13834587716 | abstraction | remove the details to make something more general; do not have to know what happens behind the scenes; makes code easier to understand | 0 | |
13834608044 | numeric values | each numeric representation is an abstraction because they simplify the details of what we have | 1 | |
13834617983 | machine code | what computers read; made up of 1 and 0s (0 means no electric charge and 1 means electric charge); the lowest level of abstraction | 2 | |
13834635834 | bit | either a 1 or 0; eight bits equal one byte | 3 | |
13834646692 | hexadecimal | used by humans (not computers) for shorter version of binary; uses 0-9 and A-F; 1, 16, 256, 4096 | 4 | |
13834657621 | binary | uses 1s and 0s; anytime you have a binary number that is all 1s to the right the number in decimal is always 1 less than the next power of two; 1, 2, 4, 8, 16, 32, 64, 128 | 5 | |
13834689306 | ASCII (American Standard Code for Information Interchange) | used to convert text to binary codes so computer can read it; uses seven bits and can only write 128 characters | 6 | |
13834699094 | Unicode | used to convert text to binary codes; uses more bits so has more characters for foreign symbols | 7 | |
13834712274 | data type | this is important so that a computer knows how to interpret the binary as a string, integer, or fraction number | 8 | |
13847168028 | string | text fields and are denote with quotation marks around the string field | 9 | |
13847175780 | integers | whole numbers; can be used in math operations and expressions where strings cannot | 10 | |
13847192485 | fractional numbers | AKA floating point numbers; numbers with decimal points; ex: 52.0; used for math; imprecise storing so money should not be stored as this data type | 11 | |
13834721901 | colors | represent with two hexadecimal (1 byte) digits for each red, green, blue (RGB); can represent over 16 million possible colors | 12 | |
13834805346 | compiler and interpreter | software types; complier gets data ready to go to the interpreter where it is broken down into machine language (binary) | 13 | |
13834825564 | how if binary data processed? | by hardware | 14 | |
13834833634 | logic gates | hardware used to create digital circuits which are used to represent boolean functions | 15 | |
13834844739 | boolean functions | have either true or false as value; and (both conditions have to be true), or (one condition has to be true), not (changes the value to its opposite) | 16 | |
13834872291 | overflow error | occur in computers when the number to be represented is larger than the compare can hold | 17 | |
13834880181 | rounding errors | occur because of the way numbers with decimal points are stored in the computer; stored as whole number + the decimal point + the fractional part of the number; imprecise; could cause inaccurate results | 18 | |
13834904975 | high level program languages | more natural language oriented; can run on almost any device; must be complied down to machine code to actually execute but the programmer does not interact with code at that level (abstraction); makes writing programs easier and faster; programs themselves run slower because they have to be complied before executing; App Inventor, Snap, Java | 19 | |
13834932741 | low level programing languages | one step up from machine language; AKA assembly languages; specific to a particular computer; much more difficult to code; don't need to be complied (just interpreted) and therefore run faster | 20 | |
13834953679 | variable | A placeholder for a piece of information that can change; abstraction; can be for numbers, text. fields | 21 | |
13834968425 | expressions | abstractions because you could have a calculation to evaluate or solve to know the value to store in the variable | 22 | |
13834988245 | procedures | AKA functions; are called by code to run; used to reuse code and therefore make code more concise (abstraction) | 23 | |
13847081325 | calling procedures | when a procedure is called the program will pause at that location, go and execute the code in the procedure, and then come back to the line of code after the call; parameters sent to the procedure must be sent in the same order if there are more than one and they are the same data type; procedures may need to send data calculated or collected in the procedure back to the calling program via a "return" statement | 24 | |
13834977851 | parameters | allow the calling program to send values to the procedure via arguments when the procedure is called; the values sent to the procedure can be different values each time so you can therefore call a procedure more than once | 25 | |
13847278579 | argument | sent to procedures where they are then used as parameters | 26 | |
13835032219 | libraries | AKA APIs; groups of programs already tested; available form use through importing into your program; abstraction: can use them with out knowing the details | 27 | |
13835057109 | transistors | turn the electrical currents on and off; a low-level hardware abstraction; computer chips contain billions of them | 28 | |
13835065309 | motherboard | controls all aspects of the computer; has multiple computer chips; high level hardware abstraction | 29 | |
13835075782 | moore's law | the number of transistors (computing power) on integrated circuits doubles every two years; somewhat inaccurate today | 30 | |
13835116466 | computer processing | computers take input from device like keyboard, mouse, etc.; the CPU directs the execution of the commands; memory and storage produce output on monitors, speakers, printers, etc. | 31 | |
