AP Comp Sci Vocab

studied byStudied by 18 people
5.0(1)
Get a hint
Hint

Abstraction

1 / 50

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

51 Terms

1

Abstraction

To reduce detail or information for a purpose in a program; to help improve focus on a relevant concept; or to understand or solve a problem

New cards
2

Algorithm

A step-by-step set of instructions implemented by a program to develop and express solutions to a computational problem.

New cards
3

Append

Adding an element to the end of a list

New cards
4

Assignment

When you put a value into a memory location and give that location a name in a program; on exam operator is represented with an arrow

New cards
5

Binary number system

two-digit number system where each number represents a power of two

New cards
6

Bit

A single binary digit which can contain a 0 or a 1

New cards
7

Boolean logic

Branch of algebra where all values are represented by either true or false

New cards
8

Certificate authority

Busses digital certificates that validate ownership of encrypted keys used in secured communications; used in authentication step of public key encryption; managed by public key infrastructure

New cards
9

Circuit

A complete path that allows electrical current to flow from a high voltage to low voltage; fundamental concept used in a component design to manipulate data

New cards
10

Citizen science

Collection and analysis of data by non-scientists on home computers; often performed in a collaboration with professional scientists

New cards
11

Cloud computing/storage

Rather than using a local computer, this form of computation uses a network of remote serves to calculate and/or store data; has fostered new ways to communicate and collaborate

New cards
12

Complexity (of an algorithm)

The amount of logical reasoning (sometimes measured in lines of code) required to create an algorithm

New cards
13

Condition

A decision in an algorithm based on a boolean value (true or false) used to control selection in an algorithm

New cards
14

Crowdsourcing

Multiple people working (often online) together to complete a task

New cards
15

Cybercrime

Criminal activities carried out by using a computer or network

New cards
16

Database

A large collection of data that can be organized, searched, clustered, classified, transformed, displayed, and/or filtered to gain new insight or to make conclusions

New cards
17

Data compression

Technique that reduces the number of bits stored or transmitted; could be lossy or lossless

New cards
18

Digital certificate

Forms digital connection between the identity of the recipient and the public key on this certificate; used for authentication step of public key encryption; managed by Certificate Authorities

New cards
19

Decryption

Using mathematical algorithms to decode a message; usually this algorithm is used to protect encrypted information from unauthorized viewers

New cards
20

Efficiency (of an algorithm)

Measure of the execution time and memory usage of an algorithm; often represented using Big-O notation

New cards
21

Encryption

Using mathematical algorithms to encode (hide) a message so only those that should read it can read it

New cards
22

Index (of a list)

Location in a list, must be a number greater than 0 or less than or equal to the length of the list in end-of-course exam

New cards
23

Input

The data that an algorithm needs to be able to run

New cards
24

Internet

The worldwide connection of devices to each other via hardware, including routers, servers, and other devices, each of which is given an IP address and must follow protocols

New cards
25

Internet Engineering Task Force

Develops and oversees internet standards and internet protocols

New cards
26

Iteration (in an algorithm)

A loop or repeated behavior in an algorithm; one of the three different parts of any algorithm

New cards
27

Key (in encryption or decryption)

Variable applied to a block of text to encrypt or decrypt that text; the length of the key is a factor in the security and performance of encryption algorithms

New cards
28

Linear

A search algorithm that finds a target by looking at each item, one at a time, until the end of the set is researched or the target is found

New cards
29

List

A collection of data in which each item is identified by a corresponding index

New cards
30

Logic gate

One of the building blocks of a computer chip, logic gates typically take two inputs and return either true or false; combinations of operations of gates can create different streams of logic used in calculations and processes in advanced chi[s such as integrated circuts

New cards
31

Lossless compression

Data compression technique where the number of bits needed to store or transmit information is reduced and the original data can be completely reconstructed

New cards
32

Lossy compression

Data compression technique where the number of bits needed to store or transmit information is reduced, but the original data cannot be reconstructed

New cards
33

Modulus (mod)

Mathematical operation that returns the remainder

New cards
34

Network

Group of two or more systems linked together

New cards
35

Output

What is made available after the input data is transformed by an algorithm

New cards
36

Packet

Way in which data is packaged during data transfer on a network

New cards
37

Parameter

Input to a procedure

New cards
38

Phishing

Cybercrime where a website, email, or other digital form of communication attempts to obtain information from a person by disguising itself as something that the person would normally use to share the information

New cards
39

Plagiarism

Occurs when one person presents another’s ideas as their own

New cards
40

Procedure

Named grouping of programming instructions code used to manage complexity or repeated code in a program

New cards
41

Process

A behavior that uses memory, a central processing unit, input, and output that can execute alone or at the same time as other processes

New cards
42

Program

Set of computer instructions assembled to help us create, analyze, understand, and/or solve problems or to automate a process

New cards
43

Proxy server

Allows a user to make connections to another network service without going through the local server that the person would normally need to use

New cards
44

Public key encryption

Asymmetric encryption scheme; involves two keys (one public, one private) where anyone can use the public key to encrypt a message, but only the sender and recipient know the private key so their data is protected

New cards
45

Routing (of packets)

Way in which data is sent on a network

New cards
46

Selection

Using a condition to control the logical path taken by an algorithm; one of the three different parts of any algorithm

New cards
47

Sequencing

Ordering the steps of an algorithm; one of three different parts of any algorithm

New cards
48

Server

Device that manages access and responds to requests on a network

New cards
49

Simulation

A program created to model a real situation with less detail to understand or solve a problem

New cards
50

Specification

The key details that need to be included in an algorithm

New cards
51

Pseudocode

Words used to organize thoughts to help plan writing code; pseudocode helps programmers translate requirements into code

New cards

Explore top notes

note Note
studied byStudied by 2822 people
Updated ... ago
4.9 Stars(9)
note Note
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 57 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 18 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 123 people
Updated ... ago
5.0 Stars(3)
note Note
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 26 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 178 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard50 terms
studied byStudied by 17 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard467 terms
studied byStudied by 14 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard56 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard48 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard51 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard24 terms
studied byStudied by 9 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard65 terms
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard777 terms
studied byStudied by 15 people
Updated ... ago
4.0 Stars(3)