ap computer science principles vocabulary to know

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/67

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:37 PM on 5/14/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

68 Terms

1
New cards

Abstraction

The process of reducing complexity by focusing on the main idea

2
New cards

Algorithm

a finite set of instructions that accomplish a specific task

3
New cards

Analog

Analog data have values that change smoothly, rather than in discrete intervals, over time

4
New cards

Argument

Specify the values of the parameters when a procedure is called

5
New cards

Asymmetric encryption

Uses a public key for encryption and a private key for decryption

6
New cards

Bandwidth

The maximum amount of data that can be sent in a fixed amount of time

7
New cards

Bias

In computer systems causes unfair tendencies for or against individuals or groups of individuals

8
New cards

Binary search

An algorithm that is often more efficient than linear search because it starts at the middle of a sorted data set and eliminates half of the data; the process repeats until a desired value is found or all elements have been eliminated. Data must be sorted in order to use this method.

9
New cards

Bit

Shorthand for binary digit and is either 0 or 1

10
New cards

Boolean

A value that is either true or false

11
New cards

Byte

8 bits

12
New cards

Certificate authorities

Entities that issue digital certificates that validate the ownership of encryption keys used in secure communications

13
New cards

Citizen science

Scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices

14
New cards

Cleaning data

Is a process that makes the data uniform without changing their meaning (e.g., replacing all equivalent abbreviations, spellings, and capitalizations with the same word)

15
New cards

Computer Network

Is a group of interconnected computing devices capable of sending and receiving data (is a type of computing system)

16
New cards

Computer virus

Is a malicious program that can copy itself and gain access to a computer in an unauthorized way

17
New cards

Computing innovation

Includes a program as an integral part of its function

18
New cards

Computing system

Is a group of computing devices and programs working together for a common purpose

19
New cards

Conditional statement

("if"-statements) execute different statements based on the value of a Boolean expression

20
New cards

Creative commons

A public copyright license that enables the free distribution of an otherwise copyrighted work. This is used when the content creator wants to give others the right to share, use, and build upon the work they created

21
New cards

Crowdsourcing

Obtaining input or information from a large number of people via the Internet

22
New cards

Data compression

Can reduce the size (number of bits) transmitted or stored data

23
New cards

Decidable problem

A decision problem for which an algorithm can be written to produce a correct output for all inputs

24
New cards

Decision problem

A problem with a yes/no answer

25
New cards

Decryption

The process of decoding data that has been encrypted

26
New cards

Digital divide

The difference in access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics

27
New cards

Distributed computing

A computational model in which program operations are run on multiple devices

28
New cards

Encryption

The process of encoding data to prevent unauthorized access

29
New cards

Fault tolerant

The ability of a computer system to continue functioning when one or more of its devices or connections fail

30
New cards

Heuristic

An approach to a problem that produces a solution that is not guaranteed to be optimal but may be used when finding a guaranteed optimal solution is impractical

31
New cards

Iteration (for or while loop)

Is a repeating portion of an algorithm

32
New cards

Keylogging

The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

33
New cards

Linear search

Check each element of a list, in order, until the desired value is found or all elements in the list have been checked

34
New cards

Logic error

Is a mistake in an algorithm or program that causes it to behave incorrectly or unexpectedly

35
New cards

Lossless compression

Algorithm to reduce the number of bits stored or transmitted while guaranteeing complete reconstruction of the original data

36
New cards

Lossy Compression

Algorithm to reduce the number of bits stored or transmitted but only allows reconstruction of an approximation of the original data

37
New cards

Malware

Software intended to damage a computing system or to take partial control over its operation

38
New cards

Metadata

Data about data. For example, for an image, it may include the date of creation or the file size of the image

39
New cards

Multi-factor authentication

A method of computer access control in which a user is only granted access after successfully presenting several pieces of evidence

40
New cards

nested conditional statements

Consist of conditional statements within conditional statements

41
New cards

Open Access

Online research output free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions

42
New cards

open source

Programs that are made freely available and may be redistributed and modified

43
New cards

Overflow Error

Is an error that occurs when a program attempts to handle data that is outside of the defined range of values

44
New cards

packet

A small amount of data along with some metadata used for routing it between the origin and the destination on the Internet, as well as data for reassembly

45
New cards

Parallel Computing

A computational model in which program operations are broken into multiple smaller sequential computing operations, some of which are performed simultaneously

Time takes as long as its sequential tasks plus the longest of its parallel tasks

46
New cards

Parallel systems

Multiple computing devices connected to complete many calculations or processes simultaneously

47
New cards

Parameter

Are input variables of a procedure (used to define the function)

48
New cards

Personally Identifiable Information (PII)

Information about an individual that identifies, links, relates, or describes them

49
New cards

Phishing

A technique that attempts to trick a user into providing personal information

50
New cards

Protocol

An agreed-upon set of rules that specify the behavior of a system

Internet protocols are open (everyone has access to them)

51
New cards

Redundancy

The inclusion of extra components that can be used to mitigate failure of a system if other components fail (helps create fault-tolerance)

52
New cards

Rouge Access Point

A wireless access point that gives unauthorized access to secure networks

53
New cards

Round-off Error

Is the difference between an approximation of a number used in computation and its exact (correct) value

Occurs when a value exceeds the range of numbers that can be represented by a fixed number of bits

54
New cards

Routing

The process of finding a path from the send device to receiving device

55
New cards

Run-time error

Is a mistake in a program that occurs during the execution of the program

56
New cards

Scalability

Is the capacity for a system to change in size and scale to meet new demands

57
New cards

Selection (if or if/else)

Determines which parts of an algorithm are executed based on a condition being true or false

58
New cards

Sequencing

Is the application of each step of an algorithm in the order in which the code statements are given

59
New cards

Sequential computing

A computational model in which program operations are performed in order one at a time

60
New cards

Software library

Collection of procedures (functions) that are ready to be used in creating new programs

61
New cards

Speedup

The speedup of a parallel solution is measured in the time it took to complete the task sequentially divided by the time it took to complete the task in parallel

62
New cards

String

Is an ordered sequence of characters

63
New cards

String concatenation

Joins two or more strings end-to-end to make a new string

64
New cards

Symmetric encryption

Uses a single key for both encryption and decryption

65
New cards

Syntax error

Is a mistake in a program where the rules of the programming language are not followed

66
New cards

The Internet

The world-wide computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols

67
New cards

Undecidable problem

A decision problem for which no algorithm can be constructed that is always capable of providing a correct yes-or-no answer

68
New cards

World Wide Web (WWW)

A system of linked pages, programs, and files shared on the internet

HTTP is a protocol used by the WWW

WWW uses the Internet