AP Computer Science Principles Vocabulary

0.0(0)
Studied by 0 people
0%Unit Mastery
0%Exam Mastery
Build your Mastery score
multiple choiceMultiple Choice
call kaiCall Kai
Supplemental Materials
Card Sorting

1/338

flashcard set

Earn XP

Description and Tags

Last updated 4:22 PM on 3/4/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

339 Terms

1
New cards

2D array

A 2D array (two-dimensional array) is an array of arrays, organized in rows and columns like a grid. It is commonly used to represent matrices, game boards, or image pixel data.



Example: "A programmer representing a Tic-Tac-Toe board stores the game state in a          with 3 rows and 3 columns, where each cell holds either 'X', 'O', or an empty string."

2
New cards

Abstraction

Abstraction is the process of reducing complexity by focusing on the main idea. By hiding details irrelevant to the question at hand, abstraction allows one to focus on a manageable number of aspects of a problem.



Example: "When designing a navigation app, developers use          to focus on calculating the shortest route rather than worrying about how each road's asphalt composition was laid."

3
New cards

Abstraction (computing definition)

Abstraction in computing is the process of managing complexity by hiding unnecessary details while exposing only the essential features needed to solve a problem. It ranges from hardware abstraction up to high-level software concepts.



Example: "A programmer writing a function to sort a list uses abstraction by calling a built-in sort procedure without needing to understand the underlying quicksort or merge sort implementation."

4
New cards

Abstraction (data representation)

Data representation abstraction means that the same information can be represented in multiple equivalent ways. For example, the number 13 can be represented as binary 1101, decimal 13, or hexadecimal D.



Example: "The color red in a digital image can be expressed through data representation abstraction as the decimal value 255, the binary sequence 11111111, or the hexadecimal value FF, all referring to the same maximum red intensity."

5
New cards

Abstraction layer

An abstraction layer is one level in a hierarchy of abstractions, where each layer hides the complexity of lower layers. Examples range from transistors up through logic gates, machine code, OS, and application software.



Example: "When a Python programmer calls a file-reading function, they are working at a high         , unaware of the lower-level disk controller instructions and transistor signals that physically retrieve the data."

6
New cards

Access control

Access control regulates who can access resources in a computing system. It is implemented through authentication (verifying identity) and authorization (determining permitted actions).



Example: "A school's learning management system uses          to allow students to view assignments and submit work, while restricting grade-editing privileges to authenticated teachers only."

7
New cards

Accessibility (computing)

Accessibility in computing is the design of technology to be usable by people with a wide range of abilities and disabilities. Accessible design removes barriers that might prevent people from using computing tools.



Example: "A web developer improves accessibility by adding alt text to all images and ensuring keyboard navigation works correctly, allowing screen readers to convey the site's content to visually impaired users."

8
New cards

Algorithm

An algorithm is a finite set of instructions that accomplishes a specific task.



Example: "The step-by-step process a search engine uses to rank web pages by relevance—checking keywords, evaluating link counts, and sorting results—is an example of an         ."

9
New cards

Algorithm efficiency

Algorithm efficiency describes how time or memory usage scales with input size. Problems solvable in polynomial time are considered efficient; those requiring exponential time are generally impracticaltical for large inputs.



Example: "A linear search through one million records may take one million comparisons in the worst case, while a binary search on the same sorted data requires at most about 20, demonstrating why          matters at scale."

10
New cards

Algorithmic bias

Algorithmic bias occurs when an algorithm produces systematically unfair outcomes, often due to biased training data or design assumptions. Algorithmic bias can perpetuate or amplify societal inequalities.



Example: "A hiring algorithm trained primarily on resumes from male candidates may exhibit          by ranking female applicants lower, perpetuating gender inequality in the hiring process."

11
New cards

Analog data

Analog data have values that change smoothly, rather than in discrete intervals, over time.



Example: "The continuous fluctuations in air pressure produced by a person's voice are         , which a microphone must convert into discrete digital samples before a computer can process them."

12
New cards

AND operator

The AND operator evaluates to true only when both operands are true. If either operand is false, the result is false. Example: (x > 0) AND (x < 10) is true only when x is between 0 and 10.



Example: "In a program that checks whether a user is eligible for a student discount, the condition (age >= 13) AND (age

13
New cards

APPEND procedure

In AP CSP pseudocode, APPEND(aList, value) increases the length of aList by 1 and places value at the end of the list.



