APCSP vocab

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/104

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

105 Terms

1
New cards

The Internet

A group of computers and servers that are connected.

2
New cards

Prototype

an original model on which later versions are patterned

3
New cards

Innovation

(n.) something new, a change; the act of introducing a new method, idea, device, etc.

4
New cards

Binary

A way of representing information using only two options.

5
New cards

Bit

A contraction of "Binary Digit". A bit is the single unit of information in a computer, typically represented as a 0 or 1.

6
New cards

Bandwith

Transmission capacity measure by bit rate

7
New cards

Bit rate

(sometimes written bitrate) the number of bits that are conveyed or processed per unit of time. e.g. 8 bits/sec.

8
New cards

Latency

Time it takes for a bit to travel from its sender to its receiver.

9
New cards

Protocol

A set of rules governing the exchange or transmission of data between devices.

10
New cards

Abstraction

a simplified representation of something more complex. Abstractions allow you to hide details to help you manage complexity, focus on relevant concepts, and reason about problems at a higher level.

11
New cards

ASCII (American Standard Code for Information Interchange)

the universally recognized raw text format that any computer can understand

12
New cards

IP Adress (Internet Protocol)

The unique number assigned to each device on the Internet.

13
New cards

Packets

Small chunks of information that have been carefully formed from larger chunks of information.

14
New cards

Network Redundancy

having multiple backups to ensure reliability during cases of high usage or failure

15
New cards

Router

A type of computer that forwards data across a network

16
New cards

DNS (Domain Name System)

this system translates domain names (like example.com)

17
New cards

IETF (Internet Engineering Task Force)

develops and promotes voluntary Internet standards and protocols, in particular the standards that comprise the Internet protocol suite (TCP/IP).

18
New cards

Request for Comments

documents how standards and protocols are defined -- Published for all to see

19
New cards

HTTP

HyperText Transfer Protocol - the protocol used for transmitting web pages over the Internet

20
New cards

TCP (Transmission Control Protocol)

provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.

21
New cards

URL (Uniform Resource Locator)

An easy-to-remember address for calling a web page (like www.code.org).

22
New cards

SSL (Secure Sockets Layer)

A method of encrypting data to provide security for communications over networks such as the Internet. TLS (Transport Layer Security) is a later version on SSL

23
New cards

TLS (Transport Layer Security)

A cryptographic protocol that provides end-to-end communication security over networks and is widely used for internet connections and online transactions. IETF standard to prevent tampering and message forgery and the successor to SSL.

24
New cards

SMTP (Simple Mail Transfer Protocol)

high-level protocol for formatting and sending email messages between mail servers.

25
New cards

POP (Post Office Protocol)

IMAP (Internet Message Access Protocol) are used to retrieve emails on the server's side

26
New cards

HTML (Hypertext Markup Language)

a computer code used to tell a web page how to look.

27
New cards

Net Neutrality

the principle that all Internet traffic should be treated equally by Internet Service Providers.

28
New cards

Heuristic

a problem solving approach (algorithm) to find a satisfactory solution where finding an optimal or exact solution is impractical or impossible.

29
New cards

Losless Compression

a data compression algorithm that allows the original data to be perfectly reconstructed from the compressed data.

30
New cards

Lossy Compression

(or irreversible compression) a data compression method that uses inexact approximations, discarding some data to represent the content. Most commonly seen in image formats like .jpg.

31
New cards

Image

A type of data used for graphics or pictures.

32
New cards

Metadata

data about data

33
New cards

Pixel

Short for "picture element" it is the fundamental unit of a digital image, typically a tiny square or dot which contains a single point of color of a larger image.

34
New cards

Hexadecimal

A base-16 number system that uses sixteen distinct symbols 0-9 and A-F to represent numbers from 0 to 15.

35
New cards

RGB

the RGB color model uses varying intensities of (R)ed, (G)reen, and (B)lue light are added together in to reproduce a broad array of colors.

36
New cards

Byte

8 bits

37
New cards

File extension

a group of letters occurring after a period in a file name, indicating the format of the file.

38
New cards

Abstraction

a simplified representation of something more complex. Abstractions allow you to hide details to help you manage complexity, focus on relevant concepts, and reason about problems at a higher level.

39
New cards

Encoding

the processing of information into the memory system

40
New cards

Decoding

interpreting and trying to make sense of the message

41
New cards

Resolution

the dimensions by which you can measure how many pixels are on the screen

42
New cards

Density

the number of pixels in a certain space

43
New cards

Zip Folders

a computer file whose contents of one or more files are compressed for storage or transmission

44
New cards

Image file

a file that contains graphic data

45
New cards

Text file

file that contains text

46
New cards

Favicon

A small, customized icon shown in the address bar next to the URL or in the Favorites menu when a site is bookmarked.

47
New cards

Algorithm

A precise sequence of instructions for processes that can be executed by a computer

48
New cards

Low level programming language

A programming language that captures only the most primitive operations available to a machine. Anything that a computer can do can be represented with combinations of low level commands.

49
New cards

High level programming language

A programming language with many commands and features designed to make common tasks easier to program. Any high level functionality is encapsulated as combinations of low level commands.

