AP Computer Science Principles Vocabulary

0.0(0)
Studied by 9 people
0%Unit Mastery
0%Exam Mastery
Build your Mastery score
multiple choiceMultiple Choice
call kaiCall Kai
Supplemental Materials
Card Sorting

1/208

flashcard set

Earn XP

Description and Tags

Last updated 8:12 PM on 3/12/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

209 Terms

1
New cards

Abstraction

The process of reducing complexity by focusing on essential details while hiding irrelevant information; a general concept derived from specific instances.

Similar definitions: generalization, simplification



Example: "Using a function to perform a repeated task is an example of          because it hides the implementation details."

2
New cards

Access Control

A security technique that regulates who or what can view or use resources in a computing environment.



Example: "Requiring a password to open a file is a form of         ."

3
New cards

Algorithm

A finite set of step-by-step instructions designed to solve a specific problem or accomplish a task.

Similar definitions: procedure, process, method



Example: "A recipe for baking bread can be compared to an          because it provides precise, ordered steps."

4
New cards

Algorithmic Efficiency

A measure of the computational resources (time and memory) an algorithm requires relative to the size of its input.



Example: "Binary search has better          than linear search for sorted data."

5
New cards

Analog Data

Data represented by continuously varying physical quantities, as opposed to discrete digital values.



Example: "The temperature reading on a mercury thermometer is          because it changes continuously."

6
New cards

Analog-to-Digital Conversion

The process of converting continuous analog signals into discrete digital values that a computer can process.



Example: "Recording a voice through a microphone involves          so the sound can be stored digitally."

7
New cards

API (Application Programming Interface)

A set of defined rules and protocols that allows different software applications to communicate and share data with each other.



Example: "The weather app uses a third-party          to retrieve current forecast data from a meteorological service."

8
New cards

Application

A program or group of programs designed for end users to perform specific tasks on a device.

Similar definitions: app, software application, program



Example: "A word processor is a common          used to create and edit text documents."

9
New cards

Argument

A value passed to a function when it is called, corresponding to a parameter in the function's definition.

Similar definitions: parameter value, input value



Example: "In the function call add(3, 5), the numbers 3 and 5 are the         s passed to the function."

10
New cards

Artifact

Any computing output created by a person using a computer, including programs, images, audio, video, presentations, or web pages.

Similar definitions: computational artifact, computing artifact



Example: "The mobile app the students built for their project is a computing         ."

11
New cards

ASCII

American Standard Code for Information Interchange; a character encoding standard that assigns numerical values to letters, digits, and symbols.



Example: "In         , the capital letter A is represented by the decimal value 65."

12
New cards

Authentication

The process of verifying the identity of a user, device, or system before granting access to resources.



Example: "Entering a username and password is a basic form of         ."

13
New cards

Automation

The use of computer programs to perform tasks that would otherwise require human effort, increasing speed and efficiency.



Example: "         allowed the factory to produce thousands of items per hour without manual assembly."

14
New cards

Bandwidth

The maximum rate of data transfer across a network connection, typically measured in bits per second (bps).



Example: "Streaming high-definition video requires greater          than sending a text email."

15
New cards

Beneficial and Harmful Effects

The positive and negative consequences — intended and unintended — that computing innovations have on individuals, society, and the world.



Example: "Social media has         : it helps people connect globally (beneficial) but can spread misinformation rapidly (harmful)."

16
New cards

Bias

A systematic error or prejudice in data, algorithms, or computing systems that produces unfair or skewed outcomes.

Similar definitions: computing bias, algorithmic bias



Example: "If a hiring algorithm was trained mostly on data from male applicants, it may have          against women."

17
New cards

Big Data

Extremely large datasets that are too complex for traditional software to process, requiring special tools to analyze and extract insights.



Example: "Scientists used          techniques to analyze billions of social media posts to study trends in public opinion."

18
New cards

Binary

A base-2 number system using only the digits 0 and 1, which forms the foundation of all digital data representation.



Example: "Computers store all information in          because transistors can only be in an on (1) or off (0) state."

19
New cards

Binary Search

An efficient search algorithm that repeatedly divides a sorted list in half to locate a target value, running in O(log n) time.