13845645403 | models and simulations | can be used to evaluated and then refine hypotheses which reduces cost and saves time; they can be modified based on the results of the tests and then retested; can be used to test potentially dangerous situations without putting anyone at risk | 32 | |
13845651203 | processing data | computers process data that can be used for decision making and research; computers see patterns that individuals would not | 33 | |
13845869521 | cleaning | when computers remove corrupt data, remove or repair incomplete data, or verify ranges or dates; useful because it prevents mistakes in data interpretations later | 34 | |
13845924381 | filtering | computers identifying and extracting different subsets and to help people make meaning of the data | 35 | |
13845937793 | classifying | computers grouping data with common features and values, which are provided by people who need to work with the data | 36 | |
13845946691 | patterns | computers can recognize these that people are not able to see or cannot process enough data to see and then transform into information for people to interpret and understand | 37 | |
13845952364 | data mining | computers searching for patterns in large data sets; can be used by companies too make business decisions | 38 | |
13845962064 | machine learning | subset of data mining that uses algorithms to analyze data and predict behavior; through these predictions, actions can be programed to occur when certain criteria are met; used for targeted adds or to release fraud alerts from banks | 39 | |
13845976766 | why was the web created? | to allow scientist across the globe to share documents for collaboration | 40 | |
13845981635 | big data | vast amounts of data that are too large to fit into the available memory on out computers or even servers at locations; need multiple servers to hold and process the data | 41 | |
13845999676 | server farms | large computers located in one place for the purpose of processing big data | 42 | |
13846021659 | spreadsheets and databases | used to filter, organize, and search the data | 43 | |
13846026263 | processing big data | methods like Map Reduce and Hadoop distribute data sets over many servers; each server processes the section of the data set it has; all are running the same program at the same time; individual solutions combined for a final solution | 44 | |
13846041295 | metadata | data that describes data; can help others find data and use it more effectively; includes: date, time stamp, author/owner, file size, file type, tags (enable web searches to find the data more easily) | 45 | |
13846055615 | scalability | the ability to increase the capacity of a resource without having to go to a completely new solution and for that resource to continue to operate at acceptable levels; the increase should be transparent to the users of the resource (processing should not slow down); important aspect in storing and processing large data sets; includes the ability to downsize with impacting storage or processing; ex: the cloud, networks | 46 | |
13846092275 | scalability of networks | as more devices are added, network managers increase access points and other devices to accommodate the additional network devices and traffic; result of redundancy | 47 | |
13846110627 | what is the importance of passwords? | strong passwords block those trying to gain unauthorized access | 48 | |
13846119230 | aggregation of data | some sites claim to do this to protect privacy; they summarize, remove, and mask the data findings so that no individual or group can be identified | 49 | |
13846129174 | kilobyte | 1000 bytes | 50 | |
13846129175 | Megabyte | 1 million bytes, 1000 kilobytes | 51 | |
13846139128 | lossless | compression techniques that allows the original image to be restored; no data is lost but the file size cannot be as compressed; a code is assigned to each character and characters that appear more often get a shorter code; doesn't work well for jpegs | 52 | |
13846149479 | lossy | compression techniques lose some data in the compression process; the original data can never be restored but the compression is greater; jpeg does this by replacing similar colors with one color creating changes the human eye cannot detect | 53 | |
13846193289 | When will compression work best? | the larger the file the greater the opportunity for a larger savings on the file size | 54 | |
13846197402 | file extension | two or three letters following a period that indicate what software tools can open and process the data | 55 | |
13846211010 | what takes up more storage space files that are to be viewed or edited? | files that are to be edited because a backup copy and a copy for editing it | 56 | |
13846237972 | what is the best way to present data? | graphics in the form of charts, tables, and other designs are useful to present data in a visual format and in summary format | 57 | |
13846320653 | algorithm | a set of steps to do a task or solve a problem; programs implement them; more than one correct algorithm to solve a problem | 58 | |
13846325545 | sequential | statements that are executed as written in the program; once a statement is complete, the next statement is run | 59 | |
13846332727 | selection | "if (condition)" statements that evaluate based on Boolean values; execute once; statements associated with "else" will only run when the "if" condition is false | 60 | |
