APCSP Practice

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/118

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:50 PM on 4/13/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

119 Terms

1
New cards

Abstraction

Simplifying complex systems by focusing on essential details and hiding unnecessary complexity.

2
New cards

AND

A Boolean operator where ALL conditions must be true for the result to be true.

3
New cards

Application

Software designed for end users to perform specific tasks.

4
New cards

ARPANET

Advanced Research Projects Agency Network; the first network to use TCP/IP.

5
New cards

ASCII

American Standard Code for Information Interchange; a 7-bit character encoding standard.

6
New cards

Asymmetric Key Encryption

Encryption using two different keys: a public key and a private key.

7
New cards

Bandwidth

The maximum amount of data that can be transmitted over a network in a given time.

8
New cards

Big Data

Datasets so large or complex that traditional methods cannot process them effectively.

9
New cards

Binary

A base-2 number system using only the digits 0 and 1.

10
New cards

Binary Search

A search algorithm that repeatedly divides a sorted list in half.

11
New cards

Bit

The smallest unit of data in computing, representing a 0 or 1.

12
New cards

Boolean Logic

A system of logic using true/false values and operators like AND, OR, and NOT.

13
New cards

Byte

A unit of data equal to 8 bits.

14
New cards

Caesar Cipher

A substitution cipher that shifts each letter by a fixed number of positions.

15
New cards

Central Processing Unit (CPU)

The brain of the computer that processes instructions.

16
New cards

Certificate Authority (CA)

An organization that issues digital certificates.

17
New cards

Cipher

An algorithm used to encrypt or decrypt data.

18
New cards

Citizen Science

Scientific research conducted with the participation of the general public.

19
New cards

Client

A computer or program that requests services from a server.

20
New cards

Cloud Computing

Storing and accessing data and programs over the Internet.

21
New cards

Computationally Hard

A problem for which no efficient algorithm is known.

22
New cards

Computer

An electronic device that processes data according to a set of instructions.

23
New cards

Constant

A named value that cannot be changed during program execution.

24
New cards

Copyright

Legal protection for original works of authorship.

25
New cards

Crowdsourcing

Obtaining input, ideas, or services from a large group of people via the Internet.

26
New cards

Data Abstraction

Managing complexity by using collections (like lists) to represent related data.

27
New cards

Datagrams

Data units used by UDP; sent without guaranteed delivery or order.

28
New cards

DDoS

Distributed Denial of Service; an attack that floods a server with traffic.

29
New cards

Debugging

The process of finding and fixing errors in a program.

30
New cards

Decimal

A base-10 number system using digits 0-9.

31
New cards

Decryption

Converting encrypted data back to its original form using a key.

32
New cards

Design-Implement-Test

The iterative development cycle: plan, build, and verify software.

33
New cards

Digital Certificate

An electronic document that verifies the identity of a website.

34
New cards

Digital Divide

The gap between those who have access to technology and those who do not.

35
New cards

Digital Signature

A cryptographic technique that verifies the authenticity of a message.

36
New cards

Distributed Computing

A system where multiple computers work together to solve a problem.

37
New cards

DNS

Domain Name System; translates domain names into IP addresses.

38
New cards

Domain Name

A human-readable address for a website.

39
New cards

Encryption

Converting data into a coded form to prevent unauthorized access.

40
New cards

Ethical Computing

Applying principles and standards to do what is right with technology.

41
New cards

EULA

End-User License Agreement; a legal contract between software provider and user.

42
New cards

Fault-Tolerant

A system that can continue operating when some components fail.

43
New cards

Graphical User Interface (GUI)

A visual interface using icons, menus, and windows.

44
New cards

Hacker

A person who uses technical skills to gain unauthorized access to systems.

45
New cards

Hardware

The physical components of a computer.

46
New cards

Heuristic Approach

A practical shortcut to find a good-enough solution when optimal is impractical.

47
New cards

Hexadecimal

A base-16 number system using digits 0-9 and letters A-F.

48
New cards

HTML

HyperText Markup Language; the standard markup language for web pages.