Example: "         is much faster than linear search when looking for a name in a sorted phone book."

20
New cards

Bit

The smallest unit of digital data, representing a single binary value of either 0 or 1.



Example: "A single          can represent a light switch being either off (0) or on (1)."

21
New cards

Bit Rate

The number of bits processed or transmitted per unit of time, typically measured in bits per second (bps).



Example: "Streaming high-definition video requires a higher          than streaming standard-definition video."

22
New cards

Boolean

A data type that has only two possible values: true or false, used to control program flow through conditions.



Example: "The variable isLoggedIn is a          value that is either true or false."

23
New cards

Boolean Expression

An expression that evaluates to either true or false, often used in conditionals and loops.



Example: "The statement x > 10 is a          that determines whether a number exceeds ten."

24
New cards

Boolean Operator

A logical operator (AND, OR, NOT) used to combine or modify Boolean expressions in conditions and searches.



Example: "The search engine used the          AND to find results that contained both 'climate' and 'change'."

25
New cards

Browser

A software application used to access, retrieve, and display content from the World Wide Web.

Similar definitions: web browser



Example: "Chrome, Firefox, and Safari are all examples of a web         ."

26
New cards

Brute Force

A problem-solving method that tries every possible solution systematically until the correct one is found.



Example: "Trying all possible password combinations is a          approach that works but is very slow."

27
New cards

Bug

An error or flaw in a program that causes it to produce incorrect results or behave unexpectedly.

Similar definitions: error, defect, fault



Example: "The program crashed every time the user entered a negative number because of a          in the code."

28
New cards

Byte

A unit of digital information consisting of 8 bits, capable of representing 256 different values (0–255).



Example: "A single character in standard ASCII encoding is stored as one         ."

29
New cards

Call

The act of invoking a function or procedure in a program, causing its instructions to execute.

Similar definitions: invoke, execute



Example: "When the program reaches the line printResult(), it makes a          to the printResult function."

30
New cards

Central Processing Unit (CPU)

The main processor of a computer that executes instructions, performs calculations, and coordinates the activities of all other hardware components.



Example: "The          executes millions of instructions per second to run the operating system and applications."

31
New cards

Cipher

An algorithm used to perform encryption or decryption, transforming data into an unreadable form and back.



Example: "The Caesar          shifts each letter in a message by a fixed number of positions in the alphabet."

32
New cards

Ciphertext

The encrypted, unreadable version of data that results from applying an encryption algorithm to plaintext.



Example: "The message appeared as meaningless          to anyone who intercepted it without the decryption key."

33
New cards

Client

A device or program that requests services or resources from a server over a network.



Example: "Your web browser acts as a          when it requests a webpage from a remote server."

34
New cards

Client-Server Model

A network architecture in which client devices request resources or services from centralized server computers.



Example: "When you check your email online, your device and the mail service communicate using the         ."

35
New cards

Cloud Computing

The delivery of computing services—including storage, processing, and software—over the internet rather than on local hardware.



Example: "Storing photos on Google Drive instead of a local hard drive is an example of         ."

36
New cards

Code

Instructions written in a programming language that a computer can interpret and execute.

Similar definitions: source code, program code



Example: "The developer wrote          in Python to automate the data analysis process."

37
New cards

Code Reuse

The practice of using existing code (functions, libraries, or modules) in new programs to save development time and reduce errors.



Example: "By writing general-purpose functions, the developer enabled          across multiple projects."

38
New cards

Collaboration

The practice of working jointly with others to design, develop, and improve computing artifacts or solve problems.



Example: "         between team members helped them find and fix bugs more quickly than working alone."

39
New cards

Computational Artifact

Something created as the result of a computational process, such as a program, image, video, audio file, or presentation.

Similar definitions: artifact, computing artifact



Example: "The infographic the students made using design software is a         ."

40
New cards

Computational Thinking

A problem-solving approach that involves decomposing problems, recognizing patterns, abstracting details, and designing algorithms.



Example: "Applying         , the student broke a complex scheduling problem into smaller, manageable sub-problems."

41
New cards

Computer

An electronic device that processes data according to a set of instructions (programs) to produce a desired result.



