Creativity,One of the seven big ide Flashcards
Creativity
One of the seven big ideas - the use of the imagination or original ideas.
Abstraction
One of the seven big ideas - technique in computing that hides detail
Data and Information
One of the seven big ideas - emphasizes how computers are used to analyze data and create new knowledge.
Algorithms
One of the seven big ideas - the process or set of rules to be followed in calculations or other problem-solving operations
The Internet
One of the seven big ideas - a global computer network providing a variety of information and communication facilities
Global Impact
One of the seven big ideas - focuses on how computing and technology has impacted our world positively and negatively.
Computer Science
The study of the ideas
Imagination Age
A theoretical period beyond the information age where creativity and imagination will become the primary creators of economic value.
Information Age
A shift in human history from traditional industry to an economy based on information computerization using analysis and thinking - AKA: Digital Age.
Program
A systematic plan or sequence of instructions for a computer to solve a problem.
Programming
The action or process of writing computer programs.
RAM
Random Access Memory consists of tiny electrical circuits that dynamically store frequently used program instruction to increase speed of the system.
Compilation
The process of source code being translated into machine code.
Compiler
A program that translates high level
Bit
Short for binary digit - a single binary value
Central Processing Unit (CPU)
The processor or brains of the computer where calculations take place.
Source Code
Programs written in high-level languages.
Machine Code
Programs written in machine-level instructions that are uniquely read by computer processors using patterns of 1s and 0s.
Hardware
Physical components of a computer built using multiple levels of abstraction
Primary Storage
Main storage or memory that stores data for quick access by the computer’s processor (RAM).
Secondary Storage
External/Auxiliary memory such as a USB flash drive
Binary
Machine code that is a direct
Create Performance Task
One of the two performance tasks on the AP CSP exam
Explore Performance Task
One of the two performance tasks
Computational Thinking
Understanding the logic and processes computers use to solve problems and run programs.
Innovating
The process of imagining something that does not yet exist
Iteration
Repeatedly applying a process with the goal of coming closer and closer to a solution.
Iterative Development Process
The process by which computer programs are designed
Debug
To identify and remove errors from a computer program.
Sequencing
Executes statements one at a time - in order
Selection
Uses ‘if…then’ to tell a computer how to select a step or to tell the sequence that it should be executed.
Imperative Statement
A command statement with a verb phrase that indicates an operation to perform (example: move forward)
Descriptive qualifier
A specific adverb or adjective that further qualifies or limits the meaning of a word (example: left shoe)
Natural Language
A complex
Artificial Language
A limited size language
Ambiguity
Uncertainty or being open to more than one interpretation.
Visual Programming Language
A programming language that lets users drag and drop icons into organized blocks of code to create programs rather than typing text.
High-Level Language
A programming language that is easier for humans to read
Low-Level Language
A programming language that has little or no abstraction and communicates closely to the hardware using machine language. Less natural for humans.
Sprite
An object in Scratch that performs functions through scripting.
Stage
The background of a project in Scratch which can have scripts
Costume
The appearance of a sprite.
Motion Blocks
Medium-blue colored blocks used to control a sprite’s movement in Scratch.
Reporter Blocks
A block in Scratch with round edges that contains a value (numbers
Looks Blocks
Purple-colored blocks of code in Scratch that are used to control a sprite’s appearance.
Sensing Blocks
Light-blue colored Boolean blocks that are used to detect different factors of a project such as touching.
Operator Blocks
Light-green colored blocks of code used to handle strings and math equations in Scratch.
Events
Blocks of code that trigger corresponding behavior (example: Green Flag - starts program)
Broadcast
When blocks of code are executed at a given time by communicating (or broadcasting) a message.
Input
User interaction with a program via clicking
Storage
What the computer ‘stores’ or needs to remember to execute a program.
State
A description of what the computer is doing or the values of variables at any given moment.
Attributes
A descriptor used to describe the state
Process
The program code and current activity that is being executed in a computer program.
Position
The x and y coordinates on the stage in Scratch.