49
New cards

HTTP

HyperText Transfer Protocol; the protocol for transmitting web pages.

50
New cards

HTTPS

HTTP Secure; encrypted version of HTTP using TLS/SSL.

51
New cards

Incremental

Building software in small steps or chunks.

52
New cards

Input and Output (I/O) Devices

Hardware used to send or receive data from a computer.

53
New cards

Internet

A global network of interconnected networks using TCP/IP.

54
New cards

IP

Internet Protocol; rules for addressing and routing packets.

55
New cards

IP Address

A unique number assigned to each device on the Internet.

56
New cards

IPv4

Internet Protocol version 4; 32-bit addresses.

57
New cards

IPv6

Internet Protocol version 6; 128-bit addresses (virtually unlimited).

58
New cards

ISP

Internet Service Provider; a company that provides Internet access.

59
New cards

Iterative

A process of continuously repeating steps to refine and improve.

60
New cards

Key

A value used in encryption and decryption to transform data.

61
New cards

Linear Search

A search algorithm that checks each element one by one.

62
New cards

Logical Error

A programming error where the program runs but produces incorrect results.

63
New cards

Lossless

Compression that reduces file size without losing any data.

64
New cards

Lossy

Compression that reduces file size by permanently removing some data.

65
New cards

Main Memory

RAM; fast, volatile memory for data currently being processed.

66
New cards

Malware

Malicious software designed to harm or compromise a computer system.

67
New cards

Metadata

Data about data (e.g., date a photo was taken, author of a document).

68
New cards

Modular Arithmetic

Arithmetic where numbers wrap around after reaching a modulus (clock math).

69
New cards

Multi-factor Authentication (MFA)

Security requiring two or more forms of verification.

70
New cards

Name Server

A server that stores domain names and their IP addresses.

71
New cards

Network

A group of computers connected to share resources.

72
New cards

One-way Function

A function that is easy to compute but extremely difficult to reverse.

73
New cards

Operating System

System software that manages hardware and provides a platform for applications.

74
New cards

OR

A Boolean operator where ANY condition being true makes the result true.

75
New cards

Overflow Error

An error when a number exceeds the defined range for its data type.

76
New cards

Packets

Small, numbered chunks of data used in TCP.

77
New cards

Parallel Computing

Using multiple processors simultaneously to solve a problem.

78
New cards

Peripherals

External devices connected to a computer.

79
New cards

Phishing

A social engineering attack that tricks users into revealing sensitive information.

80
New cards

Pixel

The smallest unit of a digital image.

81
New cards

Privacy

How personal information is collected, stored, and shared.

82
New cards

Private Key

A secret key used in asymmetric encryption to decrypt data.

83
New cards

Procedural Abstraction

Creating procedures/functions to simplify and organize code.

84
New cards

Protocol

A set of rules governing how data is transmitted over a network.

85
New cards

Public Key

A key shared openly in asymmetric encryption, used to encrypt data.

86
New cards

Random Access Memory (RAM)

Fast, volatile memory for storing data currently in use.

87
New cards

Redundancy

Extra components or pathways to ensure continued operation if one fails.

88
New cards

Reliable

A protocol that guarantees data delivery in order (like TCP).

89
New cards

RGB

Red, Green, Blue; a color model used to represent colors digitally.

90
New cards

Root Name Server

One of 13 servers at the top of the DNS hierarchy.

91
New cards

Round-off Error

An error caused by the approximation of real numbers.

92
New cards

Router

A device that directs network traffic between different networks.

93
New cards

Run-Length Encoding

A lossless compression technique using counts of repeated values.

94
New cards

Run-time Error

An error that occurs during program execution.

95
New cards

Secondary Memory

Non-volatile storage (hard drive, SSD) for permanent data.

96
New cards

Second-Level Domain

The part of a domain name directly left of the TLD.

97
New cards

Security

Steps taken to protect data from unauthorized access.

98
New cards

Selection

A programming structure using conditions to choose code paths (if/else).

99
New cards

Sequence

A programming structure where code runs line by line in order.

100
New cards

Sequential Computing

Processing tasks one after another (not in parallel).