9571276444 | Iterate | To repeat in order to achieve, or get closer to a desired goal. | 0 | |
9571276445 | While Loop | a programming construct used to repeat a set of commands (loop) as long as (while) a boolean condition is true. | 1 | |
9571276446 | Models and Simulations | A program which replicates or mimics key features of a real world event so that we can investigate its behavior in order to solve problems without the cost, time, or danger of running an experiment in real life. | 2 | |
9571276447 | Array/List | A generic term for a programming data structure that holds multiple items. | 3 | |
9571276449 | Key Event | In JavaScript an event triggered by pressing or releasing a key on the keyboard. For example: "keyup" and "keydown" are event types you can specify. Use event.key - from the "event" parameter of the onEvent callback function - to figure out which key was pressed. | 4 | |
9571276450 | for Loop | A typical looping construct designed to make it easy to repeat a section of code using a counter variable. The for loop combines the creation of a variable, a boolean looping condition, and an update to the variable in one statement. | 5 | |
9571276451 | Return Value | A value sent back by a function to the place in the code where the function was called form - typically asking for value (e.g. getText(id)) or the result of a calculation or computation of some kind. Most programming languages have many built-in functions that return values, but you can also write your own. | 6 | |
9571276452 | Canvas | a user interface element to use in HTML/JavaScript which acts as a digital canvas, allowing the programmatic drawing and manipulation of pixels, basic shapes, figures and images. | 7 | |
9571276453 | Callback Function | A function specified as part of an event listener; it is written by the programmer but called by the system as the result of an event trigger. | 8 | |
9571276454 | Event | An action that causes something to happen. | 9 | |
9571276455 | Event-Driven Program | A program designed to run blocks of code or functions in response to specified events (e.g. a mouse click). | 10 | |
9571276456 | Event Handling | An overarching term for the coding tasks involved in making a program respond to events by triggering functions | 11 | |
9571276457 | Event Listener | A command that can be set up to trigger a function when a particular type of event occurs on a particular UI element | 12 | |
9571276458 | UI Elements | On-screen objects, like buttons, images, text boxes, pull down menus, screens and so on | 13 | |
9571276459 | User Interface | The visual elements of an program through which a user controls or communications the application. Often abbreviated UI | 14 | |
9571276460 | Debugging | Finding and fixing problems in your algorithms, or code. | 15 | |
9571276461 | Data Type | All values in a programming language have a "type" - such as a Number, Boolean, or String - that dictates how the computer will interpret it. For example 7+5 is interpreted differently from "7"+"5" | 16 | |
9571276462 | Expression | Any valid unit of code that resolves/evaluates to a value. | 17 | |
9571276463 | Variable | A placeholder for a piece of information that can change. | 18 | |
9571276464 | == | Avoid confusion with the assignment operator "=". The equality operator (sometimes read: "equal equal") is used to compare two values, and returns a Boolean (true/false). | 19 | |
9571276465 | Global Variable | It can be used and updated by any part of the code because it has a scope that is "global" to the program. Its global scope is typically derived from the variable being declared (created) outside of any function, object, or method | 20 | |
9571276466 | If-Statement | The common programming structure that implements "conditional statements" and selects what code to run based on those conditional statements. | 21 | |
9571276467 | Local Variable | Can only be seen, used and updated by code within the same scope (function) in which it was created. Typically this means the variable was declared (created) inside a function -- includes function parameter variables | 22 | |
9571276469 | Concatentate | To link together or join. Typically used when joining together text Strings in programming (e.g. "Hello " + name) | 23 | |
9571276470 | String | Any sequence of characters between quotation marks (ex: "hello", "42", "this is a string!") | 24 | |
9571276471 | Conditionals/Conditions | Statements that only run under certain conditions (true or false value from a statement that controls selection). | 25 | |
9571276472 | Selection | A generic term for a type of programming statement (usually an if-statement) that uses a Boolean condition to determine, or select, whether or not to run a certain block of statements | 26 | |