13846347527 | iterative | loops that run over and over until the condition associated with it evaluates false; loops can not execute at all depending on the condition | 61 | |
13846358069 | infinite loop | A loop in which the terminating condition is never satisfied. | 62 | |
13846386711 | pseudocode | a combination of natural and programming languages | 63 | |
13846471059 | intractable problems | problems for which we do not have efficient enough algorithms to solve; the algorithm could work for smaller data sets but needs exponential time or resources to run for large amounts of data; this is an aspect of cryptography that keeps our personal information private | 64 | |
13846494237 | heuristics | used to solve intractable problems; produces an answer close enough to the solution | 65 | |
13846504619 | unsolvable problems | there is no algorithm that can solve all cases of the problem | 66 | |
13846513209 | decidable problems | a problem where an algorithm can be written that results in a yes or no answer for all inputs | 67 | |
13846504618 | undecidable | a problem that does not have. an algorithm that can give a correct yes or no for each instance | 68 | |
13846538552 | algorithm efficiency | how long it will take to run and how much memory will be needed; can be determined by mathematically proving it and actually running it on data sets and measuring how long it took and memory resources needed | 69 | |
13846604356 | searching | deals with finding the needed data from everything in the data set | 70 | |
13846608678 | linear searches | AKA sequential searches; check each individual record one after the other in the order to either find the desired data or determine it is not in the data set; best case is that the item is the first in the list; the worst case is that it isn't in the list | 71 | |
13846627431 | binary searches | more efficient than linear; however data must be sorted for them to work; divides the data set into two equal parts and then feed back about whether the value is high or lower than the midpoint determines which half to disregard and which half to continue the process in until the value is found or it is determined it isn't in the list | 72 | |
13846708475 | where do list start? | at index position 1 | 73 | |
13846717224 | iterative development process | the steps are repeated through out the process as new information is gathered or clarified and each iteration produces a better result; the cycle is shorter each time | 74 | |
13847051726 | 32 bit computer/ 64-but computer | 2^32 bits, 2^64 bits | 75 | |
13847218998 | how do you assign a value to a variable? | the variable is always to the left of <-- | 76 | |
13847224784 | Do computer use PEMDAS? | yes | 77 | |
13847224785 | list | a collection of numbers, words, phrases, or a combination of these; provide the ability to store more than one value in the same variable as long as the variable is defined as a list; abstraction of a group of numbers and, or strings | 78 | |
13847241177 | index | how individual items in a list are accessed; starts at 1 | 79 | |
13847246868 | length of a list | number of items in the list; snacks(length(snacks)) access the last item in the list | 80 | |
13847254090 | for each loop | stops after the last element in the list has been processed | 81 | |
13847260786 | appending | add item to the end of list | 82 | |
13847273349 | Internet | network of networks; hardware driven with cables, wire, etc. and even when there is a wireless device there are still access points and cables that create the wireless network | 83 | |
13847789467 | network | a group of two or more computer systems linked together | 84 | |
13847806146 | End-to-end architecture | at the sending location the info is broken into smaller packets of the same size; the packets are sent to the destination along different routes; the intermediate routers along the path move the packets to the next destination on the path; packets are put back together in order at the destination (nothing happens in the middle) | 85 | |
13847851217 | fault tolerant | if one point goes down and is not working then the traffic is redirected to a different node to get to its ultimate destination; result of duplication | 86 | |
13847862364 | packet | information separated into fixed lengths; header information includes. the destination address and where to place the info in the packet in the final reconstruction | 87 | |
13847874370 | packet switching | the transmission technology that divides blocks of text into packets | 88 | |
13847888352 | node | every device on a network is called this; AKA a host | 89 | |
13847892124 | IP address | when a device connects to the internet it is give this; it's how the internet knows where to route information; enables devices to find and communicate with each other; | 90 | |
13847907460 | protocols | A set of rules governing the exchange or transmission of data between devices so that different equipment made by different companies can communicate with each other | 91 | |
13847924864 | Internet Engineering Task Force (IETF) | a committee of representative from different industries who agree on the protocol for everyone to follow; part of the internet society | 92 | |
13847937836 | IPv4 and IPv6 | IPv4 is the current protocol for IP address but as more are needed it is being replaced by IPv6 | 93 | |
13847946863 | TCP/IP | (Transmission Control Protocol/Internet Protocol) TCP creates the packets and reassembles them; IP moves the packets through the network to their target location | 94 | |
