AP Notes, Outlines, Study Guides, Vocabulary, Practice Exams and more!

AP CSP Exam Vocabulary Flashcards

Terms : Hide Images
9571276444IterateTo repeat in order to achieve, or get closer to a desired goal.0
9571276445While Loopa programming construct used to repeat a set of commands (loop) as long as (while) a boolean condition is true.1
9571276446Models and SimulationsA program which replicates or mimics key features of a real world event so that we can investigate its behavior in order to solve problems without the cost, time, or danger of running an experiment in real life.2
9571276447Array/ListA generic term for a programming data structure that holds multiple items.3
9571276449Key EventIn JavaScript an event triggered by pressing or releasing a key on the keyboard. For example: "keyup" and "keydown" are event types you can specify. Use event.key - from the "event" parameter of the onEvent callback function - to figure out which key was pressed.4
9571276450for LoopA typical looping construct designed to make it easy to repeat a section of code using a counter variable. The for loop combines the creation of a variable, a boolean looping condition, and an update to the variable in one statement.5
9571276451Return ValueA value sent back by a function to the place in the code where the function was called form - typically asking for value (e.g. getText(id)) or the result of a calculation or computation of some kind. Most programming languages have many built-in functions that return values, but you can also write your own.6
9571276452Canvasa user interface element to use in HTML/JavaScript which acts as a digital canvas, allowing the programmatic drawing and manipulation of pixels, basic shapes, figures and images.7
9571276453Callback FunctionA function specified as part of an event listener; it is written by the programmer but called by the system as the result of an event trigger.8
9571276454EventAn action that causes something to happen.9
9571276455Event-Driven ProgramA program designed to run blocks of code or functions in response to specified events (e.g. a mouse click).10
9571276456Event HandlingAn overarching term for the coding tasks involved in making a program respond to events by triggering functions11
9571276457Event ListenerA command that can be set up to trigger a function when a particular type of event occurs on a particular UI element12
9571276458UI ElementsOn-screen objects, like buttons, images, text boxes, pull down menus, screens and so on13
9571276459User InterfaceThe visual elements of an program through which a user controls or communications the application. Often abbreviated UI14
9571276460DebuggingFinding and fixing problems in your algorithms, or code.15
9571276461Data TypeAll values in a programming language have a "type" - such as a Number, Boolean, or String - that dictates how the computer will interpret it. For example 7+5 is interpreted differently from "7"+"5"16
9571276462ExpressionAny valid unit of code that resolves/evaluates to a value.17
9571276463VariableA placeholder for a piece of information that can change.18
9571276464==Avoid confusion with the assignment operator "=". The equality operator (sometimes read: "equal equal") is used to compare two values, and returns a Boolean (true/false).19
9571276465Global VariableIt can be used and updated by any part of the code because it has a scope that is "global" to the program. Its global scope is typically derived from the variable being declared (created) outside of any function, object, or method20
9571276466If-StatementThe common programming structure that implements "conditional statements" and selects what code to run based on those conditional statements.21
9571276467Local VariableCan only be seen, used and updated by code within the same scope (function) in which it was created. Typically this means the variable was declared (created) inside a function -- includes function parameter variables22
9571276469ConcatentateTo link together or join. Typically used when joining together text Strings in programming (e.g. "Hello " + name)23
9571276470StringAny sequence of characters between quotation marks (ex: "hello", "42", "this is a string!")24
9571276471Conditionals/ConditionsStatements that only run under certain conditions (true or false value from a statement that controls selection).25
9571276472SelectionA generic term for a type of programming statement (usually an if-statement) that uses a Boolean condition to determine, or select, whether or not to run a certain block of statements26
9571276473Boolean /Boolean ExpressionA single value of either TRUE or FALSE. An expression that evaluates to True or False.27
9571276475Syntax errorsThings you misspelled or wrote in such a way the computer doesn't understand what you're trying to say. The computer will usually give a compile error as a clue to what it can't understand.28
9571276476Logic errorsThe program runs but doesn't do what you think it should. These can be tricky to fix because there might not be an error message. You can fix these errors by retracing your steps and trying to understand why the computer is interpreting what you wrote the way it is.29