9571276473 | Boolean /Boolean Expression | A single value of either TRUE or FALSE. An expression that evaluates to True or False. | 27 | |
9571276475 | Syntax errors | Things you misspelled or wrote in such a way the computer doesn't understand what you're trying to say. The computer will usually give a compile error as a clue to what it can't understand. | 28 | |
9571276476 | Logic errors | The program runs but doesn't do what you think it should. These can be tricky to fix because there might not be an error message. You can fix these errors by retracing your steps and trying to understand why the computer is interpreting what you wrote the way it is. | 29 | |
9571276477 | Moore's Law | a predication made by Gordon Moore in 1965 that computing power will double every 1.5-2 years, it has remained more or less true ever since. | 30 | |
9571276479 | Caesar Cipher | a technique for encryption that shifts the alphabet by some number of characters | 31 | |
9571276480 | Cipher | the generic term for a technique (or algorithm) that performs encryption | 32 | |
9571276481 | Cracking encryption | When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption. | 33 | |
9571276482 | Decryption | a process that reverses encryption, taking a secret message and reproducing the original plain text | 34 | |
9571276483 | Encryption | a process of encoding messages to keep them secret, so only "authorized" parties can read it. | 35 | |
9571276484 | Random Substitution Cipher | an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet. | 36 | |
9571276485 | Computationally Hard | A problem in which it cannot arrive at a solution in a reasonable amount of time for a computer. | 37 | |
9571276486 | Asymmetric Encryption | The key to encrypt data is different from the key to decrypt that same data. This is a scheme used in public key encryption. | 38 | |
9571276487 | Modulo (modular arithmetic) | Returns the remainder after integer division. A mathematical operation. Example: 7 MOD 4 = 3 | 39 | |
9571276488 | Private Key | In an asymmetric encryption scheme, the decryption key is kept private and never shared, so only the intended recipient has the ability to decrypt a message that has been encrypted with a public key. | 40 | |
9571276489 | Public Key Encryption | Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private. | 41 | |
9571276490 | Algorithm | A precise sequence of instructions for processes that can be executed by a computer in order to develop or express solutions to a problem. | 42 | |
9571276492 | Function (or procedure) | A piece of code that you can easily call over and over again. | 43 | |
9571276493 | API | A collection of commands made available to a programmer | 44 | |
9571276494 | Documentation | A description of the behavior of a command, function, library, API, etc. | 45 | |
9571276495 | Library | A collection of commands / functions, typically with a shared purpose | 46 | |
9571276496 | Parameter | Passed into the function to customize it for a specific need. | 47 | |
9571276497 | For Loop | A particular kind of looping construct provided in many languages. Typically, a for loop defines a counting variable that is checked and incremented on each iteration in order to loop a specific number of times. | 48 | |
9571276498 | Loop | The action of doing something over and over again. | 49 | |
9571276499 | Aggregation | In order to get more significant meaning or measurement from a single value, rows from a data set are grouped together. Common aggregations include: Average, Count, Sum, Max, Median, etc. | 50 | |
9571276501 | Summary/Pivot Table | Shows the results of aggregations performed on data from a larger data set, hence a "summary" of larger data. Spreadsheet software typically calls them "pivot tables" | 51 | |
9571276502 | Pie Chart | Best used for making part-to-whole comparisons with discrete or continuous data. They are most impactful with a small data set. | ![]() | 52 |
9571276503 | Line Chart | Used to show time-series relationships with continuous data. They help show trend, acceleration, deceleration, and volatility. | ![]() | 53 |
9571276504 | Area Chart | Depicts a time-series relationship, but is different than line charts in that they can represent volume. | ![]() | 54 |
9571276505 | Scatter Plot | Shows relationships between items based on two sets of variables. They are best used to show correlation in a large amount of data. | ![]() | 55 |
9571276506 | README | A document providing background information about a dataset | 56 | |
9571276507 | CSV | Abbreviation of "comma-separated values," this is a widely-used format for storing data | 57 | |
