AP Computer Science Principles Exam Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/86

flashcard set

Earn XP

Description and Tags

Flashcards for AP Computer Science Principles Exam Review

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

87 Terms

1
New cards

Computing Innovation

A computing innovation includes a program as an integral part of its function; can be physical, software, or a concept.

2
New cards

Hardware

Physical components of a computing device.

3
New cards

Software

Instructions in a programming language to the computing device.

4
New cards

Moore's Law

The size of transistors halves every two years while the cost also halves every two years.

5
New cards

Collaboration

Helps people learn from each other and avoid bias in the development of computing innovations.

6
New cards

Learned Skills of Collaboration

Communication, Consensus building, Conflict resolution, Negotiation.

7
New cards

Program

Collection of programming statements that performs a specific task when run by a computer.

8
New cards

Code Segment

Collection of programming statements that are part of a program.

9
New cards

Program Input

Data sent to a computer for processing by a program (tactile, audio, visual, or text input).

10
New cards

Event

The action that supplies input data to a program; can be generated when a key is pressed, a mouse is clicked, a program is started, or by any other defined action that affects the flow of execution.

11
New cards

Program Output

Any data sent from a program to a device (tactile, audio, visual, or text output).

12
New cards

Incremental Development Process

Breaks the problem into smaller pieces and makes sure each piece works before adding it to the whole.

13
New cards

Iterative Development Process

Requires refinement and revision based on feedback, testing, or reflection throughout the process.

14
New cards

Program Documentation

Written description of the function of a code segment, event, procedure, or program and how it was developed.

15
New cards

Logic Error

Mistake in the algorithm or program that causes it to behave incorrectly or unexpectedly.

16
New cards

Syntax Error

Mistake in the program where the rules of the programming language are not followed.

17
New cards

Runtime Error

Mistake in the program that occurs during the execution of a program.

18
New cards

Bit

A single binary digit and is either 0 or 1.

19
New cards

Byte

8 bits.

20
New cards

Analog Signals

Continuous signals (sound, colors, temperature).

21
New cards

Digital Signals

Discrete or finite signals (0s and 1s).

22
New cards

Roundoff Error

Occurs when decimals (real numbers) are rounded.

23
New cards

Information

Collection of facts and patterns extracted from data.

24
New cards

Correlation vs. Causation

A correlation found in data does not necessarily indicate that a causal relationship exists.

25
New cards

Cleaning Data

Process that makes the data uniform without changing their meaning.

26
New cards

Large Sample Size

Magnify the bias associated with the data being used.

27
New cards

Metadata

Data that describe your data - used for finding, organizing, and managing information.

28
New cards

Abstraction

Way to represent essential features without including the background details or explanations.

29
New cards

High-Level Programming Language

Semi-human language to program.

30
New cards

Machine Code

Base language where no abstractions are implemented.

31
New cards

Procedural Abstraction

Provides a name for a process and allows a procedure to be used only knowing what it does, not how it does it.

32
New cards

DISPLAY(expression)

Displays the value of expression, followed by a space.

33
New cards

RANDOM(a, b)

Evaluates to a random number from a to b inclusive.

34
New cards

Relational Operators

Used to test the relationship between two variables, expressions or values and evaluates to a Boolean value.

35
New cards

Lists

Organized and formatted way of storing and retrieving data where each element can be accessed by its index.

36
New cards

Element

Individual value in the list that is assigned a unique index.

37
New cards

INSERT(list, i, item)

Inserts the item at index i and shift right items at index i or higher.

38
New cards

APPEND(list, item)

Adds the item to the end of the list.

39
New cards

REMOVE(list, i)

Removes the item at index i and shifts left items at index i or higher.

40
New cards

Procedure

Set of code that is referred to by name and can be called at any point in a program simply by utilizing the procedure's name.

41
New cards

Standard Algorithms

Find total sum of a list of numbers, Find average of a list of numbers, Find maximum/minimum of a list of numbers, Find word from a list of words.

42
New cards

Common Algorithm

An algorithm is to swap.

43
New cards

ROTATE_RIGHT()

Rotates the robot 90 degrees clockwise.

44
New cards

ROTATE_LEFT()

Rotates the robot 90 degrees counterclockwise

45
New cards

Linear Search

Algorithm for finding an element in a list that starts from the beginning of a list and sequentially checks each element of the list until a match is found or the entire list is searched without finding the element.

