APCSP EXAM VOCAB STUDY TOOL

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/161

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

162 Terms

1
New cards

.bmp

(bitmap image file or bitmap) is a raster graphics image file format used to store digital images.

2
New cards

.gif

(acronym for Graphics Interchange Format) a bitmap image format which uses the LZW lossless data compression technique to reduce the file size without degrading the visual quality. Supports 8 bits per pixel for each image and animations.

3
New cards

.jpg or .jpeg

(acronym for Joint Photographic Experts Group), a commonly used lossy compression format for digital images, particularly for those images produced by digital photography. The format supports adjustable degrees of compression.

4
New cards

.mp3

an audio coding format for digital audio which uses a form of lossy data compression which works by reducing (or approximating)

5
New cards

.png

(Portable Network Graphics) a raster graphics file format that supports lossless data compression.

6
New cards

.txt

a computer format that is structured as a sequence of lines of electronic text.

7
New cards

.wav

(Waveform Audio File Format) an audio coding format standard for storing an audio bitstream of uncompressed audio data.

8
New cards

.zip

an archive file format that supports lossless data compression; may contain one or more files or directories.

9
New cards

Abstraction

A simplified and general representation of a complex object or process. Help manage the complexity of a program by reducing lines of code and improving readability.

10
New cards

Adware

A form of spyware. Collects information about the user or user activities in order to display advertisements in a web browser.

11
New cards

Algorithm

A set of precise instructions for solving a problem.

12
New cards

Application

A complete and self-contained program that helps the user accomplish a specific task.

13
New cards

Arithmetic overflow (Stack Overflow)

An attempt to represent an integer that exceeds the maximum allowable value.

14
New cards

Artificial Intelligence

A branch of computer science with the focus on how to endow computers with capabilities of human intelligence. Can be seen as an attempt to model aspects of human thought on computers

15
New cards

ASCII

An acronym for the American Standard Code for Information Interchange; ASCII is an international standard for representing textual information in the majority of computers.

16
New cards

Asymmetric encryption

used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt.

17
New cards

Bandwidth

Maximum transmission capacity of the device expressed typically in metric multiples of bits per second. Measures how much data you can send in a given amount of time.

18
New cards

Benchmarking

Running a program on many data sets to be sure its performance falls within required limits; timing the same algorithm on two different machines.

19
New cards

Big Data

a broad term for datasets so large or complex that traditional data processing applications are inadequate.

20
New cards

Binary

A way of representing information using only two options.

21
New cards

Binary Number System

A base-2 positional numbering system, using 1's and 0's.

22
New cards

Binary question

A question where there are only two possible answers

23
New cards

Bit

A contraction of "Binary Digits". A bit is the single unit of information in a computer, typically represented as 0 or 1.

24
New cards

Bit Rate

The number of bits that are conveyed or processed per unit of time. EX: 8bits/per second.

25
New cards

Boolean expression

An expression that can evaluate only to true or false.

26
New cards

Boolean logic

A branch of mathematics which operates on the values true and false.

27
New cards

Bug

An error, flaw, mistake, failure, or fault in a computer program that prevents it from working as intended, or produces an incorrect result.

28
New cards

Byte

Technical term for 8 bits of data

29
New cards

Character

Any symbol that requires one byte of storage

30
New cards

Cipher

the generic term for a technique (or algorithm) that performs encryption

31
New cards

Client

A computer that requests data stored on a server.

32
New cards

Cloud Computing

Shared computing services provided on demand by computers accessed over the Internet. Benefits: collaboration and ease of access; Drawbacks: security concerns.

33
New cards

Compatible

Refers to the ability of one device or program to work with another device or program.

34
New cards

Compression ratio

Measures how much a compression scheme has reduced the storage requirements of the data.

35
New cards

Computational Artifact

an object created by a human being that involves the use of computation in some way, for example a mobile app or a web page.

36
New cards

Computational Science

The field of study concerned with constructing mathematical models and numerical solution techniques and using computers to analyze and solve scientific and engineering problems.

37
New cards

Computer Science

An academic field that studies the theoretical foundations of information and computation and their implementation and application in computer systems.

38
New cards

Concatentate

to link together or join. Typically used when joining together text Strings in programming (e.g. "Hello, "+name)

39
New cards

Conditional

Statements that run under only certain conditions

40
New cards

Control Structures

A block of programming that determines which part of the program is executed next. There are three types of structures: sequence, selection, and repetition.

41
New cards

Copyright

A set of exclusive rights regulating the use of a particular expression of an idea or information, including but not limited to art designs, computer software, books, documents etc.

42
New cards

Creative Commons

One of several public copyright licenses that enable the free distribution of an otherwise copyrighted work. A CC license is used when an author wants to give people the right to share, use, and build upon a work that they have created.

43
New cards

Crowdsourcing

Inviting broad communities of people - customers, employees, independent scientists and researchers, and even the public at large - into the new product innovation process. Gives access to diverse opinions and resources.

44
New cards

Cryptography

the art of protecting information by transforming it into an unreadable format, called cipher text

45
New cards

Cyber Security

Measures taken to protect a computer or computer system against unauthorized access or attack.

46
New cards

Cyberbullying

Humiliating, taunting, threatening or invading someone's privacy using the Internet, Web, or other type of electronic technology.

47
New cards

Data Compression

The process of reducing the number of bits required to represent a sound or image.

48
New cards

Data Type

(ex: Number, Boolean, or String) a value's property that dictates how the computer will interpret it. For example 7+5 is interpreted differently from "7"+"5"

49
New cards

DDoS

pertaining to or being an incident in which a network of computers floods an online resource with high levels of unwanted traffic so that it is inaccessible to legitimate service requests

50
New cards

Decimal

Traditional number system using digits 0-9.

