AP CompSci Vocab

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/95

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

96 Terms

1
New cards

Input

data that are sent to a computer for processing by a program. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.

2
New cards

Output

any data that are sent from a program to a device. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.

3
New cards

User Interface

The inputs and outputs that allow a user to interact with a piece of software. User interfaces can include a variety of forms such as buttons, menus, images, text, and graphics.

4
New cards

Documentation

A written description of how a command or piece of code works or was developed

5
New cards

Comment

Form of a program documentation written into the program to be read by people which do not affect how a program runs

6
New cards

Pair Programming

A collaborative programming style in which two programmers switch between the role of writing code and tracking or planning high level progress.

7
New cards

Binary Number

A base 2 number with two possible different digits

8
New cards

Byte

8 bits ex. 10010101

9
New cards

Bit

A contraction of “Binary Digit” the single unit of information in a computer, typically represented as a 0 or 1

10
New cards

Overflow Error

Error from attempting to represent a number that is too large. (Not enough bits)

11
New cards

Round-off Error

Error from attempting to represent a number that is too precise. The value is rounded.

12
New cards

Sampling

A process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples

13
New cards

Analog Data

Data with values that change continuously, or smoothly over time. Ex. live music, colors of a painting, position of a sprinter during a race.

14
New cards

Digital Data

Data that changes discreetly through a finite set of possible values. Ex. digital image, mp3 file

15
New cards

Lossless Compression

A process for reducing the number of bits needed to represent something without losing any information. This process in reversible.

16
New cards

Lossy Compression

A process for reducing the number of bits needed to represent something in which some information is lost or thrown away. This process in not reversible.

17
New cards

Intellectual Property

A work or invention that is the result of creativity, such as a piece of writing or a design, to which one has rights and for which one may apply for a patent, copyright, trademark, etc.

18
New cards

Creative Commons

A collection of public copyright licenses that enable the free distribution of an otherwise copyrighted work, used when an author wants to give people the right to share, use, and build upon a work that they created

19
New cards

Computing Device

A machine that can run a program, including computers, tablets, servers, routers, and smart sensors

20
New cards

Computing Network

A group of interconnected computing devices capable of sending or receiving data

21
New cards

Computing System

A group of computing devices and programs working together for a common purpose

22
New cards

Path

The series of connections between computing devices on a network starting with a sender and ending with a receiver

23
New cards

Bandwidth

The maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second

24
New cards

Protocol

An agreed-upon set of rules that specify the behavior of some system

25
New cards

IP Address

A unique number assigned to each device on the Internet

26
New cards

Internet Protocol

A protocol for sending data across the internet that assigns unique numbers (IP addresses) to each connected device

27
New cards

Router

A type of computer that forwards data across a network

28
New cards

Fault Tolerant

Can continue to function even in the event of individual component failures. This is important because elements of complex systems like a computer network fail at unexpected times, often in groups

29
New cards

Redundancy

The inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network

30
New cards

Transmission Control Protocol (TCP)

A protocol for sending packets that does error-checking to ensure all packets are received and properly ordered (prioritizing accuracy)

31
New cards

Packet

A chunk of data sent over a network. Larger messages are divided into packets that may arrive at the destination in order, out-of-order, or not at all.

32
New cards

Packet Metadata

Data added to packets to help route them through the network and reassemble the original message

33
New cards

User Datagram Protocol (UDP)

A protocol for sending packets quickly with minimal error-checking and no resending of dropped packets (prioritizing speed)

34
New cards

Datastream

Information passed through the internet in packets.

35
New cards

Scalability

The capacity for the system to change in size and scale to meet new demands

36
New cards

World Wide Web

A system of linked pages, programs, and files

37
New cards

Hypertext Transfer Protocol (HTTP)

A protocol for computers to request and share the pages that make up the world wide web on the Internet

38
New cards

The Domain Name System (DNS)

The system responsible for translating domain names like example.com into IP addresses

39
New cards

Digital Divide

differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics.

  • Can affect both individual and groups.

  • Raises ethical concerns of equity, access, and influence globally and locally.

  • Affected by the actions of individuals, organizations, and governments.

40
New cards

Expression

A combination of operators and values that evaluates to a single value

41
New cards

Assignment Operator

Holds one value at a time

42
New cards

Variable

Allows a program to change the value represented by a variable

43
New cards

String

a data type found in computer programming that consists of alphanumeric characters (letters and numbers).

44
New cards

Boolean Value

True or false

Boolean expression: evaluates to either true or false

45
New cards

Relational Operators

Comparison operators: <,>,<=,>=,==, !=,

Logical operators: &&, ||, !

