AP Comp Sci Sem 1 Final Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Computer Science

A

the study of information and information processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

binary numbers

A

study it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

list the binary numbers in order from least to greatest

A

1 2 4 8 16 32 64 128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the value of the binary number 1111 1111?

A

255; not 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

computing innovation

A

a novel or improved idea, device, product, or the development that includes a computer and/or program code as an integral part of its functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

information

A

Details, Facts, Figures, Statistics…
Sounds, Expressions, Smells…
Text, Images, Video, Audio…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the big idea with binary numbers?

A

All digital information can be represented with just 0’s and 1’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

demo devices

A

A lot if information is shared between computers - images, videos, emails, passwords, etc.
Instead of a new system for each piece of information, they can do so using a very basic system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What number do computer scientists start counting at

A

0; not 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Flippy Do

A

The paper device used for beginner computer scientists trying to learn binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

bit

A

A contraction of “Binary Digit”; the single unit of information in a computer, typically represented as a 0 or 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

byte

A

8 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

nibble

A

4 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

decimal number

A

a base 10 number with ten possible different digits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How many numbers can be represented with two binary bits?

A

3 numbers; 01, 10, 11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

representing decimals in binary

A

used with a decimal point; 1000.0110; exponents are negative; some numbers, like 0.39 can’t be represented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

overflow error

A

Error from attempting to represent a number that is too large

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Round-off Error

A

Error from attempting to represent a number that is too precise. The value is rounded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

abstraction

A

text -> ASCII -> binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ASCII

A

the most common character encoding format for text data in computers and on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

analog data

A

Data with values that change continuously, or smoothly, over time. Some examples of analog data include music, colors of a painting, or position of a sprinter during a race.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Digital Data

A

Data that changes discreetly through a finite set of possible values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

sampling

A

A process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

hexadecimal

A

Hexadecimal is a numbering system with base 16. It can be used to represent large numbers with fewer digits. In this system there are 16 symbols or possible digit values from 0 to 9, followed by six alphabetic characters – A, B, C, D, E and F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

meta data

A

data that describes other data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

abstraction layers in color images

A

digital image layer -> sample layer -> pixel layer -> binary layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

lossless compression

A

A process for reducing the number of bits needed to represent something without losing any information. This process is reversible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

lossy compression

A

A process for reducing the number of bits needed to represent something in which some information is lost or thrown away. This process is not reversible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

computing device

A

a machine that can run a program, including computers, tablets, servers, routers, and smart sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

computing system

A

a group of computing devices and programs working together for a common purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

computing network

A

a group of interconnected computing devices capable of sending or receiving data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

path

A

the series of connections between computing devices on a network starting with a sender and ending with a receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

bandwidth

A

the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

protocol

A

An agreed-upon set of rules that specify the behavior of some system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Internet Protocol (IP)

A

a protocol for sending data across the Internet that assigns unique numbers (IP addresses) to each connected device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

IP Address

A

The unique number assigned to each device on the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

router

A

A type of computer that forwards data across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

redundancy

A

the inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

fault tolerant

A

Can continue to function even in the event of individual component failures. This is important because elements of complex systems like a computer network fail at unexpected times, often in groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

User Datagram Protocol (UDP)

A

A protocol for sending packets quickly with minimal error-checking and no resending of dropped packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Transmission Control Protocol (TCP)

A

A protocol for sending packets that does error-checking to ensure all packets are received and properly ordered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

datastream

A

Information passed through the internet in packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

packet

A

A chunk of data sent over a network. Larger messages are divided into packets that may arrive at the destination in order, out-of-order, or not at all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

packet metadata

A

Data added to packets to help route them through the network and reassemble the original message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

scalability

A

the capacity for the system to change in size and scale to meet new demands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

The Domain Name System (DNS)

A

the system responsible for translating domain names like example.com into IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

World Wide Web

A

a system of linked pages, programs, and files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Hypertext Transfer Protocol (HTTP)

A

a protocol for computers to request and share the pages that make up the world wide web on the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

digital divide

A

differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics.
Can affect both individual and groups.
Raises ethical concerns of equity, access, and influence globally and locally.
Affected by the actions of individuals, organizations, and governments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

net neutrality

A

the principle that internet service providers should enable access to all content and applications regardless of the source, and without favoring or blocking particular products or websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

internet censorship

A

the legal control or suppression of what can be accessed, published, or viewed on the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

user interface

A

the inputs and outputs that allow a user to interact with a piece of software. User interfaces can include a variety of forms such as buttons, menus, images, text, and graphics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

input

A

data that are sent to a computer for processing by a program. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

output

A

any data that are sent from a program to a device. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

sequential programming

A

program statements run in order, from top to bottom.

