APCS Principles Vocab Review 2022

5.0(1)
studied byStudied by 465 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/92

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

93 Terms

1
New cards

Heuristic

a problem solving approach (algorithm) to find a satisfactory solution where finding an optimal or exact solution is impractical or impossible

2
New cards

Lossless Compression

a data compression algorithm that allows the original data to be perfectly reconstructed from the compressed data.

3
New cards

Image

A type of data used for graphics or pictures

4
New cards

metadata

is data that describes other data. For example, a digital image may include metadata that describe the size of the image, number of colors, or resolution.

5
New cards

Lossy Compression

a data compression method that uses inexact approximations, discarding some data to represent the content. Most commonly seen in image formats like .jpg.

6
New cards

Abstraction

Pulling out specific differences to make one solution work for multiple problems

7
New cards

Innovation

A novel or improved idea, device, product, etc, or the development thereof.

8
New cards

Binary

A way of representing information using only two options.

9
New cards

Bit

A contraction of "Binary Digit". A bit is the single unit of information in a computer, typically represented as a 0 or 1.

10
New cards

Bandwidth

Transmission capacity measure by bit rate

11
New cards

Bit rate

the number of bits that are conveyed or processed per unit of time. e.g. 8 bits/sec

12
New cards

Latency

Time it takes for a bit to travel from its sender to its receiver.

13
New cards

Protocol

A set of rules governing the exchange or transmission of data between devices.

14
New cards

ASCII

the universally recognized raw text format that any computer can understand

15
New cards

code

to write instructions for a computer.

16
New cards

IETF - Internet Engineering Task Force

develops and promotes voluntary Internet standards and protocols, in particular the standards that comprise the Internet protocol suite (TCP/IP).

17
New cards

Internet

A group of computers and servers that are connected to each other.

18
New cards

Net Neutrality

the principle that all Internet traffic should be treated equally by Internet Service Providers.

19
New cards

IP Address

A number assigned to any item that is connected to the Internet.

20
New cards

Packets

Small chunks of information that have been carefully formed from larger chunks of information.

21
New cards

TCP - Transmission Control Protocol

provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.

22
New cards

DNS

The service that translates URLs to IP addresses.

23
New cards

HTTP - HyperText Transfer Protocol

the protocol used for transmitting web pages over the Internet

24
New cards

URL

An easy-to-remember address for calling a web page (like www.code.org).

25
New cards

Algorithm

A precise sequence of instructions for processes that can be executed by a computer

26
New cards

Function

A piece of code that you can easily call over and over again (May also be referred to as a method or procedure)

27
New cards

API

a collection of commands made available to a programmer

28
New cards

Documentation

a description of the behavior of a command, function, library, API, etc.

29
New cards

Library

a collection of commands / functions, typically with a shared purpose

30
New cards

Parameter

An extra piece of information that you pass to the function to customize it for a specific need.

31
New cards

For Loop

A particular kind of looping construct provided in many languages. Typically, a for loop defines a counting variable that is checked and incremented on each iteration in order to loop a specific number of times.

32
New cards

Loop

The action of doing something over and over again.

33
New cards

Caesar Cipher

a technique for encryption that shifts the alphabet by some number of characters (an example of symmetric encryption)

34
New cards

Cipher

the generic term for a technique (or algorithm) that performs encryption

35
New cards

Cracking encryption

When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption.

36
New cards

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text

37
New cards

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

38
New cards

Random Substitution Cipher

an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet. (an example of symmetric encryption)

39
New cards

Computationally Hard:

a "hard' problem for a computer is one in which it cannot arrive at a solution in a reasonable amount of time.

40
New cards

asymmetric encryption

used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt.

41
New cards

modulo

a mathematical operation that returns the remainder after integer division. Example: 7 MOD 4 = 3

42
New cards

Private Key

In an asymmetric encryption scheme the decryption key is kept private and never shared, so only the intended recipient has the ability to decrypt a message that has been encrypted with a public key.

43
New cards

Public Key Encryption

Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private. (example of asymmetric encryption)

44
New cards

Event

An action that causes something to happen.

45
New cards

Event-driven program

a program designed to run blocks of code or functions in response to specified events (e.g. a mouse click)

46
New cards

User Interface

The visual elements of an program through which a user controls or communications the application. Often abbreviated UI.

47
New cards

Debugging

Finding and fixing problems in your algorithm or program.

48
New cards

Data Type

All values in a programming language have a "type" - such as a Number, Boolean, or String - that dictates how the computer will interpret it. For example 7+5 is interpreted differently from "7"+"5"

49
New cards

Expression

Any valid unit of code that resolves to a value.

50
New cards

Variable

A placeholder for a piece of information that can change.

51
New cards

Global Variable

A variable whose scope is "global" to the program, it can be used and updated by any part of the code. Its global scope is typically derived from the variable being declared (created) outside of any function, object, or method.

52
New cards

If-Statement

The common programming structure that implements "conditional statements".

