AP CSP ULTIMATE GUIDE

0.0(0)
studied byStudied by 12 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/85

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

86 Terms

1
New cards
Protocol
A set of rules for how data is transmitted over a network. Example: HTTPS protocol used to securely load websites.
2
New cards
IP address
A unique number that identifies a device on the internet. Example: 192.168.1.1 used to identify your home router.
3
New cards

DNS

System that translates domain names to IP addresses. Example: Typing www.google.com is resolved to an IP by ___.

4
New cards
Packet
Small chunk of data sent over a network. Example: When streaming Netflix, video is sent in packets.
5
New cards
Routing
The process of choosing paths in a network for data. Example: Google Maps chooses shortest path like routers do with data.
6
New cards
Fault Tolerance
The internet still works even if parts fail. Example: If one server crashes, others handle the request.
7
New cards
HTTP/HTTPS
Protocols used to access websites (HTTPS is secure). Example: Online banking sites use HTTPS.
8
New cards
IP/TCP
Core internet protocols; TCP ensures delivery, IP handles addressing. Example: TCP resends packets if a file download is interrupted.
9
New cards
Redundancy
Extra pathways in a network to increase reliability. Example: Backup internet cables under the ocean.
10
New cards

Bandwidth

Maximum data that can pass through a network. Example: 100 Mbps home Wifi

11
New cards

Latency

Delay before data transfer starts. Example: Lag in online gaming

12
New cards
Digital Divide
Gap between people with and without internet access. Example: Rural areas with no broadband access.
13
New cards

SSL/TLS

Encryption protocols for secure web communication. Example: Online checkout pages use certificates.

14
New cards
Internet Protocol Suite
Collection of rules (like TCP/IP) for internet data. Example: Sending an email relies on TCP/IP protocols.
15
New cards
Open Standards
Publicly shared rules for internet technologies. Example: HTML is an open standard for web pages.
16
New cards
World Wide Web vs. Internet
Web = websites; Internet = entire network. Example: The Web is like the library, Internet is like the roads.
17
New cards
Internet Scalability
The internet can grow and handle more devices. Example: Billions of smartphones online at once.
18
New cards
Binary
A way to represent data using 1s and 0s. Example: Computers store text like 'A' as 01000001.
19
New cards
Bit/Byte
Bit = 1 binary digit; Byte = 8 bits. Example: A 4GB movie has billions of bytes.
20
New cards
Overflow Error
When a number is too big for the storage space. Example: Old video games score counter rolling to zero.
21
New cards

Round off error

when a computer comes across an irrational number

22
New cards
Lossless Compression
Shrinks file without losing data. Example: ZIP file compresses documents without losing info.
23
New cards
Lossy Compression
Shrinks file but loses some data. Example: JPEG image reduces quality to save space.
24
New cards
Abstraction
Simplifying complex details. Example: Google Maps shows only roads and locations, hiding raw data.
25
New cards

Metadata

Data about data (e.g., photo size, format). Example: A photo's ___ may include camera settings.

26
New cards
File Types
Formats like JPEG, MP3 for storing data. Example: Word doc (.docx), music file (.mp3).
27
New cards
Sampling
Measuring sound/image at intervals for digital storage. Example: iPhone records audio at 44.1kHz sample rate.
28
New cards

Creative Commons/Open Source/Open Access

Free ways to share and use content/data/code. Example: Wikipedia uses a license.

29
New cards
Algorithm
Step
30
New cards
Sequencing, Selection, Iteration
Order, decisions (if), and loops. Example: A traffic light uses sequence, if
31
New cards
Boolean Expressions
True/false conditions. Example: 'Is age >= 16?' checks if someone can drive.
32
New cards
Conditionals
If
33
New cards
Loops
Repeat code (for, while). Example: FitBit step counter checks steps every second.
34
New cards

Variables

Store data values. Example: the ___ 'score' in a game tracks your points.