9571276508 | Raw data | The original, unaggregated, calculated, identified, or otherwise manipulated data as it was collected. The raw, unorganized facts that need to be processed | 58 | |
9571276510 | Information | Data that is processed, organized, structured, or presented in a given context to make it useful. | 59 | |
9571276511 | Hypothesis | A proposed explanation for some phenomenon used as the basis for further investigation | 60 | |
9571276512 | Trending | An online topic that is quickly growing in popularity | 61 | |
9571276513 | Digital Divide | The variation in access or ability to use technology by various demographic characteristics (e.g., race, income, education, age, disability, and/or geography) | 62 | |
9571276514 | Visualization | Data provided in a graphical format to facilitate understanding or to communicate a message (i.e., translate data into useful information) | 63 | |
9571276515 | Computational tool | A computer-based tool or program used to create a computational artifact (e.g., a visualization, a graphic, a video, a program, or an audio recording) | 64 | |
9571276516 | Cleaning data | Making data ready for computational analysis which can include correcting or deleting invalid or ambiguous values and categorizing free-text data. | 65 | |
9571276517 | Metadata | Data that describes the main data and usually is stored at the beginning of the file. For example, a digital image may include metadata that describes the size of the image, number of colors, or resolution | 66 | |
9571276518 | Scalability | The capability of a system to expand to handle a growing amount of work. | 67 | |
9571276519 | Heuristic | a problem solving approach (algorithm) to find a "good enough" solution where finding an optimal or exact solution is impractical or impossible. | 68 | |
9571276520 | Lossless Compression | a data compression algorithm that allows the original data to be perfectly reconstructed from the compressed data. Makes a smaller file to save but does not actually lose any data. | 69 | |
9571276521 | Image | A type of data used for graphics or pictures | 70 | |
9571276523 | pixel | short for "picture element" it is the fundamental unit of a digital image, typically a tiny square or dot which contains a single point of color of a larger image | 71 | |
9571276524 | RGB | Uses varying intensities of (R)ed, (G)reen, and (B)lue light added together to reproduce a broad array of colors. | 72 | |
9571276525 | Lossy Compression | Methods that either discarding some data or approximate it in order to make a smaller file. It is not possible to get the original data back in exact form after this type of compression. | 73 | |
9571276526 | Abstraction | To reduce visible detail or information to help improve focus or understanding of a relevant concept, to understand or solve a problem, or to communicate or remember information easier. | 74 | |
9571276530 | terabyte (TB) | 1,000,000,000,000 (one trillion) or 10^12 bytes | 75 | |
9571276531 | petabyte (PB) | 1,000,000,000,000,000 (one quadrillion) or 10^15 bytes | 76 | |
9571276532 | BMP file | Uncompressed image stored as one bit per pixel. (Bitmap Image File) | 77 | |
9571276533 | WAV file | Also referred to as pulse code modulation (PCM) or waveform audio, this file is uncompressed audio (sound). | 78 | |
9571276534 | JPEG file | A widely used file type because the compression algorithm significantly reduces the size of the file, which makes it ideal for sharing, storing and displaying on websites. However, this compression also reduces the quality of the image, which might be noticeable if it's highly compressed. (Lossy) | 79 | |
9571276535 | GIF file | The Graphical Interchange Format is a compressed image - Lossless (256 color limit) | 80 | |
9571276536 | MP3 file | MPEG-1 Audio Layer 3 - or more commonly referred to as MP3. It is a lossy compression algorithm that removes certain frequencies that humans can't hear. When creating an MP3 file, the bit rate that is used to encode the audio has a big effect on the quality of the sound. Setting a bitrate that is too low can produce a file that has poor sounding quality. Compressed Sound - Lossy | 81 | |
9571276537 | ZIP file | Compressed Files - Lossless | 82 | |
9571276538 | PNG file | Portable Network Graphics file. The format uses lossless compression and is generally considered the replacement to the GIF image format. Compressed Image - Lossless | 83 | |
9571276539 | IETF | Develops and promotes voluntary Internet standards and protocols, in particular the standards that comprise the Internet protocol suite (TCP/IP). - Internet Engineering Task Force | 84 | |