Example: "After prompting a user to enter a test score, the program uses APPEND(scoreList, newScore) to add the entered value to the end of scoreList, growing the list by one element."

14
New cards

Application program interfaces (APIs)

Application program interfaces (APIs) are specificationsforhowtheproceduresina library behave and can be used.



Example: "A weather app retrieves current temperature data by making calls to a weather service's API, following the documented specifications for how to send requests and interpret the returned data."

15
New cards

Argument

Arguments specify the values of the parameters when a procedure is called.



Example: "When the procedure calculateArea is called as calculateArea(5, 8), the values 5 and 8 are          that get passed into the parameters width and height respectively."

16
New cards

Array

An array is a collection of elements stored at contiguous memory locations, all of the same data type. Arrays are accessed using indices and are called lists in AP CSP pseudocode.



Example: "A program tracking the daily high temperatures for a week stores the seven values in an         , accessing each temperature using its index from 0 to 6."

17
New cards

Artificial intelligence

Artificial intelligence (AI) is the simulation of human intelligence by computer systems, including learning, reasoning, and problem-solving. AI enables computing innovations that respond adaptively to input.



Example: "The spam filter in an email service uses          to learn patterns from millions of flagged messages and automatically classify new incoming emails as spam or legitimate."

18
New cards

ASCII

ASCII (American Standard Code for Information Interchange) is a character encoding standard that uses 7 bits to represent 128 characters, including letters, digits, punctuation, and control characters.



Example: "When a user types the letter 'A' on a keyboard, the computer internally stores it using          as the value 65, which in binary is 1000001."

19
New cards

Assignment operator

An assignment operator sets the value of a variable. In AP CSP pseudocode, the assignment operator is represented as the left arrow (a

20
New cards

Authentication

Authentication is the process of verifying the identity of a user, device, or system before granting access. Methods include passwords, biometrics (fingerprint, face recognition), and security tokens.



Example: "When a student logs into an online exam portal,          verifies their identity by checking the submitted username and password against stored credentials before allowing access."

21
New cards

Authorization

Authorization determines whether an authenticated user has permission to access specific resources or perform specific actions. Authentication establishes identity; authorization grants privileges.



Example: "After a hospital employee is authenticated by logging in,          determines that a nurse can view patient records but cannot modify prescription information, a privilege reserved for physicians."

22
New cards

Automation

Automation uses technology to perform tasks with minimal human intervention. Computing has enabled automation across many industries, changing employment patterns and creating new types of work.



Example: "Automated checkout systems in grocery stores use computing to scan barcodes, calculate totals, and process payments without requiring a human cashier, reducing labor costs while changing the nature of retail work."

23
New cards

Automation bias

Automation bias is the tendency to over-rely on automated systems, accepting their outputs without sufficient critical evaluation. This can lead to errors when automated systems make mistakes.



Example: "A pilot who accepts every altitude adjustment suggested by the autopilot without cross-checking the instruments is exhibiting         , which can be dangerous if the automated system malfunctions."

24
New cards

Bandwidth

Bandwidth is the maximum amount of data that can be sent in a fixed amount of time on a computer network, usually measured in bits per second.



Example: "A fiber-optic connection with a          of 1 gigabit per second can download a 1 GB file in about 8 seconds, far faster than a 10 Mbps connection that would take over 13 minutes."

25
New cards

Bandwidth (data transfer)

Bandwidth is the maximum rate of data transfer across a network path, measured in bits per second. Higher bandwidth allows more data to be transmitted in a given time period.



Example: "During a live-stream concert, the platform requires sufficient bandwidth to transmit high-definition video data to thousands of simultaneous viewers without buffering or quality degradation."

26
New cards

Base case

A base case is the condition in a recursive algorithm that stops the recursion and returns a value without making another recursive call. Without a base case, recursion would continue indefinitely.



Example: "In a recursive function that computes the factorial of a number, the          is when n equals 0 or 1, at which point the function returns 1 instead of calling itself again."

27
New cards

Bias

Bias is not eliminated by simply collecting more data.



Example: "A facial recognition system trained mostly on lighter-skinned faces may perform poorly on darker-skinned faces, and simply collecting more of the same skewed data will not eliminate that         ."

28
New cards

Bias in data

Bias can be introduced into data by the type or source of data being collected. Bias is not eliminated by simply collecting more data.



