AP Computer Science Princples

0.0(0)
Studied by 0 people
0%Exam Mastery
Build your Mastery score
multiple choiceAP Practice
Supplemental Materials
call kaiCall Kai
Card Sorting

1/33

Last updated 1:49 PM on 5/4/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

34 Terms

1
New cards

Collaboration

Pair programming & code reviews: fewer bugs and more ideas

2
New cards

Incremental dev

design code test refine.

Break big problems into parts.

3
New cards

Comments

explain purpose, not syntax. Help others

read your code.

4
New cards

Iterative

plan prototype test feedback

revise. Revisit steps as needed.

5
New cards

Testing

use known inputs/outputs. Check edge cases

(empty, boundary, extreme).

6
New cards

Debugging

add print statements to trace variables. Test small

sections alone.

7
New cards

Binary

Each bit is equal to the power of 2, with 2^0=1

8
New cards

Bindec

multiply each bit × place value, sum. 1011₂

Type Reversible? Examples

= 8+0+2+1 = 11.

9
New cards

Decbin

divide by 2, track remainders bottomtop.

10
New cards

Overflow

result exceeds max bits error. 8-bit: 255+1 = overflow

11
New cards

Roundoff

real #s in finite bits approx. 1/3 ≠ 0.333… in binary

12
New cards

Analog

sampling at intervals. Higher rate = better quality, more space

13
New cards

Metadata

data about data (for example: resolution, file size, date)

14
New cards

List

an ordered, flexible collection of items stored under a single name

15
New cards

Reasonable

polynomial (n, n², n³).

16
New cards

Unreasonable

exponential (2ⁿ).

17
New cards

Undecidable

no algorithm solves ALL cases (e.g. halting problem).

18
New cards

Lossy

some data removed permanently smaller but can't restore. e.g. JPEG, MP3.

19
New cards

Lossless

original fully restored. e.g. PNG, ZIP, GIF.

20
New cards

Internet

network of networks.

21
New cards

World Wide Web

web pages on the internet

22
New cards

Protocols

TCP (reliable delivery), IP (addressing), HTTP/S (web), DNS (nameIP).

23
New cards

Packets

data split into chunks routed independently reassembled.

24
New cards

Threats

phishing, DDoS, malware, keyloggers.

25
New cards

Phishing

A type of cyberattack where criminals impersonate a trusted person or organization to trick you into revealing sensitive information, such as passwords, credit card numbers, or personal data.

26
New cards

Distributed Denial-of-Service (DDoS)

is a malicious attempt to disrupt normal traffic of a server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

27
New cards

Malware

malicious software (malware) is used to disrupt, damage, or gain unauthorized access to a computer, network, or devices.

28
New cards

Keyloggers

It is a surveillance tool, either software or hardware, that secretly records every keystroke made on a computer or mobile device.

29
New cards

duel-use

tech has BOTH positive & negative effects.

30
New cards

social media

connects people but spreads mis-info & privacy.

31
New cards

Digital divide

unequal access based on income, location, age.

32
New cards

Algorithmic bias

biased data in biased results out.

33
New cards

PII

Personally identifiable info (once leaked cannot be un-leaked)

34
New cards

Cookies

They track browsing, terms of service allow data collection