AP CSP Vocabulary

studied byStudied by 24 people
0.0(0)
Get a hint
Hint

Syntax error

1 / 48

flashcard set

Earn XP

49 Terms

1

Syntax error

A mistake in typed code that violates the rules of the programming language, preventing the code from running.

New cards
2

Logic error

A mistake in an algorithm or program causing unexpected behavior or incorrect results.

New cards
3

Run-time error

A mistake in a program that occurs during execution, like accessing non-existent memory.

New cards
4

Overflow error

Error due to insufficient bits to represent a number, similar to an odometer "rolling over."

New cards
5

Bit

A binary digit, 0 or 1, fundamental in binary numbers.

New cards
6

Byte

A sequence of 8 bits, essential in computing and data storage.

New cards
7

Analog data

Values changing smoothly over time, like pitch and volume in music.

New cards
8

Lossless

Data compression preserving all original data for full recovery.

New cards
9

Lossy

Data compression discarding some data, making full recovery impossible.

New cards
10

Metadata

Information about data, like file descriptions or database rows.

New cards
11

Sequencing

Sequential execution of steps in an algorithm or program.

New cards
12

Selection

Using Boolean conditions to choose paths in an algorithm.

New cards
13

Iteration

Repeating steps in an algorithm until a condition is met.

New cards
14

Linear search

Algorithm searching for a target value by iterating through a list.

New cards
15

Binary search

Algorithm searching a sorted list by splitting it in half.

New cards
16

Reasonable time

Algorithm runtime not increasing faster than a polynomial function.

New cards
17

Heuristic

Technique aiding algorithms in finding solutions in complex problems.

New cards
18

Undecidable

Problems without an algorithm to answer for all inputs.

New cards
19

Library

Collection of useful procedures for program creation.

New cards
20

API

Application Programming Interface, a set of procedures and their descriptions.

New cards
21

Modularity

Separating a program into independent modules for functionality.

New cards
22

Traversal

Iterating over items in a list, either fully or partially.

New cards
23

Computing device

Physical device capable of running programs.

New cards
24

Computer network

Interconnected devices for data exchange.

New cards
25

Bandwidth

Maximum data transfer rate over a network connection.

New cards
26

Protocol

Agreed rules specifying system behavior.

New cards
27

Scalability

System's ability to adjust to new demands.

New cards
28

IP (Internet Protocol)

Protocol for addressing and routing data on networks.

New cards
29

TCP (Transmission Control Protocol)

Ensures reliable data transmission.

New cards
30

UDP (User Datagram Protocol)

Lightweight data transport protocol.

New cards
31

World Wide Web

System of linked pages and media browsable over HTTP.

New cards
32

HTTP (Hypertext Transfer Protocol)

Web protocol for requesting and submitting data.

New cards
33

Parallel computing

Splitting a program into tasks for simultaneous execution.

New cards
34

Speedup

Improvement in time taken by parallelized programs.

New cards
35

Distributed computing

Using multiple devices to run program parts.

New cards
36

Digital divide

Disparity in computing access among communities.

New cards
37

Crowdsourcing

Collaborative model for funding projects or generating ideas.

New cards
38

Citizen science

Involving public volunteers in scientific research.

New cards
39

Creative Commons

Alternative to copyright for sharing artistic creations.

New cards
40

Open access

Policy allowing access to documents and data.

New cards
41

PII (Personally identifiable information)

Data identifying individuals.

New cards
42

Multifactor authentication (MFA)

User authentication with multiple evidence pieces.

New cards
43

Encryption

Scrambling data to prevent unauthorized access.

New cards
44

Symmetric encryption

Using the same key for encrypting and decrypting data.

New cards
45

Public key encryption

Asymmetric encryption with different keys for encryption and decryption.

New cards
46

Cookie

Small text tracking user information on websites.

New cards
47

Virus

Self-replicating computer malware.

New cards
48

Phishing

Deceptive attack to obtain private information.

New cards
49

Rogue access point

Unauthorized wireless access point for network interception.

New cards

Explore top notes

note Note
studied byStudied by 11 people
... ago
5.0(1)
note Note
studied byStudied by 15 people
... ago
5.0(1)
note Note
studied byStudied by 21 people
... ago
5.0(1)
note Note
studied byStudied by 14 people
... ago
5.0(1)
note Note
studied byStudied by 64 people
... ago
5.0(1)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 126 people
... ago
5.0(2)
note Note
studied byStudied by 126836 people
... ago
4.9(606)

Explore top flashcards

flashcards Flashcard (44)
studied byStudied by 81 people
... ago
5.0(1)
flashcards Flashcard (21)
studied byStudied by 6 people
... ago
5.0(1)
flashcards Flashcard (34)
studied byStudied by 3745 people
... ago
4.1(74)
flashcards Flashcard (189)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (31)
studied byStudied by 9 people
... ago
5.0(1)
flashcards Flashcard (57)
studied byStudied by 16 people
... ago
5.0(1)
flashcards Flashcard (56)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (37)
studied byStudied by 3 people
... ago
5.0(1)
robot