CSP AP EOY Vocab Test
star
star
star
star
star
Last updated over 2 years ago
9 questions
Note from the author:
All the vocab for the CSP AP Test
Complete this matching test.
Required
12
Unit 1
Unit 1
| Draggable item | arrow_right_alt | Corresponding Item |
|---|---|---|
Sampling | arrow_right_alt | A way of representing information using only two options. |
Byte | arrow_right_alt | A contraction of "Binary Digit"; the single unit of information in a computer, typically represented as a 0 or 1 |
Analog Data | arrow_right_alt | 8 bits |
Intellectual Property | arrow_right_alt | Error from attempting to represent a number that is too large. |
Lossless Compression | arrow_right_alt | Error from attempting to represent a number that is too precise. The value is rounded. |
Round-off Error | arrow_right_alt | Data with values that change continuously, or smoothly, over time. Some examples of analog data include music, colors of a painting, or position of a sprinter during a race. |
Overflow Error | arrow_right_alt | Data that changes discretely through a finite set of possible values |
Bit | arrow_right_alt | A process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples. |
Binary | arrow_right_alt | A process for reducing the number of bits needed to represent something without losing any information. This process is reversible. |
Lossy Compression | arrow_right_alt | A process for reducing the number of bits needed to represent something in which some information is lost or thrown away. This process is not reversible. |
Digital Data | arrow_right_alt | A work or invention that is the result of creativity, such as a piece of writing or a design, to which one has rights and for which one may apply for a patent, copyright, trademark, etc. |
Creative Commons | arrow_right_alt | A collection of public copyright licenses that enable the free distribution of an otherwise copyrighted work, used when an author wants to give people the right to share, use, and build |
Required
15
Unit 2
Unit 2
| Draggable item | arrow_right_alt | Corresponding Item |
|---|---|---|
IP Address | arrow_right_alt | a machine that can run a program, including computers, tablets, servers, routers, and smart sensors |
World Wide Web | arrow_right_alt | a group of computing devices and programs working together for a common purpose |
Computing Device | arrow_right_alt | a group of interconnected computing devices capable of sending or receiving data. |
Redundancy | arrow_right_alt | the series of connections between computing devices on a network starting with a sender and ending with a receiver. |
Internet | arrow_right_alt | the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second. |
HTTP | arrow_right_alt | An agreed-upon set of rules that specify the behavior of some system |
Packet | arrow_right_alt | The unique number assigned to each device on the Internet. |
Internet Protocol (IP) | arrow_right_alt | A type of computer that forwards data across a network |
Path | arrow_right_alt | A chunk of data sent over a network. Larger messages are divided into packets that may arrive at the destination in order, out-of-order, or not at all. |
Router | arrow_right_alt | the inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network. |
Computing System | arrow_right_alt | HyperText Transfer Protocol - the protocol used for transmitting web pages over the Internet |
Digital Divide | arrow_right_alt | a protocol for sending data across the Internet that assigns unique numbers (IP addresses) to each connected device |
Computing Network | arrow_right_alt | a computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols. |
Bandwidth | arrow_right_alt | a system of linked pages, programs, and files. |
Protocol | arrow_right_alt | differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics |
Required
13
Unit 3
Unit 3
| Draggable item | arrow_right_alt | Corresponding Item |
|---|---|---|
Development process | arrow_right_alt | the inputs and outputs that allow a user to interact with a piece of software. User interfaces can include a variety of forms such as buttons, menus, images, text, and graphics. |
Input | arrow_right_alt | data that are sent to a computer for processing by a program. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text. |
Program Statement | arrow_right_alt | any data that are sent from a program to a device. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text. |
Sequential Programming | arrow_right_alt | a command or instruction. Sometimes also referred to as a code statement. |
Debugging | arrow_right_alt | a collection of program statements. Programs run (or “execute”) one command at a time. |
User Interface | arrow_right_alt | program statements run in order, from top to bottom. |
Event Driven Programming | arrow_right_alt | some program statements run when triggered by an event, like a mouse click or a key press |
Event | arrow_right_alt | a written description of how a command or piece of code works or was developed. |
Program | arrow_right_alt | form of program documentation written into the program to be read by people and which do not affect how a program runs. |
Documentation | arrow_right_alt | a collaborative programming style in which two programmers switch between the roles of writing code and tracking or planning high level progress |
Pair Programming | arrow_right_alt | Finding and fixing problems in an algorithm or program. |
Comment | arrow_right_alt | the steps or phases used to create a piece of software. Typical phases include investigating, designing, prototyping, and testing |
Output | arrow_right_alt | associated with an action and supplies input data to a program. Can be generated when a key is pressed, a mouse is clicked, a program is started, or by any other defined action that affects the flow of execution. |
Required
10
Unit 4
Unit 4
| Draggable item | arrow_right_alt | Corresponding Item |
|---|---|---|
String | arrow_right_alt | a combination of operators and values that evaluates to a single value |
Function Call | arrow_right_alt | allows a program to change the value represented by a variable |
Assignment Operator | arrow_right_alt | a named reference to a value that can be used repeatedly throughout a program. |
Logical operator | arrow_right_alt | an ordered sequence of characters. |
Variable | arrow_right_alt | a data type that is either true or false. |
Function | arrow_right_alt | <, >, <=, >=, ==, != indicate a Boolean expression |
Comparison Operators | arrow_right_alt | NOT, AND, and OR, which evaluate to a Boolean value. |
Conditional Statement | arrow_right_alt | affect the sequential flow of control by executing different statements based on the value of a Boolean expression. |
