AP Computer Science Principles Vocab

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/148

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

149 Terms

1
New cards

Abstraction

process of removing unnecessary details to focus on essential ones

2
New cards

Algorithm

set of steps to do a task or solve a problem

3
New cards

Analog Data

continuous series of data values that change smoothly over time

4
New cards

API (Application Programming Interface)

define how other programs can interface or interact with their programming module or application

5
New cards

Argument

hold a value that is passed to a procedure when it is called

6
New cards

can be - constant; variable; or an experssion to evaluate

7
New cards

Arithmetic Operators

symbols used in programs for mathematical operations

8
New cards
  • - addition
9
New cards
  • subtraction
10
New cards
  • - multiplication
11
New cards

/ - division

12
New cards

MOD - remainder after dividing

13
New cards

Assignment Statement

states a value in a variable.

14
New cards

The right side is evaluated and the result is stores in the left side variable

15
New cards

<--

16
New cards

Authentication

verifying users requesting access to a system before providing admittance

17
New cards

Bandwidth

measures the amount of data that can be sent over a network in a fixed amount of time

18
New cards

Bias

discrimination for or against certain groups or individuals

19
New cards

Binary Number System

uses values 0 and 1 and is used by computers at the lowest level to execute code

20
New cards

Binary Search

algorithm that uses a "divide and conquer" process.

21
New cards
  • must be sorted
22
New cards

each iteration starts in the middle; then determining if the value is higher or lower, the half that is not included will be not used in the continued iteration

23
New cards

Bit

binary digit, which can only be 0 or 1

24
New cards

Boolean Values

can be only true or false

25
New cards

Byte

made up of 8 bits

26
New cards

Certificate Authority (CA)

issues a digital certification that verifies that the data encryption code belongs to the organization

27
New cards
  • enables transfer of confidential data
28
New cards

Citizen Scientist

volunteers who work with a scientific team to help colelct or review data from their home, that can be in a separate location than the scientific team

29
New cards

Clarity

how easy it is to understand the code

30
New cards

Classifying Data

process of identifying incomplete or duplicate data and ensuring that the data is all uniform (same style like St. or street) without changing the meaning of the data

31
New cards

Code Segment

can be a single line or a collection of lines of code that are part of a program

32
New cards

Code Statement

sections of a program with an action to be executed

33
New cards

Collaboration

people working together to produce a quality product

34
New cards

Comments

used to document a program internally

35
New cards

Computer Virus

spread by attaching itself to a valid file

36
New cards

can then replicate and spread by wither collecting or destroying data/programs

37
New cards

Computing Device

piece of equipment that can run a computer program

38
New cards

Computing Network

collection of computing devices that can send and recieve data

39
New cards

Computing System

multiple computing devices and programs work together for a specific purpose

40
New cards

Concatenation

when strings are join or "glues" together to form a new string

41
New cards

Condition

use relational operators (

42
New cards

Creative Common Licensing

allows creators to assign different levels of copyright access to their intellectual property

43
New cards

Crowdfunding

uses resources like the Internet to ask people globally to donate money to help fund the project they need

44
New cards

Crowdsourcing

provides opportunities or anyone with access to a site to participate in various ways: providing feedback; help solve problems; offering funding

45
New cards

Cybersecurity

protects our computing devices and networks from attacks and unauthorized access

46
New cards

Data Abstraction

assigning a data value to a list

47
New cards

Data Mining

analyzes large data sets to search for patterns that can lead to new insights for the organization

48
New cards

Data Stream

segments of data packages in packets through a network such as the Internet

49
New cards

Debugging

finding and correcting errors in a program

50
New cards

Decidable Problem

when an alogorithm can be created that provides a yes or no answer for all instances of the problem

51
New cards

Decision Problem

only needs a yes or no answer

52
New cards

Decryption

process of deciphering an encrypted message so it can be read

53
New cards

Digital Data

made up of discrete data values

54
New cards

Digital Divide

describes those who lack access to the Internet based on location, economic, or accessibility reasons

55
New cards

Distributed Computing System

multiple computers are used to process a program or application

56
New cards

(e. Internet)

57
New cards

Efficiency

measures the amount of resources, such as memory and time, it takes to run

58
New cards

Element

each data value in a list is an element. it is referenced through its index

59
New cards

Encryption

process of converting data into a coded format

60
New cards

Event-driven programming

when a program operates in a wait state and an action, such as pressing a button, provides input and triggers a section of code to run

