AP CSP Exam Vocab

studied byStudied by 9 people
0.0(0)
Get a hint
Hint

Syntax error

1 / 49

flashcard set

Earn XP

Description and Tags

Khan Academy AP Exam Review Vocabulary

50 Terms

1

Syntax error

A mistake in typed code that violates the rules of the programming language, causing the code not to run.

New cards
2

Logic error

A mistake in an algorithm or program leading to unexpected behavior or incorrect results.

New cards
3

Run-time error

An error in a program that occurs during execution, like attempting to access non-existent memory.

New cards
4

Overflow error

Error due to insufficient bits to represent a number, like a car odometer "rolling over."

New cards
5

Bit

A binary digit, 0 or 1.

New cards
6

Byte

A sequence of 8 bits.

New cards
7

Roundoff

Error from insufficient bits to represent a number with full precision, like 3.14 as 3.

New cards
8

Analog data

Values changing smoothly over time, e.g., pitch and volume in a live concert.

New cards
9

Lossless

Data compression preserving all data for full recovery of the original.

New cards
10

Lossy

Data compression discarding some data, making recovery of the original impossible.

New cards
11

Metadata

Information about data, like file descriptions or database row details.

New cards
12

Sequencing

Sequential execution of steps in an algorithm or program.

New cards
13

Selection

Boolean condition determining paths in an algorithm.

New cards
14

Iteration

Repeating steps in an algorithm for a set number of times or until a condition is met.

New cards
15

Linear search

Algorithm iterating through a list to find a target value.

New cards
16

Binary search

Algorithm searching a sorted list by splitting it in half.

New cards
17

Reasonable time

Algorithm runtime not increasing faster than a polynomial function of input size.

New cards
18

Heuristic

Technique aiding algorithms in finding solutions in complex problems.

New cards
19

Undecidable

A problem so complex no algorithm can answer for all inputs.

New cards
20

Library

Collection of useful procedures for program creation.

New cards
21

API

Application Programming Interface, a procedure library with call descriptions.

New cards
22

Modularity

Separating a program into independent modules for specific functionalities.

New cards
23

Traversal

Iterating over items in a list, fully or partially.

New cards
24

Computing device

Physical device running programs, like computers or smartphones.

New cards
25

Computer network

Interconnected devices capable of data exchange.

New cards
26

Bandwidth

Maximum data transfer rate over a network connection.

New cards
27

Protocol

Agreed rules specifying system behavior.

New cards
28

Scalability

System's ability to adjust to new demands.

New cards
29

IP (Internet Protocol)

Protocol for addressing nodes and routing data.

New cards
30

TCP (Transmission Control Protocol)

Data transport protocol ensuring reliable packet transmission.

New cards
31

UDP (User Datagram Protocol)

Lightweight data transport protocol with minimal error checking.

New cards
32

World Wide Web

System of linked pages and media browsable over HTTP.

New cards
33

HTTP (Hypertext Transfer Protocol)

Protocol powering the Web for requesting webpages and submitting data.

New cards
34

Parallel computing

Splitting a program into tasks for simultaneous execution.

New cards
35

Speedup

Improvement in time taken by a parallelized program.

New cards
36

Distributed computing

Using multiple devices to run different parts of a program.

New cards
37

Digital divide

Disparity in computing access among communities or populations.

New cards
38

Crowdsourcing

Collaborative model for funding projects or generating ideas.

New cards
39

Citizen science

Public participation in scientific research projects.

New cards
40

Creative Commons

Alternative to copyright for sharing artistic creations.

New cards
41

Open access

Policy allowing access to documents or data.

New cards
42

PII (Personally identifiable information)

Information uniquely identifying an individual.

New cards
43

Multifactor authentication (MFA)

User authentication requiring multiple evidence pieces.

New cards
44

Encryption

Scrambling data to prevent unauthorized access.

New cards
45

Symmetric encryption

Technique using the same key for encryption and decryption.

New cards
46

Public key encryption

Asymmetric encryption using different keys for encryption and decryption.

New cards
47

Cookie

Small text tracking user information on websites.

New cards
48

Virus

Type of malware capable of self-replication.

New cards
49

Phishing

Deceptive attack tricking users into revealing private information.

New cards
50

Rogue access point

Unauthorized wireless access point intercepting network traffic.

New cards

Explore top notes

note Note
studied byStudied by 3 people
... ago
5.0(1)
note Note
studied byStudied by 13 people
... ago
5.0(1)
note Note
studied byStudied by 14 people
... ago
5.0(1)
note Note
studied byStudied by 43 people
... ago
5.0(2)
note Note
studied byStudied by 24 people
... ago
5.0(1)
note Note
studied byStudied by 63 people
... ago
4.9(7)
note Note
studied byStudied by 16 people
... ago
5.0(2)
note Note
studied byStudied by 20791 people
... ago
4.7(21)

Explore top flashcards

flashcards Flashcard (149)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (53)
studied byStudied by 58 people
... ago
5.0(1)
flashcards Flashcard (51)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (26)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (101)
studied byStudied by 17 people
... ago
5.0(2)
flashcards Flashcard (23)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (22)
studied byStudied by 13 people
... ago
5.0(1)
robot