AP CompSci Vocab

5.0(1)
studied byStudied by 35 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Get a hint
Hint

syntax error

Get a hint
Hint

a mistake in the program where the rules of the programming language are not followed therefore a syntax error is printed.

Get a hint
Hint

logic error

Get a hint
Hint

a mistake in the algorithm or program that causes it to behave incorrectly or unexpectedly.

Card Sorting

1/47

flashcard set

Earn XP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

48 Terms

1
New cards

syntax error

a mistake in the program where the rules of the programming language are not followed therefore a syntax error is printed.

2
New cards

logic error

a mistake in the algorithm or program that causes it to behave incorrectly or unexpectedly.

3
New cards

run-time error

A mistake in a program that happens only when the program is actually run, such as a program attempting to access memory that does not exist.

4
New cards

overflow error

Error from attempting to represent a number that is too large.

5
New cards

bit

binary digit; 0 or 1

6
New cards

byte

a group of 8 bits

7
New cards

roundoff

Error that results when the number of bits is not enough to represent the number with full precision

8
New cards

analog data

A continuous representation of data

9
New cards

lossless compression

a data compression algorithm that allows the original data to be perfectly reconstructed from the compressed data.

10
New cards

lossy compression

data compression techniques in which some amount of data is lost. This technique attempts to eliminate redundant information.

11
New cards

metadata

data that describes data

12
New cards

Sequencing

Putting commands in correct order so computers can read the commands.

13
New cards

Selection

the process of choosing which sensory information to focus on

14
New cards

Iteration

repetition

15
New cards

linear serach

checking each element of a list until the desired value is found or the whole list is checked

16
New cards

Binary Search

a search algorithm that starts at the middle of a sorted set of numbers and removes half of the data; this process repeats until the desired value is found or all elements have been eliminated.

17
New cards

reasonable time

polynomial in the number of steps an algorithm takes in the worst case based on the input size

18
New cards

heuristic

a simple thinking strategy that often allows us to make judgments and solve problems efficiently; usually speedier but also more error-prone than algorithms

19
New cards

library

a collection of commands / functions, typically with a shared purpose

20
New cards

API

Application Programming Interface, a library of procedures and a description of how to call each procedure.

21
New cards

Modularity

The subdivision of a computer program into separate subprograms

22
New cards

traversal

the process of accessing each item in a list one at a time

23
New cards

computing device

a physical device that can run a program

24
New cards

Bandwidth

The maximum amount of data that can pass from one point to another in a unit of time

25
New cards

protocol

A set of rules governing the exchange or transmission of data between devices.

26
New cards

Scalability

Refers to how well a system can adapt to increased demands

27
New cards

IP

(Internet Protocol) Routing protocol that is in charge of forwarding packets on the Internet.

28
New cards

TCP

(Transmission Control Protocol) provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.

29
New cards

UDP

User Datagram Protocol. Used instead of TCP when guaranteed delivery of each packet is not necessary. UDP uses a best-effort delivery mechanism.

30
New cards

World Wide Web

a system of linked pages, programs, and files

31
New cards

HTTP

HyperText Transfer Protocol - the protocol used for transmitting web pages over the Internet

32
New cards

Parallel Computing

a model in which programs are broken into small pieces, some of which are run simultaneously

33
New cards

speedup

the time used to complete a task sequentially divided by the time to complete a task in parallel

34
New cards

distributed computing

processes and manages algorithms across many machines in a computing environment

35
New cards

digital divide

A worldwide gap giving advantage to those with access to technology

36
New cards

crowdsourcing

using consumers to develop and market products

37
New cards

citizen science

scientific research by amateur scientists

38
New cards

Creative Commons

A kind of copyright that makes it easier for people to copy, share, and build on your creative work, as long as they give you credit for it.

39
New cards

Open Access

A policy that allows people to have read access to things, e.g., libraries or online data

40
New cards

PII

Personally Identifiable Information.
Information about individuals that can be used to trace a person's identity, such as a full name, birthdate, biometric data, and identifying numbers such as a Social Security number

41
New cards

MFA

Multi-factor authentication (MFA) is a security control that requires users to verify their identities by providing multiple pieces of evidence before gaining access to a device or application.

42
New cards

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

43
New cards

Symmetic Encryption

the same key is used to encode and decode

44
New cards

Public Key Encryption

uses two keys: a public key that everyone can have and a private key for only the recipient

45
New cards

cookie

a small text file that a web server stores on your computer

46
New cards

virus

A tiny, nonliving particle that invades and then reproduces inside a living cell.

47
New cards

phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

48
New cards

rogue access point

a wireless access point that gives unauthorized access to secure networks.