1/89
Vocabulary flashcards for reviewing AP Computer Science Principles concepts.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Logic Error
A mistake in the algorithm or program that causes it to behave incorrectly or unexpectedly.
Syntax Error
A mistake in the program where the rules of the programming language are not followed.
Run-time Error
A mistake in the program that occurs during the execution of a program.
Overflow Error
An error that occurs when a computer attempts to handle a number that is outside the defined range of values.
Round-off Error
Error that occurs in computing when the representation of a number used in a calculation is not exact, due to the limitations of finite-precision arithmetic.
Hardware
The physical components of a computing device.
Software
The instructions in a programming language to the computing device.
Program
A collection of program statements that performs a specific task when run by a computer.
Code Segment
A collection of program statements that are part of a program.
Program Input
Data sent to a computer for processing by a program.
Event
The action that supplies input data to a program.
Iterative Development Process
Requires refinement and revisions based on feedback, testing, or reflection throughout the process.
Incremental Development Process
Breaks down the problem into smaller pieces and makes sure each piece works before adding it to the whole.
Program Documentation
A written description of the function of a code segment, event, procedure, or program and how it was developed.
Comments
A form of programming documentation written into the program that do not affect how the program runs.
Bit
Short for a single binary digit and is either 0 or 1.
Byte
8 bits.
Abstractions
Find common features to generalize the program and can also help shrink the code.
Analog Signal
Has values that change smoothly over time, rather than in discrete intervals.
Digital Signal
An analog signal that has been broken up into steps.
Variable
An abstraction inside a program that can hold a value.
Lossy Compression
Can significantly reduce the file size while decreasing resolution.
Lossless Compression
No data is lost; the original file can be reproduced without any lost data.
Information
The collection of facts and patterns extracted from data.
Cleaning Data
A process that makes data uniform without changing meaning.
Predicting Algorithms
Use information collected from big data to influence our lives.
Metadata
Data that describe your data.
Algorithm
A set of steps to do a task.
Machine Code
A strictly numerical language that runs fast but is hard to use.
Assignment Operator
Allows a program to change the value represented by a variable.
Modulus
A mathematical operation that returns the remainder after an initial number (dividend) is divided by another number (divisor).
List
A data abstraction that reduces the level of complexity of a program by giving a collection of data a name without referencing the specific details of the representation.
Boolean Value
A data type that only has 2 possible values, true or false.
Linear Search
An algorithm for finding an element in a list that starts from the beginning and sequentially checks each element.
Binary Search
A search algorithm that halves the number of elements that need to be searched after every comparison. The list must be sorted.
Flowchart
Ways to represent algorithms visually.
Appending
Adding a value to the end of a list.
Inserting
Requires the list name, what you are adding, and at what index you intend to add the item at.
Traversing a list
Accessing all elements of the list one by one.
Procedure
A set of code that is referred to by name and can be called at any point in a program simply by using the procedure’s name.
Sequential Statements
Statements that are executed as written in order in the program.
Selection Statements
Statements that use the “if (condition)” structure and Boolean values to determine which code to execute.
Iterative Statements
Statements that repeat code as many times as specified before continuing with the rest of the program (loops).
Parameters
Allow the calling program to send values to the procedure. They are passed to the procedure as arguments when the procedure is called.
Return Statement
Can end a procedure before the end of the code is reached or send a value back to the calling program.
API
Application Programming Interface; documentation provides the information needed to set up the interface and use the newly connected software.
Instance of a problem
A specific example.
Decision Problem
Has a yes or no answer.
Optimization Problem
Should find the best solution for the problem.
Heuristic Approach
An approach that may not be optimal or the best but is close enough to use as a solution.
Decidable Problem
One where an algorithm can be written that results in a correct “yes” or “no” answer for all inputs.
Undecidable Problem
Does not have an algorithm that can give a correct “yes” or “no” for all cases of the problem.
Computing Device
A physical artifact that can run a program.
Computing System
A group of computing devices and programs working together for a common purpose.
Computer Network
A group of interconnected computing devices capable of sending or receiving data.
Bandwidth
The maximum amount of data that can be sent in a fixed amount of time.
Routing
The process of finding a path from sender to receiver.
Protocol
An agreed-upon set of rules that specify the behavior of a system.
Scalability
The capacity for the system to change in size and scale to meet new demands.
IP
A protocol that is responsible for addressing and routing your online requests.
TCP
A protocol that defines how computers send packets of data to each other.
Packets
Small chunks of data.
UDP
A protocol that allows computer applications to send messages without checking for missing packets to save on time needed to retransmit missing packets.
Fault Tolerance
When a system can support failures and continue to function.
Redundancy
The inclusion of extra paths that can mitigate the failure of a system if other components fail.
End-to-end architecture
The process between computers of breaking down and assembling packets at each end.
Internet
Refers to the hardware; made up of computers, cables, routers, and other components that make up the network.
World Wide Web
Refers to the software used on the internet. HTTP is a protocol used by the World Wide Web to transmit data.
Sequential Computing
A computational model in which operations are performed in order one at a time.
Parallel Computing
Involves breaking up a task into smaller, sequential pieces. Then those sequential pieces are all executed at the same time.
Distributed Computing
A computational model in which multiple devices are used to run a program.
Hardware Failure
When a hardware device, such as a computer or printer, stops working properly due to an issue with the physical components.
Operational Failures
Any issues or breakdowns in the operation of a business, machine, system, process, etc.
Cyberattacks
Malicious attempts to damage or disrupt computer systems, networks, and data.
Digital Divide
The difference in access to technology including access to computers and the internet.
Human Bias
Computing innovations can reflect existing human bias.
Crowdsourcing
Practice of obtaining input or info from many people via the internet.
Citizen Science
Scientific research using public participation in scientific research.
Creative Commons
An American nonprofit that is dedicated to expanding the range of creative works available for others to build upon and share legally.
Open Source
Programs that are made freely available and may be redistributed or modified.
Open Access
Online research output free of all restrictions on access and free of many restrictions on use, such as copyright or license restrictions.
Personally Identifiable Information (PII)
Info about an individual that identifies, links, relates, or describes that person.
Authentication Measures
Protect devices and info from unauthorized access. Examples of authentication measures include passwords and multifactor authentication.
Encryption
The process of encoding data to prevent unauthorized access.
Decryption
The process of decoding the data.
Malware
Malicious software intended to damage a computing system or take partial control of its operations.
Computer Viruses
Malicious programs that can copy themselves and gain access to a computer in an unauthorized way.
Phishing
A technique that directs users to unrelated sites that trick the user into giving personal data.
Keylogging
Use of a program to record every keystroke made by the computer user in order to gain fraudulent access to passwords and other confidential info.
Rogue Access Point
A wireless access point that gives unauthorized access to secure networks.