46
New cards

Conditional Statement

Affects the sequential flow of control by executing different statements based on the value of a Boolean expression

47
New cards

Logical Operator

NOT, AND, and OR, which evaluate to a Boolean value

48
New cards

Function (Procedure)

A named group of programming instructions. Also referred to as a “procedure”

49
New cards

Function (Procedure) Call

A command that executes the code within a function

50
New cards

Correlation

Similarities, patterns

51
New cards

Metadata

Data about data

52
New cards

Data Filtering

Filtering data allows the user to look at a subset of the data.

53
New cards

Data Cleaning

When data is incomplete, invalid, or multiple tables are combined into one, users can manually clean the data

54
New cards

Citizen Science

Citizen science is research where some of the data collection is done by members of the public using own computing devices which leads to solving scientific problems

"collecting data from others so you can analyze it"

55
New cards

Crowdsourcing

Crowdsourcing is the practice of obtaining input or information from a large number of people via the Internet.

56
New cards

Data Bias

Data bias refers to data that is incomplete or inaccurate. These limitations then fail to paint an accurate picture of the population the data is supposed to represent. Data can represent anything like standardized test scores of college students, customer satisfaction feedback, or population health data.

57
New cards

Information

facts provided or learned about something or someone.

58
New cards

List

A List is an ordered collection of elements

59
New cards

Index

An index a common method for referencing the elements in a list or string using numbers

60
New cards

Element

An Element is an individual value in a list that is assigned a unique index

61
New cards

Iteration

A repetitive portion of an algorithm which repeats a specified number of times or until given condition is met

62
New cards

Infinite Loop

Occurs when the ending condition will never evaluate to true. In other words, the Boolean expression will never evaluate to false

63
New cards

Traversal

the process of accessing each item in a list one at a time with a for loop

64
New cards

Parameter

A variable in a function definition. Used as a placeholder for values that will be passed through the function.

65
New cards

Argument

Value passed to the parameter

66
New cards

Return

Used to return the flow of control to the point where the procedure (also known as a function) was called and to return the value of expression

67
New cards

Procedural Abstraction

Provides a name for a process and allows the procedure (function) to be used only knowing what it does, and not necessarily how it does it. (makes something look simpler than it really is → hides complexity)

68
New cards

Library

A group of functions (procedures) that may be used in creating new programs

69
New cards

Application Program Interface (API)

specifications for how functions in a library behave and can be used

70
New cards

Modularity

The subdivision of a computer program into separate subprograms

71
New cards

Personally Identifiable Information (PII)

Information about an individual that identifies, links, relates, or describes them

72
New cards

Malware

Software intended to damage a computing system or take partial control over its operation

73
New cards

Phishing

A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails. 

74
New cards

Keylogging

The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

75
New cards

Rogue Access Point

A wireless access point that gives unauthorized access to secure networks

76
New cards

Encryption

A process of encoding messages to keep them secret, so only “authorized” parties can read it.

77
New cards

Decryption

A process that reverses encryption taking a secret message and reproducing the original plain text

78
New cards

Symmetric Key Encryption

Involves one key for both encryption and decryption

79
New cards

Public Key Encryption

Pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message.

80
New cards

Cracking Encryption

when you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption

81
New cards

Cipher

The generic term for a technique (or algorithm) that performs encryption

82
New cards

Caesar’s Cipher

A technique for encryption that shifts the alphabet by some number of characters

83
New cards

Multifactor Authentication

A method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have) and inherence (something they are). Each step provides a new layer of security.

84
New cards

Computer Virus Scanning Software

Protects a computing system against infection

85
New cards

Problem

A general description of a task that can (or cannot) be solved with an algorithm

86
New cards

Algorithm

A finite set of instructions that accomplish a task

87
New cards

Sequencing

Putting steps in an order

88
New cards

Sequencing

Putting steps in an order

89
New cards

Selection

Doing some steps over and over

90
New cards

Efficiency

A measure of how many steps are needed to complete an algorithm

91
New cards

Linear Search

A search algorithm which checks each element of a list, in order until the desired value is found or all elements in the list have been checked

92
New cards

Binary Search

A search algorithm that starts at the middle of a sorted set of numbers and removes half of the data; this process repeats until the desired value is found or all element have been eliminated

93
New cards

Unreasonable Time

Algorithms with exponential or factorial efficiencies are examples of algorithms that run in an unreasonable amount of time.

94
New cards

Reasonable Time

Algorithms with a polynomial efficiency or lower (constant, linear, square, cube, etc.) are said to run in a reasonable amount of time

95
New cards

Undecidable Problem

A problem for which no algorithm can be constructed that is always capable of providing a correct yes-or-no answer

96
New cards

Heuristic

Provides a “good enough” solution to a problem when an actual solution is impractical or impossible