AP Computer Science Principles Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/89

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards for reviewing AP Computer Science Principles concepts.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

90 Terms

1
New cards

Logic Error

A mistake in the algorithm or program that causes it to behave incorrectly or unexpectedly.

2
New cards

Syntax Error

A mistake in the program where the rules of the programming language are not followed.

3
New cards

Run-time Error

A mistake in the program that occurs during the execution of a program.

4
New cards

Overflow Error

An error that occurs when a computer attempts to handle a number that is outside the defined range of values.

5
New cards

Round-off Error

Error that occurs in computing when the representation of a number used in a calculation is not exact, due to the limitations of finite-precision arithmetic.

6
New cards

Hardware

The physical components of a computing device.

7
New cards

Software

The instructions in a programming language to the computing device.

8
New cards

Program

A collection of program statements that performs a specific task when run by a computer.

9
New cards

Code Segment

A collection of program statements that are part of a program.

10
New cards

Program Input

Data sent to a computer for processing by a program.

11
New cards

Event

The action that supplies input data to a program.

12
New cards

Iterative Development Process

Requires refinement and revisions based on feedback, testing, or reflection throughout the process.

13
New cards

Incremental Development Process

Breaks down the problem into smaller pieces and makes sure each piece works before adding it to the whole.

14
New cards

Program Documentation

A written description of the function of a code segment, event, procedure, or program and how it was developed.

15
New cards

Comments

A form of programming documentation written into the program that do not affect how the program runs.

16
New cards

Bit

Short for a single binary digit and is either 0 or 1.

17
New cards

Byte

8 bits.

18
New cards

Abstractions

Find common features to generalize the program and can also help shrink the code.

19
New cards

Analog Signal

Has values that change smoothly over time, rather than in discrete intervals.

20
New cards

Digital Signal

An analog signal that has been broken up into steps.

21
New cards

Variable

An abstraction inside a program that can hold a value.

22
New cards

Lossy Compression

Can significantly reduce the file size while decreasing resolution.

23
New cards

Lossless Compression

No data is lost; the original file can be reproduced without any lost data.

24
New cards

Information

The collection of facts and patterns extracted from data.

25
New cards

Cleaning Data

A process that makes data uniform without changing meaning.

26
New cards

Predicting Algorithms

Use information collected from big data to influence our lives.

27
New cards

Metadata

Data that describe your data.

28
New cards

Algorithm

A set of steps to do a task.

29
New cards

Machine Code

A strictly numerical language that runs fast but is hard to use.

30
New cards

Assignment Operator

Allows a program to change the value represented by a variable.

31
New cards

Modulus

A mathematical operation that returns the remainder after an initial number (dividend) is divided by another number (divisor).

32
New cards

List

A data abstraction that reduces the level of complexity of a program by giving a collection of data a name without referencing the specific details of the representation.

33
New cards

Boolean Value

A data type that only has 2 possible values, true or false.

34
New cards

Linear Search

An algorithm for finding an element in a list that starts from the beginning and sequentially checks each element.

35
New cards

Binary Search

A search algorithm that halves the number of elements that need to be searched after every comparison. The list must be sorted.

36
New cards

Flowchart

Ways to represent algorithms visually.

37
New cards

Appending

Adding a value to the end of a list.

38
New cards

Inserting

Requires the list name, what you are adding, and at what index you intend to add the item at.

39
New cards

Traversing a list

Accessing all elements of the list one by one.

40
New cards

Procedure

A set of code that is referred to by name and can be called at any point in a program simply by using the procedure’s name.

41
New cards

Sequential Statements

Statements that are executed as written in order in the program.

42
New cards

Selection Statements

Statements that use the “if (condition)” structure and Boolean values to determine which code to execute.

43
New cards

Iterative Statements

Statements that repeat code as many times as specified before continuing with the rest of the program (loops).

44
New cards

Parameters

Allow the calling program to send values to the procedure. They are passed to the procedure as arguments when the procedure is called.

45
New cards

Return Statement

Can end a procedure before the end of the code is reached or send a value back to the calling program.

46
New cards

API

Application Programming Interface; documentation provides the information needed to set up the interface and use the newly connected software.