35
New cards
Lists/Arrays
Store multiple values in one place. Example: List of groceries: [milk, eggs, bread].
36
New cards
Indexes
Position of item in a list (starts at 1 in AP pseudocode). Example: The 1st item in list [cat, dog, bird] is 'cat.'
37
New cards
Parameters
Inputs to a function. Example: A function that calculates tax may take 'price' as a parameter.
38
New cards
Return Values
Output from a function. Example: Function input: 3+4 → return value: 7.
39
New cards
Procedures (Functions)
Reusable code blocks. Example: A 'calculateTotal' function in an online store checkout.
40
New cards
Abstraction (in code)
Hiding details using functions. Example: You call 'playSound()' without knowing how sound plays.
41
New cards
Linear Search
Check each item one by one. Example: Looking through a contact list without sorting.
42
New cards
Binary Search
Repeatedly divide list to find an item. Example: Searching a name in an alphabetized directory.
43
New cards
Sorting Algorithms
Organize data (e.g., bubble sort). Example: Sorting test scores from low to high.
44
New cards
Simulation
Model a real
45
New cards
Pseudocode
Fake code that shows logic. Example: 'If age > 18, print 'adult.'
46
New cards
Event
driven Programming
47
New cards
String Operations
Manipulate text (e.g., 'hello' + 'world'). Example: Joining first and last names into a full name.
48
New cards

Encryption

Scrambling data for security. Example: WhatsApp ___ messages.

49
New cards
Decryption
Turning encrypted data back to normal. Example: Your device decrypts WhatsApp messages.
50
New cards
Public Key Encryption
Uses two keys (public + private). Example: Secure email uses public key to encrypt.
51
New cards
Private Key
Secret key used to decrypt. Example: Only you have the private key to read messages.
52
New cards
Symmetric/Asymmetric Encryption
One key vs. two
53
New cards
Phishing
Fake messages tricking users to give info. Example: Fake email asking for credit card info.
54
New cards
Malware
Harmful software. Example: A virus that deletes files.
55
New cards
DDoS Attack
Overload a system with traffic to crash it. Example: Hackers flood a website with requests to shut it down.
56
New cards

Firewalls

Protect networks from threats. Example: School blocks gaming websites

57
New cards
Antivirus Software
Detects and removes malware. Example: Norton Antivirus scans for threats.
58
New cards

Cookies

Track user behavior online. Example: Shopping sites use ___ to remember your cart.

59
New cards
Data Breach
Unauthorized access to data. Example: Hackers steal customer data from Target.
60
New cards
PII
Info that identifies a person (e.g., SSN). Example: Name + address + SSN = PII.
61
New cards
Cybersecurity
Protecting systems/data from attacks. Example: Using strong passwords and 2FA.
62
New cards
Certificate Authorities
Verify websites are secure. Example: Lock icon in browser shows valid certificate.
63
New cards

Crowdsourcing

Using many people's input to solve problems. Example: Wikipedia written by many users.

64
New cards
Citizen Science
Public helps collect scientific data. Example: People report bird sightings for research.
65
New cards
Bias in Algorithms
When code produces unfair results. Example: A hiring app that favors certain resumes.
66
New cards
Access/Equity/Inclusion
Ensuring all groups benefit from tech. Example: Providing screen readers for the blind.
67
New cards
Intellectual Property
Legal rights to creations (music, code). Example: Copyright on a software app.
68
New cards
Censorship
Controlling or blocking access to info. Example: Government blocks certain websites.
69
New cards
Data Permanence
Online data is hard to delete forever. Example: Deleted tweets can still be archived.
70
New cards
Moore's Law
Computer power doubles ~every 2 years. Example: Smartphones become faster every year.
71
New cards
Automation
Tech doing tasks without humans. Example: Robots assembling cars.
72
New cards
Assistive Technology
Tech helping people with disabilities. Example: Voice
73
New cards
Social/Economic/Cultural Impact
How computing affects life. Example: Remote work changing office culture.
74
New cards
Computing Innovations
New creations using computers. Example: AI systems like ChatGPT.
75
New cards
Input
Data given to a program. Example: User typing a search in Google.
76
New cards
Output
Data produced by a program. Example: Search results displayed.
77
New cards
Processing
Actions performed on input. Example: Calculating totals in a shopping cart.
78
New cards
Storage
Saving data. Example: Google Drive storing your files.
79
New cards
Events
User actions that trigger code. Example: Clicking 'Submit' on a form.
80
New cards
Concatenation
Combining strings. Example: 'Hello' + 'World' = 'HelloWorld'.
81
New cards
Modularization
Splitting code into smaller parts. Example: Breaking a game into score(), jump(), restart().
82
New cards
Code Tracing
Following code line by line. Example: Debugging why a score isn't updating.
83
New cards
Modeling
Representing a real situation in code. Example: Simulating a disease outbreak.
84
New cards
Data Abstraction
Simplifying data (e.g., lists). Example: Using a list to store menu items.
85
New cards
Procedural Abstraction
Simplifying code (e.g., functions). Example: Using 'calculateTip()' instead of repeating code.
86
New cards

List Operations

Add, remove, find items in a list. Example: Adding a new item to your grocery list