1/122
AP Computer Science Principles 2024 Prep Vocabulary Flashcards
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Abstraction
The process of removing unnecessary details to focus on essential ones.
Algorithm
A set of steps to do a task or solve a problem.
Analog data
A continuous series of data values that change smoothly over time.
API
Stands for Application Programming Interface. Defines how other programs can interface or interact with their programming module or application.
Argument
Holds a value that is passed to a procedure when it is called. Can be a constant, a variable, or an expression to evaluate.
Arithmetic operators
The symbols used in computer programs for mathematical operations (+, -, *, /, MOD).
Assignment statement
Stores a value in a variable. The right side is evaluated, and the result is stored in the variable on the left side.
Authentication
Verifying users requesting access to a system before providing admittance.
Bandwidth
Measures the amount of data that can be sent over a network in a fixed amount of time.
Bias
Discrimination for or against certain groups or individuals in computer science. Can come from the data used or the way the code was written.
Binary number system
Uses the values 0 and 1 and is used by computers at the lowest level to execute code.
Binary search
An algorithm that uses a “divide and conquer” process. The data must be sorted, and each iteration searches in the middle of the dataset.
Bit (binary digit)
which can only be 0 or 1.
Boolean values
Values that can only be true or false.
Byte
Made up of 8 bits.
Certificate Authority (CA)
Issues digital certificates that verify that the data encryption code belongs to the organization.
Citizen scientist
Volunteers who work with a scientific team to help collect or review data from their home.
Clarity
How easy it is to understand the code in a program.
Classifying data
Organizing and identifying categories that fit the data to make it easier to search for patterns and trends.
Cleaning data
The process of identifying incomplete or duplicate data and ensuring the data is uniform without changing the meaning of the data.
Code segment
A single line or a collection of lines of code that are part of a program.
Code statement
Sections of a program with an action to be executed.
Collaboration
People working together to produce a quality product.
Comments
Used to document a program. Ignored by the computer.
Computer virus
Spread by attaching itself to a valid file. It can then replicate and spread, either collecting or destroying data and programs.
Computing device
A piece of equipment that can run a computer program.
Computing network
A connection of computing devices that send and receive data.
Computing system
When multiple computing devices and programs work together for a specific purpose, such as managing the power grid.
Concatenation
When strings are joined or “glued” together to form a new string.
Condition
Use the relational operators (
Creative Commons Licensing
Allows creators to assign different levels of copyright access to their intellectual property.
Crowdfunding
Uses resources like the Internet to ask people across the globe to donate money to help fund their project or need.
Crowdsourcing
Provides opportunities for anyone with access to a site to participate in various ways, such as providing feedback or helping to solve problems.
Cybersecurity
Protects our computing devices and networks from attacks and unauthorized access.
Data abstraction
Assigning a data value to a list. The list can be used and updated without needing multiple variables.
Data mining
Analyzes large datasets to search for patterns that can lead to new insights for the organization.
Data stream
Segments of data packaged in packets sent through a network such as the Internet.
Debugging
Finding and correcting errors in a program.
Decidable problem
A problem where an algorithm can be created that provides a yes or no answer for all instances of the problem.
Decision problem
Only needs a yes or no answer.
Decryption
The process of deciphering an encrypted message so it can be read.
Digital data
Made up of discrete data values. These look like stairsteps and can approximate analog data.
Digital divide
Describes those who lack access to the Internet based on location, economic, or accessibility reasons.
Distributed computing system
Multiple computers are used to process a program or application. The computers each have their own processor and communicate over a network.
Efficiency
Of an algorithm, measures the amount of resources, such as memory and time, it takes to run.
Element
Each data value in a list. It is referenced through its index.
Encryption
The process of converting data into a coded format.
Event-driven programming
A program operates in a wait state and an action, such as pressing a button, provides input and triggers a section of code to run.
Expression
A combination of variables or values and operations to be performed on them. Evaluated to determine a single value.
Fault-tolerant
A system, such as the Internet, is fault-tolerant when redundancy is built in to ensure processing can occur even when sections of the system are not working.
Filtering data
Selecting a subset of data, sometimes based on its classifications, to use for further analysis.
Heuristic
A solution to a problem that is not optimal or the best but is close enough to work, especially when the optimal solution is unreasonable.
