AP CSP Exam Review Vocabulary

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/97

flashcard set

Earn XP

Description and Tags

AP CSP Exam Review Flashcards

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

98 Terms

1
New cards

Binary

A way of representing information using only 2 options.

2
New cards

Creative Commons

A collection of public copyright licenses that enable the free distribution of an otherwise copyrighted work.

3
New cards

Analog Data

Data with values that change continuously, or smoothly over time. Some examples include music, colors of a painting, or position of a sprinter during a race.

4
New cards

Byte

Eight Bits

5
New cards

Lossy Compression

A process for reducing the number of bits needed to represent something in which some information is lost or thrown away. This process is not reversible.

6
New cards

Intellectual Property

A work or invention that is the result of creativity, such as a piece of writing or a design to which one has rights and for which one may apply for a patent, copyright, trademark, etc.

7
New cards

Overflow Error

Error from attempting to represent a number that is too large.

8
New cards

Sampling

A process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples.

9
New cards

Bit

A contraction of “Binary Digit”, the single unit of information in a computer, typically represented as a 0 or a 1

10
New cards

Digital Data

Data that changes discretely through a finite set of possible values.

11
New cards

Lossless Compression

A process for reducing the number of bits needed to represent something without losing any information. This process is reversible.

12
New cards

Round-off Error

Error form attempting to represent a number that is too precise. The value is rounded.

13
New cards

Bandwidth

The maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second.

14
New cards

Computer System

A group of computing devices and programs working together for a common purpose

15
New cards

IP Address

The unique number assigned to each device on the Internet.

16
New cards

Path

The series of connections between computing devices on a network starting with a sender and ending with a receiver.

17
New cards

Computing Device

A machine that can run a program, including computers, tablets, servers, routers and smart sensors

18
New cards

Protocol

An agreed-upon set of rules that specify the behavior of some system.

19
New cards

Computer Network

A group of interconnected computing devices capable of sending or receiving data.

20
New cards

Router

A type of computer that forwards data across a network.

21
New cards

Internet

A computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols.

22
New cards

Digital Divide

Differing Access to computing devices and the Internet, based on socioeconomic, geographic or demographic characteristics.

23
New cards

Packet

A chunk of data sent over a network. Larger messages are divided into packets that may arrive at the destination in order, out of order, or not at all.

24
New cards

HTTP

HyperText Transfer Protocol – the protocol used for transmitting web pages over the internet.

25
New cards

Redundancy

The inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network.

26
New cards

World Wide Web

A system of linked pages, programs and files.

27
New cards

Fault Tolerant

Can continue to function even in the event of individual component failures. This is important because elements of complex systems like a computer network fail at unexpected times, often in groups.

28
New cards

Event Driven Programming

Some program statements run when triggered by an event, like a mouse click or a key press.

29
New cards

User Interface

The inputs and outputs that allow a user to interact with a piece of software. User interfaces can include a variety of forms such as buttons, menus, images, text, and graphics.

30
New cards

Debugging

Finding and fixing problems in an algorithm or program

31
New cards

Program Statement

A command or instruction. Sometimes referred to as a code statement.

32
New cards

Event

Associated with an action and supplies input data to a program. Can be generated when a key is pressed, a mouse is clicked, a program is started or by any other defined action that affects the flow of execution.

33
New cards

Input

Data that are sent to a computer for processing by a program. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.

34
New cards

Documentation

A written description of how a command or piece of code works or was developed.

35
New cards

Pair Programming

A collaborative programming style in which two programmers switch between the roles of writing code and tracking or planning high level process.

36
New cards

Program

A collection of program statements. Programs run or execute one command at a time.

37
New cards

Comments

Form of program documentation written into the program to be read by people and which do not affect how a program runs.

38
New cards

Development Process

The steps or phases used to create a piece of software. Typically phases include investigating, designing, prototyping, and testing.

39
New cards

Output

Any data that are sent from a program to a device. Can come in a variety of forms, such as tactile interaction, audio, visual, or text.

40
New cards

Sequential Programming

Program statements run in order, from top to bottom.

41
New cards

Function

A named group of programming instructions. Also referred to as a “procedure”.

42
New cards

Variable

A named reference to a value that can be used repeatedly throughout a program.

43
New cards

Expression

A combination of operators and values that evaluates to a single value

44
New cards

Assignment Operator

Allows a program to change the value represented by a variable

45
New cards

Boolean Value

A data type that is either true or false.

46
New cards

String

An ordered sequence of characters.

