AP Computer Science Principles Final Exam Review

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/32

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

33 Terms

1
New cards

Overflow

error that results when the number of bits is not enough to hold the number, like a car's odometer "rolling over"

2
New cards

Round-off

error that results when the number of bits is not enough to represent the actual number, like 3 digits to represent π as 3.14

3
New cards

Lossy

Compressing data in a way that throws some data away and makes it almost impossible to recover the original, great compression, like JPEG images

4
New cards

Lossless

Compressing data in a way that preserves all data away and allows full recovery of the original, good compression -- usually not as good as lossy, like PNG images

5
New cards

Metadata

data about data, like a camera storing the location, aperture, shutter speed, etc. for a digital photo

6
New cards

Sequencing

code flows line by line, one after another, like a recipe

7
New cards

Selection

a boolean condition to determine which of two algorithmic paths are taken, aka if-then

8
New cards

Iteration

using a looping control structure, like while, for, foreach, repeat, repeat-until, etc.

9
New cards

Reasonable time

polynomial in the number of steps an algorithm takes in the worst case based on the input size

10
New cards

Not reasonable time

Usually exponential in the number of steps, like doubling every time your input grows by one

11
New cards

Heuristic

using a "rule" to guide an algorithm, like always walking toward the north star if you were stuck in a forest

12
New cards

Undecidable

A problem that is so difficult, we can't ever create an algorithm that would be able to answer yes or no for all inputs, like determining if a user's program run on some input would always stop and not run forever

13
New cards

Linear vs binary search

Going one by one vs starting in the middle and going left/right like looking for a word in the dictionary -- binary search requires the list to be sorted in order

14
New cards

APIs

Application Programming Interface, how you define libraries and call them

15
New cards

Public key encryption

is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

16
New cards

Domain names

an identification string that defines a realm of administrative autonomy, authority or control within the Internet.

17
New cards

IP addresses

is an identifier assigned to each computer and other device (e.g., printer, router, mobile device, etc.) connected to a TCP/IP network[1] that is used to locate and identify the node in communications with other nodes on the network

18
New cards

TCP/IP network

the conceptual model and set of communications protocols used on the Internet and similar computer networks. It is commonly known as TCP/IP because the original protocols in the suite are the Transmission Control Protocol (TCP) and the Internet Protocol (IP).

19
New cards

Data compression

involves encoding information using fewer bits than the original representation

20
New cards

Cloud services

is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand

21
New cards

Intellectual property

Intellectual property (IP) refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce.

22
New cards

Malware attacks

short for malicious software, is any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising

23
New cards

Phishing

is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

24
New cards

DDos Attack

denial-of-service attack (DoS attack) is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

25
New cards

DNS Server

is a hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network.

26
New cards

Citizen Science

Lots of people to help with a scientific project, like asking everyone around the world to count the butterflies they see one day

27
New cards

Cloud Computing

Using distributed calculations and/or storage for big data or a web applicatio)

28
New cards

Crowdsourcing

Asking lots of users online to help with something, like funding a project, or running SETI@Home to help look for extraterrestrial signals

29
New cards

Creative Commons

An alternative to copyright that allows people to declare how they want their artistic creations to be shared, remixed, used in noncommercial contexts, and how the policy should propagate with remixed versions

30
New cards

Open Access

A policy that allows people to have read access to things, e.g., libraries or online data

31
New cards

Moore's Law

The # of transistors on a chip doubles every two years

32
New cards

Peer-to-peer networks

A system where one user's computer connects through the Internet to another user's computer without going through an intermediary "centralized" computer to manage the connection

33
New cards

Digital divide

The idea that some communities / populations have less access to computing than others