AP Computer Science Principles

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Terabyte (TB)

1,024 gigabytes

Megabyte (MB)

1,024 kilobytes

Gigabyte (GB)

1,024 megabytes

Petabyte (PB)

1,024 terabytes

Kilobyte (KB)

1024 bytes

Lossy

A compression scheme in which "useless" or less-than-totally-necessary information is thrown out in order to reduce the size of the data. The eliminated data is unrecoverable.

Lossless

A compression scheme in which every bit of the original data can be recovered from the compressed file.

Aggregation

A computation in which rows from a data set are grouped together and used to compute a single value of more significant meaning or measurement. Common aggregations include: Average, Count, Sum, Max, Median, etc.

Bit

A contraction of "Binary Digit". A bit is the single unit of information in a computer, typically represented as a 0 or a 1

README

A document providing background information about a dataset.

Innovation

A novel or improved idea, device, product, etc. or the development thereof

Hexadecimal Number System

A number system consisting of 16 distinct symbols — 0-9 and A-F — which can occur in each place value.

For Loop

A particular kind of looping construct provided in many languages. Typically, a for loop defines a counting variable that is checked and incremented on each iteration in order to loop a specific number of times.

Function

A piece of code that you can easily call over and over again.

Open Access

A policy that allows people to have read access to things, e.g., libraries or online data

Algorithm

A precise sequence of instructions for processes that can be executed by a computer

Computationally Hard Problem

A problem that can not be solved in a reasonable amount of time. Heuristics are often used to create an approximate or good enough solution.

Undecidable

A problem that is so difficult, we can't ever create an algorithm that would be able to answer yes or no for all inputs, like determining if a user's program run on some input would always stop and not run forever

Hypothesis

A proposed explanation for some phenomenon used as the basis for further investigation.

Peer-to-peer networks

A system where one user's computer connects through the Internet to another user's computer without going through an intermediary "centralized" computer to manage the connection

Summary table

A table of aggregate information about a dataset (e.g., the average, sum, count of some values).

Image

A type of data used for graphics or pictures.

Crowdsourcing

Asking lots of users online to help with something, like funding a project, or running SETI@Home to help look for extraterrestrial signals

#000000

Black represented RGB in 32Bit Hex

#0000FF

Blue represented RGB in 32Bit Hex

Search Trends

Comparison of the popularity of topical queries in an online search engine as they relate to time.

Lossless

Compressing data in a way that preserves all data away and allows full recovery of the original, good compression -- usually not as good as lossy, like PNG images

Lossy

Compressing data in a way that throws some data away and makes it almost impossible to recover the original, great compression, like JPEG images

Metadata

Data that describes other data. For example, a digital image my include metadata that describe the size of the image, number of colors, or resolution.

Overflow

error that results when the number of bits is not enough to hold the number, like a car's odometer "rolling over"

Pivot Table

The name of the tool used by most spreadsheet programs to create a summary table.

BIN: 1110

The number 14

HEX: F

The number 15

Raw data

The original data as it was collected.

penRGB(255,255,255)

White

#FFFFFF

White represented RGB in 32Bit Hex

RBG Intensities

a 256-range (or 8-bit range) of values from light to dark on each of the three color channels (R,G,B)

Selection

a boolean condition to determine which of two algorithmic paths are taken, aka if-then

Big Data

a broad term for datasets so large or complex that traditional data processing applications are inadequate.

Library

a collection of commands / functions, typically with a shared purpose

API

a collection of commands made available to a programmer

.txt

a computer format that is structured as a sequence of lines of electronic text.

Documentation

a description of the behavior of a command, function, library, API, etc.

modulo

a mathematical operation that returns the remainder after integer division.

Round-off

error that results when the number of bits is not enough to represent the actual number, like 3 digits to represent π as 3.14

Data compression

involves encoding information using fewer bits than the original representation

DNS Server

is a hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network.

Cloud services

is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand

IP addresses

is an identifier assigned to each computer and other device (e.g., printer, router, mobile device, etc.) connected to a TCP/IP network[1] that is used to locate and identify the node in communications with other nodes on the network

Public key encryption

is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

Phishing

is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

Reasonable time

polynomial in the number of steps an algorithm takes in the worst case based on the input size

Malware attacks

short for malicious software, is any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising

Byte

technical term for 8 bits of data

RGB

the color model that uses varying intensities of (R)ed, (G)reen, and (B)lue light added together in order to reproduce a broad array of colors.

