AP COMP SCI FULL REVIEW

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/99

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

100 Terms

1
New cards

Computing Innovation

an innovation that uses a program as a key part of its function.

2
New cards

Computing Innovation Examples

Physical: Robots, Tablets, smart tech. Non-physical: Social Media, Video Games.

3
New cards

Collaboration

allows for diverse ideas and thoughts that cater to different people.

4
New cards

Pair Programming

when two people share one computer and take turns coding.

5
New cards

Purpose

what a program is designed to do (e.g., solving problems, creative expression).

6
New cards

Code Segments

a smaller collection of statements that are part of a program.

7
New cards

Code Statements

individual instructions.

8
New cards

Program Inputs

pieces of data (visual, auditory, touch, etc.) that a computer takes in and processes.

9
New cards

Program Outputs

the data (same types as inputs) that the computer returns.

10
New cards

Program Events

an action that gives a program data to respond to.

11
New cards

Program Behavior

how a program will respond to a user interacting with it.

12
New cards

Iterative Development Process

develop working prototypes of a program and go back through the cycle to redevelop the program.

13
New cards

Incremental Development Process

break a problem into small parts and then reassemble the solution when each part is fixed.

14
New cards

Program Documentation

a description of how something in your program works.

15
New cards

Comments

program documentation written directly into the program itself.

16
New cards

Logic Errors

unexpected behavior in a program's output.

17
New cards

Syntax Errors

the code does not work properly because it is typed or written incorrectly.

18
New cards

Run-Time Errors

error occurs while code runs.

19
New cards

Overflow Errors

the numbers are too big for the computer.

20
New cards

Hand Tracing

manually tracking your variables' values as your program goes along.

21
New cards

Print Statements

printing out values to make sure they're correct.

22
New cards

Data

a collection of facts.

23
New cards

Bits

binary digits used to store data in computing devices.

24
New cards

Machine Code

the language computers read, usually in the binary system.

25
New cards

Abstraction

reduces complexity by focusing on the most important parts and hiding irrelevant details from the user.

26
New cards

Binary Numbers

numbers represented using 0s and 1s.

27
New cards

Bits to Bytes

8 bits = 1 byte.

28
New cards

Hexadecimal

base 16 system used for RGB color codes.

29
New cards

ASCII Code

converts text to binary format.

30
New cards

Analog Data

measured continuously and changes smoothly.

31
New cards

Digital Data

measured digitally and leaves out extra data by simplifying the data collected.

32
New cards

Data Compression

dependent on the method used and the amount of repeated info in the data.

33
New cards

Lossless Compression

less compression and better file quality.

34
New cards

Lossy Compression

more compression and worse file quality.

35
New cards

Metadata

data about data.

36
New cards

Data Mining

examining very large data sets to find information.

37
New cards

Transforming Data

editing or modifying data (e.g., doubling every number/graphing data points).

38
New cards

Cleaning Data

making data uniform without changing its meaning (e.g., correcting misspelled words).

39
New cards

Pseudocode

a simplified representation of code often used on the AP CSP exam.

40
New cards

Index in AP Pseudocode

starts at 1.

41
New cards

Data Types

categories like numbers, strings, lists, and booleans.

42
New cards

Strings

an ordered list of characters ("hello world").

43
New cards

Substrings

part of a string ("ello").

44
New cards

String Concatenation

connecting two or more strings with a "+".

45
New cards

List

an ordered sequence of elements (also called an array).

46
New cards

Element

an individual value in a list.

47
New cards

Index

the position of an element in a list.

48
New cards

Booleans

values that are either True or False.

49
New cards

Logical Operators

NOT, AND, and OR used with booleans.

50
New cards

Loops

traverse through lists, arrays, or strings.

51
New cards

Mathematical Operators

symbols like / and % used in operations.

52
New cards

MOD (%)

gives the remainder of two numbers.

53
New cards

Algorithm

instructions that accomplish a task or solve a problem, created using sequencing, selection, and iteration.

54
New cards

Sequencing

executing code in the order it is written.

55
New cards

Selection

conditional (if) statements with conditions that must be met for execution.

56
New cards

Else Statement

specifies what happens if an if-statement condition is not met.

57
New cards

Nested Conditional Statements

conditional statements inside other conditional statements.

58
New cards

Iteration

repeating code using loops (e.g., "repeat n times," "repeat until").

59
New cards

Binary Search

algorithm that searches by splitting data and eliminating half at each step.

60
New cards

Procedures

programming instructions, also called methods or functions.

61
New cards

Parameters

input variables of a procedure.

62
New cards

Arguments

defined values passed to a procedure.

63
New cards

Abstraction in Procedures

calling a procedure without knowing how it works.

64
New cards

Internet

interconnection of networks.

65
New cards

Computer Network

multiple computing devices communicating with each other.

66
New cards

Data Packets

small units of data with metadata for routing.

67
New cards

Routing

finding the best path to deliver information.

68
New cards

Path

sequence of connected computing devices from sender to receiver.

69
New cards

Bandwidth

rate of data transfer, measured in megabits per second.

70
New cards

Protocol

set of rules (e.g., TCP/IP, UDP).

71
New cards

World Wide Web

a system of web pages, programs, and files that runs on the Internet.

72
New cards

Scalability

ability to change size and scale to meet new demands.

73
New cards

Fault Tolerance

ability to function despite partial malfunctions.

74
New cards

Redundancy

duplication to improve fault tolerance.

75
New cards

Sequential Computing

traditional programming where tasks are processed one at a time.

76
New cards

Parallel Computing

breaking a program into smaller operations and processing them simultaneously.

77
New cards

Distributed Computing

multiple devices communicate to run a program.

78
New cards

Sequential Solution Time

sum of all steps in a program (a + b + c).

79
New cards

Parallel Solution Time

minimum time when independent steps are processed simultaneously.

80
New cards

Speedup

sequential solution time divided by parallel solution time.

81
New cards

Digital Divide

gap between those with and without internet access.

82
New cards

Factors of Digital Divide

demographics, socioeconomic status, and geographic location.

83
New cards

Computing Bias

reflects racial, gender, or other biases in computing innovations.

84
New cards

Intellectual Property

creations people consider their own.

85
New cards

Copyright

determines who can use a creation.

86
New cards

Creative Commons

license allowing creators to give others rights to use their work.

87
New cards

Open Sourcing

sharing, distributing, and modifying work freely.

88
New cards

Open Access

unrestricted public access to research.

89
New cards

Crowdsourcing

gathering input from a large online audience.

90
New cards

Citizen Science

public involvement in scientific research.

91
New cards

Personally Identifiable Information (PII)

data that can identify an individual.

92
New cards

Virus

attaches to infected files and requires user activation.

93
New cards

Worm

operates independently and spreads through systems.

94
New cards

Malware

malicious software that takes control of a system.

95
New cards

Phishing

tricking individuals into giving personal information by pretending to be trustworthy.

96
New cards

Multi-Factor Authentication

requiring multiple verification methods.

97
New cards

Encryption

encoding data to prevent unauthorized access.

98
New cards

Key

secret information used for encryption.

99
New cards

Symmetric Key Encryption

one key for both encryption and decryption.

100
New cards

Public Key Encryption

uses a public key to encrypt and a private key to decrypt.