9571276540 | Internet | A network of networks of computers and servers that are connected to each other using a specific set of rules to communicate with each other. | 85 | |
9571276541 | Net Neutrality | The principle that all Internet traffic should be treated equally by Internet Service Providers. | 86 | |
9571276542 | IP Address | A number assigned to any item that is connected to the Internet. | 87 | |
9571276543 | Packets | Small chunks of information that have been carefully formed from larger chunks of information for the purpose of transferring from one computer to another through a redundant and fault tolerant system (TCP/IP). | 88 | |
9571276545 | TCP | Transmission Control Protocol - provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing. | 89 | |
9571276546 | DNS | The Domain Name System, the service that translates URLs to IP addresses. | 90 | |
9571276547 | HTTP | HyperText Transfer Protocol - the protocol used for transmitting web pages over the Internet | 91 | |
9571276548 | URL | Uniform Resource Locator: An easy-to-remember address for calling a specific web page (like www.studio.code.org). | 92 | |
9571276549 | Innovation | A novel or improved idea, device, product, etc, or the development thereof. | 93 | |
9571276551 | Bit | A contraction of "Binary Digit". A bit is the single unit of information in a computer, typically represented as a 0 or 1. | 94 | |
9571276552 | Bit rate | The number of bits that are conveyed or processed per unit of time. e.g. 8 bits/sec. | 95 | |
9571276553 | Protocol | A set of rules governing the exchange or transmission of data between devices. | 96 | |
9571276554 | ASCII | The universally recognized raw text format that any computer can understand. American Standard Code for Information Interchange. | 97 | |
9571276555 | Code | (v) to write code, or to write instructions for a computer. | 98 | |
9571276556 | Permutation | An ordered arrangement of objects. | 99 | |
9571276557 | Number System | A collection of symbols and the rules for ordering them. | 100 | |
9571276558 | Prototype | A preliminary sketch of an idea or model for something new. It's the original drawing from which something real might be built or created. | 101 | |
9571276561 | Decimal | Base 10 Number System, 10 characters, 0-9 | 102 | |
9571276562 | Binary | Base 2 Number System, 2 characters, 0-1, or in some way referring to a system that has only 2 options. A way of representing information using only two options. | 103 | |
9571276563 | Hexadecimal | Base 16 Number System, 16 characters 0-F | 104 | |
9571276564 | 1 byte | 8 bits | 105 | |
9571276565 | 1 kilobyte | 1,024 bytes, 8,192 bits, or approximately 1,000 bytes | 106 | |
9571276566 | 1 megabyte | 1,024 kilobytes, 1,048,576 bytes, or approximately 1,000 kilobytes | 107 | |
9571276567 | Bandwidth | Transmission capacity, measured by bitrate. Think of it as the amount of data (bits) that can travel through a network in an amount of time. (wired or wireless) | 108 | |
9571276568 | Latency | The amount of delay when sending digital data over the internet or the total time it takes a data packet to travel from one node to another. | 109 | |
9571276569 | Infinite loop | What happens when the condition to continue looping remains true. The code will cycle through a set of commands forever. | 110 | |
9571276570 | Big Data | Data sets so large or complex that traditional data processing applications are inadequate. (generally larger than a home computer could process) | 111 | |
9571276571 | Vigenère Cipher | is an encryption algorithm that uses a key to decrypt the data. it's strong because looking at the cipher text there are no discernable patterns assuming a good key was chosen. it's resistant to analysis which means that the key has to be guessed | 112 | |
9571276572 | SSL (Secure Sockets Layer) | Issues digital certificates for websites. It is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private. | 113 | |
9571276573 | TLS | Transport Layer Security. SSL and TLS are both cryptographic protocols that provide authentication and data encryption between servers, machines and applications operating over a network (e.g. a client connecting to a web server). SSL is the predecessor to TLS. Over the years, new versions of the protocols have been released to address vulnerabilities and support stronger, more secure cipher suites and algorithms. | 114 | |
9571276574 | Virus | A program or piece of code that is loaded onto your computer without your knowledge. This type of program usually spreads to other programs or computers by duplicating itself and usually disrupts or damages data. | 115 | |
