13898973434 | Innovation | A new idea | 0 | |
13898984628 | Binary | A way of representing information using only two options. | 1 | |
13898987957 | Bit | A contraction of "Binary Digit". A bit is the single unit of information in a computer, typically represented as a 0 or 1. | 2 | |
13898994961 | Bandwidth | Transmission capacity measure by bit rate | 3 | |
13899000340 | Bit rate | (sometimes written bitrate) the number of bits that are conveyed or processed per unit of time. e.g. 8 bits/sec. | 4 | |
13899011299 | Latency | Time it takes for a bit to travel from its sender to its receiver. | 5 | |
13899018714 | Protocol | A set of rules governing the exchange or transmission of data between devices. | 6 | |
13899021233 | Abstraction | Reducing information and detail to focus on essential characteristics. | 7 | |
13899034680 | ASCII | American Standard Code for Information Interchange | 8 | |
13899037877 | IETF | Internet Engineering Task Force | 9 | |
13899041162 | Internet | A group of computers and servers that are connected to each other. | 10 | |
13899047413 | Net Neutrality | the principle that all Internet traffic should be treated equally by Internet Service Providers. | 11 | |
13899051669 | IP Address | A number assigned to any item that is connected to the Internet. | 12 | |
13899062761 | Packets | Small chunks of information that have been carefully formed from larger chunks of information. | 13 | |
13899074999 | Network Redundancy | having multiple backups to ensure reliability during cases of high usage or failure | 14 | |
13899078515 | Router | A type of computer that forwards data across a network | 15 | |
13899214030 | DNS | Domain Name System | 16 | |
13899217578 | HTTP | Hypertext Transfer Protocol | 17 | |
13899225327 | TCP | Transmission Control Protocol | 18 | |
13899231266 | URL | A location or address identifying where documents can be found on the Internet; a Web address | 19 | |
13899246530 | Heuristic | a problem solving approach (algorithm) to find a satisfactory solution where finding an optimal or exact solution is impractical or impossible. | 20 | |
13899251911 | Lossless Compression | a data compression algorithm that allows the original data to be perfectly reconstructed from the compressed data. | 21 | |
13899255684 | image | a type of data used used for graphics or pictures | 22 | |
13899268588 | metadata | data that describes other data | 23 | |
13899277236 | pixel | Short for "picture element" it is the fundamental unit of a digital image, typically a tiny square or dot which contains a single point of color of a larger image. | 24 | |
13899285586 | hexadecimal | A base-16 number system that uses sixteen distinct symbols 0-9 and A-F to represent numbers from 0 to 15. | 25 | |
13899288479 | RGB | the RGB color model uses varying intensities of (R)ed, (G)reen, and (B)lue light are added together in to reproduce a broad array of colors. | 26 | |
13899292909 | lossy compression | (or irreversible compression) a data compression method that uses inexact approximations, discarding some data to represent the content. Most commonly seen in image formats like .jpg. | 27 | |
13899297339 | algorithm | a step-by-step procedure for solving a problem | 28 | |
13899308831 | High level programming language | A programming language with many commands and features designed to make common tasks easier to program. Any high level functionality is encapsulated as combinations of low level commands. | 29 | |
13899313769 | Low level programming language | A programming language that captures only the most primitive operations available to a machine. Anything that a computer can do can be represented with combinations of low level commands. | 30 | |
13899317559 | Iterate | To repeat in order to achieve, or get closer to, a desired goal. | 31 | |
13899321562 | Selection | A generic term for a type of programming statement (usually an if-statement) that uses a Boolean condition to determine, or select, whether or not to run a certain block of statements. | 32 | |
13899335343 | Sequencing | A generic term for a type of programming statement (usually an if-statement) that uses a Boolean condition to determine, or select, whether or not to run a certain block of statements. | 33 | |
13899352163 | Pair Programming | Method of programming with another person on a single computer. | 34 | |
13899360662 | Turtle Programming | method of learning to code with a robot called "turtle" | 35 | |
13899381949 | function | functions are reusable abstractions that reduce the complexity of writing and maintaining programs. | 36 | |
13899393771 | Top Down Design | a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up. | 37 | |
13899397015 | API | a collection of commands made available to a programmer | 38 | |
13899402481 | Documentation | a description of the behavior of a command, function, library, API, etc. | 39 | |
13899410159 | Library | a collection of commands / functions, typically with a shared purpose | 40 | |
13899414281 | Parameter | An extra piece of information passed to a function to customize it for a specific need | 41 | |
13899423763 | For Loop | Loops that have a predetermined beginning, end, and increment (step interval). | 42 | |
13899431754 | Loop | The action of doing something over and over again. | 43 | |
13899435578 | Big Data | a broad term for datasets so large or complex that traditional data processing applications are inadequate. | 44 | |
13899439300 | Moore's Law | the observation that computing power roughly doubles every two years. | 45 | |
13899442143 | One-pager | A business/corporate term for a one-page document that summarizes a large issue, topic or plan. | 46 | |
13899456471 | Caesar Cipher | a technique for encryption that shifts the alphabet by some number of characters | 47 | |
13899461903 | Cracking Encryption | When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption. | 48 | |
13899465839 | Decryption | a process that reverses encryption, taking a secret message and reproducing the original plain text | 49 | |
13899475206 | Encryption | a process of encoding messages to keep them secret, so only "authorized" parties can read it. | 50 | |
13899512414 | Random Substitution | an encoding technique that maps each letter of the alphabet randomly to different letters or characters. | 51 | |
13899519919 | Computationally Hard | a "hard' problem for a computer is one in which it cannot arrive at a solution in a reasonable amount of time. | 52 | |