Placeholder
A variable for a particular value or attribute.
Variable
A placeholder to store a particular value or attribute such as x and y in an algebraic equation or calculation.
Integer
A whole number; a number that is not a fraction that is used in programs.
Character
A single letter
String
A series of characters at any length. Can be a type of variable.
Boolean Values
A variable to represent true or false.
Array
Lists of other variables.
Floating Point Number
A number that may have digits after the decimal place. Can be a type of variable.
Declaring Variables
Creating variables in a programming language.
Algorithm
A process or set of rules to be followed in calculations or other problem solving operations.
Sequencing
Logic structure where instructions are executed in order
Flowchart
A simple diagram with symbols showing the ‘flow’ of a process.
Flow Pattern
Pattern that can emerge when data is transformed using computational logic structures (sequencing
Sequential Execution
Program instructions that are executed one at a time
Parameter
A variable that defines a procedure or sets the conditions of an operation.
Procedure
A named collection of steps in an algorithm that can be reused anytime it is needed without restating the detailed procedures (abstraction).
procedure
a named collection of steps in an algorithm that can be reused anytime it is needed without restating the detailed procedures (abstraction)
comments
an annotation in the code of a computer program
remix
to modify and share a version of an uploaded existing project
selection
algorithmic structure that uses ‘if…then’ to tell computer how to select a step or to tell the sequence that should be executed.
if statement
type of selection statement that only executes when a certain criteria is met.
if else statement
a more thorough version of an if statement that stipulates what is to happen when a certain criteria is not met.
operators
symbols that imply a comparison in conditional selection statements.
control flow
the direction the computer program moves from instruction to instruction over time. Can also be controlled by if statements and other binary conditions.
Operator block
light-green colored blocks of code used to handle strings and math equations in Scratch.
If block
a set of instructions within an if block that is executed only if the condition in the if statement is met.
If else block
a set of instructions within an if block is executed if a specified condition is true and instructions within the else block are executed if the same condition is false.
branching
instruction in a computer program that can cause a computer to begin executing a different sequence of instructions.
conditionals
only executes if a certain designated condition is true.
Boolean values
binary values (usually denoted true and false)
switching
turning on or off (binary)
nesting
where different logic structures sequence
iteration
repetition - one complete step of a loop
loop
the repetition of some code
indefinite loop
when it is unknown how many times a loop will iterate
definite loop
executes a predetermined set of times for a loop to be repeated
repetition
one complete step of a loop
unsolvable problem
a problem that cannot be solved using any algorithm
Halting Problem
there cannot be a program that will determine which computer programs will halt (or exit) and which programs will go on forever (infinite loop) where no algorithm can be made that always leads to a correct yes or no answer.
undecidable problem
where no algorithm can be made that always leads to a correct yes or no answer.
scalability
how well do algorithms perform at increasingly larger scales.
Big-O Notation
a mathematical concept used by computer scientists to determine how well algorithms scale - performances classified into different categories.
sequential search
a linear search method of finding a targeted value within a list
binary search
a method of searching by dividing the search interval in half each time.
logarithmic behavior
doubling the size of a problem only requires one extra unit of work.
brute forcing
trial and error method used to decode encrypted data such as passwords.
Moore’s Law
developed by Gordon Moore
heuristics
a method for deriving an approximate solution - Rules of Thumb but not guaranteed an accurately correct answer.
logic gate
a hardware abstraction that is modeled by a Boolean function.
concatenation
chaining together or placing two or more separate things side by side so that they are treated as one.
string
a linear sequence of characters
dichotomous
in which something can only be one thing or another (yes or no).
dichotomous
in which something can only be one thing or another (yes or no)
binary code
code represented with the two symbols of 1 and 0
bits
the foundation for digital computing (1s and 0s) - short for binary digits
digital
how information is stored
state space
the space of potential possibilities
exponential growth
the rate of growth that rapidly increases in proportion to the growing total number or size.
decimal
describes the base-10 number system. The most commonly used number system.