9571276575 | DDoS (Distributed Denial of Service) | A type of attack where multiple virus-infected computers are used to target a single system, overwhelming it with traffic (fake requests), making all the sites resources unavailable for legitimate users, rendering it useless or unresponsive | 116 | |
9571276576 | Phishing | The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to "bait" the user into surrendering private information that poses a security or privacy risk to the user like usernames, passwords, or credit card numbers. | 117 | |
9571276577 | Antivirus | Is a software utility that detects, prevents, and removes viruses, worms, and other malware from a computer (source: techopedia) | 118 | |
9571276578 | Firewall | A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defend set of security rules (source: cisco) | 119 | |
9571276579 | Certificate Authorities (CAs) | Issue digital certificates that validate the ownership of encrypted keys used in secured communication and are used in authentication of public key encryption. | 120 | |
9571276580 | Digital certificates | Electronic credentials, similar to ID cards, that are used to certify the online identities of individuals, organizations, and computers. Certificates are issued and certified by certificate authorities (CAs). (definition source: Microsoft) | 121 | |
9571276581 | DNS Spoofing | This is what happens when a DNS server is hacked and IP addresses associated with domain names are changed. You are then sent to a fake website (created by the hacker) that may appear as if it is real. | 122 | |
9571276582 | Cookies | What websites use to remember who you are | 123 | |
9571281246 | And | Basic logic gate where every part of a statement must be true in order for the entire statement to be true. | 124 | |
9571286069 | Applications | Includes word processors, photo editing software, web browsers, games, music programs, almost everything else on the computer excluding saved files. | 125 | |
9571297741 | ARPANET | The advanced research projects agency network, the first agency to use TCP/IP. | 126 | |
9571332447 | Central Processing Unit (CPU) | Carries out every command or process on the computer and can be thought of as the brain of the computer. | 127 | |
9571344557 | Client | Any computer that requests a service (like information or computation). | 128 | |
9571361210 | Cloud Computing/Storage | Rather than using a local computer, this form of computation uses a network of remote servers to calculate and/or store data; has fostered new ways to communicate and collaborate. | 129 | |
9571362684 | CMYK | Used for printing and stands for Cyan, Magenta, Yellow, and Black (Key) where the number associated with each letter is the percentage of each color used. | 130 | |
9571419875 | Computer | An electronic device that processes data according to a set of instructions or commands known as a program. | 131 | |
9571425794 | Constant | Used in coding to store a value that cannot be changed | 132 | |
9571427731 | CSS | Cascading Style Sheets: Refines mark-up in HTML | 133 | |
9571523809 | 1 gigabyte | 1,024 megabytes, 1,048,576 kilobytes, 1,073,741,824 bytes, 8,589,934,592 bits, or approximately 1,000 megabytes | 134 | |
9571653154 | Domain Name | A name given or linked to an IP address. | 135 | |
9571657300 | Encryption | Taking data and converting it so it is unreadable. | 136 | |
9571664877 | Fault Tolerant | A property of IP, if there is an error, it will still work properly. | 137 | |
9571667655 | FTP | File Transfer Protocol, used for sending files through the internet from one computer to another. | 138 | |
9571672692 | Hacker | Someone who exploits weaknesses on a computer or network and can steal or disrupt data. | 139 | |
9571677349 | HTML | Hyper Text Markup Language, the standard for creating webpages. | 140 | |
9571700632 | HTTPS | A secure version of HTTP that uses SSL/TLS. | 141 | |
9571879095 | IPv4 vs IPv6 | Internet Protocol versions. v4 uses 32-bit addresses while v6 uses 128-bit addresses. Know how to calculate the difference in how many unique addresses can be stored. | 142 | |
9571887429 | ISP | Internet Service Provider (the company you pay for internet) | 143 | |
9571894252 | Key | in cryptography, a shared secret to make the difficulty of the encryption harder to crack. | 144 | |
9571897086 | Name Server | A server that contains many IP addresses and their matching domain names. | 145 | |
9578460773 | Network | A group of computers that are connected so they can share resources using a data link. | 146 | |
9578468866 | Nibble or Nybble | Half of a byte or 4 bits. | 147 | |
9578474199 | One-Way Function | An algorithm or calculation that is easy in one direction and difficult in another. This type of function is used for encryption over the internet so that information can be easily encrypted but is very difficult to hack or guess the decryption algorithm or secret key. | 148 | |
