AP Computer Science Principles Exam Review

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/69

flashcard set

Earn XP

Description and Tags

Flashcards for vocabulary review for the AP Computer Science Principles Exam.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

70 Terms

1
New cards

Hardware

The physical components of a computing device.

2
New cards

Software

The instructions in a programming language to the computing device.

3
New cards

Moore’s Law

States that the size of transistors halves every two years while the cost also halves every two years.

4
New cards

Function of a program

How a program behaves during execution and is usually described by how the user interacts with it.

5
New cards

Purpose of a program

The goal or the motivation for writing a program.

6
New cards

Program’s specification

Defines the requirements for the program.

7
New cards

Collaboration

A learned skill that includes communication, consensus building, conflict resolution, and negotiation.

8
New cards

Incremental development process

Breaks the problem into smaller pieces and makes sure each piece works before adding it to the whole.

9
New cards

Iterative development process

Requires refinement and revision based on feedback, testing, or reflection throughout the process.

10
New cards

Program documentation

A written description of the function of a code segment, event, procedure, or program and how it was developed.

11
New cards

Comments

A form of program documentation written into the program that do not affect how the program runs.

12
New cards

Logic error

A mistake in the algorithm or program that causes it to behave incorrectly or unexpectedly.

13
New cards

Syntax error

A mistake in the program where the rules of the programming language are not followed.

14
New cards

Runtime error

A mistake in the program that occurs during the execution of a program.

15
New cards

Program input

Data sent to a computer for processing by a program, which can come in a variety of forms, such as tactile, audio, visual, or text.

16
New cards

Event

The action that supplies input data to a program.

17
New cards

Program output

Any data sent from a program to a device, which can come in a variety of forms, such as tactile, audio, visual, or text.

18
New cards

Bit

A single binary digit and is either 0 or 1.

19
New cards

Byte

8 bits

20
New cards

Abstraction

The process of reducing complexity by focusing on the main idea.

21
New cards

Analog signals

Are continuous signals.

22
New cards

Digital signals

Are finite.

23
New cards

Roundoff error

Occurs when decimals (real numbers) are rounded.

24
New cards

Information

The collection of facts and patterns extracted from data.

25
New cards

Cleaning data

A process that makes the data uniform without changing their meaning.

26
New cards

Metadata

Data that describe your data—for example, a picture of you standing in front of a waterfall is data, the location and time the picture was taken are this.

27
New cards

Abstraction

A way to represent essential features without including the background details or explanations.

28
New cards

Procedural abstraction

Provides a name for a process and allows a procedure to be used only knowing what it does, not how it does it.

29
New cards

Abstractions Used on the AP Exam

DISPLAY(expression) is an abstraction that is used on your AP exam to display a value of expression followed by a space; RANDOM(a, b), which evaluates to a random number from a to b inclusive.

30
New cards

Data abstraction

Provides a separation between the abstract properties of a data type and the concrete details of its representation.

31
New cards

Lists

An organized and formatted way of storing and retrieving data. Each element in this can be accessed by its index.

32
New cards

Procedure

A set of code that is referred to by name and can be called (invoked) at any point in a program simply by utilizing the procedure's name.

33
New cards

Heuristic

An approach to a problem that produces a solution that is not guaranteed to be optimal but may be used when techniques that are guaranteed to always find an optimal solution are impractical.

34
New cards

Software library

Contains procedures that may be used in creating new programs.

35
New cards

Application program interfaces (APIs)

Are specifications for how the procedures in a library behave and can be used.

36
New cards

Computing device

A physical artifact that can run a program. Examples include computers, tablets, servers, routers, and smart sensors.

37
New cards

Computing system

A group of computing devices and programs working together for a common purpose.

38
New cards

Computer network

A group of interconnected computing devices capable of sending or receiving data.

39
New cards

Bandwidth of a computer network

The maximum amount of data that can be sent in a fixed amount of time.

40
New cards

Path

A sequence of directly connected computing devices that begins at the sender and ends at the receiver.

41
New cards

Routing

The process of finding a path from sender to receiver.

42
New cards

Protocol

An agreed-upon set of rules that specify the behavior of a system.

43
New cards

Scalability of a system

The capacity for the system to change in size and scale to meet new demands.

44
New cards

Internet protocol (IP)

Is responsible for addressing and routing your online requests.

45
New cards

Transmission control protocol (TCP)

Defines how computers send packets of data to each other.

46
New cards

User datagram protocol (UDP)

Allows computer applications to send messages without checking for missing packets to save on time needed to retransmit missing packets.

47
New cards

Redundancy

The inclusion of extra paths that can mitigate the failure of a system if other components fail.

48
New cards

The internet

Refers to the hardware, is made up of the computers, cables, routers, and many more components that make up the entire network, and it is a global decentralized network connecting millions of computers.

49
New cards

The World Wide Web

Refers to the software used on the internet.

50
New cards

HTTP

A protocol used by the World Wide Web to transmit data.

51
New cards

Sequential computing

A computational model in which operations are performed in order one at a time.

52
New cards

Parallel computing

Involves breaking up a task into smaller, sequential pieces, then those sequential pieces are all executed at the same time, each on its own processor or on a set of computers that have been networked together.

53
New cards

Speedup

Is measured in the time to complete the task sequentially divided by the time to complete the task when done in parallel: Speedup = (sequential run time)/(parallel run time)

54
New cards

Distributed computing

A computational model in which multiple devices are used to run a program.

55
New cards

Digital divide

The difference in access to technology including access to computers and the internet.

56
New cards

Crowdsourcing

A sourcing model in which individuals or organizations obtain goods and services, including ideas and finances, from a large group of internet users.

57
New cards

Citizen science

Scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices.

58
New cards

Creative Commons

A public copyright license that enables the free distribution of an otherwise copyrighted work.

59
New cards

Open Access

Online research output free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions.

60
New cards

Privacy

The right to control data generated by one’s usage of computing innovations and restrict the flow of that data to third parties.

61
New cards

Personally identifiable information (PII)

Information about an individual that identifies, links, relates, or describes that person

62
New cards

Authentication measures

Measures protect devices and information from unauthorized access.

63
New cards

Encryption

Uses cryptographic algorithms to encrypt data.

64
New cards

Malware

Malicious software intended to damage a computing system or take partial control or its operations.

65
New cards

Computer viruses

Malicious programs that can copy themselves and gain access to a computer in an unauthorized way.

66
New cards

Phishing

A technique that directs users to unrelated sites that trick the user into giving personal data.

67
New cards

Keylogging

The use of a program to record every keystroke made by the computer user in order to gain fraudulent access to passwords and other confidential information.

68
New cards

Rogue access point

A wireless access point that gives unauthorized access to secure networks.

69
New cards

Linear Search

An algorithm for finding an element in a list by starting from the beginning and sequentially checking each element until a match is found or the entire list is searched without finding the element.

70
New cards

Binary Search

A search algorithm that halves the number of elements that need to be searched after every comparison by comparing the middle element of the list to the target value, and if unequal, then the half in which the target cannot lie is eliminated.