13847955154 | Open Systems Interconnection (OSI) | A model with seven layers that each deal with an aspect of network communications allowing different types of computers to be linked together; application, presentation, session, transport, network, data link, physical; only layers, one, two, and three from the bottom are mandatory for data transmission therefore other layers may not be used in simpler communication | 95 | |
13847994249 | Simple Mail Transfer Protocol (SMTP) | the protocol used for email transmission | 96 | |
13847995611 | HTTP | controls how web page data is requested, sent, and received from the browsers and servers where web pages are stored | 97 | |
13848001989 | HTTPS | used for secure transactions; uses certificate authorities to verify a site's identity; encrypts data before it is separated into packets | 98 | |
13848005427 | bandwidth | the data transfer rate or the amount of data that can be moved across the network in a set amount of time; measured in bps (bits per second) or Mb/s (megabits per second) | 99 | |
13848021337 | how do you determine whether to plan to upgrade your bandwidth by purchasing a faster transfer rate? | by looking at the download speed; the download speed is faster than the upload speed because people usually download more than upload | 100 | |
13848030303 | latency | the time delay between the request for data and the receipt of it | 101 | |
13849636461 | domain names | http://anysite.anywhere.com top level domain: last level on the far right, ".com" each successive level to the left goes up one level; .anywhere. is the second level domain multiple levels are not always present any info to the right of the top level provides that path for folders and the ultimate filename | 102 | |
13849659507 | Domain Name Service (DNS) | translates the site name in test format to a numeric IP address; everyone is mapped to the one closet to them but if it goes down they are just sent to another server; allows sites to grow or change locations while domain name remains the same | 103 | |
13849675101 | World Wide Web | an application that runs on the Internet; a collection of web pages, or documents written in HTML | 104 | |
13849683050 | SSL/TLS | these provide a secure connection to send sensitive data between two sites; has fallen out of use because of vulnerability and Transport Layer Security (TLS) has replaced it | 105 | |
13849696314 | malware | malicious software | 106 | |
13849740364 | distributed denial of service attack (DDOS) | when the targeted web server is flooded with so many requests that it cannot handle them all; repossess from the server may. become slow and the server can ultimately crash (stop accepting requests); ex: cybersecurity attack | 107 | |
13849750328 | phishing attacks | create email and or websites that look exactly like a legitimate site. hoping to induce people to click on it; often prompt a user of their password, credit card number, or other sensitive data while appearing to be a valid transaction | 108 | |
13849759617 | viruses | attack themselves to or are a part of an infected file; many types that cause damage, delete, or steal your files and use your system to spread to other devices | 109 | |
13849769928 | computer worms | similar to viruses in the damage they can cause but they are not part of an infected file; they are separate files that can make endless copies of themselves and do not need a file to be open to spread | 110 | |
13849786834 | how to avoid malware | antivirus software, firewalls, and caution when downloading or opening files | 111 | |
13849788976 | cryptography | writing of secret codes | 112 | |
13849793326 | encryption | converting a message | 113 | |
13849795423 | decryption | deciphering the encrypted. message | 114 | |
13849796886 | ciphers | coded messages; have two parts: key-allows the creation of secret messages- and algorithm-the set of steps used to transpose the message to be unreadable to anyone who does not have the key | 115 | |
13849806497 | casear cipher | shifted letters over three spaces; symmetric cipher | 116 | |
13849810198 | symmetric cipher | the same key is used to encrypt and decrypt the message | 117 | |
13849813798 | asymmetric cipher | use different keys to encrypt and decrypt a message | 118 | |
13849817510 | brute force attack | searches involve testing every possible key to break the code which is time consuming; with today's computers we do not have the processing power to break long codes in a reasonable time | 119 | |
13849826170 | Frequency Analysis | knowing which letters in given language appear more often then comparing this to which letters appear most often in the encryption to crack the code; not effective anymore because now code makers use multiple alphabets to flatten out the letter frequencies | 120 | |
13849838874 | Polyalphabetic Cipher | Uses several different alphabets to defeat frequency analysis; a key word determines which alphabet is used for each letter | 121 | |
13849847400 | open standards | algorithms today use this, meaning they are open to everyone and are discussed by experts; the key is what keeps info secret until it gets to the intended person (public key encryption) | 122 | |
13849855893 | public key encryption | a public key is published to anyone and the private key decodes the message; the key is so long that using a brute force attack becomes an intractable problem | 123 | |
13849869309 | digital certificates | can be purchased form certificate authorities, which identify trusted sites; verify the Web browser that the encryption keys belong to the business thereby enabling e-commerce and the sending and receiving of secure documents | 124 | |
