AP CSP

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/169

flashcard set

Earn XP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

170 Terms

1
New cards

Innovation

a new or improved idea, device, or product

2
New cards

Binary

system representing data using two states, typically 0 and 1

3
New cards

Bit

the smallest unit of data in a binary system, representing a single state of 0 or 1; short for binary digit

4
New cards

Bandwidth

the maximum rate of data transfer across a network path, often measured in bits per second

5
New cards

Bit Rate

the number of bits transmitted or processed per unit of time, usually expressed in bits per second (bps)

6
New cards

Latency

the time it takes for data to travel from the source to the destination, often measured in milliseconds

7
New cards

Protocol

a set of rules governing data transmission over a network, ensuring orderly and error-free communication

8
New cards

Internet

a global network of interconnected computers that communicate using standardized protocols, enabling data exchange and access to information

9
New cards

Abstraction

the process of simplifying complex systems by focusing on essential features while hiding unnecessary details; allows for more manageable understanding and problem-solving by reducing complexity.

10
New cards

ASCII

a character encoding standard that uses numeric values to represent text in computers, allowing for communication between different devices and systems; American Standard Code for Information Interchange

11
New cards

IETF

Internet Engineering Task Force- develops and promotes voluntary Internet standards and protocols, in particular the standards that comprise the Internet protocol suite (TCP/IP)

12
New cards

Net Neutrality

the principle that Internet service providers must treat all data on the Internet equally, without discriminating or charging differently by user, content, website, platform, or application

13
New cards

IP Address

a unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network

14
New cards

Packet

a formatted unit of data carried by a packet-switched network; in networking, packets contain both header and payload information

15
New cards

DNS

Domain Name System; a hierarchical system that translates human-friendly domain names into IP addresses (like 93.184.216.34), enabling browsers to load Internet resources; there are multiple groups of DNS servers such as .com,.org, .net, etc

16
New cards

Network Redundancy

the inclusion of extra components or connections in a network to ensure reliability and availability in case of failure

17
New cards

Router

a networking device that forwards data packets between computer networks, directing traffic on the Internet

18
New cards

TCP

Transmission Control Protocol; a core protocol of the Internet Protocol Suite that ensures reliable communication between devices by establishing a connection and ensuring data delivery.

19
New cards

HTTP

Hypertext Transfer Protocol; an application protocol used for transmitting hypermedia documents, such as HTML, over the Internet

20
New cards

URL

Uniform Resource Locator; a reference or address used to access resources on the Internet, specifying the location of a resource and the protocol used to retrieve it

21
New cards

Heuristic

a problem-solving approach that employs a practical method not guaranteed to be optimal, typically used to find satisfactory solutions efficiently

22
New cards

Lossless Compression

a data compression method that allows the original data to be perfectly reconstructed from the compressed data, preserving all information

23
New cards

Lossy Compression

a data compression method that reduces file size by removing some data, often resulting in a loss of quality

24
New cards

Image

a visual representation of an object or scene, often stored in digital formats like JPEG or PNG

25
New cards

Metadata

data that provides information about other data, such as file size, type, and creation date

26
New cards

Pixel

short for "picture element", the fundamental unit of a digital image, typically a tiny square or dot that contains a single point of color of a larger image.

27
New cards

Hexadecimal System

a base-16 numbering system used in computing and digital electronics, often representing colors in web design using digits 0-9 and letters A-F.

28
New cards

RGB

a color model used in digital imaging that combines red, green, and blue light in various intensities to create a wide spectrum of colors; max value of each color is 255 (8 bits)

29
New cards

Algorithm

A set of step-by-step instructions or rules designed to perform a specific task or solve a particular problem in computing

30
New cards

High Level Programming Language

a programming language that is user-friendly and abstracted from machine code, enabling more complex programming tasks with easier syntax and readability

31
New cards

Low Level Programming Language

a programming language that is closely related to machine code, offering little abstraction from hardware and requiring detailed management of system resources

32
New cards

Iterate

to repeat a process or a set of instructions multiple times, usually with the goal of achieving a specific result or until a certain condition is met

33
New cards

Selection

the process of choosing between different options or paths in programming, typically using conditional statements to execute specific code based on certain criteria; uses a Boolean condition to determine, or select, whether or not to run a certain block of statements

34
New cards

Sequencing

the process of executing a set of instructions in the order they are written, ensuring that tasks are carried out step by step from beginning to end

35
New cards

Pair Programming

a collaborative programming technique where two programmers work together at one workstation; one person writes the code (the "driver" or “coder”), while the other reviews each line of code (the "observer" or "navigator")

36
New cards

Function

a reusable block of code designed to perform a specific task or calculation, which can be invoked multiple times throughout a program; functions can take inputs, known as parameters, and return an output.

