AP CompSci Vocab

studied byStudied by 33 people
5.0(1)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 47

flashcard set

Earn XP

48 Terms

1
syntax error
a mistake in the program where the rules of the programming language are not followed therefore a syntax error is printed.
New cards
2
logic error
a mistake in the algorithm or program that causes it to behave incorrectly or unexpectedly.
New cards
3
run-time error
A mistake in a program that happens only when the program is actually run, such as a program attempting to access memory that does not exist.
New cards
4
overflow error
Error from attempting to represent a number that is too large.
New cards
5
bit
binary digit; 0 or 1
New cards
6
byte
a group of 8 bits
New cards
7
roundoff
Error that results when the number of bits is not enough to represent the number with full precision
New cards
8
analog data
A continuous representation of data
New cards
9
lossless compression
a data compression algorithm that allows the original data to be perfectly reconstructed from the compressed data.
New cards
10
lossy compression
data compression techniques in which some amount of data is lost. This technique attempts to eliminate redundant information.
New cards
11
metadata
data that describes data
New cards
12
Sequencing
Putting commands in correct order so computers can read the commands.
New cards
13
Selection
the process of choosing which sensory information to focus on
New cards
14
Iteration
repetition
New cards
15
linear serach
checking each element of a list until the desired value is found or the whole list is checked
New cards
16
Binary Search
a search algorithm that starts at the middle of a sorted set of numbers and removes half of the data; this process repeats until the desired value is found or all elements have been eliminated.
New cards
17
reasonable time
polynomial in the number of steps an algorithm takes in the worst case based on the input size
New cards
18
heuristic
a simple thinking strategy that often allows us to make judgments and solve problems efficiently; usually speedier but also more error-prone than algorithms
New cards
19
library
a collection of commands / functions, typically with a shared purpose
New cards
20
API
Application Programming Interface, a library of procedures and a description of how to call each procedure.
New cards
21
Modularity
The subdivision of a computer program into separate subprograms
New cards
22
traversal
the process of accessing each item in a list one at a time
New cards
23
computing device
a physical device that can run a program
New cards
24
Bandwidth
The maximum amount of data that can pass from one point to another in a unit of time
New cards
25
protocol
A set of rules governing the exchange or transmission of data between devices.
New cards
26
Scalability
Refers to how well a system can adapt to increased demands
New cards
27
IP
(Internet Protocol) Routing protocol that is in charge of forwarding packets on the Internet.
New cards
28
TCP
(Transmission Control Protocol) provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.
New cards
29
UDP
User Datagram Protocol. Used instead of TCP when guaranteed delivery of each packet is not necessary. UDP uses a best-effort delivery mechanism.
New cards
30
World Wide Web
a system of linked pages, programs, and files
New cards
31
HTTP
HyperText Transfer Protocol - the protocol used for transmitting web pages over the Internet
New cards
32
Parallel Computing
a model in which programs are broken into small pieces, some of which are run simultaneously
New cards
33
speedup
the time used to complete a task sequentially divided by the time to complete a task in parallel
New cards
34
distributed computing
processes and manages algorithms across many machines in a computing environment
New cards
35
digital divide
A worldwide gap giving advantage to those with access to technology
New cards
36
crowdsourcing
using consumers to develop and market products
New cards
37
citizen science
scientific research by amateur scientists
New cards
38
Creative Commons
A kind of copyright that makes it easier for people to copy, share, and build on your creative work, as long as they give you credit for it.
New cards
39
Open Access
A policy that allows people to have read access to things, e.g., libraries or online data
New cards
40
PII
Personally Identifiable Information.
Information about individuals that can be used to trace a person's identity, such as a full name, birthdate, biometric data, and identifying numbers such as a Social Security number
New cards
41
MFA
Multi-factor authentication (MFA) is a security control that requires users to verify their identities by providing multiple pieces of evidence before gaining access to a device or application.
New cards
42
Encryption
a process of encoding messages to keep them secret, so only "authorized" parties can read it.
New cards
43
Symmetic Encryption
the same key is used to encode and decode
New cards
44
Public Key Encryption
uses two keys: a public key that everyone can have and a private key for only the recipient
New cards
45
cookie
a small text file that a web server stores on your computer
New cards
46
virus
A tiny, nonliving particle that invades and then reproduces inside a living cell.
New cards
47
phishing
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
New cards
48
rogue access point
a wireless access point that gives unauthorized access to secure networks.
New cards
robot