AP Computer Science Principles Vocab Flashcard

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/47

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

48 Terms

1
New cards

Computing Innovation

An innovation that uses a program as a key part of its function.

2
New cards

Pair Programming

When two people share a computer and take turns coding.

3
New cards

Logic Error

Unexpected behavior in a program’s output.

4
New cards

Syntax Error

The code does not work properly because it is typed or written incorrectly.

5
New cards

Run-Time Error

Error occurs while code runs.

6
New cards

Overflow Error

The numbers are too big for the computer.

7
New cards

Iterative Development Process

Develop working prototypes of a program and go back through the cycle to redevelop the program.

8
New cards

Incremental Development Process

Break a problem into small parts and then reassemble the solution when each part is fixed.

9
New cards

Waterfall Development Model

A step-by-step process where each step flows into another.

10
New cards

Bit

Binary digit; what computers store data in.

11
New cards

Byte

8 bits.

12
New cards

Hexadecimal

Used for RGB color codes & uses numbers & letters to represent values.

13
New cards

ASCII Code

Converts text to binary format.

14
New cards

Abstraction

Reduces complexity by only focusing on the most important parts & hiding the irrelevant parts from the user.

15
New cards

Analog Data

Data that is measured continuously & change smoothly.

16
New cards

Digital Data

Measured digitally and leaves out extra data by simplifying the data collected (form of abstraction).

17
New cards

Lossless Compression

Less compression & better file quality

18
New cards

Lossy Compression

More compression & worse file quality

19
New cards

Metadata

Data about data.

20
New cards

Data Mining

Examining very large data sets to find information.

21
New cards

Transforming Data

Editing or modifying data.

22
New cards

Pseudocode

A notation resembling simplified programming code, used in program design.

23
New cards

String Concatenation

Occurs when two strings or more are connected w/ a “+”

24
New cards

Algorithm

Instructions that accomplish a task or solve a problem.

25
New cards

Sequencing

All of the code is executed in the order they are written in.

26
New cards

Expression

A statement that only returns one value. (Evaluated with PEMDAS)

27
New cards

MOD (%)

Gives you the remainder of 2 #’s.

28
New cards

Procedures

Programming instructions that are also called methods or functions.

29
New cards

Parameters

Input variables of a procedure.

30
New cards

Arguments

A call with defined values + attributes.

31
New cards

Sequential Computing

Traditional programming where each program is processed at a time.

32
New cards

Parallel Computing

When program is broken into smaller operations and processed at the same time using multiple processors.

33
New cards

Distributed Computing

Multiple devices communicate together to run a program.

34
New cards

Fault Tolerant

Something can still function even w/ a partial malfunction.

35
New cards

Redundancy

Duplication of things.

36
New cards

Computer Network

Multiple computing devices communicate with each other.

37
New cards

Routing

The process of finding the best path to deliver information.

38
New cards

Digital Divide

Gaps between those who have access to the internet and those who do not.

39
New cards

Intellectual Property

The work that people consider 'theirs'.

40
New cards

Copyright

The person who created something determines who uses their creation.

41
New cards

Creative Commons

Copyright license for creators to give others the ability to use their work.

42
New cards

Open-Sourcing

Work is freely shared, distributed, and modified.

43
New cards

Open Access

Research available to public w/ out restrictions.

44
New cards

Malware

Malicious software that takes control of a system.

45
New cards

Phishing

Tricks ppl into giving their personal information away.

46
New cards

Encryption

Encoding data to prevent others from accessing it.

47
New cards

Symmetric Key Encryption

One key for both encrypting & decrypting.

48
New cards

Public Key Encryption

Public key to encrypt & private key to decrypt.