37
New cards

Top-Down Design

a problem-solving approach that breaks down a complex problem into smaller, more manageable sub-problems, allowing for easier development and understanding

38
New cards

API

Application Program Interface; a set of rules and protocols for building software applications, allowing different programs to communicate and interact with each other

39
New cards

Documentation

a comprehensive guide that explains how to use an API, including its functions, parameters, and response formats

40
New cards

Library

a collection of pre-written code and routines that developers can use to perform common tasks, facilitating easier coding and reducing redundancy

41
New cards

Parameter

a variable used in a function or method to refer to data provided as input; it allows functions to accept different values when called

42
New cards

Comments

notes added to the code by developers to explain or clarify its functionality, which are ignored by the compiler or interpreter

43
New cards

Loop

a programming construct that repeats a group of instructions until a specified condition is met, allowing for efficient code execution

44
New cards

For Loop

a type of loop that executes a block of code a specific number of times, often using a counter or iterator (the variable i)

45
New cards

Big Data

large and complex data sets that traditional data processing software cannot manage efficiently, often used for analysis and insights

46
New cards

Computer Innovation

the development and advancement of technology that enhances computing capabilities, which has a significant impact on various fields such as education, healthcare, and communication

47
New cards

Cipher

a method of transforming information to keep it secure, often using algorithms to encrypt and decrypt messages; Caesar Cipher: a substitution cipher wherein each letter is shifted a certain number of places down or up the alphabet

48
New cards

Encryption

the process of converting information or data into a code to prevent unauthorized access, ensuring confidentiality and security; often involves algorithms that secure data during transmission or storage

49
New cards

Decryption

the process of converting encrypted data back into its original form, allowing authorized users to access the information; often uses algorithms that reverse the encryption process

50
New cards

Cracking Encryption

the process of analyzing and breaking encrypted data without access to the key, often using various techniques to reveal the original information

51
New cards

Random Substitute Cipher

a cryptographic technique where each letter in the plaintext is randomly replaced with a different letter, ensuring that the same letter is always substituted the same way throughout the message

52
New cards

Computationally Hard

a problem that requires significant computational resources and time to solve, often prohibitive in practice for certain algorithms

53
New cards

Key

a piece of information used in encryption algorithms to encode and decode messages, essential for maintaining data confidentiality

54
New cards

Asymmetric Encryption

a cryptographic method that uses a pair of keys—one public and one private—to encrypt and decrypt messages, enhancing security; used by computers

Public Key: allows anyone to encrypt messages, while the private key is kept secret for decryption

Private Key: used solely by the recipient to decrypt messages

55
New cards

SSL

Secure Sockets Layer; a cryptographic protocol that provides secure communication over a computer network, ensuring data integrity and confidentiality.

56
New cards

TLS

Transport Layer Security; a cryptographic protocol that evolved from SSL to provide secure communication over networks, enhancing security and performance

57
New cards

MOD

a mathematical operation that finds the remainder when one integer is divided by another, commonly used in computer science for hashing and encryption (modulo)

58
New cards

Private Key Encryption

a type of encryption that uses a single key for both encryption and decryption, ensuring that only authorized users can access the encrypted data

59
New cards

Public Key Encryption

a type of encryption that uses two keys: a public key for encryption and a private key for decryption, allowing secure communication without prior sharing of a secret key

60
New cards

Antivirus Software

a program designed to detect, prevent, and remove malicious software (malware) from computers and networks by keeping a big list of known viruses and scans your computer to get rid of them

61
New cards

DDoS Attack

Distributed Denial of Service; an attack which aims to overwhelm a target's resources, such as a server or network, by flooding it with excessive traffic from multiple compromised systems, rendering it unavailable to users.

62
New cards

Firewall

a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules, helping to prevent unauthorized access.