9578513290 | Or | Basic logic gate where either part of a statement can be true for the entire statement to be true. | 149 | |
9578810304 | Root Name Server | One of 13 servers that contain every IP address and their matching names. | 150 | |
9578817876 | Router | A networking device that routes internet traffic through the interconnected system to the proper destination. | 151 | |
9578827570 | Sample Rate | Usually measured in bits per second. It is how often an analogue (continuous) signal is saved into bits when converting or saving as a digital file. | 152 | |
9578860009 | Sequence | The structure that runs one line after another in that order. | 153 | |
9578869500 | Server | Any computer that provides a service (the client computer requests information from a server). | 154 | |
9578897807 | Subdomain | PRECEEDS the domain name, owned by the domain. Anything after the ".com/" is a file or something more specific in the file structure of that particular page. It is not the domain name. Check this: https://poxse.com/domain/what-is-domain-name Hierarchical of domains: rea.com. The "." marks the location of the type of address this is. To the right of the "." is "com". This syntax will then look for where "rea" is located amoung all the "com" addresses. | 155 | |
9578996945 | Symmetric Encryption | The same key is used to encrypt and decrypt a message. The decryption process is exactly the reverse of the encryption process. | 156 | |
9579023574 | UDP | User Datagram Protocol is an alternative communications protocol to Transmission Control Protocol (TCP which takes as long as possible to make sure that the entire file has been received and assembled perfectly) used primarily for establishing low-latency and loss tolerating (if connection or data is lost, it continues to stream) connections between applications on the Internet like video (minor TV) or audio (pandora) content. | 157 | |
9579089450 | VoIP | Voice over Internet Protocol is a protocol used to transfer telephone calls over the IP based internet. | 158 | |
9579099961 | World Wide Web | The set of interconnected documents identified by the hyperlinks and URL. A way of accessing information over the medium of the Internet. It is an information-sharing model that is built on top of the Internet. The Web uses the HTTP protocol to transmit data. The Web is just one of the ways that information can be disseminated over the Internet. The Internet, not the Web, is also used for email, which relies on SMTP, Usenet news groups, instant messaging and FTP and VoIP for telephony. | 159 | |
9579166646 | Generalizing | Pulling out specific differences to make one solution work for multiple problems. This can be done in a function using parameters so that the function can be used for multiple purposes. | 160 | |
9581070447 | Append | Adding an element to the end of a list | 161 | |
9581073475 | Variable Assignment | When you put a value into a memory location and give that location a name in a program; on the AP exam, the assignment operator is an arrow <- | 162 | |
9581162833 | Binary Search | An algorithm that finds a target in an ORDERED set by halving the set being searched at each stage (based on checking a current value against the target) until the target is found or a set of one element is all that remains. | 163 | |
9581186514 | Citizen Science | Collection and analysis of data by non-scientists on home computers; often performed in collaboration with professional scientists. | 164 | |
9581195550 | Clustering Data | Grouping data sets together to provide an argument that a pattern exists. | 165 | |
9581202645 | Computing | Using computer algorithms to solve problems. | 166 | |
9581289881 | Constraint | A limit placed to control inputs or outputs. | 167 | |
9581292545 | Cookie | Information stored by a browser to track movement and information triggered by a person viewing a website. | 168 | |
9581295321 | Creative Commons | A copyright license that can be used for free distribution while still ensuring proper attribution with appropriate citations. | 169 | |
9581751631 | Cryptography | The study of hiding messages or finding hidden messages | 170 | |
9581754155 | Crowdsourcing | Multiple people working (often online) together to complete a task. | 171 | |
9581757982 | Curated Database | Database organized in such a way to facilitate efficient searching. | 172 | |
9581761166 | Cyberattack | Attempt to penetrate, use, or access information on another computer or network without permission; examples include phishing or viruses. | 173 | |
