Print Options

Font size:

← Back to notecard set|Easy Notecards home page

To print: Ctrl+PPrint as notecards

AP CSP Vocabulary

1.

Bit

A contraction of "Binary Digit"; the single unit of information in a computer, typically represented as a 0 or 1

2.

Binary

A way of representing information using only two options

3.

Byte

8 bits

4.

Creative Commons

A collection of public copyright licenses that enable the free distribution of an otherwise copyrighted work, used when an author wants to give people the right to share, use, and build upon a work that they have created

5.

Intellectual Property

A work or invention that is the result of creativity, such as a piece of writing or a design, to which one has rights and for which one may apply for a patent, copyright, trademark, etc.

6.

Redundancy

The inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network

7.

Lossy Compression

A process for reducing the number of bits needed to represent something in which some information is lost or thrown away. This process is not reversible.

8.

Lossless Compression

A process for reducing the number of bits needed to represent something without losing any information. This process is reversible.

9.

Computing Device

a machine that can run a program, including computers, tablets, servers, routers, and smart sensors

10.

Parallel Computing

a model in which programs are broken into small pieces, some of which are run simultaneously

11.

Round

off Error - Error from attempting to represent a number that is too precise. The value is rounded.

12.

Computing System

a group of computing devices and programs working together for a common purpose

13.

Sequential Computing

a model in which programs run in order, one command at a time

14.

Overflow Error

Error from attempting to represent a number that is too large

15.

Distributed Computing

a model in which programs are run by multiple devices

16.

Decimal

A way of representing information using ten options

17.

List

an ordered collection of elements

18.

Data Abstraction

manage complexity in programs by giving a collection of data a name without referencing the specific details of the representation

19.

Element

an individual value in a list that is assigned a unique index

20.

Index

a common method for referencing the elements in a list or string using numbers

21.

Information

the collection of facts and patterns extracted from data

22.

Metadata

data about data

23.

IP Address

The unique number assigned to each device on the Internet

24.

Internet Protocol (IP)

a protocol for sending data across the Internet that assigns unique numbers (IP addresses) to each connected device

25.

Analog Data

Data with values that change continuously, or smoothly, over time. Some examples of analog data include music, colors of a painting, or position of a sprinter during a race.

26.

Digital Data

Data that changes discretely through a finite set of possible values

27.

Sampling

A process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples.

28.

Bandwidth

the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second

29.

Computing Network

a group of interconnected computing devices capable of sending or receiving data.

30.

Path

the series of connections between computing devices on a network starting with a sender and ending with a receiver

31.

Protocol

An agreed-upon set of rules that specify the behavior of some system

32.

Fault Tolerant

Can continue to function even in the event of individual component failures. This is important because elements of complex systems like a computer network fail at unexpected times, often in groups.

33.

Router

A type of computer that forwards data across a network

34.

Packet

A chunk of data sent over a network. Larger messages are divided into packets that may arrive at the destination in order, out-of-order, or not at all

35.

Domain Name System (DNS)

the system responsible for translating domain names like example.com into IP addresses

36.

HyperText Transfer Protocol (HTTP)

the protocol used for transmitting web pages over the Internet

37.

World Wide Web

a system of linked pages, programs, and files

38.

Digital Divide

differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics

39.

Input

data that are sent to a computer for processing by a program. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.

40.

Output

any data that are sent from a program to a device. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.

41.

User Interface

the inputs and outputs that allow a user to interact with a piece of software. User interfaces can include a variety of forms such as buttons, menus, images, text, and graphics.

42.

Event Driven Programming

some program statements run when triggered by an event, like a mouse click or a key press

43.

Program

a collection of program statements. Programs run (or 'execute') one command at a time.

44.

Program Statement

a command or instruction. Sometimes also referred to as a code statement.

45.

Sequential Programming

program statements run in order, from top to bottom

46.

Comment

form of program documentation written into the program to be read by people and which do not affect how a program runs

47.

Debugging

Finding and fixing problems in an algorithm or program

48.

Documentation

a written description of how a command or piece of code works or was developed

49.

Development Process

the steps or phases used to create a piece of software. Typical phases include investigating, designing, prototyping, and testing.

50.

Pair Programming

a collaborative programming style in which two programmers switch between the roles of writing code and tracking or planning high level progress

51.

Assignment Operator

allows a program to change the value represented by a variable

52.

