ap csp

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

A mistake in typed code that violates the rules of the programming language. Typically, code with syntax errors will not run.

syntax error:

2
New cards

A mistake in an algorithm or program that causes it to behave unexpectedly or return the incorrect value.

logic error:

3
New cards

A mistake in a program that happens only when the program is actually run, such as a program attempting to access memory that does not exist.

run-time error:

4
New cards

Error that results when the number of bits is not enough to represent the number (like a car’s odometer “rolling over”).

overflow error:

5
New cards

A binary digit, either 0 or 1.

bit:

6
New cards

A sequence of 8 bits.

byte:

7
New cards

Error that results when the number of bits is not enough to represent the number with full precision (like using 3 digits to represent

roundoff:

8
New cards

Values that change smoothly, rather than in discrete intervals, over time. For example, the pitch and volume of a live concert.

analog data:

9
New cards

Compressing data in a way that preserves all data away and allows full recovery of the original.

lossless:

10
New cards

Compressing data in a way that discards some data and makes it impossible to recover the original.

lossy:

11
New cards

Data about data, like descriptive information about a file or a row in a database.

metadata:

12
New cards

The sequential execution of steps in an algorithm or code in a program (like steps in a recipe).

sequencing:

13
New cards

A Boolean condition to determine which of two paths are taken in an algorithm or program.

selection:

14
New cards

The repetition of steps in an algorithm or program for a certain amount of times or until a certain condition is met.

iteration:

15
New cards

An algorithm that iterates through each item in a list until it finds the target value.

linear search:

16
New cards

An algorithm that searches a sorted list for a value by repeatedly splitting the list in half.

binary search:

17
New cards

A run time for an algorithm that doesn't increase faster than a polynomial function of the input size

reasonable time:

18
New cards

A technique that helps an algorithm find a good solution in a hard problem (like always walking toward the north star when you are stuck in a forest).

heuristic:

19
New cards

A problem that is so logically difficult, we can’t ever create an algorithm that would be able to answer "yes or "no" for all inputs (like the halting problem).

undecidable:

20
New cards

A collection of procedures that are useful in creating programs.

library:

21
New cards

Application Programming Interface, a library of procedures and a description of how to call each procedure.

API:

22
New cards

The separation of a program into independent modules that are each responsible for one aspect of the program's functionality.

modularity:

23
New cards

The iteration over the items in a list. A full traversal iterates over every item, while a partial traversal iterates over a subset of the items.

traversal:

24
New cards

A physical device that can run a program, such as a computer, smart phone, or smart sensor.

computing device:

25
New cards

A group of interconnected computing devices capable of sending or receiving data.

computer network:

26
New cards

The maximum amount of data that can be sent in a fixed period of time over a network connection, typically measured in bits per second.

bandwidth:

27
New cards

An agreed upon set of rules that specify the behavior of a system.

protocol:

28
New cards

The ability of a system to adjust in scale to meet new demands.

scalability:

29
New cards

The protocol that determines how to address nodes on the network (with IP addresses) and how to route data from one node to a destination node (using routers).

IP (Internet Protocol):

30
New cards

A data transport protocol that includes mechanisms for reliably transmitting packets to a destination.

TCP (Transmission Control Protocol):

31
New cards

A lightweight data transport protocol with minimal error checking.

UDP (User Datagram Protocol):

32
New cards

A system of linked pages, media, and files, browsable over HTTP.

World Wide Web:

33
New cards

The protocol that powers the Web, used to request webpages from servers and submit form data to servers.

HTTP (Hypertext Transfer Protocol):

34
New cards

A computational model which splits a program into multiple tasks, some of which can be executed simultaneously.

parallel computing:

35
New cards

The improvement in the amount of time a parallelized program takes to solve a problem, computed as the amount of time to complete the task sequentially divided by the amount of time to complete the task when run in parallel.

speedup:

36
New cards

A computational model which uses multiple devices to run different parts of a program.

distributed computing:

37
New cards

The idea that some communities or populations have less access to computing than others, typically due to limitations of Internet speed or computer hardware access.

digital divide:

38
New cards

A model in which many online users combine efforts to help fund projects, generate ideas, or create goods or services (like Wikipedia).

crowdsourcing:

39
New cards

Crowdsourcing for science! The participation of volunteers from the public in a scientific research project (like collecting rain samples or counting butterflies). Learn more in Citizen science.

citizen science:

40
New cards

An alternative to copyright that allows people to declare how they want their artistic creations to be shared, remixed, used in noncommercial contexts, and how the policy should propagate with remixed versions.

Creative Commons:

41
New cards

A policy that allows people to have access to documents (like research papers) for reading or data (like government datasets) for analysis.

open access:

42
New cards

Information about an individual that can be used to uniquely identify them (directly or indirectly).

PII (Personally identifiable information):

43
New cards

A method of user authentication which requires the user to present multiple pieces of evidence in multiple categories (such as knowledge and possession).

multifactor authentication (MFA):

44
New cards

The process of scrambling data to prevent unauthorized access.

encryption:

45
New cards

A technique for encrypting data where the same key is used to both encrypt and decrypt data.

symmetric encryption:

46
New cards

An asymmetric encryption technique that uses different keys for encrypting versus decrypting data.

public key encryption:

47
New cards

A small amount of text that tracks information about a user visiting a website.

cookie:

48
New cards

A type of computer malware that can make copies of itself.

virus:

49
New cards

An attack where a user is tricked into revealing private information, often via a deceptive email.

phishing:

50
New cards

A wireless access point that provides an attacker with unauthorized access to the traffic going over the network.

rogue access point: