AP Computer Science Principles Vocabulary

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/35

flashcard set

Earn XP

Description and Tags

These vocabulary terms primarily come from Khan Academy, with a few that I added myself. Visit the following link to see the article where these terms came from: https://www.khanacademy.org/computing/ap-computer-science-principles/ap-csp-exam-preparation/prepare-for-the-2019-ap-cs-p-exam/a/vocabulary-review?classCode=JK5335DZ

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

overflow

Error that results when the amount of bits is not enough to represent the number (like a car’s odometer “rolling over”).

2
New cards

round-off

Error that results when the number of bits is not enough to represent the number with full precision (like using 3 digits to represent pi as 3.14).

3
New cards

metadata

Data about data, like descriptive information about a file or a row in a database.

4
New cards

lossless

Compressing data in a way that preserves all data and allows full recovery of the original.

5
New cards

lossy

Compressing data in a way that discards some data and makes it impossible to recover the original.

6
New cards

sequencing

The consecutive execution of steps in an algorithm or code in a program (like steps in a recipe)

7
New cards

selection

A Boolean condition to determine which of two paths are taken in an algorithm.

8
New cards

iteration

Repeating steps in an algorithm for a certain amount of times or until a certain condition is met.

9
New cards

linear search

An algorithm that iterates through each item in a list until it finds the target value.

10
New cards

binary search

An algorithm that searches a sorted list for a value by repeatedly splitting the list in half.

11
New cards

reasonable time

A run time for an algorithm that increase as fast or faster than a polynomial function of the input size (like 10n, n^2, etc). An unreasonable run time would increase superpolynomially (like 2^n or n!).

12
New cards

heuristic

A technique designed for solving a problem more quickly when classic methods are too slow, or when such methods fail to find any exact solution.

13
New cards

undecidable

A problem that is so logically difficult, we can’t ever create an algorithm that would be able to answer "yes or "no" for all inputs (like the halting problem).

14
New cards

API (Application Programming Interface)

A library of procedures and a description of how to call each procedure.

15
New cards

bit rate

The number of bits that are transferred per second, typically measured in Kbps, Mbps, Gbps.

16
New cards

bandwidth

The maximum bit rate of a network connection.

17
New cards

latency

The time elapsed between sending a message and the recipient receiving the message.

18
New cards

IP (Internet Protocol)

The protocol that determines how to address nodes on the network (with IP addresses) and how to route data from one node to a destination node (using routers).

19
New cards

TCP (Transmission Control Protocol)

The protocol that is in charge of splitting data into small packets and reliably transmitting the packets to a destination.

20
New cards

DNS (Domain Name System)

A hierarchical system of name servers that are responsible for mapping domain names (like khanacademy.org) to IP addresses.

21
New cards

TLS (Transport Layer Security)

A protocol that adds a layer of encryption to TCP/IP connection, necessary for sending data privately across the internet.

22
New cards

symmetric encryption

A technique for encrypting data where the same key is used to both encrypt and decrypt data.

23
New cards

public key encryption

An encryption system in which anyone with a public key can encrypt a message, but only those who know the corresponding private key can decrypt the message.

24
New cards

HTTP (HyperText Transfer Protocol)

The protocol that powers the web, used to request webpages from servers and submit form data to servers.

25
New cards

HTTPS (HTTP Secure)

The combination of the HTTP and TLS protocols to create secured connections to websites.

26
New cards

cookie

A packet of data sent by a web server to a browser, which is returned by the browser each time it subsequently accesses the same server, used to identify the user or track their access to the server.

27
New cards

DDoS (Distributed Denial-of-Service)

A cyber attack that floods a server with an enormous number of requests, so that it does not have the resources to service normal user requests.

28
New cards

virus

A type of computer malware that hides within the source code of another program.

29
New cards

antivirus software

An application that attempts to detect and remove computer malware downloaded to a computer.

30
New cards

firewall

A system that monitors incoming and outgoing network traffic to a computer and filters out unwanted traffic.

31
New cards

phishing

An attack where a user is tricked into revealing private information, often via a deceptive email.

32
New cards

Moore’s Law

A prediction that the number of transistors on a chip doubles every two years, correlating to an increased speed in computers.

33
New cards

peer-to-peer networks

A system where one user’s computer connects to the Internet through another user’s computer without going through an intermediary “centralized” computer to manage the connection.

34
New cards

crowdsourcing

A model in which many online users combine efforts to help fund projects, generate ideas, or create goods or services (like Wikipedia).

35
New cards

digital divide

The idea that some communities or populations have less access to computing than others, typically due to limitations of internet speed or computer hardware access.

36
New cards

protocol

A set of rules governing the exchange or transmission of data between devices.