Example: "A survey about internet usage conducted only among smartphone owners introduces          because it excludes populations without smartphone access, skewing results toward more connected demographics."

29
New cards

Big data

Big data refers to extremely large and complex datasets that require advanced computational tools to process and analyze. Analysis of big data can reveal patterns and insights not visible in smaller datasets.



Example: "Genomics researchers analyze          by processing the DNA sequences of millions of patients to identify genetic markers associated with specific diseases, a task impossible without large-scale computational tools."

30
New cards

Binary

Binary is a base-2 number system that uses only the digits 0 and 1 to represent numbers. All digital data is ultimately stored and processed as binary values.



Example: "All images, videos, and text stored on a computer are ultimately represented in         , with every pixel color, character, and audio sample encoded as a sequence of 0s and 1s."

31
New cards

Binary addition

Binary addition adds two binary numbers using rules: 0+0=0, 0+1=1, 1+0=1, 1+1=10 (write 0, carry 1). Binary addition is fundamental to how computers perform arithmetic in hardware.



Example: "When adding the binary numbers 0110 and 0101,          produces 1011, following the carry rules just as decimal addition carries values when a column sum reaches 10."

32
New cards

Binary search

Binary search is an algorithm that starts at the middle of a sorted data set of numbers and eliminates half of the data with each comparison. Binary search is often more efficient than sequential/linear search when applied to sorted data.



Example: "To find a student's name in an alphabetically sorted list of 1,000 entries, a          compares the target name to the middle entry and eliminates half the list with each step, finding the name in at most 10 comparisons."

33
New cards

Binary to decimal conversion

Binary to decimal conversion translates a binary number to its decimal equivalent by multiplying each bit by its positional value (power of 2) and summing the results. Example: 1011 = 8+0+2+1 = 11.



Example: "To convert the binary number 1101 to decimal, you compute 1×8 + 1×4 + 0×2 + 1×1 = 13, demonstrating how each bit position represents a power of 2."

34
New cards

Binary tree

A binary tree is a hierarchical data structure where each node has at most two children (left and right). Binary search trees enable efficient searching, insertion, and deletion operations.



Example: "A program managing a sorted contact list stores names in a          so that searches, insertions, and deletions can be performed efficiently by traversing left or right branches based on alphabetical comparisons."

35
New cards

Bit

Bit is shorthand for binary digit and is either 0 or 1.



Example: "A single          can store whether a light switch is on or off, but combining 8          into a byte allows 256 different values to be represented, such as every possible ASCII character."

36
New cards

Bit manipulation

Bit manipulation refers to acting directly on individual bits of binary data using bitwise operations (AND, OR, XOR, NOT, shift). It is used in low-level programming and cryptography.



Example: "A graphics program uses          with a bitwise AND operation to isolate the blue channel from a pixel's 24-bit color value, extracting just the 8 bits that represent blue intensity."

37
New cards

Bit rate

Bit rate is the number of bits processed or transmitted per unit of time, usually measured in bits per second (bps). Higher bit rate generally means better quality for audio and video.



Example: "A music streaming service offers songs at 320 kbps, meaning the          is 320,000 bits per second, producing higher audio fidelity than the 128 kbps option at the cost of more data usage."

38
New cards

Bits

Bits are grouped to represent abstractions.



Example: "When a computer stores a color image, groups of          are used together to represent abstractions like pixel colors, with 24          typically encoding over 16 million possible color values."

39
New cards

Boolean

Boolean refers to a data type with only two possible values: true or false.



Example: "A variable named isLoggedIn holds a          value that is true when a user has authenticated and false when they have not, controlling which parts of the interface are displayed."

40
New cards

Boolean expression

A Boolean expression is an expression that evaluates to either true or false. Boolean expressions use relational operators (=, not equal, >,

41
New cards

Boolean logic

Boolean logic is the branch of algebra using variables with only two possible values (true/false). The primary operations are AND (both true), OR (at least one true), and NOT (reverse), forming the foundation of computing.



Example: "Computer processors perform arithmetic using circuits built on         , where AND, OR, and NOT gates manipulate individual bits to carry out every calculation the CPU performs."

42
New cards

Boolean value

A Boolean value is either true or false.



Example: "After checking whether a list is empty, a function returns a         —true if the list contains no elements, false if it contains at least one—which the calling code uses to decide the next step."

43
New cards

Botnet

A botnet is a network of computers infected with malware and remotely controlled by an attacker. Botnets are used for distributed denial-of-service attacks, sending spam, or mining cryptocurrency.