51
New cards

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text

52
New cards

Digital Certificate

an electronic document used to prove ownership of a public key.

53
New cards

Digital Divide

the gulf between those who have ready access to computers and the Internet, and those who do not.

54
New cards

Divide-and-conquer

A program design strategy in which tasks are broken down into subtasks, which are broken down into sub-subtasks, and so on, until each piece is small enough to code comfortably. These pieces work together to accomplish the total job.

55
New cards

Domain Name

The part of the URL that identifies a particular web page.

56
New cards

Domain named system (DNS)

The internet's system for converting alphabetic names into numeric IP addresses.

57
New cards

Efficiency/Run Time

A measure of the number of steps per input size needed to complete an algorithm.

58
New cards

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

59
New cards

Event Driven Programming

a programming approach whereby the program's behavior is controlled by writing code that responds to various events that occur, such as Button clicks.

60
New cards

Expression

Any valid unit of code that resolves to a value.

61
New cards

External documentation

Any materials assembled to clarify the program's design and implementation.

62
New cards

External library

A well-written, efficient, and thoroughly tested code module that is separately compiled and then drawn on by any program that wishes to use its capabilities.

63
New cards

Fault-Tolerant

The ability to continue functioning even in the presence of the failure of one or more components.

64
New cards

Feasibility study

A step in the software development life cycle that evaluates a proposed project and compares the costs and benefits of various solutions.

65
New cards

Fiberoptics

Method of transmitting data that utilizes light

66
New cards

File extensions

the endings of file names that indicate to the computer the format for how the underlying bits are organized.

67
New cards

For Loop

A particular kind of looping construct provided in many languages. Typically, a for loop defines a counting variable that is checked and incremented on each iteration in order to loop a specific number of times.

68
New cards

Function

A piece of code that you can easily call over and over again.

69
New cards

Gate

An electronic device that operates on a collection of binary inputs to produce a binary output. Also called a logic gate.

70
New cards

Gigabyte (GB or Gig)

One billion bytes.

71
New cards

Global Variable

A variable whose scope is "global" to the program, it can be used and updated by any part of the code. Its global scope is typically derived from the variable being declared (created) outside of any function, object, or method.

72
New cards

Grayware

Refers to a malicious software or code that is considered to fall in the "grey area" between normal software and a virus. A term for which all other malicious or annoying software such as adware, spyware, trackware, and other malicious code and malicious shareware fall under.

73
New cards

Hacker

A person who uses technology to gain unauthorized access to data.

74
New cards

Hacktivism

Hacking that is intended as political activism.

75
New cards

Hardware

The physical components that make up a computer (mouse, monitor, hardrive, etc).

76
New cards

Hardware design

The process of designing the low level components of a computer, including arithmetic and control circuits

77
New cards

Heuristic

A problem-solving approach (algorithm) to find a satisfactory solution where finding an optimal or exact solution is impractical or impossible.

78
New cards

Hexadecimal Number System

A number system consisting of 16 distinct symbols — 0-9 and A-F — which can occur in each place value.

79
New cards

High-Level Programming Language

A programming language that is closer to human language and further from machine language. Contains high levels of abstraction. Examples: JavaScript, Java, FORTRAN

80
New cards

Host Computer

A centralized server that delivers specific services to other networked computers.

81
New cards

HTTPS

The secure protocol used by the world wide web. It describes how messages are formatted and interchanged, and how web servers respond to commands.

82
New cards

Hypertext Transfer Protocol (HTTP)

The protocol used by the world wide web. It describes how messages are formatted and interchanged, and how web servers respond to commands.

83
New cards

If Statement

The common programming structure that implements "conditional statements".

84
New cards

Infinite loop

The repetitive execution of a block of operations that will never end. This is a fatal error when it occurs in an algorithm.

85
New cards

Innovation

A novel or improved idea, device, product, etc. or the development thereof

86
New cards

Input

An operation that causes data values from the outside world to be brought into the algorithm.

87
New cards

Integrated development environment (IDE)

A collection of programs that support software development, such as debuggers, editors, toolkits, and libraries, that lets programmers perform several tasks within the shell of a single application.

88
New cards

Intellectual Property

refers to any property that is created using original thought. Traditional intellectual property include patents, copyrights, and trademarks.

89
New cards

Internal documentation

Documentation that is part of the program code itself.

90
New cards

Internet

A tangible physical system that is made to move information

91
New cards

Internet Censorship

The control or suppression of what can be accessed, published, or viewed on the Internet. It may be carried out by governments or by private organizations at the behest of government, regulators, or on their own initiative.

92
New cards

Internet Engineering Task Force (IETF)

A group of volunteers, private citizens, government officials, etc. who promote internet standards

93
New cards

IP Address

A unique string of numbers separated by periods assigned to any item that is connected to the internet.

94
New cards

Iteration

A process that repeats a series of steps over and over until the desired outcome is obtained.

95
New cards

Iterative Innovation

Incremental or small improvement to an item

96
New cards

Kilobyte (KB)

1024 bytes (or about one thousand bytes)

97
New cards

Latency

The amount of time it takes for a bit to travel from sender to receiver. Measured in time units

98
New cards

Local Variable

A variable with local scope is one that can only be seen, used and updated by code within the same scope. Typically this means the variable was declared (created) inside a function; includes function parameter variables.

99
New cards

Logic error

An error in the logic that an algorithm used to solve a problem.

100
New cards

Loop

The action of doing something over and over again.