AP Computer Science Principles Cheatsheet 2024

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/71

flashcard set

Earn XP

Description and Tags

AP Computer Science Principles flashcards for exam review.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

72 Terms

1
New cards

Computing Innovation

An innovation that uses a program as a key part of its function.

2
New cards

Collaboration

Allows for diverse ideas and thoughts that cater to different people.

3
New cards

Pair Programming

Two people share one computer and take turns coding.

4
New cards

Program Function

What a program is designed to do (ex: solving problems, creative expression).

5
New cards

Code Segments

A smaller collection of statements that are part of a program.

6
New cards

Code Statements

Individual instructions in a program.

7
New cards

Program Inputs

Pieces of data (visual, auditory, touch, etc.) that a computer takes in and processes.

8
New cards

Program Outputs

The data (same types as inputs) that the computer returns.

9
New cards

Program Events

An action that gives a program data to respond to.

10
New cards

Program Behavior

How a program will respond to a user interacting with it.

11
New cards

Iterative Development Process

Develop working prototypes of a program and go back through the cycle to redevelop the program.

12
New cards

Incremental Development Process

Break a problem into small parts and then reassemble the solution when each part is fixed.

13
New cards

Program Documentation

A description of how something in your program works.

14
New cards

Comments

Program documentation written directly into the program itself.

15
New cards

Logic Errors

Unexpected behavior in a program’s output.

16
New cards

Syntax Errors

The code does not work properly because it is typed or written incorrectly.

17
New cards

Run-Time Errors

Error occurs while code runs.

18
New cards

Overflow Errors

The numbers are too big for the computer.

19
New cards

Hand tracing

Manually tracking your variables' values as your program goes along.

20
New cards

Abstraction

Reduces complexity by only focusing on the most important parts & hiding the irrelevant parts from the user.

21
New cards

ASCII code

Converts text to binary format.

22
New cards

Analog data

Data that is measured continuously & changes smoothly.

23
New cards

Digital data

Data that is measured digitally and leaves out extra data by simplifying the data collected (form of abstraction).

24
New cards

Lossless Compression

Less compression & better file quality.

25
New cards

Lossy Compression

More compression & worse file quality.

26
New cards

Metadata

Data about data.

27
New cards

Data mining

Examining very large data sets to find information.

28
New cards

Transforming data

Editing or modifying data (ex: doubling every number/graphing data points).

29
New cards

Cleaning data

Making data uniform w/o changing meaning (ex: correcting misspelled words).

30
New cards

String concatenation

Occurs when two strings or more are connected w/ a “+”.

31
New cards

Element

An individual value in a list.

32
New cards

Index

Number that represents the position in the list

33
New cards

Algorithm

Instructions that accomplish a task or solve a problem; created using sequencing, selection and iteration.

34
New cards

Sequencing

Code is executed in the order it is written

35
New cards

Selection

If statements: have conditions that need to be met for the selection to run

36
New cards

Iteration

repeat n times”/”repeat until”; you can use NOT, AND and OR to write loops.

37
New cards

Binary Search

Type of algorithm used to search; works by splitting the data set and eliminates ½ the data with each round of splitting

38
New cards

Procedures

Programming instructions that are also called methods or functions.

39
New cards

Parameters

Input variables of a procedure.

40
New cards

Arguments

A procedure call with defined values.

41
New cards

Internet

Interconnection and networks.

42
New cards

Computer network

When multiple computing devices (ex: computer, tablet) communicate with each other

43
New cards

Routing

The process of finding the best path to deliver information.

44
New cards

Path

Sequences of connected computing devices (routers) that begin at the sender and end at the receiver.

45
New cards

Bandwidth

The rate of data transfer from one device to another; megabits per second.

46
New cards

Protocol

Set of rules; the internet uses the TCP/IP and UDP protocols to communicate.

47
New cards

World Wide Web

A system of web-pages, programs, and files; runs on the Internet but is not the internet.

48
New cards

Scalability

The capacity to change in size and scale to meet new demands.

49
New cards

Fault Tolerant

Something can still function even w/ a partial malfunction.

50
New cards

Redundancy

Duplication of things; helps make the internet fault tolerant.

51
New cards

Sequential Computing

Traditional programming where each program is processed at a time.

52
New cards

Parallel Computing

When program is broken into smaller operations and processed at the same time using multiple processors.

53
New cards

Distributed Computing

Multiple devices communicate together to run a program.

54
New cards

Digital Divide

Gaps between those who have access to the internet and those who do not.

55
New cards

Computing Bias

Computing innovations can reflect existing racial/gender/etc biases.

56
New cards

Intellectual Property

The work that people consider “theirs”.

57
New cards

Copyright

The person who created something determines who uses their creation.

58
New cards

Creative Commons

Copyright license for creators to give others the ability to use their work.

59
New cards

Open-sourcing

Work is freely shared, distributed, and modified.

60
New cards

Open Access

Research available to public w/ out restrictions.

61
New cards

Crowdsourcing

Getting a large amount of input or information from people on the Internet.

62
New cards

Citizen Science

Scientific research that the general population helps to conduct.

63
New cards

Personally Identifiable Information (PII)

Information that can be used to identify you.

64
New cards

Virus

Attached to infected files and must be activated by the user.

65
New cards

Worm

Can operate independently.

66
New cards

Malware

Malicious software that takes control of a system.

67
New cards

Phishing

Tricks people into giving their personal information away by pretending to be a trustworthy group.

68
New cards

Multi-Factor Authentication

Requiring multiple methods of verification.

69
New cards

Encryption

Encoding data to prevent others from accessing it.

70
New cards

Key

A secret piece of information used to encrypt data.

71
New cards

Symmetric Key Encryption

One key for both encrypting & decrypting.

72
New cards

Public Key Encryption

Public key to encrypt & private key to decrypt.