AP Computer Science Principles 2024 Prep

0.0(0)
studied byStudied by 1 person
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/122

flashcard set

Earn XP

Description and Tags

AP Computer Science Principles 2024 Prep Vocabulary Flashcards

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

123 Terms

1
New cards

Abstraction

The process of removing unnecessary details to focus on essential ones.

2
New cards

Algorithm

A set of steps to do a task or solve a problem.

3
New cards

Analog data

A continuous series of data values that change smoothly over time.

4
New cards

API

Stands for Application Programming Interface. Defines how other programs can interface or interact with their programming module or application.

5
New cards

Argument

Holds a value that is passed to a procedure when it is called. Can be a constant, a variable, or an expression to evaluate.

6
New cards

Arithmetic operators

The symbols used in computer programs for mathematical operations (+, -, *, /, MOD).

7
New cards

Assignment statement

Stores a value in a variable. The right side is evaluated, and the result is stored in the variable on the left side.

8
New cards

Authentication

Verifying users requesting access to a system before providing admittance.

9
New cards

Bandwidth

Measures the amount of data that can be sent over a network in a fixed amount of time.

10
New cards

Bias

Discrimination for or against certain groups or individuals in computer science. Can come from the data used or the way the code was written.

11
New cards

Binary number system

Uses the values 0 and 1 and is used by computers at the lowest level to execute code.

12
New cards

Binary search

An algorithm that uses a “divide and conquer” process. The data must be sorted, and each iteration searches in the middle of the dataset.

13
New cards

Bit (binary digit)

which can only be 0 or 1.

14
New cards

Boolean values

Values that can only be true or false.

15
New cards

Byte

Made up of 8 bits.

16
New cards

Certificate Authority (CA)

Issues digital certificates that verify that the data encryption code belongs to the organization.

17
New cards

Citizen scientist

Volunteers who work with a scientific team to help collect or review data from their home.

18
New cards

Clarity

How easy it is to understand the code in a program.

19
New cards

Classifying data

Organizing and identifying categories that fit the data to make it easier to search for patterns and trends.

20
New cards

Cleaning data

The process of identifying incomplete or duplicate data and ensuring the data is uniform without changing the meaning of the data.

21
New cards

Code segment

A single line or a collection of lines of code that are part of a program.

22
New cards

Code statement

Sections of a program with an action to be executed.

23
New cards

Collaboration

People working together to produce a quality product.

24
New cards

Comments

Used to document a program. Ignored by the computer.

25
New cards

Computer virus

Spread by attaching itself to a valid file. It can then replicate and spread, either collecting or destroying data and programs.

26
New cards

Computing device

A piece of equipment that can run a computer program.

27
New cards

Computing network

A connection of computing devices that send and receive data.

28
New cards

Computing system

When multiple computing devices and programs work together for a specific purpose, such as managing the power grid.

29
New cards

Concatenation

When strings are joined or “glued” together to form a new string.

30
New cards

Condition

Use the relational operators (

31
New cards

Creative Commons Licensing

Allows creators to assign different levels of copyright access to their intellectual property.

32
New cards

Crowdfunding

Uses resources like the Internet to ask people across the globe to donate money to help fund their project or need.

33
New cards

Crowdsourcing

Provides opportunities for anyone with access to a site to participate in various ways, such as providing feedback or helping to solve problems.

34
New cards

Cybersecurity

Protects our computing devices and networks from attacks and unauthorized access.

35
New cards

Data abstraction

Assigning a data value to a list. The list can be used and updated without needing multiple variables.

36
New cards

Data mining

Analyzes large datasets to search for patterns that can lead to new insights for the organization.

37
New cards

Data stream

Segments of data packaged in packets sent through a network such as the Internet.

38
New cards

Debugging

Finding and correcting errors in a program.

39
New cards

Decidable problem

A problem where an algorithm can be created that provides a yes or no answer for all instances of the problem.

40
New cards

Decision problem

Only needs a yes or no answer.

41
New cards

Decryption

The process of deciphering an encrypted message so it can be read.

42
New cards

Digital data

Made up of discrete data values. These look like stairsteps and can approximate analog data.

43
New cards

Digital divide

Describes those who lack access to the Internet based on location, economic, or accessibility reasons.

44
New cards

Distributed computing system

Multiple computers are used to process a program or application. The computers each have their own processor and communicate over a network.

45
New cards

Efficiency

Of an algorithm, measures the amount of resources, such as memory and time, it takes to run.

46
New cards

Element

Each data value in a list. It is referenced through its index.

47
New cards

Encryption

The process of converting data into a coded format.

48
New cards

Event-driven programming

A program operates in a wait state and an action, such as pressing a button, provides input and triggers a section of code to run.

49
New cards

Expression

A combination of variables or values and operations to be performed on them. Evaluated to determine a single value.

50
New cards

Fault-tolerant

A system, such as the Internet, is fault-tolerant when redundancy is built in to ensure processing can occur even when sections of the system are not working.

51
New cards

Filtering data

Selecting a subset of data, sometimes based on its classifications, to use for further analysis.

52
New cards

Heuristic

A solution to a problem that is not optimal or the best but is close enough to work, especially when the optimal solution is unreasonable.