9571276477Moore's Lawa predication made by Gordon Moore in 1965 that computing power will double every 1.5-2 years, it has remained more or less true ever since.30
9571276479Caesar Ciphera technique for encryption that shifts the alphabet by some number of characters31
9571276480Cipherthe generic term for a technique (or algorithm) that performs encryption32
9571276481Cracking encryptionWhen you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption.33
9571276482Decryptiona process that reverses encryption, taking a secret message and reproducing the original plain text34
9571276483Encryptiona process of encoding messages to keep them secret, so only "authorized" parties can read it.35
9571276484Random Substitution Cipheran encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.36
9571276485Computationally HardA problem in which it cannot arrive at a solution in a reasonable amount of time for a computer.37
9571276486Asymmetric EncryptionThe key to encrypt data is different from the key to decrypt that same data. This is a scheme used in public key encryption.38
9571276487Modulo (modular arithmetic)Returns the remainder after integer division. A mathematical operation. Example: 7 MOD 4 = 339
9571276488Private KeyIn an asymmetric encryption scheme, the decryption key is kept private and never shared, so only the intended recipient has the ability to decrypt a message that has been encrypted with a public key.40
9571276489Public Key EncryptionUsed prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.41
9571276490AlgorithmA precise sequence of instructions for processes that can be executed by a computer in order to develop or express solutions to a problem.42
9571276492Function (or procedure)A piece of code that you can easily call over and over again.43
9571276493APIA collection of commands made available to a programmer44
9571276494DocumentationA description of the behavior of a command, function, library, API, etc.45
9571276495LibraryA collection of commands / functions, typically with a shared purpose46
9571276496ParameterPassed into the function to customize it for a specific need.47
9571276497For LoopA particular kind of looping construct provided in many languages. Typically, a for loop defines a counting variable that is checked and incremented on each iteration in order to loop a specific number of times.48
9571276498LoopThe action of doing something over and over again.49
9571276499AggregationIn order to get more significant meaning or measurement from a single value, rows from a data set are grouped together. Common aggregations include: Average, Count, Sum, Max, Median, etc.50
9571276501Summary/Pivot TableShows the results of aggregations performed on data from a larger data set, hence a "summary" of larger data. Spreadsheet software typically calls them "pivot tables"51
9571276502Pie ChartBest used for making part-to-whole comparisons with discrete or continuous data. They are most impactful with a small data set.52
9571276503Line ChartUsed to show time-series relationships with continuous data. They help show trend, acceleration, deceleration, and volatility.53
9571276504Area ChartDepicts a time-series relationship, but is different than line charts in that they can represent volume.54
9571276505Scatter PlotShows relationships between items based on two sets of variables. They are best used to show correlation in a large amount of data.55
9571276506READMEA document providing background information about a dataset56
9571276507CSVAbbreviation of "comma-separated values," this is a widely-used format for storing data57
9571276508Raw dataThe original, unaggregated, calculated, identified, or otherwise manipulated data as it was collected. The raw, unorganized facts that need to be processed58
9571276510InformationData that is processed, organized, structured, or presented in a given context to make it useful.59
9571276511HypothesisA proposed explanation for some phenomenon used as the basis for further investigation60
9571276512TrendingAn online topic that is quickly growing in popularity61
9571276513Digital DivideThe variation in access or ability to use technology by various demographic characteristics (e.g., race, income, education, age, disability, and/or geography)62
9571276514VisualizationData provided in a graphical format to facilitate understanding or to communicate a message (i.e., translate data into useful information)63
9571276515Computational toolA computer-based tool or program used to create a computational artifact (e.g., a visualization, a graphic, a video, a program, or an audio recording)64
9571276516Cleaning dataMaking data ready for computational analysis which can include correcting or deleting invalid or ambiguous values and categorizing free-text data.65
9571276517MetadataData that describes the main data and usually is stored at the beginning of the file. For example, a digital image may include metadata that describes the size of the image, number of colors, or resolution66