Hypertext Transfer Protocol (HTTP)
The World Wide Web uses HTTP to send requested web pages across the Internet.
Hypertext Transfer Protocol Secure (HTTPS)
Provides the secure processing of a web page. Always check for HTTPS before making a purchase online to ensure your credit card number is encrypted.
Incremental development process
Subdivides a program into small modules. Each section is coded, tested, and approved and then added to the larger application.
Information
Data that has been analyzed and has meaning applied to it. Can guide decision- making for the data owners.
Intellectual property
Anything a person creates using a computer is the intellectual property of that person.
Internet Protocol (IP) address
A unique number assigned each time a device connects to the Internet. It is how the network knows where to find your device.
Iterative
To repeat code a specified number of times or until a condition is true using a loop structure.
Iterative development process
Repeats the steps of coding, testing, and feedback to refine a section of code until it is complete.
Keylogging
Malware that captures keystrokes and stores them in a file that is later transmitted to a location specified in the software.
Library
A collection of programs where the executable code is made available to other programmers.
Linear search
A sequential search of a dataset. It starts at the beginning and checks each value to see if it matches the target value being sought.
Lists
A collection of data values stored in one variable. Each data value, or element, is referenced by its index position.
Logic error
Occurs when the code runs but produces incorrect results.
Logical operators
AND, OR, and NOT, used to create more complex conditions that evaluate to a Boolean value (true or false).
Lossless data compression
A technique to make files smaller and allows the original file to be restored when the data is decompressed.
Lossy data compression
Techniques that can achieve more compression than lossless techniques, but some data is lost, and the original file cannot be restored.
Malware
Stands for malicious software and includes anything placed on a device, unknown to the owner, for destructive purposes.
Metadata
Data about data, such as the author of a document. It is used to help organize and find data.
Modularity
A style of programming that breaks the requirements into smaller pieces until each module does a specific task or set of tasks.
Modulus
This operation provides only the remainder after dividing.
Multifactor authentication
Uses more than one method to ensure someone trying to access an account should be granted access.
Open access
Data that is freely available online with limited, if any, copyright restrictions.
Open source
Software that is available for anyone to use or modify without restrictions.
Optimization problem
Attempts to find the best solution for the problem.
Overflow error
Occurs when a number is too large for the number of bits the programming language allocates for it.
Packets
Created by breaking data into same-size segments. A header is created with the sending and receiving IP addresses.
Parallel computing system
Use multiple computers to process a section of a program at the same time. The results are then combined for the complete solution. The devices share memory.
Parameter
Used to accept data values into a procedure. The values are sent through arguments when the procedure is called.
Patterns in data
Raw data is analyzed for patterns to help gain insights into its meaning.
PII (Personally Identifiable Information)
Any information that identifies you such as birthdate, address, driver’s license number, and email address.
Phishing
An attack that uses messages and websites that look like another organization’s official site to fool users into clicking on it and entering information.
Plagiarism
Copying information or computational artifacts without direct permission from the owner/creator.
Procedural Abstraction
Once a procedure is defined, tested, and working, it can be encapsulated so users only need to know the input and output.
Procedure
A defined block of code that does a specific task or tasks. It does not run until it is called in the program.
Program
A collection of code to perform a specific task.
Program behavior
How a program performs when it is running and how users interact with the program.
Program documentation
Describes a program’s purpose and how it achieves it. Used by anyone who needs to review and understand the code.
Program input
Data sent to a program. It can be in a variety of formats, depending on what the program will accept.
Program output
Data produced by the program and sent by the program to a device or file.
Prototype
A draft or incomplete version used to obtain feedback from users and team members before allocating resources.
Protocols
Rules. The Internet has protocols that are open for everyone to ensure that different manufacturers create equipment that can connect to each other.
Pseudocode
A combination of natural language and program code. It is used to design the structure or outline of a program prior to writing the code.
Public key encryption
Uses one key for encrypting data and another to decrypt it. The encryption key is public knowledge, and the decryption key is private.
Readability
Making a program readable should be a goal of every programmer. The use of blank space and comments along with well-named variables and procedures help.
Redundancy
Duplication, is designed into the Internet to keep it operating even when sections of it are nonfunctional.
Relational operators
The same as those used in mathematics:
Requirements
The specifications for the program to meet once it is complete.
RETURN statement
Used to immediately exit a procedure and return control back to the calling program. Also used to send values back.