46
New cards

Binary Search

Search algorithm that halves the number of elements that need to be searched after every comparison and requires that the list must be sorted.

47
New cards

Flowchart

Way to represent an algorithm visually.

48
New cards

Run in a Reasonable Amount of Time

Algorithms with a polynomial efficiency (constant, linear, square, cube, etc.).

49
New cards

Run in an Unreasonable Amount of Time

Algorithms with exponential or factorial efficiencies.

50
New cards

Heuristic

Approach to a problem that produces a solution that is not guaranteed to be optimal but may be used when techniques that are guaranteed to always find an optimal solution are impractical.

51
New cards

Software library

Contains procedures that may be used in creating new programs.

52
New cards

Application program interfaces (APIs)

Specifications for how the procedures in a library behave and can be used.

53
New cards

Computing device

Physical artifact that can run a program.

54
New cards

Computing system

Group of computing devices and programs working together for a common purpose.

55
New cards

Computer network

Group of interconnected computing devices capable of sending or receiving data.

56
New cards

Bandwidth

Maximum amount of data that can be sent in a fixed amount of time.

57
New cards

Path

Sequence of directly connected computing devices that begins at the sender and ends at the receiver.

58
New cards

Routing

Process of finding a path from sender to receiver.

59
New cards

Protocol

Agreed-upon set of rules that specify the behavior of a system.

60
New cards

Scalability

Capacity for the system to change in size and scale to meet new demands.

61
New cards

Internet protocol (IP)

Responsible for addressing and routing your online requests.

62
New cards

Transmission control protocol (TCP)

Defines how computers send packets of data to each other.

63
New cards

User datagram protocol (UDP)

Allows computer applications to send messages without checking for missing packets to save on time needed to retransmit missing packets.

64
New cards

Redundancy

Inclusion of extra paths that can mitigate the failure of a system if other components fail.

65
New cards

The Internet

Hardware made up of the computers, cables, routers, and many more components that make up the entire network; a global decentralized network connecting millions of computers.

66
New cards

The World Wide Web

Software used on the internet; a system of linked pages, programs, and files.

67
New cards

HTTP

Protocol used by the World Wide Web to transmit data.

68
New cards

Sequential computing

Computational model in which operations are performed in order one at a time.

69
New cards

Parallel computing

Involves breaking up a task into smaller, sequential pieces, then those sequential pieces are all executed at the same time, each on its own processor or on a set of computers that have been networked together.

70
New cards

Distributed computing

Computational model in which multiple devices are used to run a program.

71
New cards

Speedup

(sequential run time)/(parallel run time)

72
New cards

Digital divide

Difference in access to technology including access to computers and the internet.

73
New cards

Crowdsourcing

Sourcing model in which individuals or organizations obtain goods and services, including ideas and finances, from a large group of internet users.

74
New cards

Citizen science

Scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices.

75
New cards

Creative Commons

Public copyright license that enables the free distribution of an otherwise copyrighted work.

76
New cards

Security

Needed to protect the confidentiality, integrity, and availability of information.

77
New cards

Privacy

Right to control data generated by one’s usage of computing innovations and restrict the flow of that data to third parties.

78
New cards

Personally, identifiable information (PII)

Information about an individual that identifies, links, relates, or describes that person.

79
New cards

Authentication measures

Protect devices and information from unauthorized access.

80
New cards

Encryption

Uses cryptographic algorithms to encrypt data and is the process of encoding data to prevent unauthorized access.

81
New cards

Symmetric key encryption

Uses the same key for both encryption and decryption.

82
New cards

Public key encryption (also called asymmetric encryption)

Uses two keys—one private and one public.

83
New cards

Malware

Malicious software intended to damage a computing system or take partial control of its operations.

84
New cards

Computer viruses

Malicious programs that can copy themselves and gain access to a computer in an unauthorized way.

85
New cards

Phishing

Technique that directs users to unrelated sites that trick the user into giving personal data.

86
New cards

Keylogging

Use of a program to record every keystroke made by the computer user in order to gain fraudulent access to passwords and other confidential information.

87
New cards

Rogue access point

Wireless access point that gives unauthorized access to secure networks.