Example: "Attackers deployed a          of 500,000 infected home routers to flood a major website with traffic, executing a distributed denial-of-service attack that made the site unreachable for several hours."

44
New cards

Byte

A byte is 8 bits. Bytes are the standard unit of digital storage and memory size. Common multiples include kilobyte (1,024 bytes), megabyte (1,024 KB), and gigabyte (1,024 MB).



Example: "A plain-text file containing the word 'Hello' takes up approximately 5          of storage because each ASCII character is represented using one         ."

45
New cards

Cache memory

Cache memory is a small, fast type of memory that stores frequently accessed data to reduce access time to slower main memory. Caches improve program performance.



Example: "A processor repeatedly accessing the same lookup table during a simulation stores that data in          so it can retrieve values in nanoseconds rather than waiting hundreds of nanoseconds for slower RAM."

46
New cards

Certificate authority

Certificate authorities issue digital certificates that validate the ownership of encryption keys used in secure communications and are based on a trust model.



Example: "When a browser connects to a banking website over HTTPS, it contacts a          to verify that the digital certificate presented by the site is legitimate and has not been forged."

47
New cards

Ciphertext

Ciphertext is data that has been encrypted using an algorithm and key, making it unreadable without the corresponding decryption key. Converting ciphertext back to plaintext is called decryption.



Example: "After a user's password is encrypted with a symmetric key algorithm, it becomes          that appears as meaningless characters to anyone who intercepts it without the decryption key."

48
New cards

Citizen science

Citizen science is a form of research collaboration where members of the public contribute data or analysis using personal devices. Computing technology enables large-scale citizen science projects.



Example: "The SETI@home project used          by allowing volunteers worldwide to donate their computers' idle processing time to analyze radio telescope data for signs of extraterrestrial intelligence."

49
New cards

Clarity and readability

Clarity and readability are important considerations when expressing an algorithm in a programming language.



Example: "A programmer uses descriptive variable names like totalStudentCount instead of x to improve the          of the code, making it easier for teammates to understand and maintain."

50
New cards

Cleaning data

Cleaning data is a process that makes the data uniform without changing their meaning (e.g., replacing all equivalent abbreviations, spellings, andcapitalizationswiththesameword)..



Example: "Before analyzing survey responses, a data scientist performs          by standardizing all entries of 'U.S.A.', 'US', and 'United States' to a single consistent value so the country is counted correctly."

51
New cards

Client

A client is a computer or application that requests services, resources, or data from a server. In client-server architecture, clients initiate requests and servers respond with data or services.



Example: "When a user opens a browser and requests a webpage, the browser acts as a         , sending an HTTP request to the web server and waiting to receive and display the returned HTML content."

52
New cards

Cloud computing

Cloud computing is the delivery of computing services including servers, storage, databases, networking, and software over the Internet rather than on local hardware, enabling flexible and scalable access to resources.



Example: "A small startup uses          to host its application on rented servers, scaling up resources during peak traffic periods and avoiding the large upfront cost of purchasing physical hardware."

53
New cards

Code segment

A code segment is a collection of program statements that is part of a program.



Example: "The          that calculates a student's letter grade—containing the conditional statements that check numeric score ranges—can be reused anywhere in the program where grading logic is needed."

54
New cards

Code statement

A code statement is a part of program code that expresses an action to be carried out.



Example: "The line total

55
New cards

Code tracing

Code tracing is the process of manually following the execution of a program step by step to determine its output or identify errors, without running the program on a computer.



Example: "To verify that a sorting algorithm works correctly, a student performs          by writing out the values of each variable after every iteration, confirming the list is reordered as expected."

56
New cards

Collaboration

Collaboration is the practice of working with others to solve problems and create computing innovations. Collaboration is crucial when developing computing innovations because having multiple perspectives offers opportunities to improve the design of innovations.



Example: "The team developed a more inclusive accessibility feature by practicing         —bringing together perspectives from designers, developers, and users with disabilities to identify requirements no single person had considered."

57
New cards

Comments

Comments are a form of program documentation written into the program to bereadbypeopleanddonotaffecthowa program runs.



Example: "A programmer adds          at the beginning of a complex loop to explain that it iterates through only the even-indexed elements, helping a future developer understand the logic without re-analyzing the code."

