Home
Explore
Exams
Search for anything
Search for anything
Login
Get started
Home
AP Compsci Principle Review
Studied by 0 people
0.0
(0)
Add a rating
View linked note
Learn
A personalized and smart learning plan
Practice Test
Take a test on your terms and definitions
Spaced Repetition
Scientifically backed study method
Matching Game
How quick can you match all your cards?
Flashcards
Study terms and definitions
1 / 41
There's no tags or description
Looks like no one added any tags here yet for you.
42 Terms
View all (42)
Star these 42
1
Compression
Process of making data smaller for storage or transmission
New cards
2
Data compression
Reducing the size of data for saving disk space or bandwidth
New cards
3
Lossless algorithms
Reconstruct original message exactly from compressed message
New cards
4
Lossy compression
Technique not decompressing digital data back to 100% original
New cards
5
Abstraction
Bundling related program variables for hierarchical data thinking
New cards
6
Parameters
Values sent to a procedure to make it more flexible
New cards
7
API
Application Programming Interface providing functionality documentation
New cards
8
Random numbers
Frequently needed feature in programs with prewritten code
New cards
9
Simulations
Designed to mirror real-world scenarios for testing
New cards
10
Algorithm Efficiency
Resources needed to run an algorithm in terms of time and memory
New cards
11
Heuristic approach
Suboptimal but close enough approach for problem-solving
New cards
12
Decidable problem
Problem with an algorithm resulting in a correct yes or no answer
New cards
13
Undecidable problem
Problem without an algorithm for a correct yes or no answer
New cards
14
Routing
Process of finding a path from sender to receiver in a network
New cards
15
Bandwidth
Measure of maximum data transfer through a network connection
New cards
16
Internet protocol (IP)
Responsible for addressing and routing online requests
New cards
17
Transmission control protocol (TCP)
Defines how computers send data packets to each other
New cards
18
User datagram protocol (UDP)
Protocol allowing applications to send messages without checking for missing packets
New cards
19
Solar Flare
Intense radiation released from the sun that can disrupt hardware
New cards
20
Parallel computing
Solution involving tasks done simultaneously and sequentially
New cards
21
Cloud computing
Offers new ways for communication and collaboration through remote servers
New cards
22
Digital Divide
Impact of technology on access to information, markets, and global society
New cards
23
Bias
Prejudice for or against certain groups, found in computing innovations
New cards
24
Artificial Intelligence Programs
Utilized for screening job applications, credit determination, and crime location
New cards
25
Crowdsourcing
Enables sharing info for problem-solving, finding jobs, or funding
New cards
26
Legal and Ethical Concerns
Includes intellectual property, citation, peer-to-peer networks, and data monitoring
New cards
27
Creative Commons
Facilitates sharing with clear permissions for various creations
New cards
28
Open-Source Software
Freely shared, updated, and supported software accessible to all
New cards
29
Open Access
Public data sharing by organizations for problem-solving and information search
New cards
30
Search Trends and Analytics
Reveals popular searches, browsing habits, and marketing trends
New cards
31
Data Mining
Analyzing large datasets, with machine learning as a subset
New cards
32
Personally Identifiable Information (PII)
Includes data identifying individuals, like addresses or social security numbers
New cards
33
Privacy
Concerns digital footprints, data storage, and web browsing privacy
New cards
34
Protecting Our Data
Involves cybersecurity measures to prevent unauthorized access
New cards
35
Security
Ensures data protection from unauthorized access and alterations
New cards
36
Cybersecurity
Safeguards electronic devices and networks from attacks
New cards
37
Phishing
Creates deceptive emails or websites to trick users into clicking malicious links
New cards
38
Computer Viruses
Malware that attaches to files, causing harm or spreading further
New cards
39
Keylogging Software
Malware capturing keystrokes and transmitting them to unauthorized parties
New cards
40
Cryptography
Involves secret codes, encryption, and decryption for data security
New cards
41
Public Key Encryption
Uses published algorithms to keep information secret until decryption
New cards
42
Securing the Internet
Relies on digital certificates from Certificate Authorities for trust
New cards