ASCII (American Standard Code for Information Interchange)
a table that outlines a common set of conventions established for converting between binary values and alphanumeric (represents 128 different characters)
alphanumeric
the characters that consists of uppercase and lowercase letters in addition to numerals 0-9.
digital noise
irrelevant or meaningless data that has found its way into otherwise meaningful code.
abstraction
the process of removing or suppressing details to create a manageable level of complexity.
bit string
a sequence of bits that can be used to represent sets or to manipulate binary data.
mapping
associating each element of a given set with one or more elements of a second set.
data
characters
unicode
a binary encoding system that can represent much more of the world’s text than ASCII can (represents 65
hexadecimal
a base-16 number system utilizing numbers 0-9 and letters A-F used to represent eight binary digits or one byte.
Morse Code
a code where letters are represented by combinations of long and short signals of light or sound.
Baudot Code
a binary code invented by Emile Baudot in 1870 that uses crosses and dots in order to encode 2^5 or 32 characters.
variable-width encoding
using codes of different lengths to encode a character set for representation (example: Morse Code)
fixed-width encoding
using codes with a fixed width to encode a character set for representation (example: Baudot Code)
discrete
separate or divided (digital)
continuous
unbroken
approximation
digital copies are only approximations of the natural object.
analog
non-digital signals or information represented by a continuously variable physical quantity such as spatial position or voltage.
list
a data structure (also called an array) that stores multiple pieces of information at once.
data structure
a particular way of organizing and storing data such as an array
index value
the representation of the location of each item in a list.
output
observable behaviors generated by the computer such as animation
join
block in Scratch that concatenates
linear search
a method for finding a target value within a list (whether presorted or not) by checking each value until a match is found or until all the elements have been searched.
substring
a subset of a string of alphanumeric fields or variables.
Function
A set of commands which can be run by calling it by name.
Parameter
Information sent to a function.
If statement
Command that tests a true/false condition.
Relational Operators
The symbols used to compare values in true/false tests.
Syntax
the set of rules that defines the combinations of symbols that are considered to be correctly structured programs in a programming language.
Processing language
a text-based open-source programming language built for visual and electronic media design and manipulation.
semicolon
in some programming languages
braces
Braces (aka: curly braces) are used to group the statements in an if statement
debugging
locating and correcting errors in a program.
bug
any unwanted or unintended property of a program or piece of hardware
phi phenomenon
the optical illusion that is created when looking in rapid succession at a series of photos
pixel
pixel (picture element) is the smallest element or unit that makes up a digital image that can be individually processed.
setup() function
a function used in the Processing language that runs and sets up the initial properties such as screen size
draw() function
an implicit looping structure that is executed every time the screen is redrawn in the Processing language.
while loop
a control flow statement that allows code to be executed repeatedly according to a given Boolean condition (consists of Initialization
iterative
repeating a process to generate an unbounded sequence of outcomes
initialization
to set a variable to an initial value (example: int numberDrawn = 0;)
RGB
an additive color model where Red Green and Blue light are added together to produce a variety of colors to display electronically.
CMYK
a subtractive color model where Cyan
hexadecimal
a positional number system based on 16 and uses 16 symbols to represent values (0-9
raster format image
an image represented by a grid of pixels - also known as bitmap. Can be scaled down with no quality loss
bitmap
a file format used to store digital images comprised of a map of bits.
vector format image
a graphic image made up of paths
raw format image
an original image from a digital camera that is neither processed nor compressed and is a larger file format.
jpeg format image
a processed and compressed image that is more accessible and generally has a smaller file format.
file formats
the way a file is encoded for structure and storage. Denoted with file extensions: .jpg
encoding
the process of putting a sequence of characters (letters
run-length encoding (RLE)
Lossless data compression where sequences of the same data value are stored as a single value. Example: WWWWWWWWWEEEEEEEE would be compressed to 9W8E.
encoding scheme
the conversion of a sequence of characters (letters
filter
a technique that changes the appearance of an image by altering shades and colors of pixels.
remix
to alter a piece of media by adding
sampling
a technique for measuring the sound wave and digitally encoding sound to make a digital representation.
sampling rate
the number of samples of sound that can be taken per second to represent the sound digitally.
autotune
digitally transforming out-of-tune bits of an audio file to improve the pitch and sound quality.
frequency
the speed of the vibration which determines the pitch of sound. Measured in wave cycles that occur in one second (Hertz).