No user interaction
Code runs the same way every time

56
Q

event-driven programming

A

some program statements run when triggered by an event, like a mouse click or a key press

Programs run differently each time depending on user interactions

57
Q

debugging strategies

A

keep your code clean, run your code frequently, use classmates and resources

58
Q

documentation

A

a written description of how a command or piece of code works or was developed

59
Q

comment

A

form of program documentation written into the program to be read by people and which do not affect how a program runs

60
Q

iteration

A

a sequence of instructions that is continually repeated

61
Q

IDE

A

An integrated development environment (IDE) is a software application that helps programmers develop software code efficiently

62
Q

API

A

application programming interface; a way for two or more computer programs to communicate with each other

63
Q

expression

A

a combination of operators and values that evaluates to a single value

64
Q

variable

A

a reference to a value or expression that can be used repeatedly throughout a program; holds one value at a time

65
Q

assignment operator

A

allows a program to change the value represented by a variable

66
Q

boolean value

A

a data type that is either true or false

67
Q

comparison operators

A

<, >, <=, >=, ==, != indicate a Boolean expression

68
Q

boolean expression

A

evaluates to either true or false

69
Q

function

A

a named group of programming instructions. Also referred to as a “procedure”

70
Q

function call

A

a command that executes the code within a function

71
Q

global variable

A

Permanent. Can be used anywhere in your code.

72
Q

local variable

A

Temporary. Can be used only in the part of the code where it was created, like inside an onEvent(). Deleted once the onEvent() is done running.

73
Q

transversals

A

A way to travel through all the elements of a list.
We will use for loops to do this.

74
Q

intellectual property

A

a work or invention that is the result of creativity, such as a manuscript or a design, to which one has rights and for which one may apply for a patent, copyright, trademark, etc.

75
Q

abstraction

A

the process of removing elements of a code or program that aren’t relevant or that distract from more important elements

76
Q

high vs. low level programming languages

A

A high-level language is one that is user-oriented in that it has been designed to make it straightforward for a programmer to convert an algorithm into program code. A low-level language is machine-oriented. Low-level programs are expressed in terms of the machine operations that must be performed to carry out a task.

77
Q

parameter

A

subvalue within a line of code
example: function addNumber ( x , y ) -> x and y would be the parameters

78
Q

concetanate

A

the operation of joining two strings together

79
Q

HyperText Markup Language

A

HTML; the standard markup language for documents designed to be displayed in a web browser

80
Q

speedup

A

sequential time divided by parallel time
the time used to complete a task sequentially divided by the time to complete a task in parallel

81
Q

sequential computing

A

programs run in order, one command at a time

82
Q

Parallel Computing

A

programs are broken into small pieces, some of which are run simultaneously

83
Q

Distributed Computing

A

programs are run by multiple devices

84
Q

Library

A

a group of functions (procedures) that may be used in creating new programs

85
Q

API

A

Application Program Interface - specifications for how functions in a library behave and can be used - The documentation for each function in the library

86
Q

Procedural Abstraction

A

provides a name for a process and allows the procedure (function) to be used only knowing what it does, and not necessarily how it does it

87
Q

Modularity

A

the subdivision of a computer program into separate subprograms

88
Q

Two distinctions with data

A

What does the data show - fact
Why might this be the case - opinion

89
Q

correlation

A

similarities, patterns

90
Q

causation

A

this thing caused that thing

91
Q

metadata

A

Data about other data
Can Help us uncover the why
questions. (sometimes auto gathered)

92
Q

Metadata are data about data:

A

It can be changed without impacting the primary data
Used for finding, organizing, and managing information
Increases effective use of data by providing extra information
Allows data to be structured and organized

93
Q

visualizations

A

Look at lots of data at once
See patterns that are “invisible” if you just look at the table

94
Q

data analysis process

A
  1. collect or choose data
  2. clean and/or filter
  3. visualize and find patterns
  4. generate new information
95
Q

bar chart

A

Count how many times each value in the column appears and make a bar at that height.
What value(s) are most common in this column?
What value(s) are least common in this column?
What is the unique list of values in this column?

96
Q

histogram

A

Similar to a bar chart, but first all numbers in a range or “bucket” are grouped together. For example, the chart below has a bucket size of 20 so the numbers 41, 48, and 53 would all be placed in the same bucket between 40 and 60.

Histograms can only be created with numeric data but can be useful when a normal bar chart may be difficult to read.
What range of value(s) are most common in this column?
What range value(s) are least common in this column?
What ranges of values do or do not appear in this column?

97
Q

visualization takeaways

A

Programs (like the Data Visualizer) can help process data so we can understand it and learn.

Charts and other visualizations can help both find and communicate what we’ve learned from data

Bar charts and histograms are two common chart types for exploring one column of data in a table.

98
Q

when does data need to be cleaned?

A

Data is incomplete
Data is invalid
Multiple tables are combined into one

99
Q

What leads to “messy” data?

A

Users enter in different types of data (“two”, 2)
Users use different abbreviations to represent the same information (“February”, “Feb”, “Febr”)
Data may have different spellings (“color”, “colour”) or inconsistent capitalization (“spring”, “Spring”)

100
Q

cleaning data

A

Look through the data manually. Find and fix messy data.
Use a program to find and fix messy data.