Example: "A smartphone is a portable          capable of running many different applications."

42
New cards

Computer Network

A system of two or more computing devices connected together to share resources and communicate.

Similar definitions: network



Example: "The school's          allows every classroom computer to share the same printer."

43
New cards

Computing Device

A physical device that can run a program, including computers, tablets, smartphones, and embedded systems.



Example: "A smart thermostat is a          that runs software to regulate home temperature."

44
New cards

Computing Innovation

A new or improved computing artifact, technique, or system that has a significant effect on society, the economy, or culture.



Example: "The development of GPS navigation was a          that transformed how people travel."

45
New cards

Computing System

A group of hardware and software components working together to process, store, and communicate data.



Example: "A laptop with its operating system, apps, and hardware components forms a complete         ."

46
New cards

Conditional

A programming construct that executes different code blocks based on whether a condition evaluates to true or false.

Similar definitions: if statement, selection statement, branching



Example: "The          statement checks if a user's age is over 18 before granting access to the site."

47
New cards

Confidentiality

The principle that sensitive data should only be accessible to those authorized to view it, a key goal of cybersecurity.



Example: "Encryption helps ensure the          of medical records stored in the cloud."

48
New cards

Constant

A named value in a program that does not change during execution.



Example: "The programmer defined PI as a          with the value 3.14159 so it would not be accidentally changed."

49
New cards

Cookie

A small piece of data stored on a user's device by a web browser, used to remember information about the user across sessions.



Example: "The website saved a          on the user's browser to keep them logged in."

50
New cards

Copyright

A legal protection that grants creators exclusive rights to reproduce, distribute, and adapt their original works.



Example: "Using someone's photograph without permission may violate their         ."

51
New cards

Creative Commons

A set of standardized licenses that allow creators to share their work with specific permissions for public use.



Example: "The musician released her song under a          license so others could remix it for free."

52
New cards

Creative Development

The iterative process of designing and building computing innovations through collaboration, testing, and revision.



Example: "The app went through several rounds of          as the team refined the user interface based on feedback."

53
New cards

Crowdsourcing

The practice of obtaining input, information, or services from a large distributed group of people, often via the internet.



Example: "Wikipedia relies on          to build and maintain its encyclopedia articles."

54
New cards

Cryptography

The practice and study of techniques for securing communication and data by transforming it into an unreadable form.



Example: "Modern internet security depends on          to protect sensitive financial transactions."

55
New cards

Cybersecurity

The practice of protecting computer systems, networks, and data from unauthorized access, damage, or attack.



Example: "The company hired a          expert to find and patch vulnerabilities in their software."

56
New cards

Data

Raw facts, values, or observations that can be processed, analyzed, or stored by a computer.



Example: "The survey collected          from 1,000 students about their daily screen time."

57
New cards

Data Abstraction

The use of a collection or structure (such as a list or dictionary) to manage multiple related values under one name.



Example: "Storing all student names in a single list is a form of         ."

58
New cards

Data Cleaning

The process of detecting and correcting (or removing) corrupt, inaccurate, or irrelevant records from a dataset before analysis.



Example: "Before running the analysis, the researcher performed          to remove duplicate entries and fix formatting errors."

59
New cards

Data Compression

The process of reducing the size of data by encoding information more efficiently, making storage and transmission faster.



Example: "         allows a music file to be stored in a fraction of the space of the original recording."

60
New cards

Data Mining

The process of discovering patterns, correlations, and insights in large datasets using statistical and computational methods.



Example: "The retailer used          to discover that customers who buy diapers often also buy beer on Friday evenings."

61
New cards

Data Type

A classification that specifies what kind of value a variable holds, such as integer, string, Boolean, or list.



Example: "The variable age has the          integer because it stores whole numbers."

62
New cards

Data Visualization

The graphical representation of data (charts, graphs, maps) to help people understand patterns, trends, and insights.



Example: "A bar chart is a simple form of          that makes it easy to compare values across categories."

63
New cards

Database

An organized collection of structured data stored electronically, designed for efficient retrieval and manipulation.



Example: "The hospital stored patient records in a          that doctors could query to find treatment histories."

64
New cards

Debugging

The process of identifying, analyzing, and correcting errors (bugs) in a program.



