click below
click below
Normal Size Small Size show me how
AP CSP Terms
Term | Definition |
---|---|
Abstraction | ______ is the process of removing unnecessary details to focus on essential ones. |
Algorithm | An ______ is a set of steps to do a task or solve a problem. |
Analog data | ______ ______ is a continuous series of data values that change smoothly over time. |
API | ______ stands for ______ ______ ______ . ______ s define how other programs can interface or interact with its programming module or application. |
Argument | An ______ holds a value that is passed to a procedure when it is called. An ______ can be a constant, a variable, or an expression to evaluate. |
Arithmetic operators | These are the symbols used in computer programs for mathematical operations. + addition, − subtraction, * multiplication, / division |
Modulus/MOD | ______ math results in the remainder after dividing |
Assignment statement | An ______ ______ stores a value in a variable. The right side of the ______ ______ is evaluated, and the result is stored in the variable on the left side of the assignment operator, which is the ← for this course |
Authentication | ______ involves verifying users requesting access to a system before providing admittance. |
Bandwidth | ______ measures the amount of data that can be sent over a network in a fixed amount of time. |
Bias | ______ in computer science is the discrimination for or against certain groups or individuals. The bias can come from the data used or the way the code was written. |
Binary number system | The ______ ______ ______ uses the values 0 and 1 and is used by computers at the lowest level to execute code. |
Binary search | A ______ ______ is an algorithm that uses a “divide & conquer” process. The data must be sorted & each iteration searches the middle of the dataset. After determining if the target value is higher or lower than the value at the current position. |
Bit | A ______ is a binary digit, which can only be 0 or 1. |
Boolean values | These are values that can only be true or false. |
Byte | A ______ is made up of 8 bits. |
Certificate Authority (CA) | A ______ ______ issues digital certificates that verify that the data encryption code belongs to the organization. This enables the transfer of confidential data such as passwords or credit card information on the associated website. |
Citizen scientist | ______ ______ are volunteers who work with a scientific team to help collect or review data from their home which can be in a separate location than the scientific team. |
Clarity | The ______ of a program means how easy it is to understand the code. |
Classifying data | ______ ______ involves organizing and identifying categories that fit the data to make it easier to search for patterns and trends leading to insights. |
Cleaning data | ______ ______ is the process of identifying incomplete or duplicate data and ensuring the data is uniform (st. or street) without changing the meaning of the data. |
Code segment | A ______ ______ can be a single line or a collection of lines of code that are part of a program. |
Code statement | ______ ______ are sections of a program with an action to be executed. |
Collaboration | ______ is people working together to produce a quality product. |
Comments | ______ are used to document a program. They should be used to include a brief description of the program, along with who wrote it and when, and to document complicated sections of code. ______ are for people and are ignored by the computer. |
Computer virus | A computer virus is spread by attaching itself to a valid file. It can then replicate and spread, either collecting or destroying data and programs. |
Computing device | A ______ device is a piece of equipment that can run a computer program. |
Computing network | A ______ ______ is a connection of computing devices that send and receive data. |
Computing system | A ______ ______ is when multiple computing devices and programs work together for a specific purpose, such as managing the power grid. |
Concatenation | ______ is when strings are joined or “glued” together to form a new string. |
Condition | ______ use the relational operators (<, ≤, >, ≥, = and ≠) to compare two values, variables, or expressions and return true or false. |
Creative Commons Licensing | ______ ______ ______ allows creators to assign different levels of copyright access to their intellectual property. |
Crowdfunding | ______ uses resources like the Internet to ask people across the globe to donate money to help fund their project or need. |
Crowdsourcing | ______ provides opportunities for anyone with access to a site to participate in various ways such as providing feedback, helping to solve problems, offering funding, or offering assistance finding employment. |
Cybersecurity | ______ protects our computing devices and networks from attacks and unauthorized access. |
Data abstraction | ______ ______ is assigning a data value to a variable or list. The list can be used and updated without needing multiple variables for the data in the program or knowing the details of how it is stored. |
Data mining | ______ ______ analyzes large datasets to search for patterns that can lead to new insights for the organization. |
Data stream | ______ ______ are segments of data packaged in packets sent through a network such as the Internet. |
Debugging | ______ is finding and correcting errors in a program. |
Decidable problem | A problem is ______ when an algorithm can be created that provides a yes or no answer for all instances of the problem. |
Decision problem | A ______ ______ only needs a yes or no answer. |
Decryption | ______ is the process of deciphering an encrypted message so it can be read. |
Digital data | ______ ______ is made up of discrete data values. These look like stair steps and can approximate analog data. |
Digital divide | The ______ ______ describes those who lack access to the Internet based on location, economic, or accessibility reasons. |
Distributed computing system | ______ ______ ______ are when multiple computers are used to process a program or application. The computers each have their own processor and communicate over a network. The Internet is an example of a distributed computing system. |
Efficiency | The ______ of an algorithm measures the amount of resources, such as memory and time, it takes to run. |
Element | Each data value in a list is an ______. It is referenced through its index. |
Encryption | ______ is the process of converting data into a coded format. |
Event-driven programming | ______-______ ______ is when a program operates in a wait state and an action, such as pressing a button, provides input and triggers a section of code to run. |
Expression | An ______ is a combination of variables or values and operations to be performed on them. ______ are evaluated to determine a single value. |
Fault tolerant | A system, such as the Internet, is ______ ______ when redundancy is built in to ensure processing can occur even when sections of the system are not working. |
Filtering data | ______ ______ involves selecting a subset of data, sometimes based on its classifications, to use for further analysis. |
Heuristic | A ______ is a solution to a problem that is not optimal or the best but is close enough to work, especially when the optimal solution is unreasonable. |
Hypertext Transfer Protocol (HTTP) | The World Wide Web uses the ______ protocol to send requested web pages across the Internet. |
Hypertext Transfer Protocol Secure (HTTPS) | ______ provides the secure processing of a web page. Always check for ______ before making a purchase online to ensure your credit card number is encrypted. |
Incremental development process | An ______ ______ ______ subdivides a program into small modules. Each section is coded, tested, and approved and then added to the larger application and tested with other completed parts of it. |
Information | ______ is data that has been analyzed and has meaning applied to it. ______ can guide decisions for the data owners. |
Intellectual property | Anything a person creates using a computer is the ______ ______ of that person. |
Internet Protocol (IP) address | An ______ ______ address is a unique number assigned each time a device connects to the Internet. It is how the network knows where to find your device to get and send requested information. |
Iterative | ______ means to repeat code a specified number of times or until a condition is true (for this course) using a loop structure. |
Iterative development process | The ______ ______ ______ repeats the steps of coding, testing, and feedback to refine a section of code until it is complete. |
Keylogging | ______ software is malware that captures keystrokes and stores them in a file that is later transmitted to a location specified in the software. |
Library | A ______ is a collection of programs where the executable code is made available to other programmers. The entire ______ or a module from it can be imported into a program. |
Linear search | A ______ ______ is a sequential search of a dataset. It starts at the beginning and checks each value to see if it matches the target value being sought. |
Lists | A ______ is a collection of data values stored in one variable. Each data value, or element, is referenced by its index position. |
Logic error | A ______ ______ occurs when the code runs but produces incorrect results. |
Logical operators | The ______ ______ are AND, OR, and NOT and are used to create more complex conditions that evaluate to a Boolean value (true or false). |
Lossless data compression | ______ data compression is a technique to make files smaller and allows the original file to be restored when the data is decompressed. |
Lossy data compression | ______ data compression techniques can achieve more compression than lossless techniques, but some data is lost, and the original file cannot be restored. |
Malware | ______ stands for malicious software and includes anything placed on a device, unknown to the owner, for destructive purposes. |
Metadata | ______ is data about data, such as the author of a document. It is used to help organize and find data. |
Modularity | ______ is a style of programming that breaks the requirements into smaller pieces until each module does a specific task or set of tasks. |
Modulus | This operation provides only the remainder after dividing. |
Multifactor authentication | ______ ______ uses more than one method to ensure someone trying to access an account should be granted access. |
Open access | Data that is ______ ______ is freely available online with limited, if any, copyright restrictions. |
Open source | ______-______ software is available for anyone to use or modify without restrictions. |
Optimization problem | An ______ ______ attempts to find the best solution for the problem. |
Overflow error | An ______ ______ occurs when a number is too large for the number of bits the programming language allocates for it. The sign bit for the number is flipped as the number “overflows” out of its assigned range of bits. |
Packets | ______ are created by breaking data into same-size segments (except possibly the last one). A header is created with the sending and receiving IP addresses, the size of the packet, and its position in the reassembled data stream. |
Parallel computing system | ______ ______ ______ use multiple computers to process a section of a program at the same time. The results are then combined for the complete solution. The devices in a ______ ______ ______ share memory. |
Parameter | ______ are used to accept data values into a procedure. The values are sent through arguments when the procedure is called. |
Patterns in data | Raw data is analyzed for ______ to help gain insights into its meaning. |
PII (Personally Identifiable Information) | ______ or ______ ______ ______ is any information that identifies you. |
Phishing | A ______ attack uses messages and websites that look like another organization’s official site to fool users into clicking on it and entering information such as passwords and account data. |
Plagiarism | ______ is copying information or computational artifacts without direct permission from the owner/creator or without permission via the use of Creative Commons licensing. |
Procedural Abstraction | Once a ___ is defined, tested, & working, it can be encapsulated so users only need to know the inputs to send & the outputs to expect. The details of how the _____ accepts the input & produces the output do not need to be known and are _____ away. |
Procedure | A ______ is a defined block of code that does a specific task or tasks. It does not run in a program until it is called in the program, and it can be called as many times as needed. |
Program | A ______ is a collection of code to perform a specific task. |
Program behavior | A program’s ______ is how it performs when it is running and how users interact with the program. |
Program documentation | Program ______ describes a program’s purpose and how it achieves it. ______ is used by anyone who needs to review and understand the code. ______ can also include the user’s manual on how to use the program and help text to solve errors that occur. |
Program input | Program ______ is data sent to a program. It can be in a variety of formats, depending on what the program will accept. |
Program output | Program ______ is data produced by the program and sent by the program to a device such as a screen or printer or file. |
Prototype | A ______ is a draft or incomplete version used to obtain feedback from users and team members before allocating resources such as time and money to creating the final version. |
Protocols | ______ are rules. The Internet has ______ that are open for everyone to ensure that different manufacturers create equipment that can connect to and communicate with all other devices and equipment following the same protocols. |
Pseudocode | ______ is a combination of natural language, such as English, and program code. It is used to design the structure or outline of a program prior to writing the code. |
Public key encryption | ______ ______ ______ uses one key for encrypting data and another to decrypt it. The encryption key is public knowledge, and the decryption key is private to the person receiving the data. |
Readability | Making a program ______ should be a goal of every programmer. The use of blank space and comments along with well-named variables and procedures help to make a program more ______. |
Redundancy | ______, or duplication, is designed into the Internet to keep it operating even when sections of it are non-functional. |
Relational operators | The ______ ______ are the same as those used in mathematics |
Requirements | ______ are the specifications for the program to meet once it is complete. |
RETURN statement | The ______ statement is used to immediately exit a procedure and return control back to the calling program. ______ is also used to send values back to the calling program. |
Rogue access point | A ______ ______ ______ is one that is on an organization’s secure network, but it is not managed by their network administrator. |
Round-off or Rounding error | A ______ error occurs because real numbers (those with decimals) are stored imprecisely in computer memory. 0.1 could be stored as 0.0999998. |
Router | A ______ manages the devices and routes packets to their destination along a network path. It can provide wireless access for smaller networks. |
Run-time error | A ______-______ ______ occurs when the program is executing. The error may not occur each time the program runs but only when certain conditions exist, such as trying to divide by zero. |
Scalability | ______ in computer science means devices can be easily added or removed without interrupting service. The Internet is ______ because new devices and networks can be added without impacting the current operational structure. |
Selection statement | ______ ______ are used to filter out sections of code that are only executed when a specified condition is true. |
Sequential computing system | A ______ ______ system processes data by executing lines of code one after the other in order. |
Sequential statement | A ______ ______ executes as soon as the program statement ahead of it finishes executing. These run one after the other in the order specified and should be in the correct order to avoid invalid results. |
Simulation | A ______ is a test environment of a model representing a real object or event. |
String | A ______ is a series of characters. These can be letters, symbols, or numbers. When numbers are part of a ______, mathematical operations cannot be performed on them. |
Substring | A ______ method returns a specified section of a string. |
Symmetric key encryption | ______ ______ ______ uses the same key to encrypt and decrypt data. |
Syntax error | ______ ______ break the rules of the programming language. A program cannot run until the ______ ______ are corrected. |
Testing | ______ involves executing a program to ensure it produces correct output that meets the program requirements. |
Transmission Control Protocol/Internet Protocol (TCP/IP) | ______ ______ ______/______ ______ are the rules that govern the breaking of information into packets, sending the data stream across the Internet to its destination, and reassembling the packets to display the information. |
Targeted marketing | ______ ______ is when advertising is sent to a specific group of people, usually based on their prior searches and pages viewed. |
Traverse | ______ means to process all or part of a list’s elements. |
UDP | ______ ______ ______ can be used in place of TCP to create and reassemble packets and work with IP to send the packets across the Internet. UDP does not send an acknowledgment that packets were received, whereas TCP does. ______ is faster than TCP. |
Undecidable problem | An ______ problem is one where an algorithm cannot be written that returns a yes or no response for all inputs. |
Unreasonable problem | An ______ problem occurs when an algorithm to find the optimal solution takes too long or too much memory using current computing capabilities. Algorithms with exponential or factorial efficiency run in an ______ amount of time. |
User interface | The ______ ______ includes all the ways a user would interact with a program, including providing input and reviewing output. |
Variable | A ______ is a holding place for data. |
World Wide Web (www) | The ______ ______ ______ is an application that uses the Internet to share web pages, files, documents, images, and other forms of data. |