9571276518ScalabilityThe capability of a system to expand to handle a growing amount of work.67
9571276519Heuristica problem solving approach (algorithm) to find a "good enough" solution where finding an optimal or exact solution is impractical or impossible.68
9571276520Lossless Compressiona data compression algorithm that allows the original data to be perfectly reconstructed from the compressed data. Makes a smaller file to save but does not actually lose any data.69
9571276521ImageA type of data used for graphics or pictures70
9571276523pixelshort for "picture element" it is the fundamental unit of a digital image, typically a tiny square or dot which contains a single point of color of a larger image71
9571276524RGBUses varying intensities of (R)ed, (G)reen, and (B)lue light added together to reproduce a broad array of colors.72
9571276525Lossy CompressionMethods that either discarding some data or approximate it in order to make a smaller file. It is not possible to get the original data back in exact form after this type of compression.73
9571276526AbstractionTo reduce visible detail or information to help improve focus or understanding of a relevant concept, to understand or solve a problem, or to communicate or remember information easier.74
9571276530terabyte (TB)1,000,000,000,000 (one trillion) or 10^12 bytes75
9571276531petabyte (PB)1,000,000,000,000,000 (one quadrillion) or 10^15 bytes76
9571276532BMP fileUncompressed image stored as one bit per pixel. (Bitmap Image File)77
9571276533WAV fileAlso referred to as pulse code modulation (PCM) or waveform audio, this file is uncompressed audio (sound).78
9571276534JPEG fileA widely used file type because the compression algorithm significantly reduces the size of the file, which makes it ideal for sharing, storing and displaying on websites. However, this compression also reduces the quality of the image, which might be noticeable if it's highly compressed. (Lossy)79
9571276535GIF fileThe Graphical Interchange Format is a compressed image - Lossless (256 color limit)80
9571276536MP3 fileMPEG-1 Audio Layer 3 - or more commonly referred to as MP3. It is a lossy compression algorithm that removes certain frequencies that humans can't hear. When creating an MP3 file, the bit rate that is used to encode the audio has a big effect on the quality of the sound. Setting a bitrate that is too low can produce a file that has poor sounding quality. Compressed Sound - Lossy81
9571276537ZIP fileCompressed Files - Lossless82
9571276538PNG filePortable Network Graphics file. The format uses lossless compression and is generally considered the replacement to the GIF image format. Compressed Image - Lossless83
9571276539IETFDevelops and promotes voluntary Internet standards and protocols, in particular the standards that comprise the Internet protocol suite (TCP/IP). - Internet Engineering Task Force84
9571276540InternetA network of networks of computers and servers that are connected to each other using a specific set of rules to communicate with each other.85
9571276541Net NeutralityThe principle that all Internet traffic should be treated equally by Internet Service Providers.86
9571276542IP AddressA number assigned to any item that is connected to the Internet.87
9571276543PacketsSmall chunks of information that have been carefully formed from larger chunks of information for the purpose of transferring from one computer to another through a redundant and fault tolerant system (TCP/IP).88
9571276545TCPTransmission Control Protocol - provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.89
9571276546DNSThe Domain Name System, the service that translates URLs to IP addresses.90
9571276547HTTPHyperText Transfer Protocol - the protocol used for transmitting web pages over the Internet91
9571276548URLUniform Resource Locator: An easy-to-remember address for calling a specific web page (like www.studio.code.org).92
9571276549InnovationA novel or improved idea, device, product, etc, or the development thereof.93
9571276551BitA contraction of "Binary Digit". A bit is the single unit of information in a computer, typically represented as a 0 or 1.94
9571276552Bit rateThe number of bits that are conveyed or processed per unit of time. e.g. 8 bits/sec.95
9571276553ProtocolA set of rules governing the exchange or transmission of data between devices.96
9571276554ASCIIThe universally recognized raw text format that any computer can understand. American Standard Code for Information Interchange.97
9571276555Code(v) to write code, or to write instructions for a computer.98
9571276556PermutationAn ordered arrangement of objects.99
9571276557Number SystemA collection of symbols and the rules for ordering them.100
9571276558PrototypeA preliminary sketch of an idea or model for something new. It's the original drawing from which something real might be built or created.101
9571276561DecimalBase 10 Number System, 10 characters, 0-9102
9571276562BinaryBase 2 Number System, 2 characters, 0-1, or in some way referring to a system that has only 2 options. A way of representing information using only two options.103