58
New cards

Compiler

A compiler translates an entire program written in a high-level language into machine code or an intermediate representation before execution. Compiled programs generally run faster than interpreted ones.



Example: "Before a C++ program can run, a          translates the entire source code into machine language instructions specific to the target processor, catching syntax errors in the process."

59
New cards

Computational problem

A computational problem is a task that can be addressed through the use of an algorithm. Computational problems range from simple (sorting a list) to complex (route planning) to undecidable (halting problem).



Example: "Determining whether a given number is prime is a          because it can be solved by an algorithm that systematically tests divisors up to the square root of the number."

60
New cards

Computational thinking

Computational thinking is a problem-solving approach involving decomposition (breaking problems into smaller parts), pattern recognition, abstraction (identifying essential information), and algorithm design.



Example: "Designing a school scheduling system requires         : decompose it into sub-problems like room assignment and conflict detection, recognize patterns from past schedules, abstract away irrelevant details, and then develop an algorithm."

61
New cards

Computer network

A computer network is a group of interconnected computing devices capable of sending or receiving data.



Example: "The devices in a school—student laptops, teachers' desktop computers, and shared printers—are all part of a          that allows them to share files and access the Internet through a common router."

62
New cards

Computer virus

A computer virus is a malicious program that can copy itself and gain access to a computer inanunauthorizedway.Computervirusesoften attach themselves to legitimate programs and start running independently on a computer.



Example: "A student accidentally downloaded a          disguised as a game file; the virus attached itself to other programs on the laptop and spread to a shared drive, corrupting several documents."

63
New cards

Computing artifact

A computing artifact is something created using computing tools, such as a program, digital image, audio recording, video, or presentation. Computational artifacts are the products of computational work.



Example: "The mobile app a student created to track daily water intake is a         —a product built using computational tools that serves a practical purpose."

64
New cards

Computing bias

Computing bias occurs when results produced by algorithms or data reflect existing societal biases, often due to biased training data or flawed algorithm design.



Example: "A loan-approval algorithm that relies on zip code data may exhibit          by systematically denying applicants from historically redlined neighborhoods, replicating historical discrimination in an automated system."

65
New cards

Computing device

A computing device is a physical artifact that can run a program.



Example: "A Raspberry Pi is a low-cost          capable of running programs that control sensors, displays, and motors, making it popular for educational robotics projects."

66
New cards

Computing innovation

A computing innovation includes a program as an integral part of its function. A computing innovation can be physical (e.g., self-driving car), nonphysical computing software (e.g., picture editing software), or a nonphysical computing concept (e.g., e-commerce).



Example: "A GPS navigation app is a          because a program is integral to its function—processing satellite signals, running routing algorithms, and displaying turn-by-turn directions in real time."

67
New cards

Computing system

A computing system is a group of computing devices and programs working together for a common purpose.



Example: "An automated traffic management network is a          in which sensors, traffic lights, servers, and control software all work together to reduce congestion across a city."

68
New cards

Concatenation

Concatenation is the operation of joining two or more strings end-to-end to produce a new, longer string.



Example: "A program builds a personalized greeting by using          to join 'Hello, ' with the user's name variable and '!' to produce the string 'Hello, Maria!'."

69
New cards

Concurrent computing

Concurrent computing involves multiple computations occurring during overlapping time periods. It includes parallel computing (simultaneous execution) and distributed computing (execution across multiple devices).



Example: "A video rendering application speeds up processing through          by splitting the work across eight processor cores that each render different frames of the video simultaneously."

70
New cards

Conditional statement

A conditional statement uses a Boolean expression to determine which block of code executes. In AP CSP pseudocode, an IF/ELSE construct executes the first block if the condition is true and the second block otherwise.



Example: "A program uses a          to display 'Pass' if a student's score is 60 or higher and 'Fail' otherwise, executing different code blocks depending on the evaluation of the Boolean expression."

71
New cards

Content delivery network

A content delivery network (CDN) is a geographically distributed network of servers that delivers web content to users based on their geographic location, reducing latency and improving load times.



Example: "When users around the world stream a popular video, a          serves the video from servers located in each user's region, reducing buffering caused by long-distance data travel."

72
New cards

Cookies (web)

Cookies are small pieces of data stored by a website on a user's device. They track user sessions, preferences, and browsing behavior, which can be used for targeted advertising or to enhance user experience.



Example: "An online store uses cookies to remember items a user added to their shopping cart during a previous visit, so the cart still contains those items when the user returns the next day."