Example: "After hours of         , the programmer finally found the off-by-one error causing the crash."

65
New cards

Decomposition

The process of breaking a complex problem or system into smaller, more manageable sub-problems or components.



Example: "The team used          to divide the large app project into separate tasks: UI design, database setup, and API integration."

66
New cards

Decryption

The process of converting encrypted (ciphertext) data back into its original readable form (plaintext).



Example: "Only the recipient with the correct private key could perform          on the secret message."

67
New cards

Digital Data

Information represented as discrete binary values (0s and 1s) that can be stored and processed by computers.



Example: "A scanned photograph becomes          when converted into a grid of pixels stored as binary values."

68
New cards

Digital Divide

The gap between individuals, communities, or countries that have access to modern information technology and those that do not.



Example: "Students in rural areas without broadband internet face a          compared to students in cities."

69
New cards

Disinformation

False information deliberately spread to deceive people, often amplified by digital platforms and social media.



Example: "The          campaign spread fabricated news stories to mislead voters before the election."

70
New cards

Distributed Computing

A computing model in which tasks are divided and processed across multiple networked computers simultaneously.



Example: "The SETI@home project used          to analyze radio telescope data on millions of volunteers' computers."

71
New cards

DNS (Domain Name System)

A hierarchical naming system that translates human-readable domain names (like google.com) into IP addresses computers use to communicate.



Example: "When you type a URL into your browser, the          converts that name into the server's numeric IP address."

72
New cards

Documentation

Written explanations and comments that describe what a program does, how it works, and how to use it.



Example: "The          for the library explained each function's parameters and return values."

73
New cards

Domain Name

A human-readable label (such as example.com) that identifies a location on the internet and maps to an IP address via DNS.



Example: "The          makes it easier for users to remember web addresses instead of numeric IP addresses."

74
New cards

Encryption

The process of encoding data so it can only be read by someone with the correct key or decryption method.



Example: "The bank uses          to protect credit card numbers transmitted over the internet."

75
New cards

End-to-End Encryption

A communication method where only the communicating users can read the messages, preventing interception by third parties including service providers.



Example: "Messaging apps that use          ensure that even the app company cannot read users' private chats."

76
New cards

Environmental Impact

The effects of computing technology on the natural environment, including energy use, electronic waste, and carbon emissions from data centers.



Example: "The          of streaming millions of videos daily includes significant electricity consumption in server farms."

77
New cards

Error

A mistake in a program that prevents it from running correctly; can be a syntax error, runtime error, or logic error.

Similar definitions: bug, fault



Example: "The program produced an          when it tried to divide a number by zero."

78
New cards

Event

An action or occurrence detected by a program, such as a mouse click, key press, or timer expiration, that triggers a response.



Example: "Clicking the submit button triggers an          that causes the form data to be sent to the server."

79
New cards

Event-Driven Programming

A programming paradigm where the flow of the program is determined by events such as user actions, sensor outputs, or messages.



Example: "Most graphical user interfaces rely on          to respond to button clicks and keyboard input."

80
New cards

Expression

A combination of values, variables, operators, and function calls that evaluates to a single value.



Example: "The          (x + y) * 2 produces a numeric result based on the current values of x and y."

81
New cards

Fault Tolerance

The ability of a system to continue functioning correctly even when one or more of its components fail.



Example: "The internet was designed with          so that traffic can be rerouted if a connection goes down."

82
New cards

Firewall

A network security system that monitors and controls incoming and outgoing network traffic based on predefined security rules.



Example: "The company's          blocked unauthorized attempts to access its internal servers from outside the network."

83
New cards

Flowchart

A diagram that represents the steps and decision points of an algorithm or process using standardized symbols and arrows.



Example: "The programmer drew a          to plan the logic of the login system before writing any code."

84
New cards

For Loop

A control flow statement that iterates a specific number of times or over each element in a collection.



Example: "The          iterated over each item in the shopping list and printed its name."

85
New cards

Function

A named block of reusable code that performs a specific task and can be called from anywhere in a program.

Similar definitions: procedure, method, subroutine



Example: "The programmer wrote a          to calculate the area of a circle so the formula didn't need to be repeated."

