CSP Study Guide

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

Syntax error

A mistake in typed code that violates the rules of the programming language, preventing the code from running.

2
New cards

Logic error

A mistake in an algorithm or program causing unexpected behavior or incorrect results.

3
New cards

Run-time error

A mistake in a program that occurs during execution, like accessing non-existent memory.

4
New cards

Overflow error

Error due to insufficient bits to represent a number, similar to an odometer "rolling over."

5
New cards

Bit

A binary digit, 0 or 1, fundamental in binary numbers.

6
New cards

Byte

A sequence of 8 bits, essential in computing and data storage.

7
New cards

Roundoff

Error from insufficient bits to represent a number precisely, like approximating 3.14 with 3 digits.

8
New cards

Analog data

Data changing smoothly over time, like live concert pitch and volume.

9
New cards

Lossless

Data compression preserving all original data for full recovery.

10
New cards

Lossy

Data compression discarding some data, making full recovery impossible.

11
New cards

Metadata

Information about data, like file descriptions or database rows.

12
New cards

Sequencing

Sequential execution of steps in an algorithm or program, akin to a recipe.

13
New cards

Selection

Choosing a path based on a Boolean condition in an algorithm or program.

14
New cards

Iteration

Repeating steps in an algorithm until a condition is met.

15
New cards

Linear search

Algorithm searching for a target value by iterating through a list.

16
New cards

Binary search

Algorithm searching a sorted list by halving the search space.

17
New cards

Reasonable time

Algorithm runtime not increasing faster than a polynomial function of input size.

18
New cards

Heuristic

Technique aiding algorithms in finding solutions for complex problems.

19
New cards

Undecidable

A problem so complex no algorithm can answer for all inputs.

20
New cards

Library

Collection of useful procedures for program creation.

21
New cards

API

Application Programming Interface, a library with procedure descriptions.

22
New cards

Modularity

Separating a program into independent modules for functionality.

23
New cards

Traversal

Iterating over items in a list, either fully or partially.

24
New cards

Computing device

Physical device running programs, like computers or smartphones.

25
New cards

Computer network

Interconnected devices capable of data exchange.

26
New cards

Bandwidth

Maximum data transfer rate over a network connection.

27
New cards

Protocol

Agreed rules specifying system behavior.

28
New cards

Scalability

System's ability to adjust to new demands.

29
New cards

IP (Internet Protocol)

Protocol for addressing and routing data on networks.

30
New cards

TCP (Transmission Control Protocol)

Protocol for reliable data transmission.

31
New cards

UDP (User Datagram Protocol)

Lightweight data transport protocol.

32
New cards

World Wide Web

System of linked web pages and media.

33
New cards

HTTP (Hypertext Transfer Protocol)

Protocol for web data exchange.

34
New cards

Parallel computing

Splitting a program into tasks for simultaneous execution.

35
New cards

Speedup

Improvement in program time by parallel execution.

36
New cards

Distributed computing

Using multiple devices for program execution.

37
New cards

Digital divide

Disparity in computing access among communities.

38
New cards

Crowdsourcing

Collaborative model for funding, ideas, or goods creation.

39
New cards

Citizen science

Public participation in scientific research projects.

40
New cards

Creative Commons

Alternative to copyright for sharing artistic creations.

41
New cards

Open access

Policy allowing access to documents or data.

42
New cards

PII (Personally identifiable information)

Data identifying individuals.

43
New cards

Multifactor authentication (MFA)

User authentication with multiple evidence categories.

44
New cards

Encryption

Scrambling data to prevent unauthorized access.

45
New cards

Symmetric encryption

Technique using the same key for encryption and decryption.

46
New cards

Public key encryption

Asymmetric encryption using different keys for encryption and decryption.

47
New cards

Cookie

Small text tracking user information on websites.

48
New cards

Virus

Malware capable of self-replication.

49
New cards

Phishing

Deceptive attack to obtain private information.

50
New cards

Rogue access point

Unauthorized wireless access point intercepting network traffic.