73
New cards

Copyright

Copyright is legal protection giving creators exclusive rights to their original works, including software, text, images, and music. Copyright applies automatically when a work is created.



Example: "A student who copies original code from a developer's GitHub repository and submits it as their own project work without permission may be infringing         , since the code is automatically protected the moment it is created."

74
New cards

Creative Commons

Creative Commons is a public copyright license that enables the free distribution of an otherwise copyrighted work. This is used when the content creator wants to give others the right to share, use, and build upon the work they have created.



Example: "A photographer releases their portfolio under a          license so educators can freely use the images in class presentations without needing to request individual permission."

75
New cards

Creative Commons license

A Creative Commons license allows creators to grant others rights to share, use, and build upon their work under specified conditions, balancing protection of rights with access to information.



Example: "A teacher finds a YouTube video released under a          that allows remix and redistribution, so she legally edits clips from it into her own instructional video."

76
New cards

Crowdsourcing

Crowdsourcing is the practice of obtaining input or information from a large number of people via the Internet.



Example: "OpenStreetMap is built through         , where millions of contributors worldwide submit GPS traces, road names, and location data from their own devices to create a collaboratively maintained global map."

77
New cards

Cybercrime

Cybercrime refers to criminal activities carried out using computers or the Internet, including hacking, identity theft, financial fraud, and distribution of malware. Cybercrime has significant personal and economic impacts.



Example: "Stealing a victim's credit card numbers by installing malicious software that captures keystrokes on their computer is a form of          that can result in significant financial harm and federal criminal charges."

78
New cards

Cybersecurity

Cybersecurity is the practice of protecting computing systems, networks, and data from unauthorized access, attacks, damage, and theft. It involves technical measures as well as user behavior and policies.



Example: "A company strengthens its          posture by encrypting sensitive customer data, training employees to recognize phishing emails, and requiring multi-factor authentication for all system logins."

79
New cards

Data

Data are the values stored and used by programs. Data can come in many forms such as numbers, text, images, and more.



Example: "The          stored in a fitness tracker—including step counts, heart rate readings, and GPS coordinates—can be analyzed to provide users with personalized health recommendations."

80
New cards

Data abstraction

Data abstraction allows programs to work with collections of data using high-level operations (like list procedures) without knowing details of how the data is stored or managed internally.



Example: "By using a list and its built-in procedures like INSERT and REMOVE, a programmer manages a collection of student names through          without needing to know how the list allocates memory internally."

81
New cards

Data aggregation

Data aggregation combines data from multiple sources to create more comprehensive datasets. Aggregating data can reveal information about individuals that was not apparent from separate data points alone.



Example: "Combining a user's location history, purchase records, and browsing data through          can reveal sensitive details about their daily routine and personal habits, even if each data source seems harmless alone."

82
New cards

Data compression

Data compression reduces the number of bits needed to represent data.



Example: "Streaming services use          to reduce video file sizes before transmission so that high-definition content can be delivered over limited bandwidth connections without sacrificing too much visual quality."

83
New cards

Data integrity

Data integrity refers to the accuracy, consistency, and reliability of data throughout its lifecycle. Error detection and correction mechanisms help maintain data integrity during transmission and storage.



Example: "A network protocol uses checksums to verify         , detecting whether any bits in a transmitted packet were flipped during transmission and requesting a retransmission if errors are found."

84
New cards

Data mining

Data mining is the process of analyzing large datasets to discover patterns, correlations, and insights. Computing tools enable data mining that would be impracticaltical to perform manually.



Example: "Retailers apply          to years of purchase transaction records to discover that customers who buy baby products also frequently purchase wine, enabling targeted cross-promotional marketing campaigns."

85
New cards

Data parallelism

Data parallelism involves applying the same operation simultaneously to multiple data elements across multiple processors, commonly used in scientific computing and machine learning.



Example: "Training a neural network is accelerated through          by splitting a large batch of training images across hundreds of GPU cores that each compute gradient updates simultaneously."

86
New cards

Data structure

A data structure is a way of organizing and storing data in a computer so it can be accessed and modified efficiently. Common data structures include lists, stacks, queues, trees, and graphs.



Example: "A program that needs to process tasks in the order they arrive uses a queue          to ensure the first task added is always the first task removed and executed."

87
New cards

Data type

A data type is a classification that specifies the kind of value a variable can hold and what operations can be performed on it. Common data types include integer, floating-point, string, Boolean, and list.