63
New cards

Phishing Scam

a fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communications, often through email or websites

64
New cards

Cybercrime

illegal activities conducted via the internet, including hacking, identity theft, and fraudulent financial transactions

65
New cards

Callback Function

a function passed as an argument to another function, which is then invoked after a certain event or condition is met, commonly used in asynchronous programming

66
New cards

Event

a programming construct that is triggered by a specific action, such as user interaction or a change in the state of the program which causes something to happen

67
New cards

Event-Driven Program

a programming model where the flow of execution is determined by events such as user actions or messages from other programs

68
New cards

Event Handling

the process of responding to events in a program, often involving the use of event listeners that execute specific code when an event occurs

69
New cards

Event Listener

a routine in a program that waits for an event to occur and executes specified code in response

70
New cards

UI Elements

components of a user interface that users interact with, such as buttons, text boxes, and menus

71
New cards

User Interface

the space where interactions between humans and machines occur, allowing users to communicate and control the software through visual elements like graphics, text, and controls.

72
New cards

Debugging

the process of identifying and removing errors or bugs in a program to ensure it operates as intended

73
New cards

Data Type

a classification that dictates what kind of value a variable can hold, such as integers, strings, or booleans

74
New cards

Expression

a combination of variables, values, and operators that produces a new value or result in programming

75
New cards

Variable

a named storage location in a program that can hold data and whose value can change during program execution.

76
New cards

Global Variable

a variable that is accessible from any part of a program, typically defined outside of functions or classes

77
New cards

Local Variable

a variable that is defined within a function or block and can only be accessed within that specific scope

78
New cards

Variable Scope

the context in which a variable is defined and accessible, determining its visibility and lifetime within a program

79
New cards

Concatenate

to join two or more strings together to form a single string

80
New cards

String

a sequence of characters used to represent text in programming. Strings can include letters, numbers, and symbols, and are typically enclosed in quotes

81
New cards

Conditionals

allow the program to execute different code paths based on whether a specified condition is true or false

82
New cards

If-Statement

a programming construct that evaluates a condition and executes a block of code if the condition is true

83
New cards

Boolean

a data type that can hold one of two values: true or false, often used in conditional statements to control flow in programming

84
New cards

Boolean Expression

an expression that evaluates to a Boolean value, typically used in conditional statements to determine the flow of execution based on true or false

85
New cards

Models and Simulations

a program which replicates or mimics key features of a real world event in order to investigate its behavior without the cost, time, or danger of running an experiment in real life

86
New cards

Array

specific to JS; a data structure that can hold multiple values, typically of the same type, organized in a single variable, and accessed using an index

87
New cards

List

a data structure that holds an ordered collection of elements, which can be of varying types, and allows for dynamic resizing and straightforward access

88
New cards

Return Value

the output that a function produces after execution, which can be used or assigned to a variable in a program; the result produced by a function after it runs, which can be utilized or stored in a variable.

89
New cards

Index

the position of an element within an array or list, typically represented as a zero-based integer indicating its location

90
New cards

Element

an individual item within a data structure, such as a list or array, which can be accessed or manipulated

91
New cards

Traversals

methods for accessing elements in data structures, often used in trees or graphs to visit each node or element in a structured manner, enabling operations such as searching or modifying data

92
New cards

Argument

a value or reference passed to a function or method to influence its behavior or operations; value passed into a parameter

93
New cards

Problem

a general description of a task that can or cannot be solved with an algorithm

94
New cards

Linear Search

a sequential method for finding an item within a list by checking each element in order until the desired item is found or the list ends

95
New cards

Binary Search

a search algorithm that finds the position of a target value within a sorted array or list by repeatedly dividing the search interval in half; begins by comparing the target value to the middle element of the array and then continues searching in the half where the target value could exist.

96
New cards

Efficiency

the measure of how well an algorithm uses resources, particularly time and space, to complete its task

97
New cards

Computer Science

the study of computers and computational systems, including their theory, development, and applications in solving problems

98
New cards

Simple Device

a basic electronic device that performs a specific function, often involving input and output processes, and serves as a fundamental component in computer systems; on and off, but doubles possibilities every time you add a new device

99
New cards

Decimal System

a numerical system based on ten digits (0-9), used for representing numbers in everyday counting and calculations

100
New cards

Octal System

a numerical system base 8, using digits 0-7, commonly utilized in computing and digital systems for data representation