TCP/IP network

the conceptual model and set of communications protocols used on the Internet and similar computer networks. It is commonly known as TCP/IP because the original protocols in the suite are the Transmission Control Protocol (TCP) and the Internet Protocol (IP).

file extensions

the endings of file names that indicate to the computer the format for how the underlying bits are organized.

Cipher

the generic term for a technique (or algorithm) that performs encryption

Digital Divide

the gulf between those who have ready access to computers and the Internet, and those who do not.

Moore's Law

the observation that computing power roughly doubles every two years.

Filter

tool/technique using dynamic parameters for reducing a data set to viewing only similar items in a row or column.

asymmetric encryption

used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt.

Heuristic

using a "rule" to guide an algorithm, like always walking toward the north star if you were stuck in a forest

Iteration

using a looping control structure, like while, for, foreach, repeat, repeat-until, etc.

Vigenère cipher

a method of encrypting text by applying a series of alphabetical shifts based on the letters of a keyword.

Heuristic

a problem solving approach (algorithm) to find a satisfactory solution where finding an optimal or exact solution is impractical or impossible.

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text

Caesar Cipher

a technique for encryption that shifts the alphabet by some number of characters

.zip

an archive file format that supports lossless data compression; may contain one or more files or directories.

.mp3

an audio coding format for digital audio which uses a form of lossy data compression which works by reducing (or approximating) certain components of the audio that are considered to be beyond audible human hearing.

Random Substitution Cipher

an encryption technique that maps each letter of the alphabet to a chosen other letters of the alphabet.

Domain names

an identification string that defines a realm of administrative autonomy, authority or control within the Internet.

Sequencing

code flows line by line, one after another, like a recipe

Metadata

data about data, like a camera storing the location, aperture, shutter speed, etc. for a digital photo

#FF0000

Red represented RGB in 32Bit Hex

.png

(Portable Network Graphics) a raster graphics file format that supports lossless data compression.

.wav

(Waveform Audio File Format) an audio coding format standard for storing an audio bitstream of uncompressed audio data.

.gif

(acronym for Graphics Interchange Format) a bitmap image format which uses the LZW lossless data compression technique to reduce the file size without degrading the visual quality. Supports 8 bits per pixel for each image and animations.

.jpg or .jpeg

(acronym for Joint Photographic Experts Group), a commonly used lossy compression format for digital images, particularly for those images produced by digital photography. The format supports adjustable degrees of compression.

.bmp

(bitmap image file or bitmap) is a raster graphics image file format used to store digital images.

CSV

Abbreviation of "comma-separated values," this is a widely-used format for storing data.

Creative Commons

An alternative to copyright that allows people to declare how they want their artistic creations to be shared, remixed, used in noncommercial contexts, and how the policy should propagate with remixed versions

Parameter

An extra piece of information that you pass to the function to customize it for a specific need

APIs

Application Programming Interface, how you define libraries and call them

Linear vs binary search

Going one by one vs starting in the middle and going left/right like looking for a word in the dictionary -- binary search requires the list to be sorted in order

#00FF00

Green represented RGB in 32Bit Hex

Visualization

Images, diagrams, tables, etc created from information extracted from a given data set, with the express intention of highlighting a data story.

Intellectual property

Intellectual property (IP) refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce.

Citizen Science

Lots of people to help with a scientific project, like asking everyone around the world to count the butterflies they see one day

Abstraction

Pulling out specific differences to make one solution work for multiple problems.

Pixel

Short for "picture element" it is the fundamental unit of a digital image, typically a tiny square or dot which contains a single point of color of a larger image.

Moore's Law

The # of transistors on a chip doubles every two years

DDos Attack

denial-of-service attack (DoS attack) is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

Loop

The action of doing something over and over again.

Digital divide

The idea that some communities / populations have less access to computing than others

Public Key Encryption

Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.

Cloud Computing

Using distributed calculations and/or storage for big data or a web applicatio)

Not reasonable time

Usually exponential in the number of steps, like doubling every time your input grows by one

Cracking encryption

When you attempt to decode a secret message without knowing all the specifics of the cipher.


Set pelajaran terkait

620 Adult - Dermatology - AG and FNP Certification Exam 4th ed. Winland-Brown and Dunphy

View Set

Chapter 7: How Cells Capture Light Energy via Photosynthesis

View Set

psy 200 chapter 4 (LearningCurve 4a) Emotional Development

View Set

Just Like My Dad by David Melling

View Set

CyberOps Associate Modules 1 + 2 Test

View Set

Nursing Care of Children Online Practice 2019 A

View Set

CoursePoint Chapter 1: The Nurse's Role in Health Assessment

View Set