61
New cards

(ex. pressing the green flag) - this triggers the start of the program

62
New cards

Expression

combination of variables or values and operation to be performed on them

63
New cards

Fault-tolerant

system, like the Internet, is fault-tolerant when redundancy is built in to ensure processing can occur even when sections of the system are not working

64
New cards

Filtering Data

involves selecting a subset of data, sometimes based on its classifications, to use for further analysis

65
New cards

Heuristic

a solution to a problem that is not optimal or the best but is close enough to work, especially when the optimal solution is unreasonable

66
New cards

Hypertext Transfer Protocol (HTTP)

the World Wide Web uses this to send requested web pages across the Internet

67
New cards

Hypertext Transfer Protocol Secure (HTTPS)

provides the secure processing of a web page.

68
New cards

important to check for before sending personal data (credit card info)

69
New cards

Incremental Development Process

create small goals and later combine them together with the other completed goals to finish the project

70
New cards

Information

data that has been analyzed and has meaning applied to it

71
New cards

Intellectual Property

anything a person creates using a computer is the intellectual property of that person

72
New cards

Internet Protocol Address (IP Address)

addresses a unique number assigned each time a devie connects to the Internet. It is how the network knows where to find your devidce to recieve and send requested information.

73
New cards

Iterative

means to repeat a code a specific number of times, or until a condition is true using a loop structure

74
New cards

Iterative Development Process

repeats the steps of coding, testing, and feedback to refine a section of code until it is complete

75
New cards

Keylogging

malware that captures keystrokes and stores them in a file that is later transmitted to whoever planted the software

76
New cards

Library

collection of programs where the executable code is made available to other programmers.

77
New cards

Linear Search

sequential search of a dataset. Starts at the beginning and checks each value to see if it matches the target value being sought.

78
New cards

lists

collection of data values stored in one variable. Each data value, or element, is referenced by its index position

79
New cards

Logic Error

occurs when the code runs but produces incorrect results

80
New cards

Logical Operators

AND, OR, and NOT and are used to create more complex conditions that evalutate to a Boolean Value (true/false)

81
New cards

Lossles Data Compression

technique to make files smaller and allows the original file to be RESTORED when the data is decompressed

82
New cards

Lossy Data Compression

can acheive more compression than loseless, but some data is lost and the original file CANNOT be restored

83
New cards

Malware

stands for malicious software and includes anything placed on a device, unknown to the owner, for destructive purposes

84
New cards

Metadata

data about data, such as the author of a document. used to help organize and find data

85
New cards

Modularity

style of programming that breaks the requirements into smaller pieces until each module does a specific task or set of tasks

86
New cards

Modulus

this operation provides only the remainder after dividing

87
New cards

Multifactor authentication

uses more than one method to ensure someone trying to access an account should be granted access.

88
New cards

Open Access

data that is open access is freely available online with limited, if any, copyright restrictions

89
New cards

Open Source

software is avilable for anyone to use or modify without restrictions

90
New cards

Optimization Problem

attempts to find the best solution for the problem

91
New cards

Overflow Error

occurs when a number is too large for the number of bits the programming language allocates for it.

92
New cards

Packets

created by breaking data into same size segments. A header is created with the sending and receiving IP addresses, the size of the packet, and its position in the reassembled data stream

93
New cards

Parallel Computing System

uses multiple computers to process a section of a program at the same time.

94
New cards

Parameter

used to accept data values into a procedure. The values are sent through arguments when the procedure is called

95
New cards

Patterns In Data

raw data is analyzed for patterns to help gain insights into its meaning

96
New cards

Personally Identifiable Information (PII)

any information that identifies you

97
New cards

Phishing

uses messages and websites that look like another organization's official sire to fool users into clicking on it and entering information (passwords and account data)

98
New cards

Plagiarism

copying information or computational artifacts without diret permission from the owner/creator or without permission via the use Creative Common licensing

99
New cards

Procedural Abstraction

a technique where complex code is broken down into smaller, manageable units called procedures or functions

100
New cards

Procedure

defined block of code that does a specific task or tasks. Does not run in a program until it is called in the program, and it can be called as many times as needed