9571276563HexadecimalBase 16 Number System, 16 characters 0-F104
95712765641 byte8 bits105
95712765651 kilobyte1,024 bytes, 8,192 bits, or approximately 1,000 bytes106
95712765661 megabyte1,024 kilobytes, 1,048,576 bytes, or approximately 1,000 kilobytes107
9571276567BandwidthTransmission capacity, measured by bitrate. Think of it as the amount of data (bits) that can travel through a network in an amount of time. (wired or wireless)108
9571276568LatencyThe amount of delay when sending digital data over the internet or the total time it takes a data packet to travel from one node to another.109
9571276569Infinite loopWhat happens when the condition to continue looping remains true. The code will cycle through a set of commands forever.110
9571276570Big DataData sets so large or complex that traditional data processing applications are inadequate. (generally larger than a home computer could process)111
9571276571Vigenère Cipheris an encryption algorithm that uses a key to decrypt the data. it's strong because looking at the cipher text there are no discernable patterns assuming a good key was chosen. it's resistant to analysis which means that the key has to be guessed112
9571276572SSL (Secure Sockets Layer)Issues digital certificates for websites. It is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private.113
9571276573TLSTransport Layer Security. SSL and TLS are both cryptographic protocols that provide authentication and data encryption between servers, machines and applications operating over a network (e.g. a client connecting to a web server). SSL is the predecessor to TLS. Over the years, new versions of the protocols have been released to address vulnerabilities and support stronger, more secure cipher suites and algorithms.114
9571276574VirusA program or piece of code that is loaded onto your computer without your knowledge. This type of program usually spreads to other programs or computers by duplicating itself and usually disrupts or damages data.115
9571276575DDoS (Distributed Denial of Service)A type of attack where multiple virus-infected computers are used to target a single system, overwhelming it with traffic (fake requests), making all the sites resources unavailable for legitimate users, rendering it useless or unresponsive116
9571276576PhishingThe act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to "bait" the user into surrendering private information that poses a security or privacy risk to the user like usernames, passwords, or credit card numbers.117
9571276577AntivirusIs a software utility that detects, prevents, and removes viruses, worms, and other malware from a computer (source: techopedia)118
9571276578FirewallA network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defend set of security rules (source: cisco)119
9571276579Certificate Authorities (CAs)Issue digital certificates that validate the ownership of encrypted keys used in secured communication and are used in authentication of public key encryption.120
9571276580Digital certificatesElectronic credentials, similar to ID cards, that are used to certify the online identities of individuals, organizations, and computers. Certificates are issued and certified by certificate authorities (CAs). (definition source: Microsoft)121
9571276581DNS SpoofingThis is what happens when a DNS server is hacked and IP addresses associated with domain names are changed. You are then sent to a fake website (created by the hacker) that may appear as if it is real.122
9571276582CookiesWhat websites use to remember who you are123
9571281246AndBasic logic gate where every part of a statement must be true in order for the entire statement to be true.124
9571286069ApplicationsIncludes word processors, photo editing software, web browsers, games, music programs, almost everything else on the computer excluding saved files.125
9571297741ARPANETThe advanced research projects agency network, the first agency to use TCP/IP.126
9571332447Central Processing Unit (CPU)Carries out every command or process on the computer and can be thought of as the brain of the computer.127
9571344557ClientAny computer that requests a service (like information or computation).128
9571361210Cloud Computing/StorageRather than using a local computer, this form of computation uses a network of remote servers to calculate and/or store data; has fostered new ways to communicate and collaborate.129
9571362684CMYKUsed for printing and stands for Cyan, Magenta, Yellow, and Black (Key) where the number associated with each letter is the percentage of each color used.130
9571419875ComputerAn electronic device that processes data according to a set of instructions or commands known as a program.131
9571425794ConstantUsed in coding to store a value that cannot be changed132
9571427731CSSCascading Style Sheets: Refines mark-up in HTML133
95715238091 gigabyte1,024 megabytes, 1,048,576 kilobytes, 1,073,741,824 bytes, 8,589,934,592 bits, or approximately 1,000 megabytes134
