterns) does not equal causation (this thing caused that thing) 

60
New cards

Metadata

data/information about data you have, can be changed without impacting primary data, Use for finding, managing and organizing information, Increases effective use of data by providing extra information, Allows data to be structures and organized

61
New cards

Data Cleaning

process of identifying and correcting or removing errors, inconsistencies, and inaccuracies in a dataset

62
New cards

Data Filtering

allows the user to look at a subset of the data, programs with built in tools (like the data visualizer) can also be used

63
New cards

Cross Tab

count how often pairs of values appear in two columns

64
New cards

Big Data

Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions. (volume, velocity, variety)

65
New cards

Crowdsourcing

practice of obtaining input or information from a large number of people via the internet

66
New cards

Citizen Science

research where some of the data collection is done by members of the public using own computing devices which leads to solving scientific problems, scientists share data and ask “citizen scientists,” to look for and report on patterns or other interesting features of the data or to “donate” computer time during periods of time their machine is inactive

67
New cards

Open Data

Sharing data with others so they can analyze it, it is publicly available data shared by governments, organizations and others; helps spread useful knowledge or creates opportunities for others to use it to solve problems

68
New cards

Data Bias

systematic errors or prejudices present in a dataset that can lead to inaccurate or unfair conclusions when analyzing the data.

69
New cards

Information

data that has been processed and given meaning, making it useful for understanding and decision-making

70
New cards

Lists

an ordered collection of elements, length of list is how many elements it contains, lists can shrink as elements are added/removed, lists start at index 0 and end at (length - 1)

71
New cards

Index

a common method for referencing the elements in a list or string using number

72
New cards

Element

An element is an individual value in a list that is assigned a unique index 

73
New cards

Data Abstraction

organizing and encapsulating certain data into a more general representation

74
New cards

Iteration

repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met (for loop, while loop, repeat until loop)

75
New cards

Infinite Loop

Loop that runs forever or infinitely 

76
New cards

For Loop

Used for known quantity when you know the start and stop 

77
New cards

While Loop

uzsable for anything 

78
New cards

Traversal

access each item in a list one at a time by using a for loop, traveling or traversing through a list one element at a time

79
New cards

Argument

the value that is passed to parameter

80
New cards

Return

does 2 things:

1) to end a procedure before the end of the code is reached (no other code in the procedure will be executed after the return statement)

2) other use is to send a value back to the calling program

(stops the flow of the function, if a return is inside of a conditional, if that condition is met the function ends here and then it returns a value to the place where the function was called)

functions only return one value at a time

81
New cards

Parameter

variable in a function definition, used as a placeholder for values that will be passed through the function, makes procedure more flexible b/c can be used for many values

82
New cards

Procedural Abstraction

extracting shared features to generalize functionality, process that allows a procedure to be used only knowing what it does, not how it does, allows a solution to a large problem to be based on the solution of smaller subproblems (only need to know name, parameters and output)

83
New cards

Library

Collection of functions that can be used in many different programs (how each function works, complete list of the parameters, what will be returned)

84
New cards

API: Application Program Interface

specifications for how the functions in a library behave and can be used 

85
New cards

Modularity

separation of a program into independent modules that are each responsible for one aspect of the program's functionality

86
New cards

Computing Innovation

includes a program as an integral part of its function, can be physical (self driving car), non physical computing software (picture editing software), or non physical computing concepts (ecommerce)

87
New cards

Personally Identifiable Information (PII)

information about an individual that identifies, links, relates, or describes them

88
New cards

Keylogging

use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

89
New cards

Phishing

technique that attempts to trick a user into providing personal information, personal information can then be used to access sensitive online resources, such as bank accounts and emails

90
New cards

Malware

software intended to damage a computing system or take partial control over its operation 

91
New cards

Rogue Access Point

a wireless access point that gives unauthorized access to secure networks

92
New cards

DDOS: Distributed Denial of Service

attack to make a website or online service unavailable by overwhelming it with traffic from multiple sources, typically a virus installed on many computers (thousands) activate at the same time

93
New cards

Decryption

A process that reverses encryption, taking a secret message and reproducing the original plain text

94
New cards

Encryption

A process of encoding messages to keep them secret so only “authorized” parties can read it

95
New cards

BotNet

a network of private computers infected with malicious software and controlled as a group without the owners' knowledge (to send spam messages)

96
New cards

Public Key (Asymmetric Encryption)

Pairs a public key for encryption and a private key for decryption, the sender doesn’t need the receiver’s private key to encrypt the message, not the but the receiver’s private key is required to decrypt the message computers use asymmetric keys

97
New cards

Cipher

generic term for a technique or algorithm that performs encryption 

98
New cards

Caesar’s Cipher

technique for encryption that shifts the alphabet by some number of characters 

99
New cards

Cracking Encryption

When you attempt to decode a secret message without knowing all the specific of the cipher you are trying to crack the encryption

100
New cards

Multi-Factor Authentication

method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are)