53
New cards

Local Variable

A variable with local scope is one that can only be seen, used and updated by code within the same scope. Typically this means the variable was declared (created) inside a function -- includes function parameter variables.

54
New cards

Variable Scope

dictates what portions of the code can "see" or use a variable, typically derived from where the variable was first created. (See Global v. Local)

55
New cards

Concatentate

to link together or join. Typically used when joining together text Strings in programming (e.g. "Hello, "+name)

56
New cards

String

Any sequence of characters between quotation marks (ex: "hello", "42", "this is a string!").

57
New cards

Conditionals

Statements that only run under certain conditions

58
New cards

Selection

A generic term for a type of programming statement (usually an if-statement) that uses a Boolean condition to determine, or select, whether or not to run a certain block of statements.

59
New cards

Boolean

A single value of either TRUE or FALSE

60
New cards

Boolean Expression

in programming, an expression that evaluates to True or False.

61
New cards

Iterate

To repeat in order to achieve, or get closer to, a desired goal.

62
New cards

while loop

a programming construct used to repeat a set of commands (loop) as long as (while) a boolean condition is true

63
New cards

Models and Simulations

a program which replicates or mimics key features of a real world event in order to investigate its behavior without the cost, time, or danger of running an experiment in real life.

64
New cards

Array

A data structure in JavaScript or Java used to represent a list.

65
New cards

List

A generic term for a programming data structure that holds multiple items

66
New cards

for loop

A typical looping construct designed to make it easy to repeat a section of code using a counter variable. The for loop combines the creation of a variable, a boolean looping condition, and an update to the variable in one statement.

67
New cards

Return Value

A value sent back by a function to the place in the code where the function was called form - typically asking for value (e.g. getText(id)) or the result of a calculation or computation of some kind. Most programming languages have many built-in functions that return values, but you can also write your own.

68
New cards

Server

A computer that awaits and responds to requests for data
Example: a DNS server awaits and responds to requests for URLs to be translated to IP addresses.

69
New cards

virus

a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

70
New cards

phishing

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

71
New cards

DDos - short for Distributed Denial of Service

attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service attack.

72
New cards

byte

8 bits

73
New cards

overflow

error that results when the number of bits is not enough to hold the number or result of a calculation, like a car's odometer "rolling over"

74
New cards

round-off error

error that results when the number of bits is not enough to represent the actual number, like 3 digits to represent π as 3.14

75
New cards

sequencing

code flows line by line, one after another, like a recipe

76
New cards

reasonable time

polynomial in the number of steps an algorithm takes in the worst case based on the input size

77
New cards

not reasonable time

Usually exponential in the number of steps, like doubling every time your input grows by one

78
New cards

undecidable

A problem that is so difficult, we can't ever create an algorithm that would be able to answer yes or no for all inputs, like determining if a user's program run on some input would always stop and not run forever

79
New cards

Crowdsourcing

Asking lots of users online to help with something, like funding a project, or running SETI@Home to help look for extraterrestrial signals

80
New cards

Creative Commons

An alternative to copyright that allows people to declare how they want their artistic creations to be shared, remixed, used in noncommercial contexts, and how the policy should propagate with remixed versions. Helps legally share your
knowledge and creativity to build
a more equitable, accessible, and
innovative world

81
New cards

Open Access

A policy that allows people to have read access to things, e.g., libraries or online data

82
New cards

Spamming

Email or a SMS message that has
many copies floating around the
internet forcing people who would
not typically want to receive it get
it in their inbox.

83
New cards

Phishing

Email messages that appear to
come from legitimate sources to
get private information

84
New cards

Cloud Computing

Storing data over the Internet -
rather than on the local computer
hard disk is cloud computing.

85
New cards

Digital Millennium
Copyright Act (DMCA)

Copyright laws related to digital
media and emerging information
technologies that are occurring
because of the Internet

86
New cards

Citizen Science

The involvement of the public in
scientific research - whether
community-driven research or
global investigations. (Example: asking everyone around the world to count the butterflies they see one day

87
New cards

Machine Learning

A method of pattern recognition
using programming to teach a
program to recognize or react to
patterns

88
New cards

Digital Divide
or
Digital Split

A social issue referring to the
differing amount of information
between those who have access
to the Internet (especially
broadband access) and those
who do not have access.

89
New cards

Sequential Computing

The computer executes each operation of the program in order, one at a time

90
New cards

Parallel Computing

The process of breaking down larger problems into smaller, independent, often similar parts that can be executed simultaneously by multiple processors communicating via shared memory

91
New cards

Distributed computing

A system with multiple components located on different machines that communicate and coordinate actions in order to appear as a single coherent system to the end-user

92
New cards

Rogue Access Point

A rogue access point (rogue AP) is any wireless access point that has been installed on a network's wired infrastructure without the consent of the network's administrator or owner, thereby providing unauthorized wireless access to the network's wired infrastructure.

93
New cards

Speedup

The speedup of a parallel solution is measured in the time it took to complete the task sequentially divided by the time it took to complete the task when done in parallel.