AP Compsci Principle Review

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/41

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

42 Terms

1
New cards
Compression
Process of making data smaller for storage or transmission
2
New cards
Data compression
Reducing the size of data for saving disk space or bandwidth
3
New cards
Lossless algorithms
Reconstruct original message exactly from compressed message
4
New cards
Lossy compression
Technique not decompressing digital data back to 100% original
5
New cards
Abstraction
Bundling related program variables for hierarchical data thinking
6
New cards
Parameters
Values sent to a procedure to make it more flexible
7
New cards
API
Application Programming Interface providing functionality documentation
8
New cards
Random numbers
Frequently needed feature in programs with prewritten code
9
New cards
Simulations
Designed to mirror real-world scenarios for testing
10
New cards
Algorithm Efficiency
Resources needed to run an algorithm in terms of time and memory
11
New cards
Heuristic approach
Suboptimal but close enough approach for problem-solving
12
New cards
Decidable problem
Problem with an algorithm resulting in a correct yes or no answer
13
New cards
Undecidable problem
Problem without an algorithm for a correct yes or no answer
14
New cards
Routing
Process of finding a path from sender to receiver in a network
15
New cards
Bandwidth
Measure of maximum data transfer through a network connection
16
New cards
Internet protocol (IP)
Responsible for addressing and routing online requests
17
New cards
Transmission control protocol (TCP)
Defines how computers send data packets to each other
18
New cards
User datagram protocol (UDP)
Protocol allowing applications to send messages without checking for missing packets
19
New cards
Solar Flare
Intense radiation released from the sun that can disrupt hardware
20
New cards
Parallel computing
Solution involving tasks done simultaneously and sequentially
21
New cards
Cloud computing
Offers new ways for communication and collaboration through remote servers
22
New cards
Digital Divide
Impact of technology on access to information, markets, and global society
23
New cards
Bias
Prejudice for or against certain groups, found in computing innovations
24
New cards
Artificial Intelligence Programs
Utilized for screening job applications, credit determination, and crime location
25
New cards
Crowdsourcing
Enables sharing info for problem-solving, finding jobs, or funding
26
New cards
Legal and Ethical Concerns
Includes intellectual property, citation, peer-to-peer networks, and data monitoring
27
New cards
Creative Commons
Facilitates sharing with clear permissions for various creations
28
New cards
Open-Source Software
Freely shared, updated, and supported software accessible to all
29
New cards
Open Access
Public data sharing by organizations for problem-solving and information search
30
New cards
Search Trends and Analytics
Reveals popular searches, browsing habits, and marketing trends
31
New cards
Data Mining
Analyzing large datasets, with machine learning as a subset
32
New cards
Personally Identifiable Information (PII)
Includes data identifying individuals, like addresses or social security numbers
33
New cards
Privacy
Concerns digital footprints, data storage, and web browsing privacy
34
New cards
Protecting Our Data
Involves cybersecurity measures to prevent unauthorized access
35
New cards
Security
Ensures data protection from unauthorized access and alterations
36
New cards
Cybersecurity
Safeguards electronic devices and networks from attacks
37
New cards
Phishing
Creates deceptive emails or websites to trick users into clicking malicious links
38
New cards
Computer Viruses
Malware that attaches to files, causing harm or spreading further
39
New cards
Keylogging Software
Malware capturing keystrokes and transmitting them to unauthorized parties
40
New cards
Cryptography
Involves secret codes, encryption, and decryption for data security
41
New cards
Public Key Encryption
Uses published algorithms to keep information secret until decryption
42
New cards
Securing the Internet
Relies on digital certificates from Certificate Authorities for trust