Theremin
an electronic musical instrument where tone is generated through high-frequency and the pitch is controlled by hand motions to and from the circuit.
backmasking
a technique for recording audio backward.
amplitude
the length and width of soundwaves - volume or loudness.
compression algorithm
the reduction in the amount of data needed to represent an audio sample.
lossless compression
compression that has occurred with no loss of information so when decompression occurs
lossy compression
irreversible compression that uses a more aggressive compression ratio through approximations resulting in partial data loss.
big data
large amounts of structured and unstructured data that can potentially be mined
data processing
converting information that can be understood by a computer.
useable data
data that is capable of being used - i.e.
useful data
can someone use the data to make predictions
data collection
gathering and measuring information on targeted variables in order to answer questions and evaluate outcomes.
collaboration
working together to facilitate the application of multiple perspectives and diverse talents and skills.
unstructured data
raw data with no connections and/or relationships among data detected - requires more storage space.
structured data
data that is organized in some fashion - utilizes less storage space.
data set
a collection of numbers or values that relate to a particular subject usually portrayed in a relational database table. Example: column header and row contents for test scores for each student.
knowledge extraction
knowledge created from structured relational databases.
relational database
a collection of data organized and retrieved in various ways between database tables.
data vs. information
data are figures and facts while information is data that is processed
data storage
the retention and retrieval of data.
extraction
retrieving or processing data from unstructured data sources for further data processing
spiderbot
a virtual robot (program) that visits web sites and reads information to create entries for a search engine index.
screen scraping
extracting information that is formatted for human use and converting it into a format for computer use (example: scanner or pdf converter).
generation loss
the loss of quality between copies of data
browser
a computer program used to navigate and search the World Wide Web and display HTML files in a graphical format (example: Google Chrome
data persistence
information that is not often accessed and rarely modified.
data storage
static storage of various capacities and speed such as CDs’
indexing
the specific organization and method of keeping track of data.
filter bubble
limiting a user’s perspective by having an algorithm selectively determine what type of information a user would like to see based on past search history and behavior.
privacy concerns
digitization of personal data means your data is now easier to reproduce
utility
the measurement of usefulness - example: sharing personal digital data in order to receive something of value in return.
cache
a memory location to store active data temporarily to shorten data access times and reduce latency.
reCAPTCHA
a digital tool used to deter automated form-filling and exploitation of web-based registration systems.
crowdsourcing
obtaining information from a large number of people
human computation
using human cognition to provide computational data via techniques such as crowdsourcing.
descriptive analytics
information about collected data using statistics (mean
predictive analytics
information about future events based on collected and analyzed data.
analytics
information resulting from the systematic analysis of data or statistics.
automated summarization
summarizing data to a simpler state by removing redundant or less significant details.
visualization
the representation of information using a chart
regression analysis
the forecasting of change through statistical analysis of the strength of the relationship between one dependent variable and other changing independent variables.
metadata
descriptive data about an image
curation of information
gathering information pertaining to a specific topic.
models
physical or virtual representations of an object.
simulations
test a hypothesis of a situation using a model.
social media
applications and websites that allow users to share content and participate in social networking that may have otherwise had socioeconomic barriers.
socioeconomic
the differences among groups based on geographical
search tools
directories and search engines on the Internet that are essential for finding information efficiently on the Web.
cloud computing
storing
client-server model
the client(s) are the end-user(s) and communicates with the server (a centralized computer) that services the clients.
digital divide
the gap between those who have ready access to computers and the Internet
routing
the process of moving information (or packets) over a network via a device called a router.
SMTP protocol
Email communication standard developed and overseen by the Internet Engineering Task Force (Simple Mail Transfer Protocol).