86
New cards

Global Impact

The worldwide effects — social, economic, cultural, or environmental — that computing innovations have on people and societies.



Example: "Social media has had a significant          by changing how billions of people communicate and share information."

87
New cards

Hacker

A person who uses technical skills to gain unauthorized access to computer systems, or (in a positive sense) someone who creatively solves technical problems.



Example: "A malicious          broke into the company's database and stole customer information."

88
New cards

Hardware

The physical components of a computer system, including the processor, memory, storage devices, and input/output devices.



Example: "The keyboard, monitor, and hard drive are all examples of computer         ."

89
New cards

Heuristic

A problem-solving approach that uses practical techniques to find a good-enough solution when an optimal solution is impractical to compute.



Example: "GPS navigation uses a          to find a fast route without checking every possible path."

90
New cards

Hexadecimal

A base-16 number system using digits 0–9 and letters A–F, commonly used to represent binary data in a more compact form.



Example: "Web colors are often written in         , such as #FF5733 for a shade of orange."

91
New cards

HTML (HyperText Markup Language)

The standard markup language used to create and structure content on the World Wide Web.



Example: "The developer used          tags like <h1> and <p> to structure the text on the webpage."

92
New cards

HTTP (HyperText Transfer Protocol)

The foundational protocol used by the World Wide Web to define how messages are formatted and transmitted between browsers and servers.



Example: "When you visit a website, your browser sends an          request to the server to retrieve the page."

93
New cards

HTTPS

An extension of HTTP that uses encryption (TLS/SSL) to secure data transmitted between a browser and a web server.



Example: "Online banking sites use          to protect users' financial information from interception."

94
New cards

Hyperlink

A reference in a digital document that links to another document or location when clicked, enabling web navigation.



Example: "Clicking the          on the homepage took the user to the product page."

95
New cards

Identity Theft

The fraudulent acquisition and use of another person's private information, typically for financial gain.



Example: "The criminal used stolen personal data to commit          and open credit cards in the victim's name."

96
New cards

Impact of Computing

The effects—both intended and unintended, beneficial and harmful—that computing innovations have on individuals, society, and the world.



Example: "Studying the          includes examining how social media affects mental health."

97
New cards

Index

A numeric position identifying an element within a list or string, typically starting at 1 (in AP CSP pseudocode) or 0 (in most languages).



Example: "In the list [10, 20, 30], the element at          2 is 20."

98
New cards

Infinite Loop

A loop that never terminates because its exit condition is never reached, causing a program to run indefinitely.



Example: "Because the counter variable was never updated, the program entered an          and had to be force-quit."

99
New cards

Information

Data that has been processed, organized, or structured so that it has meaning and is useful for decision-making.



Example: "Raw temperature readings become useful          when they are averaged to show a monthly climate trend."

100
New cards

Input

Data provided to a program or computing device for processing, such as keyboard input, sensor readings, or file data.



Example: "The user's typed text is the          that the spell-check program processes."

Explore top notes

Explore top flashcards

flashcards
Travel and leisure
112
Updated 325d ago
0.0(0)
flashcards
Module 11
65
Updated 727d ago
0.0(0)
flashcards
Lit - 4th Mid
24
Updated 1074d ago
0.0(0)
flashcards
Unit 3 vocab
20
Updated 1208d ago
0.0(0)
flashcards
Chemistry - Ions and molecules
57
Updated 400d ago
0.0(0)
flashcards
Prefix/Suffix
52
Updated 215d ago
0.0(0)
flashcards
Important Root Words
98
Updated 1117d ago
0.0(0)
flashcards
Travel and leisure
112
Updated 325d ago
0.0(0)
flashcards
Module 11
65
Updated 727d ago
0.0(0)
flashcards
Lit - 4th Mid
24
Updated 1074d ago
0.0(0)
flashcards
Unit 3 vocab
20
Updated 1208d ago
0.0(0)
flashcards
Chemistry - Ions and molecules
57
Updated 400d ago
0.0(0)
flashcards
Prefix/Suffix
52
Updated 215d ago
0.0(0)
flashcards
Important Root Words
98
Updated 1117d ago
0.0(0)