ap computer science principle

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/104

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

105 Terms

1
New cards

Algorithm

A step-by-step set of instructions used to solve a problem or complete a task.

2
New cards

Variables

A named container used to store information that can change while a program runs.

3
New cards

Collaboration

Working with others to solve problems, develop code, or design computing solutions.

4
New cards

Driver

In pair programming, the person who types the code and controls the computer.

5
New cards

Navigator

In pair programming, the person who reviews the code, offers ideas, and helps catch mistakes.

6
New cards

Conditionals

Statements that run certain code only when a specific condition is true (e.g., if statements).

7
New cards

Sprite

A character or object in a visual programming environment that can be moved or controlled.

8
New cards

Broadcast

A way to send a message in a program to trigger events or actions (used in environments like Scratch).

9
New cards

Command

An instruction for the computer to perform a specific task.

10
New cards

Event/Control

An action that causes something to happen in a program, like clicking a mouse or pressing a key.

11
New cards

Input

Data or signals received by a computer program (e.g., user typing, mouse clicks).

12
New cards

Output

Information a program gives back to the user (e.g., text on screen, sounds, images).

13
New cards

Pseudocode

A simplified way to describe algorithms using plain language or code-like statements, without specific syntax.

14
New cards

Digital Divide

The gap between people who have access to computers and the internet and those who do not.

15
New cards

Sequence

The specific order in which instructions or steps are carried out in a program.

16
New cards

Local Variable

A variable that is only accessible within the part of the program where it was created (e.g., inside a function).

17
New cards

Global Variable

A variable that can be used throughout the entire program.

18
New cards

Initializing

Setting a variable to a starting value when it is first created.

19
New cards

Data Types

Different kinds of data a program can use, like numbers (integers), text (strings), or true/false values (Booleans).

20
New cards

Lists

An ordered collection of items (elements) that can be accessed by their position (index).

21
New cards

Strings

A sequence of characters (like letters, numbers, or symbols) treated as text.

22
New cards

Prototype

A basic or early version of a program or function used to test ideas or demonstrate features.

23
New cards

Expression

A combination of values, variables, and operators that is evaluated to produce a result.

24
New cards

Parameter

A variable used in a procedure or function definition that acts as a placeholder for values passed into it.

25
New cards

Argument

The actual value that is passed into a function or procedure when it is called.

26
New cards

Iteration

Repeating a set of instructions (looping) until a condition is met.

27
New cards

Procedure

A named block of code designed to perform a specific task; also called a function or method.

28
New cards

Boolean

A data type that represents only two values: true or false.

29
New cards

Abstraction

Simplifying complex problems by hiding unnecessary details to focus on important parts.

30
New cards

Infinite Loop

A loop that never ends because the stopping condition is never met.

31
New cards

Modulus

An operator that returns the remainder after division (e.g., 7 % 3 is 1).

32
New cards

Code Segment

A portion or snippet of code that performs a specific task or function.

33
New cards

Operators

Symbols used to perform operations on values or variables (e.g., +, -, *, /, %).

34
New cards

Readability

How easy it is to read and understand the code, often improved by good naming, spacing, and comments.

35
New cards

Traverse

To go through each item in a list, usually with a loop.

36
New cards

Index

The position of an item in a list or string, usually starting at 0.

37
New cards

Element

An individual item or value within a list.

38
New cards

Sublist

A smaller list that is part of a larger list.

39
New cards

Data Abstraction

Managing complexity by organizing and working with data in a simplified way (e.g., using lists instead of individual variables).

40
New cards

Selection

Using conditionals to choose which set of instructions to run (e.g., if, else).

41
New cards

Conditional

A statement that runs code only if a certain condition is true (e.g., if x > 10).

42
New cards

Nested Conditional

A conditional statement inside another conditional statement.

43
New cards

Return Statement

A command in a procedure that sends a value back to where the procedure was called.

44
New cards

Computer Virus

A type of malicious software that can replicate itself and spread to other computers, often damaging files or systems.

45
New cards

Cybersecurity

The practice of protecting computers, networks, and data from unauthorized access, attacks, or damage.

46
New cards

Keylogging

A type of spyware that records every key pressed on a keyboard to steal sensitive information like passwords.

47
New cards

Malware

Short for "malicious software," it includes viruses, spyware, worms, and other harmful programs designed to damage or control systems.

48
New cards

Personally Identifiable Information (PII)

Any data that can be used to identify a specific person, such as name, address, phone number, or Social Security number.

49
New cards

Phishing

A cyber attack where fake emails or websites trick people into giving away personal or sensitive information.

50
New cards

Targeted Marketing

Using personal data, such as browsing history or online behavior, to send customized advertisements to users.

51
New cards

Debugging

The process of finding and fixing errors or bugs in a computer program.

52
New cards

DDoS (Distributed Denial of Service)

An attack where many computers flood a website or server with traffic, making it slow or unavailable.