HTTP
Hypertext Transfer Protocol developed by the Engineering Task Force
HTTPS
HTTP with a Secured Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer that encrypts and decrypts user data and requests for added security (Hypertext Transfer Protocol Secure).
Internet protocol
the protocol by which data is sent from one computer to another on the Internet.
TCP/IP
standard for packets and routing (Transmission Control Protocol/Internet Protocol).
SMS
Short Message Services. Text messaging that allows the user to send up to 160 characters to another device. If message is longer it may truncate
interface
a user-friendly picture-oriented way to interact with technology
protocols
a common set of rules that computers must abide by in order to connect with each other.
IP address
a unique numeric identification for each device that is connected to a computer network and uses Internet Protocol.
IPv6
Internet Protocol
IPv4
Internet Protocol
domain
a group of devices connected on a network using the same protocol to access and administer web pages.
domain name system (DNS)
the way that domain names are located and translated into Internet Protocol (IP) addresses.
packet switching
digital data is sent by breaking the data into blocks of bits called packets
net neutrality
the Internet is built around the notion of free and open access to information with no blocking
encryption
the process of converting information or data into a code
public-key encryption
an asymmetric encryption method that uses a public key (made available publicly) and a private key (available to owner only).
certificate authorities
CA’s issue digital certificates that validate ownership of encrypted keys used in secured communications and are based on a trust model.
trust model
validation of one’s identity necessary for an event or transaction to occur.
open platforms
software based on open standards where there is no single ownership and is freely available through open license.
closed platforms
proprietary software where the provider has control over the application and content and can restrict access.
cybersecurity
measures taken to protect a computer or computer system against unauthorized access or attack.
confidentiality
the ability to limit access to information to a certain set of users.
integrity
the certainty that information is accurate.
availability
the reliability of access to information.
firewall
part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
Secure Sockets Layer (SSL)
the standard security technology for establishing an encrypted link between a web server and a browser
DDoS Attack
Distributed Denial of Service - an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.
viruses
code that is capable of copying itself and corrupting a system or destroying data.
social engineering
the psychological manipulation of people into performing actions or divulging confidential information.
malware
software that is intended to damage or disable computers and computer systems.
phishing
obtaining confidential information by masquerading as an ‘official’ person
Internet
the network infrastructure composed of devices (or nodes) that communicate via protocols.
World Wide Web
a network of online content formatted in html and accessed via HTTP (WWW).
Tim Berners-Lee
created the set of fundamental tools and technologies that make up the World Wide Web.
hyperlinks
clickable bits of text
distributed computing
computers that interact with each other in order to achieve a common goal.
botnets
a network of private computers infected with a malicious software and controlled as a group without the owners knowing.
bitcoin mining
the processing of transactions in the digital currency system
Internet of Things
the network of physical devices
autonomous technology
technology that can function without being told what to do - i.e. Robots.
computing innovation
a new method or idea utilizing computing that has meaningful impact on society
crowdfunding
entrepreneurs using online access to customers as a means of funding their project.
network
connection of devices and networks to communicate using addresses and protocols.
sensor networks
autonomous sensors that measure environmental conditions such as light
Application Program Interfaces (APIs)/Libraries
a set of routines
hierarchy
an arrangement of elements in a ranking of superiority. the Internet and systems are built from the top (root) down.
bandwidth
a measure of bit rate of a system or data (measured in bits) that can be sent in a fixed amount of time over a system.
latency
the time elapsed between the transmission and the receipt of a request in a system.
open standard
a standard where documentation and specifications are open to the public.
closed standard
a standard where documentation and specifications are not available to the public.
open source
publicly available information that is free to use
closed source
privately owned information that is proprietary.
symmetric key system
an encryption method where each pair of users share a secret key.
asymmetric key system
an encryption method that uses different keys to encrypt and decrypt.
User Datagram Protocol (UDP)
a communication protocol used to send messages to other hosts of an IP network; sends packets quickly with minimal error-checking and no resending of dropped packets.