AP Compsci Principle Review

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Compression

1 / 41

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

42 Terms

1

Compression

Process of making data smaller for storage or transmission

New cards
2

Data compression

Reducing the size of data for saving disk space or bandwidth

New cards
3

Lossless algorithms

Reconstruct original message exactly from compressed message

New cards
4

Lossy compression

Technique not decompressing digital data back to 100% original

New cards
5

Abstraction

Bundling related program variables for hierarchical data thinking

New cards
6

Parameters

Values sent to a procedure to make it more flexible

New cards
7

API

Application Programming Interface providing functionality documentation

New cards
8

Random numbers

Frequently needed feature in programs with prewritten code

New cards
9

Simulations

Designed to mirror real-world scenarios for testing

New cards
10

Algorithm Efficiency

Resources needed to run an algorithm in terms of time and memory

New cards
11

Heuristic approach

Suboptimal but close enough approach for problem-solving

New cards
12

Decidable problem

Problem with an algorithm resulting in a correct yes or no answer

New cards
13

Undecidable problem

Problem without an algorithm for a correct yes or no answer

New cards
14

Routing

Process of finding a path from sender to receiver in a network

New cards
15

Bandwidth

Measure of maximum data transfer through a network connection

New cards
16

Internet protocol (IP)

Responsible for addressing and routing online requests

New cards
17

Transmission control protocol (TCP)

Defines how computers send data packets to each other

New cards
18

User datagram protocol (UDP)

Protocol allowing applications to send messages without checking for missing packets

New cards
19

Solar Flare

Intense radiation released from the sun that can disrupt hardware

New cards
20

Parallel computing

Solution involving tasks done simultaneously and sequentially

New cards
21

Cloud computing

Offers new ways for communication and collaboration through remote servers

New cards
22

Digital Divide

Impact of technology on access to information, markets, and global society

New cards
23

Bias

Prejudice for or against certain groups, found in computing innovations

New cards
24

Artificial Intelligence Programs

Utilized for screening job applications, credit determination, and crime location

New cards
25

Crowdsourcing

Enables sharing info for problem-solving, finding jobs, or funding

New cards
26

Legal and Ethical Concerns

Includes intellectual property, citation, peer-to-peer networks, and data monitoring

New cards
27

Creative Commons

Facilitates sharing with clear permissions for various creations

New cards
28

Open-Source Software

Freely shared, updated, and supported software accessible to all

New cards
29

Open Access

Public data sharing by organizations for problem-solving and information search

New cards
30

Search Trends and Analytics

Reveals popular searches, browsing habits, and marketing trends

New cards
31

Data Mining

Analyzing large datasets, with machine learning as a subset

New cards
32

Personally Identifiable Information (PII)

Includes data identifying individuals, like addresses or social security numbers

New cards
33

Privacy

Concerns digital footprints, data storage, and web browsing privacy

New cards
34

Protecting Our Data

Involves cybersecurity measures to prevent unauthorized access

New cards
35

Security

Ensures data protection from unauthorized access and alterations

New cards
36

Cybersecurity

Safeguards electronic devices and networks from attacks

New cards
37

Phishing

Creates deceptive emails or websites to trick users into clicking malicious links

New cards
38

Computer Viruses

Malware that attaches to files, causing harm or spreading further

New cards
39

Keylogging Software

Malware capturing keystrokes and transmitting them to unauthorized parties

New cards
40

Cryptography

Involves secret codes, encryption, and decryption for data security

New cards
41

Public Key Encryption

Uses published algorithms to keep information secret until decryption

New cards
42

Securing the Internet

Relies on digital certificates from Certificate Authorities for trust

New cards

Explore top notes

note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 27 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 27 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 86 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 126 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 123061 people
Updated ... ago
4.9 Stars(601)

Explore top flashcards

flashcards Flashcard38 terms
studied byStudied by 42 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard62 terms
studied byStudied by 31 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard30 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard75 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard24 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard46 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard49 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard43 terms
studied byStudied by 69 people
Updated ... ago
5.0 Stars(2)