53
New cards

Rogue Access Point

An unauthorized Wi-Fi hotspot set up to trick users into connecting, often used to steal information.

54
New cards

Syntax Error

An error in the code that breaks the rules of the programming language (e.g., missing punctuation or misspelled words).

55
New cards

Logic Error

An error where the code runs but produces the wrong result due to incorrect reasoning or logic.

56
New cards

Run Time Error

An error that occurs while the program is running, often causing it to crash (e.g., dividing by zero).

57
New cards

Index Out of Bounds

An error that happens when a program tries to access a list position that doesn’t exist (e.g., index 5 in a 3-element list).

58
New cards

Rounding Error

A small mistake that occurs when numbers are rounded during calculations, especially with decimals.

59
New cards

Privacy

The right to control your personal information and decide who has access to it.

60
New cards

Security

The measures taken to protect digital data and systems from unauthorized access or attacks.

61
New cards

Bias

A systematic error in data or algorithms that unfairly favors certain outcomes or groups.

62
New cards

Classifying Data

Sorting data into categories based on shared characteristics or features.

63
New cards

Cleaning Data

Fixing or removing incorrect, duplicate, or incomplete data to improve quality and accuracy.

64
New cards

Filtering Data

Selecting only the data that meets certain conditions or criteria.

65
New cards

Patterns in Data

Trends or repeated sequences found in data that can help make predictions or inform decisions.

66
New cards

Scalability

A system's ability to handle growing amounts of work or data without losing performance.

67
New cards

Internet

A global network that connects millions of computers and devices, enabling communication and data sharing.

68
New cards

Computer System

A combination of hardware and software working together to perform computing tasks.

69
New cards

Computer Network

A group of connected computers that can share resources and communicate.

70
New cards

Computing Device

Any electronic device that can run programs and process data, such as phones, laptops, or tablets.

71
New cards

Bandwidth

The maximum amount of data that can be transmitted over a network connection in a given time.

72
New cards

Distributed Computing System

A system where multiple computers work together on different parts of a larger task.

73
New cards

Fault Tolerance

A system’s ability to keep working even if some parts fail.

74
New cards

IP Address

A unique number assigned to each device on a network to identify and locate it.

75
New cards

TCP (Transmission Control Protocol)

A protocol that ensures data is sent and received accurately over the internet.

76
New cards

Packets

Small chunks of data sent across a network; the internet breaks files into packets for efficient transfer.

77
New cards

Parallel Computing System

A system where multiple processors work on parts of a task at the same time to solve problems faster.

78
New cards

Protocols

Rules that define how data is sent, received, and interpreted over a network.

79
New cards

Redundancy

Having extra components or pathways in a system to ensure it keeps working if something fails.

80
New cards

Router

A device that directs data packets between different networks, like from your home to the internet.

81
New cards

Sequential Computing System

A system where tasks are completed one after another, step by step.

82
New cards

World Wide Web (WWW)

A collection of web pages and resources accessed through the internet using browsers.

83
New cards

Encryption

Converting data into a code to prevent unauthorized access.

84
New cards

Decryption

Converting encrypted data back into its original, readable form.

85
New cards

Certificate Authority

A trusted organization that issues digital certificates to verify website identities for secure connections.

86
New cards

Public Key Encryption

A method of encrypting data using two keys: a public key to encrypt and a private key to decrypt.

87
New cards

Multifactor Authentication

A security method that requires two or more forms of identification to access a system (e.g., password + code sent to phone).

88
New cards

Authentication

Verifying a user's identity before granting access to a system.

89
New cards

Asymmetric Ciphers

Encryption that uses two different keys: one for encrypting and a different one for decrypting (used in public key encryption).

90
New cards

Symmetric Key Encryption

Encryption that uses the same key for both encrypting and decrypting data.

91
New cards

Crowdsourcing

Getting input or ideas from a large group of people, often online, to solve a problem or collect data.

92
New cards

Simulation

A computer program that imitates a real-world process or system to study its behavior under different conditions.

93
New cards

Undecidable Problem

A problem for which no algorithm can be created that always leads to a correct yes-or-no answer.

94
New cards

Lossy

A type of data compression that removes some data permanently to reduce file size (e.g., JPEG images, MP3 audio).

95
New cards

Lossless

A type of data compression that reduces file size without losing any information (e.g., PNG images, ZIP files).

96
New cards

Analog

Continuous data that can take on any value within a range (e.g., sound waves, light levels).

97
New cards

Bits

The smallest unit of data in computing, short for “binary digit,” which can be either 0 or 1.

98
New cards

Bytes

A group of 8 bits, often used to represent a single character (e.g., a letter or symbol).

99
New cards

Metadata

Data about data — for example, the author and date of a document or the dimensions of an image.

100
New cards

Overflow Errors

Errors that occur when a number is too large to be stored in the available space (like adding beyond the limit of bits).