47
New cards

Comparison Operator

48
New cards

Function Call

A command that executes the code within a function

49
New cards

Logical Operator

NOT, AND, and OR, which evaluate to a Boolean value.

50
New cards

Index

A common method for referencing the elements in a list or string using numbers.

51
New cards

Infinite Loop

Occurs when the ending condition will never evaluate to true.

52
New cards

List

An ordered collection of elements

53
New cards

Iteration

A repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met.

54
New cards

Element

An individual value in a list that is assigned a unique index.

55
New cards

Traversal

The process of accessing each item in a list one at a time.

56
New cards

Data Abstraction

Manage complexity in programs by giving a collection of data a name without referencing the specific details of the representation.

57
New cards

Efficiency

A measure of how many steps are needed to complete an algorithm.

58
New cards

Sequencing

Putting steps in an order.

59
New cards

Problem

A general description of a task that can (or cannot) be solved with an algorithm.

60
New cards

Sequential Computer

A model in which programs run in order, one command at a time.

61
New cards

Selection

Deciding which steps to do next.

62
New cards

Heuristic

Provides a “good enough” solution to a problem when an actual solution is impractical or impossible.

63
New cards

Reasonable Time

Algorithms with a polynomial efficiency or lower (constant, linear, square, cube, etc.) are said to run in

64
New cards

Distributed Computing

A model in which programs are run on multiple devices.

65
New cards

Linear Search

A search algorithm, which checks each element of a list, in order, until the desired value is found or all elements in the list have been checked.

66
New cards

Algorithm

A finite set of instructions that accomplish a task

67
New cards

Speedup

The time used to complete a task sequentially divided by the time to complete the task in parallel.

68
New cards

Decision Problem

A problem with a yes/no answer (e.g. is there a path from A to B?)

69
New cards

Iteration

Doing some steps over and over

70
New cards

Binary Search

A search algorithm that starts at the middle of a sorted set of numbers and removes half of the data; this process repeats until the desired value is found or all elements have been eliminated.

71
New cards

Optimization Problem

A problem with the goal of finding the “best” solution among many (e.g. What is the shortest path from A to B?)

72
New cards

Parallel Computing

A model in which programs are broken into small pieces, some of which are run simultaneously

73
New cards

Unreasonable Time

Algorithms with exponential or factorial efficiencies are examples of algorithms that run in _

74
New cards

Undecidable Problem

A problem for which no algorithm can be constructed that is always capable of providing a correct yes-or-no answer

75
New cards

Argument

The value passed to the parameter

76
New cards

Library

A group of functions (procedures) that may be used in creating new programs

77
New cards

API

Application Program Interface – specifications for how functions in a library behave and can be used.

78
New cards

Procedural Abstraction

A process and allows a procedure to be used only knowing what it does, not how it does it. This allows a solution to a large problem to be based on the solution of smaller subproblems. This is accomplished by creating procedures to solve each of the subproblems.

79
New cards

Parameter

A variable in a function definition. Used as a placeholder for values that will be passed through the function.

80
New cards

Return

Used to return the flow of control to the point where the procedure (also known as a function) was called and to return the value of expression

81
New cards

Data Bias

Data that does not accurately reflect the full population or phenomenon being studied.

82
New cards

Crowd Sourcing

The practice of obtaining input or information from a large number of people via the internet.

83
New cards

Cleaning Data

A process that makes the data uniform without changing its meaning (e.g. replacing all equivalent abbreviations, spellings, and capitalization with the same word).

84
New cards

Data Filtering

Choosing a smaller subset of a data set to use for analysis, for example by eliminating / keeping only certain rows in a table.

85
New cards

Information

The collection of facts and patterns extracted from data

86
New cards

Citizen Science

Scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices.

87
New cards

Correlation

A relationship between two pieces of data, typically referring to the amount that one varies in relation to the other.

88
New cards

Symmetric Key Encryption

Involves one key for both encryption and decryption

89
New cards

Personal Identifiable Information (PII)

Information about an individual that identifies, links, relates, or describes them.

90
New cards

Encryption

A process of encoding messages to keep them secret, so only “authorized” parties can read it.

91
New cards

Malware

Software intended to damage a computing system or to take partial control over its operation.

92
New cards

Rouge Access Point

A wireless access point that gives unauthorized access to secure networks.

93
New cards

Computing Innovation

Includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e- commerce).

94
New cards

Public Key Encryption

Pairs public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message.

95
New cards

Keylogging

The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.

96
New cards

Decryption

A process that reverse encryption, taking a secret message and reproducing the original plain text.

97
New cards

Phising

A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

98
New cards

Multi-factor Authentication

A system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access.