9581767545 | Database | A large collection of data that can be organized, searched, clustered, classified, transformed, displayed, and/or filtered to gain new insight or make conclusions. | 174 | |
9581773595 | Data Compression | Technique that reduces the number of bits stored or transmitted; could be lossy or lossless. | 175 | |
9581775149 | Data Mining | The analysis of large databases to retrieve new insights; example: artificial intelligence that has enabled innovation in medicine, business, and science. | 176 | |
9581791130 | Element | One specific item in a list. | 177 | |
9581792385 | Floating-Point Value | Used in programming language to represent non-integers. | 178 | |
9581794154 | Linear (Sequential) Search | A search algorithm that finds a target by looking at each item, one at a time, until the end of the set is reached or the target is found. | 179 | |
9581800195 | Logic Gate | One of the building blocks of a computer chip, logic gates typically take two inputs and return either true or false; combinations of operations of gates can create different streams of logic used in calculations and processes in advanced chips such as integrated circuits. (these are your ANDs and ORs from programming) | 180 | |
9581805767 | Machine Learning | The ability of a computer to learn without being explicitly programmed; example: artificial intelligence that has enabled innovation in medicine, business, and science. | 181 | |
9581812433 | Overflow Error | Error caused when a number is too large for the memory allocated for it. For example, the decimal value of the non-integer 1/3 is a non-terminating decimal. There is no way for a computer to allocate an infinite number of bits so the computer stores this number using the highest number of bits possible. | 182 | |
9581820667 | Network Types | Peer-peer: multiple computers sharing resources. Client-server: one central computer stores resources that are used by multiple other computers. | 183 | |
9581826923 | Pseudocode | Words or diagrams used to organize thoughts to help plan writing code; helps programmers translate specifications into code. | 184 | |
9581832775 | Reasonable Time | Way to analyze an algorithm in terms of the number of steps required to solve a problem. An algorithm is said to run in a reasonable amount of time if the number of steps the algorithm takes is less than or equal to a polynomial function (constant, linear, square, cube, etc.) of the size of the set. | 185 | |
9581840168 | Redundant System | A system that is self checking or has multiple pathways to success in order to improve system reliability. | 186 | |
9581842524 | Round-off Error | caused with operations on floating-point values; an example is a computer trying to store 1/3. | 187 | |
9603969161 | SMTP | Standard for how email messages are sent and received on the internet. | 188 | |
9603987702 | Smart Technology | Technology that responds to the user and/or the environment; examples include smart grids, smart buildings, smart transportation, smart phones, or smart watches (These last 2 are what are called "wearables".) | 189 | |
9604060023 | System Capacity | Amount of bits that can be stored on a system. | 190 | |
9604328481 | Text-Based Language | One of the two types of languages commonly seen in programming; usually created using a text editor that may or may not need to compile in order to run. | 191 | |
9604345625 | Block-Based Language | One of the two types of languages commonly seen in programming; writing code in this language often involves dragging and dropping pictorial code, rather than typing text. | 192 | |
9604358032 | Transistor | One of the building blocks of a computer chip which controls flow of electricity by amplifying or redirecting it. | 193 | |
9604378664 | Undecidable Problem | No algorithm can be constructed to answer "yes" or "no" for all inputs. | 194 | |
9604397305 | Unsolvable Problem | Cannot be solved exactly using any algorithm. | 195 |
AP CSP Exam Vocabulary Flashcards
Primary tabs
Need Help?
We hope your visit has been a productive one. If you're having any problems, or would like to give some feedback, we'd love to hear from you.
For general help, questions, and suggestions, try our dedicated support forums.
If you need to contact the Course-Notes.Org web experience team, please use our contact form.
Need Notes?
While we strive to provide the most comprehensive notes for as many high school textbooks as possible, there are certainly going to be some that we miss. Drop us a note and let us know which textbooks you need. Be sure to include which edition of the textbook you are using! If we see enough demand, we'll do whatever we can to get those notes up on the site for you!