9571653154Domain NameA name given or linked to an IP address.135
9571657300EncryptionTaking data and converting it so it is unreadable.136
9571664877Fault TolerantA property of IP, if there is an error, it will still work properly.137
9571667655FTPFile Transfer Protocol, used for sending files through the internet from one computer to another.138
9571672692HackerSomeone who exploits weaknesses on a computer or network and can steal or disrupt data.139
9571677349HTMLHyper Text Markup Language, the standard for creating webpages.140
9571700632HTTPSA secure version of HTTP that uses SSL/TLS.141
9571879095IPv4 vs IPv6Internet Protocol versions. v4 uses 32-bit addresses while v6 uses 128-bit addresses. Know how to calculate the difference in how many unique addresses can be stored.142
9571887429ISPInternet Service Provider (the company you pay for internet)143
9571894252Keyin cryptography, a shared secret to make the difficulty of the encryption harder to crack.144
9571897086Name ServerA server that contains many IP addresses and their matching domain names.145
9578460773NetworkA group of computers that are connected so they can share resources using a data link.146
9578468866Nibble or NybbleHalf of a byte or 4 bits.147
9578474199One-Way FunctionAn algorithm or calculation that is easy in one direction and difficult in another. This type of function is used for encryption over the internet so that information can be easily encrypted but is very difficult to hack or guess the decryption algorithm or secret key.148
9578513290OrBasic logic gate where either part of a statement can be true for the entire statement to be true.149
9578810304Root Name ServerOne of 13 servers that contain every IP address and their matching names.150
9578817876RouterA networking device that routes internet traffic through the interconnected system to the proper destination.151
9578827570Sample RateUsually measured in bits per second. It is how often an analogue (continuous) signal is saved into bits when converting or saving as a digital file.152
9578860009SequenceThe structure that runs one line after another in that order.153
9578869500ServerAny computer that provides a service (the client computer requests information from a server).154
9578897807SubdomainPRECEEDS the domain name, owned by the domain. Anything after the ".com/" is a file or something more specific in the file structure of that particular page. It is not the domain name. Check this: https://poxse.com/domain/what-is-domain-name Hierarchical of domains: rea.com. The "." marks the location of the type of address this is. To the right of the "." is "com". This syntax will then look for where "rea" is located amoung all the "com" addresses.155
9578996945Symmetric EncryptionThe same key is used to encrypt and decrypt a message. The decryption process is exactly the reverse of the encryption process.156
9579023574UDPUser Datagram Protocol is an alternative communications protocol to Transmission Control Protocol (TCP which takes as long as possible to make sure that the entire file has been received and assembled perfectly) used primarily for establishing low-latency and loss tolerating (if connection or data is lost, it continues to stream) connections between applications on the Internet like video (minor TV) or audio (pandora) content.157
9579089450VoIPVoice over Internet Protocol is a protocol used to transfer telephone calls over the IP based internet.158
9579099961World Wide WebThe set of interconnected documents identified by the hyperlinks and URL. A way of accessing information over the medium of the Internet. It is an information-sharing model that is built on top of the Internet. The Web uses the HTTP protocol to transmit data. The Web is just one of the ways that information can be disseminated over the Internet. The Internet, not the Web, is also used for email, which relies on SMTP, Usenet news groups, instant messaging and FTP and VoIP for telephony.159
9579166646GeneralizingPulling out specific differences to make one solution work for multiple problems. This can be done in a function using parameters so that the function can be used for multiple purposes.160
9581070447AppendAdding an element to the end of a list161
9581073475Variable AssignmentWhen you put a value into a memory location and give that location a name in a program; on the AP exam, the assignment operator is an arrow <-162
9581162833Binary SearchAn algorithm that finds a target in an ORDERED set by halving the set being searched at each stage (based on checking a current value against the target) until the target is found or a set of one element is all that remains.163
9581186514Citizen ScienceCollection and analysis of data by non-scientists on home computers; often performed in collaboration with professional scientists.164
9581195550Clustering DataGrouping data sets together to provide an argument that a pattern exists.165
9581202645ComputingUsing computer algorithms to solve problems.166
9581289881ConstraintA limit placed to control inputs or outputs.167