47
New cards

Instance of a problem

A specific example.

48
New cards

Decision Problem

Has a yes or no answer.

49
New cards

Optimization Problem

Should find the best solution for the problem.

50
New cards

Heuristic Approach

An approach that may not be optimal or the best but is close enough to use as a solution.

51
New cards

Decidable Problem

One where an algorithm can be written that results in a correct “yes” or “no” answer for all inputs.

52
New cards

Undecidable Problem

Does not have an algorithm that can give a correct “yes” or “no” for all cases of the problem.

53
New cards

Computing Device

A physical artifact that can run a program.

54
New cards

Computing System

A group of computing devices and programs working together for a common purpose.

55
New cards

Computer Network

A group of interconnected computing devices capable of sending or receiving data.

56
New cards

Bandwidth

The maximum amount of data that can be sent in a fixed amount of time.

57
New cards

Routing

The process of finding a path from sender to receiver.

58
New cards

Protocol

An agreed-upon set of rules that specify the behavior of a system.

59
New cards

Scalability

The capacity for the system to change in size and scale to meet new demands.

60
New cards

IP

A protocol that is responsible for addressing and routing your online requests.

61
New cards

TCP

A protocol that defines how computers send packets of data to each other.

62
New cards

Packets

Small chunks of data.

63
New cards

UDP

A protocol that allows computer applications to send messages without checking for missing packets to save on time needed to retransmit missing packets.

64
New cards

Fault Tolerance

When a system can support failures and continue to function.

65
New cards

Redundancy

The inclusion of extra paths that can mitigate the failure of a system if other components fail.

66
New cards

End-to-end architecture

The process between computers of breaking down and assembling packets at each end.

67
New cards

Internet

Refers to the hardware; made up of computers, cables, routers, and other components that make up the network.

68
New cards

World Wide Web

Refers to the software used on the internet. HTTP is a protocol used by the World Wide Web to transmit data.

69
New cards

Sequential Computing

A computational model in which operations are performed in order one at a time.

70
New cards

Parallel Computing

Involves breaking up a task into smaller, sequential pieces. Then those sequential pieces are all executed at the same time.

71
New cards

Distributed Computing

A computational model in which multiple devices are used to run a program.

72
New cards

Hardware Failure

When a hardware device, such as a computer or printer, stops working properly due to an issue with the physical components.

73
New cards

Operational Failures

Any issues or breakdowns in the operation of a business, machine, system, process, etc.

74
New cards

Cyberattacks

Malicious attempts to damage or disrupt computer systems, networks, and data.

75
New cards

Digital Divide

The difference in access to technology including access to computers and the internet.

76
New cards

Human Bias

Computing innovations can reflect existing human bias.

77
New cards

Crowdsourcing

Practice of obtaining input or info from many people via the internet.

78
New cards

Citizen Science

Scientific research using public participation in scientific research.

79
New cards

Creative Commons

An American nonprofit that is dedicated to expanding the range of creative works available for others to build upon and share legally.

80
New cards

Open Source

Programs that are made freely available and may be redistributed or modified.

81
New cards

Open Access

Online research output free of all restrictions on access and free of many restrictions on use, such as copyright or license restrictions.

82
New cards

Personally Identifiable Information (PII)

Info about an individual that identifies, links, relates, or describes that person.

83
New cards

Authentication Measures

Protect devices and info from unauthorized access. Examples of authentication measures include passwords and multifactor authentication.

84
New cards

Encryption

The process of encoding data to prevent unauthorized access.

85
New cards

Decryption

The process of decoding the data.

86
New cards

Malware

Malicious software intended to damage a computing system or take partial control of its operations.

87
New cards

Computer Viruses

Malicious programs that can copy themselves and gain access to a computer in an unauthorized way.

88
New cards

Phishing

A technique that directs users to unrelated sites that trick the user into giving personal data.

89
New cards

Keylogging

Use of a program to record every keystroke made by the computer user in order to gain fraudulent access to passwords and other confidential info.

90
New cards

Rogue Access Point

A wireless access point that gives unauthorized access to secure networks.