Boolean Value | arrow_right_alt | a named group of programming instructions. Also referred to as a “procedure”. |
Expression | arrow_right_alt | a command that executes the code within a function |
Required
7
Unit 5
Unit 5
| Draggable item | arrow_right_alt | Corresponding Item |
|---|---|---|
Iteration | arrow_right_alt | an ordered collection of elements |
Infinite loop | arrow_right_alt | an individual value in a list that is assigned a unique index |
Index | arrow_right_alt | a common method for referencing the elements in a list or string using numbers |
Traversal | arrow_right_alt | a repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met. |
List | arrow_right_alt | occurs when the ending condition will never evaluate to true. |
Element | arrow_right_alt | the process of accessing each item in a list one at a time. |
Data abstraction | arrow_right_alt | manage complexity in programs by giving a collection of data a name without referencing the specific details of the representation. |
Required
18
Unit 6
Unit 6
| Draggable item | arrow_right_alt | Corresponding Item |
|---|---|---|
Unreasonable Time | arrow_right_alt | a general description of a task that can (or cannot) be solved with an algorithm |
Heuristic | arrow_right_alt | a finite set of instructions that accomplish a task. |
Selection | arrow_right_alt | putting steps in an order. |
Optimization Problem | arrow_right_alt | deciding which steps to do next. |
Sequencing | arrow_right_alt | doing some steps over and over |
Iteration | arrow_right_alt | a measure of how many steps are needed to complete an algorithm |
Sequential Computing | arrow_right_alt | a search algorithm which checks each element of a list, in order, until the desired value is found or all elements in the list have been checked. |
Linear Search | arrow_right_alt | a search algorithm that starts at the middle of a sorted set of numbers and removes half of the data; this process repeats until the desired value is found or all elements have been eliminated. |
Parallel Computing | arrow_right_alt | Algorithms with a polynomial efficiency or lower (constant, linear, square, cube, etc.) are said to run in a reasonable amount of time. |
Binary Search | arrow_right_alt | Algorithms with exponential or factorial efficiencies are examples of algorithms that run in an unreasonable amount of time. |
Decision Problem | arrow_right_alt | provides a "good enough" solution to a problem when an actual solution is impractical or impossible |
Speedup | arrow_right_alt | a problem with a yes/no answer (e.g., is there a path from A to B?) |
Efficiency | arrow_right_alt | a problem with the goal of finding the "best" solution among many (e.g., what is the shortest path from A to B?) |
Algorithm | arrow_right_alt | a problem for which no algorithm can be constructed that is always capable of providing a correct yes-or-no answer |
Distributed Computing | arrow_right_alt | a model in which programs run in order, one command at a time. |
Undecidable Problem | arrow_right_alt | a model in which programs are broken into small pieces, some of which are run simultaneously |
Reasonable Time | arrow_right_alt | a model in which programs are run by multiple devices |
Problem | arrow_right_alt | the time used to complete a task sequentially divided by the time to complete a task in parallel |
Required
6
Unit 7
Unit 7
| Draggable item | arrow_right_alt | Corresponding Item |
|---|---|---|
API | arrow_right_alt | a variable in a function definition. Used as a placeholder for values that will be passed through the function. |
Argument | arrow_right_alt | the value passed to the parameter |
Return | arrow_right_alt | used to return the flow of control to the point where the procedure (also known as a function) was called and to return the value of expression. |
Parameter | arrow_right_alt | a process and allows a procedure to be used only knowing what it does, not how it does it. Procedural abstraction allows a solution to a large problem to be based on the solution of smaller subproblems. This is accomplished by creating procedures to solve each of the subproblems. |
Library | arrow_right_alt | a group of functions (procedures) that may be used in creating new programs |
Procedural abstraction | arrow_right_alt | Application Program Interface - specifications for how functions in a library behave and can be used |
Required
7
Unit 9
Unit 9
| Draggable item | arrow_right_alt | Corresponding Item |
|---|---|---|
Citizen Science | arrow_right_alt | scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices. |
Cleaning Data | arrow_right_alt | a process that makes the data uniform without changing its meaning (e.g., replacing all equivalent abbreviations, spellings, and capitalizations with the same word). |
Data bias | arrow_right_alt | a relationship between two pieces of data, typically referring to the amount that one varies in relation to the other. |
Data filtering | arrow_right_alt | the practice of obtaining input or information from a large number of people via the Internet. |
Correlation | arrow_right_alt | the collection of facts and patterns extracted from data |
Crowdsourcing | arrow_right_alt | data that does not accurately reflect the full population or phenomenon being studied |
Information | arrow_right_alt | choosing a smaller subset of a data set to use for analysis, for example by eliminating / keeping only certain rows in a table |
Required
11
Unit 10
Unit 10
| Draggable item | arrow_right_alt | Corresponding Item |
|---|---|---|
Decryption | arrow_right_alt | includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce). |
Malware | arrow_right_alt | information about an individual that identifies, links, relates, or describes them. |
Computing Innovation | arrow_right_alt | a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails |
Rogue Access Point | arrow_right_alt | the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information |
Phishing | arrow_right_alt | software intended to damage a computing system or to take partial control over its operation |
Keylogging | arrow_right_alt | a wireless access point that gives unauthorized access to secure networks. |
Public Key Encryption | arrow_right_alt | a process of encoding messages to keep them secret, so only "authorized" parties can read it. |
Symmetric Key Encryption | arrow_right_alt | a process that reverses encryption, taking a secret message and reproducing the original plain text. |
Personally Identifiable Information (PII) | arrow_right_alt | involves one key for both encryption and decryption. |
Multi-factor Authentication | arrow_right_alt | pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message |
Encryption | arrow_right_alt | a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access |