53
New cards

Hypertext Transfer Protocol (HTTP)

The World Wide Web uses HTTP to send requested web pages across the Internet.

54
New cards

Hypertext Transfer Protocol Secure (HTTPS)

Provides the secure processing of a web page. Always check for HTTPS before making a purchase online to ensure your credit card number is encrypted.

55
New cards

Incremental development process

Subdivides a program into small modules. Each section is coded, tested, and approved and then added to the larger application.

56
New cards

Information

Data that has been analyzed and has meaning applied to it. Can guide decision- making for the data owners.

57
New cards

Intellectual property

Anything a person creates using a computer is the intellectual property of that person.

58
New cards

Internet Protocol (IP) address

A unique number assigned each time a device connects to the Internet. It is how the network knows where to find your device.

59
New cards

Iterative

To repeat code a specified number of times or until a condition is true using a loop structure.

60
New cards

Iterative development process

Repeats the steps of coding, testing, and feedback to refine a section of code until it is complete.

61
New cards

Keylogging

Malware that captures keystrokes and stores them in a file that is later transmitted to a location specified in the software.

62
New cards

Library

A collection of programs where the executable code is made available to other programmers.

63
New cards

Linear search

A sequential search of a dataset. It starts at the beginning and checks each value to see if it matches the target value being sought.

64
New cards

Lists

A collection of data values stored in one variable. Each data value, or element, is referenced by its index position.

65
New cards

Logic error

Occurs when the code runs but produces incorrect results.

66
New cards

Logical operators

AND, OR, and NOT, used to create more complex conditions that evaluate to a Boolean value (true or false).

67
New cards

Lossless data compression

A technique to make files smaller and allows the original file to be restored when the data is decompressed.

68
New cards

Lossy data compression

Techniques that can achieve more compression than lossless techniques, but some data is lost, and the original file cannot be restored.

69
New cards

Malware

Stands for malicious software and includes anything placed on a device, unknown to the owner, for destructive purposes.

70
New cards

Metadata

Data about data, such as the author of a document. It is used to help organize and find data.

71
New cards

Modularity

A style of programming that breaks the requirements into smaller pieces until each module does a specific task or set of tasks.

72
New cards

Modulus

This operation provides only the remainder after dividing.

73
New cards

Multifactor authentication

Uses more than one method to ensure someone trying to access an account should be granted access.

74
New cards

Open access

Data that is freely available online with limited, if any, copyright restrictions.

75
New cards

Open source

Software that is available for anyone to use or modify without restrictions.

76
New cards

Optimization problem

Attempts to find the best solution for the problem.

77
New cards

Overflow error

Occurs when a number is too large for the number of bits the programming language allocates for it.

78
New cards

Packets

Created by breaking data into same-size segments. A header is created with the sending and receiving IP addresses.

79
New cards

Parallel computing system

Use multiple computers to process a section of a program at the same time. The results are then combined for the complete solution. The devices share memory.

80
New cards

Parameter

Used to accept data values into a procedure. The values are sent through arguments when the procedure is called.

81
New cards

Patterns in data

Raw data is analyzed for patterns to help gain insights into its meaning.

82
New cards

PII (Personally Identifiable Information)

Any information that identifies you such as birthdate, address, driver’s license number, and email address.

83
New cards

Phishing

An attack that uses messages and websites that look like another organization’s official site to fool users into clicking on it and entering information.

84
New cards

Plagiarism

Copying information or computational artifacts without direct permission from the owner/creator.

85
New cards

Procedural Abstraction

Once a procedure is defined, tested, and working, it can be encapsulated so users only need to know the input and output.

86
New cards

Procedure

A defined block of code that does a specific task or tasks. It does not run until it is called in the program.

87
New cards

Program

A collection of code to perform a specific task.

88
New cards

Program behavior

How a program performs when it is running and how users interact with the program.

89
New cards

Program documentation

Describes a program’s purpose and how it achieves it. Used by anyone who needs to review and understand the code.

90
New cards

Program input

Data sent to a program. It can be in a variety of formats, depending on what the program will accept.

91
New cards

Program output

Data produced by the program and sent by the program to a device or file.

92
New cards

Prototype

A draft or incomplete version used to obtain feedback from users and team members before allocating resources.

93
New cards

Protocols

Rules. The Internet has protocols that are open for everyone to ensure that different manufacturers create equipment that can connect to each other.

94
New cards

Pseudocode

A combination of natural language and program code. It is used to design the structure or outline of a program prior to writing the code.

95
New cards

Public key encryption

Uses one key for encrypting data and another to decrypt it. The encryption key is public knowledge, and the decryption key is private.

96
New cards

Readability

Making a program readable should be a goal of every programmer. The use of blank space and comments along with well-named variables and procedures help.

97
New cards

Redundancy

Duplication, is designed into the Internet to keep it operating even when sections of it are nonfunctional.

98
New cards

Relational operators

The same as those used in mathematics:

99
New cards

Requirements

The specifications for the program to meet once it is complete.

100
New cards

RETURN statement

Used to immediately exit a procedure and return control back to the calling program. Also used to send values back.