🔧
1. The Internet & Networking
Internet: A global network of interconnected computers that communicate using standardized protocols.
IP Address: A unique identifier for a device on the Internet.
IPv4/IPv6: Versions of IP addressing (IPv4 is 32-bit; IPv6 is 128-bit).
DNS (Domain Name System): Translates domain names (like www.google.com) into IP addresses.
TCP (Transmission Control Protocol): Ensures reliable, ordered, and error-checked delivery of data.
UDP (User Datagram Protocol): Sends data faster but without error checking (used in live streaming, gaming).
HTTP/HTTPS: Protocols used for accessing websites (HTTPS is secure).
Packets: Small chunks of data sent across networks.
Redundancy: Having multiple pathways to increase reliability.
Fault Tolerance: Ability of a system to continue working even if parts fail.
Bandwidth: Maximum amount of data that can be transmitted over a network.
Latency: Delay in transmitting data over a network.
👨💻
2. Programming & Algorithms
Algorithm: A finite set of steps for solving a problem.
Sequencing: The specific order in which instructions are executed.
Selection: Using if statements to make decisions.
Iteration: Repeating steps using loops (for, while).
Boolean: A data type with only two values: true or false.
Variable: A name used to store data.
List (or Array): An ordered collection of elements.
Procedure (Function): A named set of instructions that performs a specific task.
Parameter: Input to a procedure or function.
Return Value: The result produced by a function.
Modularity: Designing a system divided into separate components.
Abstraction: Hiding complexity by using simple representations.
🧠
3. Data & Information
Binary: Base-2 number system used in computers (0s and 1s).
Bit: Smallest unit of data in computing.
Byte: 8 bits.
Overflow Error: When a calculation exceeds the maximum value a system can represent.
Round-off Error: Error caused by imprecise representation of real numbers.
Lossless Compression: Reduces file size without losing data (e.g., PNG).
Lossy Compression: Reduces file size by removing some data (e.g., JPEG).
Metadata: Data about data (e.g., image dimensions, author).
Encryption: Scrambling data to protect it.
Decryption: Unscrambling encrypted data.
Public Key Encryption: Uses one public key to encrypt, and a private key to decrypt.
🔐
4. Cybersecurity
Phishing: Fraudulent attempts to obtain sensitive information.
Malware: Malicious software (viruses, worms, spyware).
Firewall: Security system that monitors and controls network traffic.
Authentication: Verifying identity (e.g., passwords, biometrics).
Symmetric Encryption: Uses the same key to encrypt and decrypt.
Asymmetric Encryption: Uses a public and private key pair.
💻
5. Programming Structures & Data Abstractions
Debugging: Finding and fixing errors in code.
Syntax Error: Mistake in the structure of code.
Logic Error: Code runs, but the result is incorrect.
Simulations: Programs that mimic real-world processes.
Events: Actions like mouse clicks or keystrokes that trigger code.
Event-driven programming: Code that runs in response to events.
🧑🤝🧑
6. Impact of Computing
Digital Divide: The gap between those with and without access to computing.
Crowdsourcing: Using contributions from a large group of people online.
Citizen Science: Public participation in scientific research using technology.
Open Source: Software with publicly available source code.
Intellectual Property: Creations of the mind that are legally protected.
Creative Commons: Licensing that allows creators to share their work under specific conditions.
🧪
7. AP CSP Create Performance Task (PT) Vocab
Input: Data entered into a program (e.g., user clicks, keyboard).
Output: Data sent from a program to the user (e.g., images, text).
Program Purpose: The intended goal or function of the program.
Data Abstraction: Using data structures (like lists) to manage complexity.
Procedural Abstraction: Using functions to reduce complexity.
Algorithm Implementation: Writing code that uses sequencing, selection, and iteration.
Testing: Checking the program for expected behavior and errors.