AP Computer Science Principles Vocab

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

syntax error

A mistake in typed code that violates the rules of the programming language, typically preventing the code from running.

2
New cards

logic error

A mistake in an algorithm or program that causes it to behave unexpectedly or return the incorrect value.

3
New cards

run-time error

A mistake in a program that occurs only when it is actually run, such as trying to access memory that does not exist.

4
New cards

overflow error

An error that results when the number of bits is insufficient to represent a number, akin to a car’s odometer rolling over.

5
New cards

bit

A binary digit, either 0 or 1.

6
New cards

byte

A sequence of 8 bits.

7
New cards

roundoff

An error that occurs when the number of bits is insufficient to represent a number with full precision.

8
New cards

analog data

Values that change smoothly over time rather than in discrete intervals.

9
New cards

lossless

A method of compressing data that allows full recovery of the original data.

10
New cards

lossy

A method of compressing data that discards some information, making it impossible to recover the original.

11
New cards

metadata

Data about data, like descriptive information about a file or a database row.

12
New cards

sequencing

The sequential execution of steps in an algorithm or program.

13
New cards

selection

A Boolean condition used to determine which of two paths to take in an algorithm or program.

14
New cards

iteration

The repetition of steps in an algorithm or program for a certain amount of time or until a condition is met.

15
New cards

linear search

An algorithm that checks each item in a list until the target value is found.

16
New cards

binary search

An algorithm that searches a sorted list by repeatedly splitting the list in half.

17
New cards

reasonable time

A run time for an algorithm that does not increase faster than a polynomial function of input size.

18
New cards

heuristic

A technique that helps an algorithm find a good solution to a difficult problem.

19
New cards

undecidable

A problem that is so complex, there is no algorithm that can determine a yes or no answer for all inputs.

20
New cards

library

A collection of procedures that are useful in creating programs.

21
New cards

API

Application Programming Interface, a library of procedures and descriptions on how to call each.

22
New cards

modularity

The separation of a program into independent modules, each responsible for one aspect of functionality.

23
New cards

traversal

Iterating over items in a list, either fully or partially.

24
New cards

computing device

A physical device capable of running a program.

25
New cards

computer network

A group of interconnected computing devices that can send or receive data.

26
New cards

bandwidth

The maximum amount of data that can be transmitted over a network connection in a fixed period of time.

27
New cards

protocol

A set of agreed-upon rules that govern the behavior of a system.

28
New cards

scalability

The ability of a system to adjust in size to meet new demands.

29
New cards

IP (Internet Protocol)

The protocol that addresses nodes on a network and routes data to destination nodes.

30
New cards

TCP (Transmission Control Protocol)

A data transport protocol that ensures reliable packet transmission to a destination.

31
New cards

UDP (User Datagram Protocol)

A lightweight protocol for data transport with minimal error checking.

32
New cards

World Wide Web

A system of linked pages and media accessible over HTTP.

33
New cards

HTTP (Hypertext Transfer Protocol)

The protocol used to request webpages from servers.

34
New cards

parallel computing

A model that splits a program into multiple tasks that can be executed simultaneously.

35
New cards

speedup

The improvement in execution time of a parallelized program compared to sequential execution.

36
New cards

distributed computing

A model using multiple devices to run different parts of a program.

37
New cards

digital divide

The gap between communities that have access to computing and those that do not.

38
New cards

crowdsourcing

A model where many users collaborate online to fund, generate ideas, or create projects.

39
New cards

citizen science

Crowdsourcing for scientific research involving public participation.

40
New cards

Creative Commons

A licensing alternative to copyright that allows creators to specify usage terms for their work.

41
New cards

open access

A policy that allows unrestricted access to research papers and governmental datasets.

42
New cards

PII (Personally identifiable information)

Information that can be used to identify an individual.

43
New cards

multifactor authentication (MFA)

A user authentication method requiring multiple forms of evidence.

44
New cards

encryption

The process of converting data into a coded format to prevent unauthorized access.

45
New cards

symmetric encryption

A method of data encryption using the same key for both encryption and decryption.

46
New cards

public key encryption

An asymmetric encryption method using different keys for encrypting and decrypting data.

47
New cards

cookie

Small text files that track information about a user visiting a website.

48
New cards

virus

A type of computer malware capable of making copies of itself.

49
New cards

phishing

An attack that tricks users into revealing private information through deceptive messages.

50
New cards

rogue access point

An unauthorized wireless access point providing an attacker access to network traffic.