Khan Academy CSP Vocab

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/50

flashcard set

Earn XP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

51 Terms

1
New cards

Syntax error

A mistake in typed code that violates the rules of the programming language. Code with syntax errors will not run.

2
New cards

Logic error

A mistake in an algorithm or program that causes unexpected behavior or incorrect results.

3
New cards

Run-time error

An error that occurs only when the program is running, such as accessing nonexistent memory.

4
New cards

Overflow error

An error that happens when a number exceeds the storage capacity (like an odometer rolling over).

5
New cards

Bit

A binary digit, either 0 or 1.

6
New cards

Byte

A sequence of 8 bits.

7
New cards

Roundoff

Error caused by insufficient bits to represent a number with full precision (e.g., 3.14 for π).

8
New cards

Analog data

Data that changes smoothly over time (e.g., live concert volume).

9
New cards

Lossless

Compression that preserves all data and allows full recovery.

10
New cards

Lossy

Compression that discards some data, making full recovery impossible.

11
New cards

Metadata

Data about data (e.g., file descriptions).

12
New cards

Sequencing

Executing steps in order, like a recipe.

13
New cards

Selection

Using a Boolean condition to choose between two paths.

14
New cards

Iteration

Repeating steps for a set amount of times or until a condition is met.

15
New cards

Linear search

Checking each item in a list until the target is found.

16
New cards

Binary search

Searching a sorted list by repeatedly dividing it in half.

17
New cards

Reasonable time

Algorithm runtime that doesn’t grow faster than a polynomial function.

18
New cards

Heuristic

A technique that finds a good solution for a complex problem.

19
New cards

Undecidable

A problem with no algorithm that guarantees an answer for all inputs.

20
New cards

Library

A collection of reusable code procedures.

21
New cards

API

A library of procedures with descriptions on how to use them.

22
New cards

Modularity

Dividing a program into independent modules.

23
New cards

Traversal

Iterating through items in a list (full or partial).

24
New cards

Computing device

Any physical device that can run a program (e.g., phone, computer).

25
New cards

Computer network

A group of devices that send/receive data.

26
New cards

Bandwidth

Maximum data transfer rate over a network (bits per second).

27
New cards

Protocol

A set of rules that define system behavior.

28
New cards

Scalability

A system’s ability to handle increased demand.

29
New cards

IP (Internet Protocol)

Defines addressing and routing of data.

30
New cards

TCP (Transmission Control Protocol)

Reliable data transport protocol.

31
New cards

UDP (User Datagram Protocol)

A fast but less reliable data transport protocol.

32
New cards

World Wide Web

A system of linked web pages and media.

33
New cards

HTTP (Hypertext Transfer Protocol)

The protocol for web page requests and form submissions.

34
New cards

Parallel computing

Running multiple tasks simultaneously.

35
New cards

Speedup

Performance improvement in parallel computing (sequential time / parallel time).

36
New cards

Distributed computing

Running different parts of a program on multiple devices.

37
New cards

Digital divide

The gap between those with and without computing access.

38
New cards

Crowdsourcing

Many users contributing to a project (e.g., Wikipedia).

39
New cards

Citizen science

Volunteers participating in scientific research.

40
New cards

Creative Commons

Alternative to copyright allowing flexible content usage.

41
New cards

Open access

Free availability of documents or datasets.

42
New cards

PII (Personally Identifiable Information)

Data that can identify an individual.

43
New cards

Multifactor authentication (MFA)

Authentication requiring multiple verification methods.

44
New cards

Encryption

Scrambling data to prevent unauthorized access.

45
New cards

Symmetric encryption

Uses the same key for encryption and decryption.

46
New cards

Public key encryption

Uses different keys for encryption and decryption.

47
New cards

Cookie

Small text file that tracks user data on websites.

48
New cards

Virus

Malware that replicates itself.

49
New cards

Phishing

A scam tricking users into revealing personal information.

50
New cards

Rogue access point

An unauthorized network access point used for attacks.

51
New cards