AP Computer Science Principles Vocabulary

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/84

flashcard set

Earn XP

Description and Tags

A collection of vocabulary words and definitions crucial for understanding AP Computer Science Principles.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

85 Terms

1
New cards

Creativity

An essential part of innovation in computer science.

2
New cards

Abstraction

Minimizes extra details to focus on pertinent information, helping manage complexity.

3
New cards

Data/Information

Input for computing, translated from raw data into consumable information.

4
New cards

Algorithms

Sets of instructions developed to solve computational problems.

5
New cards

Programming

The creation of software that enables problem-solving and is related to algorithms.

6
New cards

The Internet

A group of connected computers and servers.

7
New cards

Prototype

An original model on which later versions are based.

8
New cards

Innovation

Something new introduced in methods, ideas, or devices.

9
New cards

Binary

A way to represent information using only two options (0 and 1).

10
New cards

Bit

A single unit of information in a computer, typically a 0 or 1.

11
New cards

Bandwidth

The transmission capacity measured by the bit rate.

12
New cards

Bit rate

The number of bits conveyed or processed per unit of time.

13
New cards

Latency

The time taken for a bit to travel from its sender to its receiver.

14
New cards

Protocol

A set of rules for data exchange or transmission between devices.

15
New cards

ASCII

A universally recognized raw text format that any computer can understand.

16
New cards

IP Address

A unique number assigned to any item connected to the Internet.

17
New cards

Packets

Small chunks of information formed from larger chunks.

18
New cards

Network Redundancy

Having multiple backups to ensure reliability in high usage or failure.

19
New cards

Router

A computer that forwards data across a network.

20
New cards

DNS

Translates domain names (like example.com) to IP addresses (like 93.184.216.34).

21
New cards

IETF

Develops voluntary Internet standards and protocols, notably the Internet protocol suite.

22
New cards

HTTP

The protocol used for transmitting web pages over the Internet.

23
New cards

TCP

Provides reliable, ordered, and error-checked delivery of a stream of packets.

24
New cards

URL

An easy-to-remember address for a web page (e.g., www.code.org).

25
New cards

SSL

Standard security technology for establishing an encrypted link between server and browser.

26
New cards

TLS

A protocol providing communication security over networks, successor to SSL.

27
New cards

SMTP

Protocol for sending email messages between mail servers.

28
New cards

POP

Protocol for retrieving emails from a server.

29
New cards

HTML

A markup language used to structure content on the web.

30
New cards

Net Neutrality

The principle that all Internet traffic should be treated equally.

31
New cards

Heuristic

A problem-solving approach where finding an optimal solution is impractical.

32
New cards

Lossless Compression

A data compression algorithm that allows original data to be perfectly reconstructed.

33
New cards

Lossy Compression

Irreversible compression method discarding some data for representation.

34
New cards

Image

A type of data used for graphics or pictures.

35
New cards

Metadata

Data that describes other data, such as size and resolution.

36
New cards

Pixel

The fundamental unit of a digital image, representing a single point of color.

37
New cards

Hexadecimal

A base-16 number system using symbols 0-9 and A-F.

38
New cards

RGB

A color model using varying intensities of red, green, and blue light.

39
New cards

Byte

8 bits of data, the standard chunk size in computing.

40
New cards

File Extension

Letters following a period in a file name indicating its format.

41
New cards

Encoding

The processing of information into a memory system.

42
New cards

Decoding

Interpreting and making sense of a message.

43
New cards

Resolution

Dimensions measuring how many pixels are on a screen.

44
New cards

Density

The number of pixels in a certain space.

45
New cards

Zip Folders

Compressed files for storage or transmission.

46
New cards

Text File

A file containing only text without special formatting.

47
New cards

Favicon

A small icon displayed in the browser's address bar next to the URL.

48
New cards

Callback Function

A function specified as part of an event listener called by the system.

49
New cards

Event

An action that triggers something to happen in a program.

50
New cards

Event-Driven Program

A program that runs functions in response to specified events.

51
New cards

Event Listener

A command that triggers a function when a particular type of event occurs.

52
New cards

UI Elements

On-screen objects like buttons and images.

53
New cards

User Interface (UI)

The visual elements through which users interact with an application.

54
New cards

Data Type

Dictates how values in a programming language will be interpreted.

55
New cards

Expression

Any valid unit of code that resolves to a value.

56
New cards

Variable

A placeholder for a piece of information that can change.

57
New cards

Equality Operator

Compares two values and returns a Boolean result.

58
New cards

Global Variable

A variable accessible from any part of the code.

59
New cards

Local Variable

A variable that can only be seen and used within a specific scope.

60
New cards

Variable Scope

Determines which parts of code can access a variable.

61
New cards

Concatenate

To join text strings together in programming.

62
New cards

Conditionals

Statements that run only under specific conditions.

63
New cards

Boolean

A single value of either TRUE or FALSE.

64
New cards

Boolean Expression

An expression that evaluates to true or false.

65
New cards

Big Data

Datasets so large or complex that traditional processing applications are inadequate.

66
New cards

Moore's Law

The prediction that computing power will double every 1.5 to 2 years.

67
New cards

Caesar Cipher

An encryption technique that shifts the alphabet by a set number.

68
New cards

Cipher

A technique that performs encryption.

69
New cards

Encryption

A process of encoding messages to keep them secret.

70
New cards

Public Key Encryption

An encryption scheme where a public key encrypts data but requires a private key to decrypt.

71
New cards

Firewall

Software that allows traffic through according to security rules.

72
New cards

Phishing Scam

A method of tricking users into giving sensitive information.

73
New cards

DDoS Attack

A flood of traffic overwhelming a target server.

74
New cards

Malware

Software intended to damage or disable computers.

75
New cards

Worm

A standalone program that replicates itself to spread across networks.

76
New cards

Digital Divide

The gulf between those with access to the internet and those without.

77
New cards

Antivirus Software

Programs that scan for known viruses on a computer.

78
New cards

Asymmetric Encryption

A scheme where the encryption key differs from the decryption key.

79
New cards

HTTP

The protocol for transferring web pages across the internet.

80
New cards

TLS

A cryptographic protocol providing end-to-end communication security.

81
New cards

Algorithm

A precise sequence of instructions for processes executable by a computer.

82
New cards

Loop

A programming construct that repeats commands.

83
New cards

Function

A named group of programming instructions that perform a specific task.

84
New cards

Event Handling

Coding tasks that allow a program to respond to events.

85
New cards

Debugging

The process of finding and fixing problems in a program.