Example: "Declaring a variable as a string          instead of an integer prevents a program from accidentally performing arithmetic on a phone number like '555-1234', which would produce meaningless results."

88
New cards

Data visualization

Data visualization is the graphical representation of data using charts, graphs, maps, and other visual formats to help people understand patterns, trends, and relationships within data.



Example: "Scientists studying climate change use          techniques such as heat maps and trend line graphs to communicate decades of temperature measurements in a form that policymakers can quickly understand."

89
New cards

Data-driven decision making

Data-driven decision making uses data analysis to inform choices. Computing tools enable processing of large datasets to discover patterns and insights that guide decisions in business, science, and government.



Example: "A public health department uses          by analyzing hospital admission records and vaccination rates to determine which neighborhoods should receive additional vaccine distribution resources."

90
New cards

Database

A database is an organized collection of structured data managed by a database management system (DBMS). Databases allow efficient storage, retrieval, and manipulation of large amounts of data.



Example: "A hospital stores patient records in a relational          so that doctors can query by patient ID, date of visit, or diagnosis code to quickly retrieve relevant medical history."

91
New cards

Debugging

Debugging is the process of identifying and fixing errors (bugs) in a program. Errors may be syntax errors (violating language rules), logic errors (incorrect algorithm), or run-time errors (occurring during execution).



Example: "After noticing that a program always outputs the wrong total, a developer uses          to add print statements that reveal a logic error—the loop was summing values from index 1 instead of index 0."

92
New cards

Decimal

Decimal is the base-10 number system used in everyday life, which uses digits 0-9 to represent values. Computers ultimately store all numbers in binary but can display them in decimal.



Example: "Although the computer stores the number 42 internally as the binary value 101010, the program displays it in          as '42' because that representation is far more intuitive for human users."

93
New cards

Decimal to binary conversion

Decimal to binary conversion translates a decimal number to binary by repeatedly dividing by 2 and recording remainders. The binary number is the remainders read in reverse order.



Example: "To store the decimal number 25 in a computer, it must be converted to binary: dividing repeatedly by 2 yields remainders 1,0,0,1,1, which when read in reverse gives the binary representation 11001."

94
New cards

Decision problem

A decision problem is a problem with a yes/no answer (e.g., is there a path from A to B?).



Example: "Determining whether a graph contains a Hamiltonian cycle—a path that visits every vertex exactly once—is a classic          with a yes or no answer, and it is considered computationally difficult to solve efficiently."

95
New cards

Decomposition

Decomposition is breaking a complex problem into smaller, more manageable sub-problems. It is a fundamental component of computational thinking that makes large problems tractable.



Example: "A team building a social media app uses          to break the project into smaller modules: user authentication, post creation, newsfeed display, and notifications, each developed and tested independently."

96
New cards

Decryption

Decryption is the process of decoding the data.



Example: "When a recipient receives an encrypted message, their device uses the appropriate private key to perform         , converting the unreadable ciphertext back into the original plaintext message."

97
New cards

Denial-of-service attack

A denial-of-service (DoS) attack attempts to make a computing resource unavailable by overwhelming it with traffic or requests. A distributed DoS (DDoS) attack uses many computers simultaneously.



Example: "During a product launch, attackers flooded a retailer's website with millions of fake requests in a         , consuming all server resources and preventing legitimate customers from completing purchases."

98
New cards

Digital certificate

A digital certificate validates the ownership of encryption keys used in secure communications and is issued by a certificate authority.



Example: "When a browser displays a padlock icon for a website, it has validated the site's         —issued by a trusted certificate authority—confirming that the encrypted connection is with the legitimate server."

99
New cards

Digital citizenship

Digital citizenship is the responsible and ethical use of technology. It encompasses online safety, privacy protection, cybersecurity awareness, digital literacy, and respecting intellectual property.



Example: "A student practicing good          cites the sources of images used in a school presentation, avoids sharing classmates' personal information online, and uses strong unique passwords for every account."

100
New cards

Digital data

Digital data can be represented as a finite number of binary values.



Example: "Unlike the continuous audio waves captured by a vintage vinyl record,          on a CD represents the same music as a finite sequence of binary values, sampled at discrete intervals of time."

Explore top flashcards

flashcards
faf
40
Updated 956d ago
0.0(0)
flashcards
faf
40
Updated 956d ago
0.0(0)