Expression

a combination of operators and values that evaluates to a single value

53.

String

an ordered sequence of characters

54.

Variable

a named reference to a value that can be used repeatedly throughout a program

55.

Boolean Value

a data type that is either true or false

56.

Comparison Operator

<, >, <=, >=, ==, indicate a Boolean expression

57.

Logical Operator

NOT, AND, and OR, which evaluate to a Boolean value

58.

Conditional Statement

affects the sequential flow of control by executing different statements based on the value of a Boolean expression

59.

Logical Operator

NOT, AND, and OR, which evaluate to a Boolean value

60.

Function

a named group of programming instructions. Also referred to as a 'procedure'.

61.

Function Call

a command that executes the code within a function

62.

Cleaning Data

a process that makes the data uniform without changing its meaning (e.g., replacing all equivalent abbreviations, spellings, and capitalizations with the same word).

63.

Data Filtering

choosing a smaller subset of a data set to use for analysis, for example by eliminating / keeping only certain rows in a table

64.

Correlation

a relationship between two pieces of data, typically referring to the amount that one varies in relation to the other.

65.

Citizen Science

scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices.

66.

Crowdsourcing

the practice of obtaining input or information from a large number of people via the Internet

67.

Data Bias

data that does not accurately reflect the full population or phenomenon being studied

68.

Information

the collection of facts and patterns extracted from data

69.

Data Bias

data that does not accurately reflect the full population or phenomenon being studied

70.

Infinite Loop

occurs when the ending condition will never evaluate to true

71.

Iteration

a repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met

72.

Traversal

the process of accessing each item in a list one at a time

73.

Argument

the value passed to the parameter

74.

Parameter

a variable in a function definition. Used as a placeholder for values that will be passed through the function

75.

Return

used to return the flow of control to the point where the procedure (also known as a function) was called and to return the value of expressionProcedural Abstraction - a process and allows a procedure to be used only knowing what it does, not how it does it. Procedural abstraction allows a solution to a large problem to be based on the solution of smaller subproblems. This is accomplished by creating procedures to solve each of the subproblems.

76.

API

Application Program Interface - specifications for how functions in a library behave and can be used

77.

Library

a group of functions (procedures) that may be used in creating new programs

78.

Modularity

the subdivision of a computer program into separate subprograms

79.

Computing Innovation

includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).

80.

Personally Identifiable Information (PII)

information about an individual that identifies, links, relates, or describes them

81.

Keylogging

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

82.

Malware

software intended to damage a computing system or to take partial control over its operation

83.

Phishing

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails

84.

Rogue Access Point

a wireless access point that gives unauthorized access to secure networks

85.

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text

86.

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it

87.

Public Key Encryption

pairs a public key for encryption and a private key for decryption. The sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message

88.

Symmetric Key Encryption

involves one key for both encryption and decryption

89.

Computer Virus Scanning Software

protects a computing system against infection

90.

Multi

factor Authentication - a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access

91.

Algorithm

a finite set of instructions that accomplish a task

92.

Iteration

a repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met

93.

Problem

a general description of a task that can (or cannot) be solved with an algorithm

94.

Selection

deciding which steps to do next

95.

Sequencing

putting steps in an order

96.

Binary Search

a search algorithm that starts at the middle of a sorted set of numbers and removes half of the data; this process repeats until the desired value is found or all elements have been eliminated

97.

Efficiency

a measure of how many steps are needed to complete an algorithm

98.

Linear Search

a search algorithm which checks each element of a list, in order, until the desired value is found or all elements in the list have been checked

99.

Reasonable Time

Algorithms with a polynomial efficiency or lower (constant, linear, square, cube, etc.) are said to run in a reasonable amount of time

100.

Unreasonable Time

Algorithms with exponential or factorial efficiencies are examples of algorithms that run in an unreasonable amount of time

101.

Decision Problem

a problem with a yes/no answer (e.g., is there a path from A to B?)

102.

Heuristic

provides a "good enough" solution to a problem when an actual solution is impractical or impossible

103.

Optimization Problem

a problem with the goal of finding the "best" solution among many (e.g., what is the shortest path from A to B?)

104.

Undecidable Problem

a problem for which no algorithm can be constructed that is always capable of providing a correct yes-or-no answer

105.

Speedup

the time used to complete a task sequentially divided by the time to complete a task in parallel