1/87
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Computing innovations
an innovation that uses a program as a key
part of their function. 2 types, physical and non
physical innovation
robots tablets
not physical computer innovation
social media instagram snapchat tiktok clash royake
why is collaboraiton imporatant
mportant because it allows for diverse ideas and
thoughts that cater towards different people.
Pair programming
Pair programming is when two people share a computer and take turns coding.
Logic Errors
Unexpected behavior in a program’s output.
Syntax Errors
The code does not work properly because it is typed or written incorrectly.
Run-Time Errors
Error occurs while code runs.
Iterative development
Build a basic version of the program, test it, improve it, and repeat the cycle.
Incremental development
Solve the problem in small pieces, then combine those pieces into the full solution.
Waterfall model
Follow a clear, step-by-step plan where each stage must be completed before moving to the next, with detailed documentation.
Data
\a collection of numbers and facts from different sources.
Bits (binary digits)
are what computers store data in.
smallest unit of intomraiton
Binary System
Computers read machine code, which is usually in the binary system.
10101010 1 yes true on, 0 fal;se no off, reprensts a 2 option thong
How many bits in a byte
8 bits equal 1 byte.
Hexadecimal
Used for RGB color codes, and it uses numbers and letters to represent values.
ASCII code
Converts text to binary format.
Abstraction
Reduces complexity by only focusing on the most important parts and hiding the irrelevant parts from the user.
Analog data
Measured continuously and changes smoothly.
Digital data
Measured digitally and leaves out extra data by simplifying the data collected (form of abstraction).
Data compression
Dependent on the method used and the amount of repeated info in the data.
Lossless compression
Less compression and better file quality.
Lossy compression
More compression and worse file quality.
Metadata
Data about data.
Data mining
Examining very large data sets to find information.
Pseudocode
Pseudocode
Integers
Whole numbers (positive, negative, or zero), used for mathematical operations or counting.
Strings
An ordered sequence of characters like "Hello", used for text; substrings are portions of a string (e.g., "ell" is a substring of "Hello"); string concatenation occurs when you combine two or more strings using the + operator (e.g., "Hello" + " World" results in "Hello World").
List
An ordered sequence of elements (values), where each element has an index starting from 1 in AP pseudocode, which allows you to access specific elements in the list.
Booleans
Data type of true or false
Algorithm
instructions to solve a problem or task
Sequencing
following instructions in the same order as they are written, same sequence. sequence = order
Selection
decision making process, uses if statments, checks a condition and code is exectuted based on the true or false of condition
Iteration
loops, usedf to perform task smultiple times
Expression
A statement that evaluates to a single value, using PEMDAS.
NOT, also represneted as !
Reverses the truth value of a condition; true becomes false, false becomes true
AND (if checkNigga and abhiChopped:)
Returns True if both conditions are true
OR
returns true if one of the conditions is true, not both at least one
Parameters
The input variables defined for a procedure that allow it to accept different values def function(x, y) x, y are parameters).
Arguments
The actual values or data passed to a procedure when calling it, which are used by the parameters (e.g., function(5, 10) 5, 10 are arguments).
MOD (%)
Represented as a %, it's the remainder of division (e.g., 7 % 3 = 1).
Element
A value in a list or array, with indices starting at 1 in AP CSP pseudocode (e.g., "Apple" is at index 1 in ["Apple", "Banana", "Cherry"]).
Sequential computing
Traditional programming where each program is processed one at a time.
Parallel computing
When a program is broken into smaller operations and processed at the same time using multiple processors.
Distributed computing
Multiple devices communicate together to run a program.
Sequential solution
Takes as long as the number of all steps in a program.
Parallel computing solution
Faster with fewer cores.
Fault tolerant
Something that can still function even with a partial malfunction.
Redundancy
duplication
Internet
intercention and netwrooks
computer netwroks
when multiple computing devices communcate with eacvh other
data on the internte __
splits into data packetse
routing
the process of finding the best path to deliver infomation
packet
A unit of data for internet routing.
Digital divide
Gaps between those who have access to the internet and those who do not.
Factors affecting the digital divide
Demographics, socioeconomic status, and geographic location.
Intellectual property
the work that poeple consider as their property
Copyright
The person who created something determines who uses their creation.
Creative Commons
Copyright license for creators to give others the ability to use their work.
Open-sourcing
Work that is freely shared, distributed, and modified.
Open access
no restrutions and avalabile to the public
Malware
software to harm or take data form a system
phishing
scamming to get personal infomraiton
encryption
encoding data to prevent others form acsessing it
Symmetric key encryption
One key for both encrypting and decrypting.
Public key encryption
anyone can send a secret message to you, but only you can read it.
Heuristics
A shortcut or rule of thumb for solving a hard problem quickly. It may not be perfect, but it works well enough.
Internet Protocols
Rules that allow computers and devices to communicate with each other over the internet. Protocols like IP, TCP, and HTTP help send, receive, and load data accurately between
4o mini
cookie
Small pieces of data stored by websites on a user's device to track and remember information, like login status or preferences. For example, a website may use cookies to keep you logged in between visits.
rogue access point
: An unauthorized wireless access point that allows attackers to intercept or monitor network traffic. For example, someone setting up a fake Wi-Fi network to steal personal information from users.
4o mini
multifactor authentication (MFA)
provide two or more verification factors to gain access to an account or system. For example, logging in with a password and then confirming your identity with a text message code.
PII (Personally Identifiable Information)
name, address, phone number, or social security number
crowdsourcing
Gathering contributions or ideas from a large group of people, usually online, to help fund projects, generate ideas, or create services. For example, Wikipedia uses crowdsourcing by allowing users to edit and add content to its articles
citizen science
Public volunteers helping with scientific research, like collecting data or observing events.
distributed computing
Using multiple devices to run different parts of a program.
4o mini
speedup
How much faster a task is done using parallel computing compared to doing it alone.
IP
TCP
UDP
HTTP
IP: addressing and routing data over a network.
TCP: reliable data transmission.
UDP: A faster but less reliable data transmission protocol.
HTTP : r transferring webpages over the internet.
scalability
0: The ability of a system to handle growth or increased demand without losing performance.
bandwidth
The maximum data transfer rate over a network, measured in bits per second (bps).
traversal
he process of visiting each item in a collection, like a list, one by one. It can be full (visiting all items) or partial (visiting only some items).
library
A collection of prewritten code (procedures/functions) that can be reused to make programming easier.
undecidable
e: A problem so complex that no algorithm can solve it for all possible inputs.
binary search
: Efficient algorithm that finds an item in a sorted list by repeatedly dividing the list in half.
4o
linear search
Linear search is an algorithm that checks each item in a list one by one until it finds the target value or reaches the end of the list.