AP CSP Exam Vocab

0.0(0)
studied byStudied by 9 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

flashcard set

Earn XP

Description and Tags

Khan Academy AP Exam Review Vocabulary

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

Syntax error

A mistake in typed code that violates the rules of the programming language, causing the code not to run.

2
New cards

Logic error

A mistake in an algorithm or program leading to unexpected behavior or incorrect results.

3
New cards

Run-time error

An error in a program that occurs during execution, like attempting to access non-existent memory.

4
New cards

Overflow error

Error due to insufficient bits to represent a number, like a car odometer "rolling over."

5
New cards

Bit

A binary digit, 0 or 1.

6
New cards

Byte

A sequence of 8 bits.

7
New cards

Roundoff

Error from insufficient bits to represent a number with full precision, like 3.14 as 3.

8
New cards

Analog data

Values changing smoothly over time, e.g., pitch and volume in a live concert.

9
New cards

Lossless

Data compression preserving all data for full recovery of the original.

10
New cards

Lossy

Data compression discarding some data, making recovery of the original impossible.

11
New cards

Metadata

Information about data, like file descriptions or database row details.

12
New cards

Sequencing

Sequential execution of steps in an algorithm or program.

13
New cards

Selection

Boolean condition determining paths in an algorithm.

14
New cards

Iteration

Repeating steps in an algorithm for a set number of times or until a condition is met.

15
New cards

Linear search

Algorithm iterating through a list to find a target value.

16
New cards

Binary search

Algorithm searching a sorted list by splitting it in half.

17
New cards

Reasonable time

Algorithm runtime not increasing faster than a polynomial function of input size.

18
New cards

Heuristic

Technique aiding algorithms in finding solutions in complex problems.

19
New cards

Undecidable

A problem so complex no algorithm can answer for all inputs.

20
New cards

Library

Collection of useful procedures for program creation.

21
New cards

API

Application Programming Interface, a procedure library with call descriptions.

22
New cards

Modularity

Separating a program into independent modules for specific functionalities.

23
New cards

Traversal

Iterating over items in a list, fully or partially.

24
New cards

Computing device

Physical device running programs, like computers or smartphones.

25
New cards

Computer network

Interconnected devices capable of data exchange.

26
New cards

Bandwidth

Maximum data transfer rate over a network connection.

27
New cards

Protocol

Agreed rules specifying system behavior.

28
New cards

Scalability

System's ability to adjust to new demands.

29
New cards

IP (Internet Protocol)

Protocol for addressing nodes and routing data.

30
New cards

TCP (Transmission Control Protocol)

Data transport protocol ensuring reliable packet transmission.

31
New cards

UDP (User Datagram Protocol)

Lightweight data transport protocol with minimal error checking.

32
New cards

World Wide Web

System of linked pages and media browsable over HTTP.

33
New cards

HTTP (Hypertext Transfer Protocol)

Protocol powering the Web for requesting webpages and submitting data.

34
New cards

Parallel computing

Splitting a program into tasks for simultaneous execution.

35
New cards

Speedup

Improvement in time taken by a parallelized program.

36
New cards

Distributed computing

Using multiple devices to run different parts of a program.

37
New cards

Digital divide

Disparity in computing access among communities or populations.

38
New cards

Crowdsourcing

Collaborative model for funding projects or generating ideas.

39
New cards

Citizen science

Public participation in scientific research projects.

40
New cards

Creative Commons

Alternative to copyright for sharing artistic creations.

41
New cards

Open access

Policy allowing access to documents or data.

42
New cards

PII (Personally identifiable information)

Information uniquely identifying an individual.

43
New cards

Multifactor authentication (MFA)

User authentication requiring multiple evidence pieces.

44
New cards

Encryption

Scrambling data to prevent unauthorized access.

45
New cards

Symmetric encryption

Technique using the same key for encryption and decryption.

46
New cards

Public key encryption

Asymmetric encryption using different keys for encryption and decryption.

47
New cards

Cookie

Small text tracking user information on websites.

48
New cards

Virus

Type of malware capable of self-replication.

49
New cards

Phishing

Deceptive attack tricking users into revealing private information.

50
New cards

Rogue access point

Unauthorized wireless access point intercepting network traffic.