AP CSP Vocabulary

0.0(0)
studied byStudied by 24 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/48

flashcard set

Earn XP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

49 Terms

1
New cards

Syntax error

A mistake in typed code that violates the rules of the programming language, preventing the code from running.

2
New cards

Logic error

A mistake in an algorithm or program causing unexpected behavior or incorrect results.

3
New cards

Run-time error

A mistake in a program that occurs during execution, like accessing non-existent memory.

4
New cards

Overflow error

Error due to insufficient bits to represent a number, similar to an odometer "rolling over."

5
New cards

Bit

A binary digit, 0 or 1, fundamental in binary numbers.

6
New cards

Byte

A sequence of 8 bits, essential in computing and data storage.

7
New cards

Analog data

Values changing smoothly over time, like pitch and volume in music.

8
New cards

Lossless

Data compression preserving all original data for full recovery.

9
New cards

Lossy

Data compression discarding some data, making full recovery impossible.

10
New cards

Metadata

Information about data, like file descriptions or database rows.

11
New cards

Sequencing

Sequential execution of steps in an algorithm or program.

12
New cards

Selection

Using Boolean conditions to choose paths in an algorithm.

13
New cards

Iteration

Repeating steps in an algorithm until a condition is met.

14
New cards

Linear search

Algorithm searching for a target value by iterating through a list.

15
New cards

Binary search

Algorithm searching a sorted list by splitting it in half.

16
New cards

Reasonable time

Algorithm runtime not increasing faster than a polynomial function.

17
New cards

Heuristic

Technique aiding algorithms in finding solutions in complex problems.

18
New cards

Undecidable

Problems without an algorithm to answer for all inputs.

19
New cards

Library

Collection of useful procedures for program creation.

20
New cards

API

Application Programming Interface, a set of procedures and their descriptions.

21
New cards

Modularity

Separating a program into independent modules for functionality.

22
New cards

Traversal

Iterating over items in a list, either fully or partially.

23
New cards

Computing device

Physical device capable of running programs.

24
New cards

Computer network

Interconnected devices for data exchange.

25
New cards

Bandwidth

Maximum data transfer rate over a network connection.

26
New cards

Protocol

Agreed rules specifying system behavior.

27
New cards

Scalability

System's ability to adjust to new demands.

28
New cards

IP (Internet Protocol)

Protocol for addressing and routing data on networks.

29
New cards

TCP (Transmission Control Protocol)

Ensures reliable data transmission.

30
New cards

UDP (User Datagram Protocol)

Lightweight data transport protocol.

31
New cards

World Wide Web

System of linked pages and media browsable over HTTP.

32
New cards

HTTP (Hypertext Transfer Protocol)

Web protocol for requesting and submitting data.

33
New cards

Parallel computing

Splitting a program into tasks for simultaneous execution.

34
New cards

Speedup

Improvement in time taken by parallelized programs.

35
New cards

Distributed computing

Using multiple devices to run program parts.

36
New cards

Digital divide

Disparity in computing access among communities.

37
New cards

Crowdsourcing

Collaborative model for funding projects or generating ideas.

38
New cards

Citizen science

Involving public volunteers in scientific research.

39
New cards

Creative Commons

Alternative to copyright for sharing artistic creations.

40
New cards

Open access

Policy allowing access to documents and data.

41
New cards

PII (Personally identifiable information)

Data identifying individuals.

42
New cards

Multifactor authentication (MFA)

User authentication with multiple evidence pieces.

43
New cards

Encryption

Scrambling data to prevent unauthorized access.

44
New cards

Symmetric encryption

Using the same key for encrypting and decrypting data.

45
New cards

Public key encryption

Asymmetric encryption with different keys for encryption and decryption.

46
New cards

Cookie

Small text tracking user information on websites.

47
New cards

Virus

Self-replicating computer malware.

48
New cards

Phishing

Deceptive attack to obtain private information.

49
New cards

Rogue access point

Unauthorized wireless access point for network interception.