13899526519 | Asymmetric encryption | used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt. | 53 | |
13899529459 | Modulo | a mathematical operation that returns the remainder after integer division. Example: 7 MOD 4 = 3 | 54 | |
13899532215 | Private Key | In an asymmetric encryption scheme the decryption key is kept private and never shared, so only the intended recipient has the ability to decrypt a message that has been encrypted with a public key. | 55 | |
13899542226 | Private Key Encryption | Data is encrypted using a single key. | 56 | |
13899558597 | Symmetric encryption | An encryption method whereby the same key is used to encode and to decode the message | 57 | |
13899568629 | antivirus Software | usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them. | 58 | |
13899573863 | DDos Attack | Distributed Denial of Service Attack. Typically a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed. | 59 | |
13899589487 | Firewall | Part of a computer system that is designed to block unauthorized access | 60 | |
13899594057 | Phishing Scam | a thief trying to trick you into sending them sensitive information. Typically these include emails about system updates asking you send your username and password, social security number or other things. | 61 | |
13899597334 | SSL/TLS | Secure Sockets layer / Transport Layer Security - An encryption layer of HTTP that uses public key cryptography to establish a secure connection. | 62 | |
13899607635 | Virus | A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data | 63 | |
13899617021 | Callback function | a function specified as part of an event listener; it is written by the programmer but called by the system as the result of an event trigger. | 64 | |
13899619653 | event | An action that causes something to happen. | 65 | |
13899623139 | Event-driven programming | a programming approach whereby the program's behavior is controlled by writing code that responds to various events that occur, such as Button clicks. | 66 | |
13899626638 | event handling | an overarching term for the coding tasks involved in making a program respond to events by triggering functions. | 67 | |
13899632049 | event listening | a command that can be set up to trigger a function when a particular type of event occurs on a particular UI element. | 68 | |
13899636545 | UI elements | on-screen objects, like buttons, images, text boxes, pull down menus, screens and so on. | 69 | |
13899641185 | user interface | The visual elements of an program through which a user controls or communications the application. Often abbreviated UI. | 70 | |
13899646032 | debugging | Finding and fixing problems in your algorithm or program. | 71 | |
13921260533 | data type | All values in a programming language have a "type" - such as a Number, Boolean, or String - that dictates how the computer will interpret it. For example 7+5 is interpreted differently from "7"+"5" | 72 | |
13921264596 | expression | A mathematical phrase that contains operations, numbers, and/or variables. | 73 | |
13921272397 | variable | A factor that can change | 74 | |
13921283486 | == | The equality operator (sometimes read: "equal equal") is used to compare two values, and returns a Boolean (true/false). Avoid confusion with the assignment operator "=", | 75 | |
13921286557 | Boolean | True or False | 76 | |
13921292685 | Global Variable | A variable whose scope is "global" to the program, it can be used and updated by any part of the code. Its global scope is typically derived from the variable being declared (created) outside of any function, object, or method. | 77 | |
13921303554 | If-statement | The common programming structure that implements "conditional statements". | 78 | |
13921306906 | local variable | A variable with local scope is one that can only be seen, used and updated by code within the same scope. Typically this means the variable was declared (created) inside a function -- includes function parameter variables. | 79 | |
13921312745 | Variable Scope | dictates what portions of the code can "see" or use a variable, typically derived from where the variable was first created. (See Global v. Local) | 80 | |
13921316286 | concatenate | link together | 81 | |
13921316287 | string | A sequence of characters in quotes | 82 | |
13921323481 | Conditionals | Statements that only run under certain conditions. | 83 | |
13921335781 | Boolean Expression | in programming, an expression that evaluates to True or False. | 84 | |
13921338737 | iterate | To repeat in order to achieve, or get closer to, a desired goal. | 85 | |
13921344768 | while loop | A control flow statement that allows code to be executed repeatedly. | 86 | |
13921348462 | procedure | A way of organizing, writing, and conducting the experiment. | 87 | |
13921352823 | <-- | arrow | 88 | |
13921358830 | cryptography | the art of protecting information by transforming it into an unreadable format, called cipher text | 89 | |
13921360803 | robot | A machine capable of carrying out a complex series of actions automatically | 90 | |
13921364685 | MOD | act of modifying hardware, software, or virtually anything else | 91 | |
13921368067 | selection | A generic term for a type of programming statement (usually an if-statement) that uses a Boolean condition to determine, or select, whether or not to run a certain block of statements. | 92 | |
13921374028 | relational operations | Expressions that compare two values such as equal to or greater than | 93 | |
13921381969 | assignment | The act of transferring to another all or part of one's rights arising under a contract. | 94 | |
13921385176 | Input | Something put into a system, such as resources, in order to achieve a result. | 95 | |
13921387219 | display | displaying code | 96 |
AP Vocab Flashcards
Primary tabs
Need Help?
We hope your visit has been a productive one. If you're having any problems, or would like to give some feedback, we'd love to hear from you.
For general help, questions, and suggestions, try our dedicated support forums.
If you need to contact the Course-Notes.Org web experience team, please use our contact form.
Need Notes?
While we strive to provide the most comprehensive notes for as many high school textbooks as possible, there are certainly going to be some that we miss. Drop us a note and let us know which textbooks you need. Be sure to include which edition of the textbook you are using! If we see enough demand, we'll do whatever we can to get those notes up on the site for you!