9581292545CookieInformation stored by a browser to track movement and information triggered by a person viewing a website.168
9581295321Creative CommonsA copyright license that can be used for free distribution while still ensuring proper attribution with appropriate citations.169
9581751631CryptographyThe study of hiding messages or finding hidden messages170
9581754155CrowdsourcingMultiple people working (often online) together to complete a task.171
9581757982Curated DatabaseDatabase organized in such a way to facilitate efficient searching.172
9581761166CyberattackAttempt to penetrate, use, or access information on another computer or network without permission; examples include phishing or viruses.173
9581767545DatabaseA large collection of data that can be organized, searched, clustered, classified, transformed, displayed, and/or filtered to gain new insight or make conclusions.174
9581773595Data CompressionTechnique that reduces the number of bits stored or transmitted; could be lossy or lossless.175
9581775149Data MiningThe analysis of large databases to retrieve new insights; example: artificial intelligence that has enabled innovation in medicine, business, and science.176
9581791130ElementOne specific item in a list.177
9581792385Floating-Point ValueUsed in programming language to represent non-integers.178
9581794154Linear (Sequential) SearchA search algorithm that finds a target by looking at each item, one at a time, until the end of the set is reached or the target is found.179
9581800195Logic GateOne of the building blocks of a computer chip, logic gates typically take two inputs and return either true or false; combinations of operations of gates can create different streams of logic used in calculations and processes in advanced chips such as integrated circuits. (these are your ANDs and ORs from programming)180
9581805767Machine LearningThe ability of a computer to learn without being explicitly programmed; example: artificial intelligence that has enabled innovation in medicine, business, and science.181
9581812433Overflow ErrorError caused when a number is too large for the memory allocated for it. For example, the decimal value of the non-integer 1/3 is a non-terminating decimal. There is no way for a computer to allocate an infinite number of bits so the computer stores this number using the highest number of bits possible.182
9581820667Network TypesPeer-peer: multiple computers sharing resources. Client-server: one central computer stores resources that are used by multiple other computers.183
9581826923PseudocodeWords or diagrams used to organize thoughts to help plan writing code; helps programmers translate specifications into code.184
9581832775Reasonable TimeWay to analyze an algorithm in terms of the number of steps required to solve a problem. An algorithm is said to run in a reasonable amount of time if the number of steps the algorithm takes is less than or equal to a polynomial function (constant, linear, square, cube, etc.) of the size of the set.185
9581840168Redundant SystemA system that is self checking or has multiple pathways to success in order to improve system reliability.186
9581842524Round-off Errorcaused with operations on floating-point values; an example is a computer trying to store 1/3.187
9603969161SMTPStandard for how email messages are sent and received on the internet.188
9603987702Smart TechnologyTechnology that responds to the user and/or the environment; examples include smart grids, smart buildings, smart transportation, smart phones, or smart watches (These last 2 are what are called "wearables".)189
9604060023System CapacityAmount of bits that can be stored on a system.190
9604328481Text-Based LanguageOne of the two types of languages commonly seen in programming; usually created using a text editor that may or may not need to compile in order to run.191
9604345625Block-Based LanguageOne of the two types of languages commonly seen in programming; writing code in this language often involves dragging and dropping pictorial code, rather than typing text.192
9604358032TransistorOne of the building blocks of a computer chip which controls flow of electricity by amplifying or redirecting it.193
9604378664Undecidable ProblemNo algorithm can be constructed to answer "yes" or "no" for all inputs.194
9604397305Unsolvable ProblemCannot be solved exactly using any algorithm.195

Need Help?

We hope your visit has been a productive one. If you're having any problems, or would like to give some feedback, we'd love to hear from you.

For general help, questions, and suggestions, try our dedicated support forums.

If you need to contact the Course-Notes.Org web experience team, please use our contact form.

Need Notes?

While we strive to provide the most comprehensive notes for as many high school textbooks as possible, there are certainly going to be some that we miss. Drop us a note and let us know which textbooks you need. Be sure to include which edition of the textbook you are using! If we see enough demand, we'll do whatever we can to get those notes up on the site for you!