50
New cards

Selection

A generic term for a type of programming statement (usually an if-statement) that uses a Boolean condition to determine, or select, whether or not to run a certain block of statements.

51
New cards

Sequencing

Putting commands in correct order so computers can read the commands.

52
New cards

Function

a named group of programming instructions. Also referred to as a "procedure".

53
New cards

API (Application Programming Interface)

a collection of commands made available to a programmer

54
New cards

Documentation

a description of the behavior of a command, function, library, API, etc.

55
New cards

Library

a collection of commands / functions, typically with a shared purpose

56
New cards

Parameter

An extra piece of information that you pass to the function to customize it for a specific need.

57
New cards

For Loop

A particular kind of looping construct provided in many languages. Typically, a for loop defines a counting variable that is checked and incremented on each iteration in order to loop a specific number of times.

58
New cards

Loop

a programming construct that repeats a group of commands.

59
New cards

Programming Language

a coding language used to dictate specific instructions to a computer

60
New cards

Prgramming environement

a tool where you write and run computer programs

61
New cards

Debugging

Finding and fixing problems in your algorithm or program.

62
New cards

Top- Down Design

a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.

63
New cards

Camelcase

multi-word function names are made a single word which begins in lowercase and uses uppercase letters to indicate the start of a new word

64
New cards

Iterate

To repeat in order to achieve, or get closer to, a desired goal.

65
New cards

Turtle Programming

a classic method for learning programming with commands to control movement and drawing of an on-screen robot called a "turtle". The turtle hearkens back to early implementations in which children programmed a physical robot whose dome-like shape was reminiscent of a turtle.

66
New cards

Efficiency

achieving maximum productivity with minimum wasted effort or expense

67
New cards

Abstraction

a simplified representation of something more complex. Abstractions allow you to hide details to help you manage complexity, focus on relevant concepts, and reason about problems at a higher level.

68
New cards

Iteration

the repetition of a process or utterance. (loop)

69
New cards

Caesar Cipher

a technique for encryption that shifts the alphabet by some number of characters

70
New cards

Cipher

the generic term for a technique (or algorithm) that performs encryption

71
New cards

Cracking encryption

When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption.

72
New cards

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text

73
New cards

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

74
New cards

Asymmetric Encryption

used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt.

75
New cards

Modulo

a mathematical operation that returns the remainder after integer division. Example: 7 MOD 4 = 3

76
New cards

Private Key

In an asymmetric encryption scheme the decryption key is kept private and never shared, so only the intended recipient has the ability to decrypt a message that has been encrypted with a public key.

77
New cards

Public Key Encryption

Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.

78
New cards

Antivirus Software

usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them.

79
New cards

DDoS Attack

Distributed Denial of Service Attack. Typically a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed.

80
New cards

Phishing

a thief trying to trick u into sending them sensitive information

81
New cards

Virus

a program that runs on a computer to do something the owner of the computer does not intend.

82
New cards

Digital Divide

the gulf between those who have ready access to computers and the Internet, and those who do not.

83
New cards

Malware

software that is intended to damage or disable computers and computer systems.

84
New cards

Callback function

a function specified as part of an event listener; it is written by the programmer but called by the system as the result of an event trigger.

85
New cards

Event

An action that causes something to happen.

86
New cards

Event Driven Program

a program designed to run blocks of code or functions in response to specified events (e.g. a mouse click)

87
New cards

Event Handling

an overarching term for the coding tasks involved in making a program respond to events by triggering functions.

88
New cards

Event Listener

a command that can be set up to trigger a function when a particular type of event occurs on a particular UI element.

89
New cards

UI elements

on-screen objects, like buttons, images, text boxes, pull down menus, screens and so on.

90
New cards

User Interface (UI)

The visual elements of a program through which a user controls or communicates with the application.

91
New cards

Debugging

Finding and fixing problems in your algorithm or program.

92
New cards

Data type

All values in a programming language have a "type" - such as a Number, Boolean, or String - that dictates how the computer will interpret it. For example 7+5 is interpreted differently from "7"+"5"

93
New cards

Expression

Any valid unit of code that resolves to a value.

94
New cards

Variable

A placeholder for a piece of information that can change.

95
New cards

Equality Operator

Is used for comparing two values, and returns a Boolean (true/false). Avoid confusion with the assignment operator "="; sometimes read "equal equal" (==)

96
New cards

Global Variable

A variable whose scope is "global" to the program, it can be used and updated by any part of the code. Its global scope is typically derived from the variable being declared (created) outside of any function, object, or method.

97
New cards

If statement

The common programming structure that implements "conditional statements".

98
New cards

Local Variable

A variable with local scope is one that can only be seen, used and updated by code within the same scope. Typically this means the variable was declared (created) inside a function -- includes function parameter variables.

99
New cards

Variable Scope

dictates what portions of the code can "see" or use a variable, typically derived from where the variable was first created. (See Global v. Local)

100
New cards

Concatenate

to link together or join. Typically used when joining together text Strings in programming (e.g. "Hello, "+name)