13849889535 | Short Message Service (SMS) | Technology that enables texting | 125 | |
13849927085 | asynchronous communication | messages can be sent at the convince o the sender and the receiver can check them and respond as time permits; not constant stream | 126 | |
13849933624 | synchronous communication | all parties are seeing the same thing at the same time; ex: video chat | 127 | |
13849941317 | internet effects | social media: news is shared in real time, better understanding of other places. (except some government block info), cyber bulling businesses: advertise online, employees telecommute, distractions that hurt productivity healthcare: files digitalized so they can be sent to specialists in any part of the world; physicians can collaborate with other doctors anywhere in the world online learning: gives students global perspective Global Positioning System (GPS): uses satellites to create maps of roads and terrain easy access to any kind of info | 128 | |
13849953253 | Cloud Computing | storing documents at a location different than where the owner of the files is located; documents accessible with internet connection to anyone with access benefits: multiple people can update a document at the same time, can access document form any device, | 129 | |
13849983845 | Internet of Things (IoT) | the network of products embedded with connectivity-enabled electronics, can help people with disabilities; ex: connect to thermostat | 130 | |
13850006781 | search engines | algorithm determines which pieces of info to return to us in which order | 131 | |
13850013137 | trends | companies use info from these for market purposes to determine what and where customers are searching for their products and their competitor's products, how long an item sits in a shopping bag, and when people buy; "people also bought/watch..." | 132 | |
13850032782 | open source | freely shared, updated, and supported by anyone who wants to do so; allowing everyone to develop the software ensures a better product with the ideas and solutions to problems from many perspectives; less error prone; concerns that someone will take the code and market it or insert malware | 133 | |
13850041181 | Crowdsourcing | allows people to share information and ask anyone who has access to the site for feedback, problem solving help, employment, or funding | 134 | |
13850090819 | citizen science | type of crowdsourcing where scientists ask nonscientists to look for and report on patterns or other interesting features of the data or to donate computer time during periods of time their machine is inactive (helps scale up processing capability at little to no cost to the organization); monitoring butterfly migrations, help with documentation and identifying photos | 135 | |
13850108294 | crowdfunding | helps inventors, individuals, and businesses fund their ventures with a little money from many sources | 136 | |
13850113210 | creative commons | provides a way for creators of software, images, and videos to share their creations with stipulations for sharing and permission from the author clearly indicated; levels include use with and without attribution, the ability to modify with and without attribution, and whether someone other than the original author can sell it | 137 | |
13850129981 | Digital Millennium Copyright Act (DMCA) | purpose was to strengthen legal protection for intellectual property, particularly with the Internet; lack of knowledge about copyright laws does not excuse offender | 138 | |
13850136693 | mashups | a legal concern because people combine copyrighted stuff and sometimes make money off it; lawsuits challenging whether you need to cite | 139 | |
13850146817 | ways to prevent privacy concerns | private modes on web browsers, blocking cookies, installing add ons, suing proxy servers | 140 | |
13850154145 | the digital divide | rural and remote areas often have limited or slower access to internet; some poor areas do not have infrastructure to support the internet | 141 | |
13850164560 | net neutrality | end of this has potential to create new digital divide where those with funding have faster and better internet access | 142 | |
13850169982 | what role does government play in the internet? | while the world wide web and internet are not owned by any country, each government determines the access its citizens may have and many businesses exist to provide this access | 143 | |
13850183499 | what is the order of hardware abstraction from least to most abstract? | circuit diagram, truth table, logic gate diagram | 144 | |
13850187603 | empirical testing | provides the best, worst, and average case information about the algorithm | 145 |
AP CSP Flashcards
Primary tabs
Need Help?
We hope your visit has been a productive one. If you're having any problems, or would like to give some feedback, we'd love to hear from you.
For general help, questions, and suggestions, try our dedicated support forums.
If you need to contact the Course-Notes.Org web experience team, please use our contact form.
Need Notes?
While we strive to provide the most comprehensive notes for as many high school textbooks as possible, there are certainly going to be some that we miss. Drop us a note and let us know which textbooks you need. Be sure to include which edition of the textbook you are using! If we see enough demand, we'll do whatever we can to get those notes up on the site for you!