
8.3. AP CSP Vocabulary Review¶
To prepare for the AP CSP exam, make sure that you review some vocabulary that you may encounter on the exam. The following quizlet consists of all vocabulary from the Mobile CSP course.
8.3.1. Vocabulary¶
The following table includes all the vocabulary from the Mobile CSP Course. Hover over a word to see the definition and test your knowledge.
ADT | ALU | AND gate | API |
ASCII | Alexa | CPU | CSV files |
Computing Innovation | Cookies | DMCA | DNS |
DRM | Data Privacy | Data Security | Data Storage |
Event Handler | Event-driven Programming | GPS | GeoJSON |
HTML | HTTP | Horizontal Arrangement | IDE |
IETF | IP Address | IPv4 | IPv6 |
If/Else | Input | Internet | Internet Service Provider |
JSON | LAN | Moore’s Law | NOT gate |
OCR | OR gate | Output | PRNG |
Personally Identifiable Information (PII) | RAM | SMTP/POP | Scalability |
TCP/IP | The Halting Problem | The Traveling Salesman Problem | Tim Berners-Lee |
Trojan horse | UI Components | URI | User Events |
User Interface | WAN | WWW as a higher level of abstraction | World Wide Web |
World Wide Web (WWW) | abstracting | abstraction | abstraction layer |
accumulator | algorithm | analog | append |
arguments | artificial intelligence (AI) | assembly language | assignment |
asymmetric cipher | back propagation | bandwidth | base |
bias | binary number system | binary search | binary sequence |
biometrics | bit | bitmap | blacklist |
boolean | browser | brute force | brute force attack |
byte | calorie intake | centralized | certificate authority |
character | chip | cipher | ciphertext |
cleaning data | client | cloud computing | comment |
compilation | computer | computer bug | computing system |
concatenation | constant | control structure | copyright |
creative commons | crowdsourcing | cryptography | cyberspace |
data | data abstraction | data center | data network |
data type | database | debugging | decentralized |
decidable problems | decimal number system | decision problem | decryption |
deep learning | deterministic | diffie-hellman | digital |
digital certificate | digital divide | digital signal processing | disk drive |
distributed computing | domain name | download | efficiency |
encryption | encryption algorithm | encryption key | endpoint function |
ethernet | even parity | expression | fair coin |
fair use | fault-tolerant | fetch-execute cycle | firewalls |
flip flop | flowchart | frequency analysis | function |
general purpose computer | global variable | hardware | heuristic algorithm |
hexadecimal number system | high level language | host | https |
hypothesis | index | input | insert |
instance of a problem | instruction counter | instruction register | integrated circuit |
intellectual property | intent | interpretation | intractable |
intractable problems | invocation | iteration | key exchange problem |
keylogger | latency | length | linear or sequential search |
list | local variables | logic gate | lossless compression |
lossy compression | machine langauge | machine language | machine learning |
malware | malware scanning software | megabyte | megapixel |
microgravity | mod operator | model | modeling |
modem | modular arithmetic | more efficient | motherboard |
multi-factor authentication (MFA) | network | neural network | octal number system |
odd parity | one time pad | open access | open standard |
operator | optimization problem | output | overflow error |
packet | packet sniffer | packet switching | parallel computing |
parallel lists | parameters | parity | parity bit |
peer-to-peer | phishing | ping | pixel |
plaintext | polyalphabetic substitution | positional number system | procedural abstraction |
processor | program | program function | program purpose |
protocol | pseudocode | public key cryptography | random |
random event | random number generator | randomness | ransomware |
raster | reasonable time | refactoring | render |
repetition | rogue access point | router | routing |
rsa | run length encoding | run-time error | sampling |
selection | semantic error | sequence | sequential computing |
server | skill | slot | social network |
software | sorting algorithm | spam | special purpose computer |
speech recognition | speech synthesis | speedup | ssl |
steganography | string | strong password | substitution cipher |
substring | symmetric cipher | symmetric encryption | syntax error |
traceroute | transistor | transposition cipher | trust model |
undecidable problems | unreasonable time | upload | utterances |
variable | virus | wake word | whitelist |
wifi | worm |
You have attempted 1 of 1 activities on this page