Khan Academy AP Exam Review Vocabulary
Syntax error
A mistake in typed code that violates the rules of the programming language, causing the code not to run.
Logic error
A mistake in an algorithm or program leading to unexpected behavior or incorrect results.
Run-time error
An error in a program that occurs during execution, like attempting to access non-existent memory.
Overflow error
Error due to insufficient bits to represent a number, like a car odometer "rolling over."
Bit
A binary digit, 0 or 1.
Byte
A sequence of 8 bits.
Roundoff
Error from insufficient bits to represent a number with full precision, like 3.14 as 3.
Analog data
Values changing smoothly over time, e.g., pitch and volume in a live concert.
Lossless
Data compression preserving all data for full recovery of the original.
Lossy
Data compression discarding some data, making recovery of the original impossible.
Metadata
Information about data, like file descriptions or database row details.
Sequencing
Sequential execution of steps in an algorithm or program.
Selection
Boolean condition determining paths in an algorithm.
Iteration
Repeating steps in an algorithm for a set number of times or until a condition is met.
Linear search
Algorithm iterating through a list to find a target value.
Binary search
Algorithm searching a sorted list by splitting it in half.
Reasonable time
Algorithm runtime not increasing faster than a polynomial function of input size.
Heuristic
Technique aiding algorithms in finding solutions in complex problems.
Undecidable
A problem so complex no algorithm can answer for all inputs.
Library
Collection of useful procedures for program creation.
API
Application Programming Interface, a procedure library with call descriptions.
Modularity
Separating a program into independent modules for specific functionalities.
Traversal
Iterating over items in a list, fully or partially.
Computing device
Physical device running programs, like computers or smartphones.
Computer network
Interconnected devices capable of data exchange.
Bandwidth
Maximum data transfer rate over a network connection.
Protocol
Agreed rules specifying system behavior.
Scalability
System's ability to adjust to new demands.
IP (Internet Protocol)
Protocol for addressing nodes and routing data.
TCP (Transmission Control Protocol)
Data transport protocol ensuring reliable packet transmission.
UDP (User Datagram Protocol)
Lightweight data transport protocol with minimal error checking.
World Wide Web
System of linked pages and media browsable over HTTP.
HTTP (Hypertext Transfer Protocol)
Protocol powering the Web for requesting webpages and submitting data.
Parallel computing
Splitting a program into tasks for simultaneous execution.
Speedup
Improvement in time taken by a parallelized program.
Distributed computing
Using multiple devices to run different parts of a program.
Digital divide
Disparity in computing access among communities or populations.
Crowdsourcing
Collaborative model for funding projects or generating ideas.
Citizen science
Public participation in scientific research projects.
Creative Commons
Alternative to copyright for sharing artistic creations.
Open access
Policy allowing access to documents or data.
PII (Personally identifiable information)
Information uniquely identifying an individual.
Multifactor authentication (MFA)
User authentication requiring multiple evidence pieces.
Encryption
Scrambling data to prevent unauthorized access.
Symmetric encryption
Technique using the same key for encryption and decryption.
Public key encryption
Asymmetric encryption using different keys for encryption and decryption.
Cookie
Small text tracking user information on websites.
Virus
Type of malware capable of self-replication.
Phishing
Deceptive attack tricking users into revealing private information.
Rogue access point
Unauthorized wireless access point intercepting network traffic.