101
Q

filtering data

A

Filtering data allows the user to look at a subset of the data.
In Unit 5, we filtered data programmatically using traversals to gain insight into knowledge from data.
Software programs with built in tools (like the Data Visualizer) can also be used to filter data.

102
Q

data stored in text files

A

old school PC games
.csv Comma Separated Values
date, level, score
01/11/2019, 9. 73
Common File Format
Require Spreadsheet Programs or Specific Programs to Iterate Through

Easy to mess up a file
No Standard ways to create file

103
Q

data storage through spreadsheets

A

Designed for people to analyze data not for programs

104
Q

data storage through databases

A

Preferred method of storing data that will be used in programs

Programers use SQL (Structured Query Language) to interact with databases.

To be a Data Scientist You often need to learn programming languages like Python/R to analyze and visualize data.

You also need to learn SQL to be able to interact with databases

105
Q

scatter plot

A

counts how many times combinations of values appear. Arrows show where that row in the data table would be counted in the chart
Counts how often pairs of values in two columns appear.

Useful for:
Finding the most / least common combinations of values in two columns
Finding patterns across two columns
Exploring two columns when one or both are strings.

Not useful:
If either column has too many values (the chart would be enormous)

106
Q

crosstab chart

A

Useful for:
Finding the most / least common combinations of values in two columns
Finding patterns across two columns
Exploring two columns when one or both are strings.

Not useful:
If either column has too many values (the chart would be enormous)

107
Q

when to use what graph

A

study slide 17 in 9.4

108
Q

big data

A

“collecting data from others so you can analyze it”
Crowdsourcing is the practice of obtaining input or information from a large number of people via the Internet.
Citizen science is research where some of the data collection is done by members of the public using own computing devices which leads to solving scientific problems
Crowdsourcing offers new models for collaboration, such as connecting businesses or social causes with funding
Both are examples of how human capabilities can be enhanced by collaboration via computing

109
Q

citizen science and crowdsourcing

A

“collecting data from others so you can analyze it”
Crowdsourcing is the practice of obtaining input or information from a large number of people via the Internet.
Citizen science is research where some of the data collection is done by members of the public using own computing devices which leads to solving scientific problems
Crowdsourcing offers new models for collaboration, such as connecting businesses or social causes with funding
Both are examples of how human capabilities can be enhanced by collaboration via computing

110
Q

open data

A

“sharing data with others so they can can analyze it”
Open data is publicly available data shared by governments, organizations, and others
Making data open help spread useful knowledge or creates opportunities for others to use it to solve problems

111
Q

Computing Innovation

A

includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).

112
Q

Personally Identifiable Information (PII):

A

information about an individual that identifies, links, relates, or describes them.
Most digital technology needs some kind of PII to work
advertise to you by creating detailed profiles of who you are and what you like
PII can be used to steal the identity of a person, or stalk them online. Information that is often posted on social media can be combined to create a profile on you.

113
Q

10.3 takeaways

A

slide 6

114
Q

Phishing

A

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

115
Q

Keylogging

A

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

116
Q

Malware

A

oftware intended to damage a computing system or to take partial control over its operation

117
Q

Rogue Access Point

A

a wireless access point that gives unauthorized access to secure networks. (starbucks2) (airport/traveling)

118
Q

10.4 takeaways

A

Our private data powers a lot of computing innovations in ways we like. It makes products that are convenient, interesting, personal, useful, and often “free” because we “pay” with our data.
Not every effect of a computing innovation is anticipated in advance.
This data can also be used by companies, governments, or criminals in ways that we didn’t intend or that threatens our privacy.

119
Q

Encryption

A

a process of encoding messages to keep them secret, so only “authorized” parties can read it.

120
Q

Decryption

A

a process that reverses encryption, taking a secret message and reproducing the original plain text.

121
Q

Symmetric Key Encryption

A

involves one key for both encryption and decryption.

122
Q

Public Key Encryption

A

pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message.

123
Q

Multifactor Authentication

A

a method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are). Each step provides a new layer of security.

124
Q

Computer Virus Scanning Software

A

protects a computing system against infection.

125
Q

Cipher

A

the generic term for a technique (or algorithm) that performs encryption

126
Q

Caesar’s Cipher:

A

a technique for encryption that shifts the alphabet by some number of characters.

127
Q

Cracking encryption

A

When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption.

128
Q

asymmetric key encryption

A

allows users to encrypt information using shared keys

129
Q

Distributed Denial of Service (DDos)

A

a cybercrime in which the attacker floods a server with internet traffic to prevent users from accessing connected online services and sites

130
Q

digital certificate

A

an electronic document used to prove the validity of a public key

131
Q

random substitution cipher

A

an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.

132
Q

big data

A

data that contains greater variety, arriving in increasing volumes and with more velocity

133
Q

digital divide

A

the gap between demographics and regions that have access to modern information and communications technology (ICT), and those that don’t or have restricted access

134
Q

heuristic

A

when it’s impractical to solve a particular problem with a step-by-step algorithm

135
Q

botnet

A

a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder