AP Computer Science Principles | Important Vocab

Enjoy complimentary access to these vocabulary words needed for the AP Computer Science Principles (AP CSP) exam. These terms appear frequently throughout the course and assessment. Knowing them will help you understand key concepts and communicate your ideas clearly, offering a taste of the variety and depth our content and book have to offer.


A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

A

Abstraction – reducing information and detail to facilitate focus on relevant concepts

AND – basic logic gate where every part of a statement must be true for the entire statement to be true

Application – almost everything on the computer except saved files and the operating system, including word processors, photo editing software, web browsers, games, and music programs

ARPANET – the Advanced Research Projects Agency Network, first agency to use TCP/IP

ASCII – American Standard Code for Information Interchange

Asymmetric Key Encryption – a different key is used to encrypt and decrypt a message

B

Bandwidth – the amount of resources available to transmit the data

Big Data – sets of data that are larger than a consumer software application can handle

Binary – base 2, number system that uses 0, 1

Binary Search – a searching algorithm, used on sorted lists, that divides the number of elements to search in half until it is down to one element

Bit – each number in the binary system, 0 or 1

Boolean Logic – a branch of algebra where variables can only have two values: true or false

Byte – 8 bits

C

Caesar Cipher – a shift cipher where each letter is shifted the same amount

Central Processing Unit (CPU) –carries out every command or process on the computer and can be thought of as the brain of the computer

Certificate Authority (CA) – the entity that stores, signs, and issues digital certificates

Cipher – is a pair of algorithms that give details on how to encrypt and decrypt the data

Citizen Science – a type of scientific research that is conducted, in whole or in part, by distributed individuals who contribute relevant data to research using their own computing devices

Client –any computer that requests a service

Cloud Computing – a type of distributed computing that involves using a network of remote servers to store, manage, and process data

Computationally hard – a problem that takes too long even for a computer to find the exact solution

Computer – an electronic device that processes data according to a set of instructions or commands, known as a program

Constant – used in coding to store a value that cannot be changed

Copyright – a form of intellectual property, which protects original forms of expression

Crowdsourcing – tapping into the collective intelligence of a large group of people to achieve a specific goal or solve a problem

D

Data abstraction – the process of managing complexity by using a list or array to store related data without focusing on the individual elements’ implementation

Datagrams – Similar to packets, used in unreliable protocols such as UDP

DDoS – distributed denial-of-service attack, hackers flood a site with fake request making all the site’s recourses unavailable for legitimate users

Debugging – finding errors in code

Decimal – base 10, number system that used 0-9

Decryption – the reverse process of encryption

Design – Implement – Test – the three steps of the iterative development process

Digit – each number in the decimal system, 0-9

Digital Certificate – a trusted third-party file that verifies a site as legitimate

Digital Divide – the gap between those who have access to technology and those who do not

Digital signature – an electronic signature that, by using public key, can be verified authentic

Distributed Computing – a model that involves using multiple devices to run a program

DNS – Domain Name System, one of the smaller networks that make up the Internet. It contains many servers that act like phone books

Domain Name – a name given or linked to an IP address

E

Encryption – taking text and converting it so it is illegible

Ethical computing – demands that users and developers hold themselves to a higher standard. Refers to the principles, values, standards, and practices that guide individuals and groups in doing what is right

EULA – end-user license agreement

F

Fault-Tolerant – a property of IP. If there is an error, it still works properly

G

Graphical User Interface (GUI) – an interface that uses images to represent a system’s folders and files

H

Hacker – anyone who uses their technological skills to solve problems. A malicious security hacker exploits weaknesses on a computer or network and can steal or disrupt data

Hardware – the physical parts of the computer, including devices such as the monitor, keyboard, speakers, wires, chips, cables, plugs, disks, printers, and mice

Heuristic approach – an approach that gives results that are “good enough” when an exact answer is not necessary

Hexadecimal – base 16, number system that uses 0-9 and a-f

HTML – Hyper Text Markup Language, the standard for creating web pages

HTTP – Hyper Text Transfer Protocol, used for websites

HTTPS – a secure version of HTTP that uses SSL/TLS

I

Incremental – done in small chunks

Input and output (I/O) devices – how the user interacts with the computer

Internet – a network of smaller networks connected using a specific set of rules that computers use to communicate with each other

IP –Internet protocol, a unique address for every device connected to the Internet

IP Address – a unique identifier for every device on the Internet

IPv4 – the version of IP that uses 32-bit addresses

IPv6 – the version of IP that uses 128-bit addresses

ISP – Internet Service Provider

Iterative – continuously repeating steps, achieved in programming by using loops

K

Key – in cryptography, a shared secret to make encryption harder to crack

L

Linear Search – a searching algorithm that starts at the first index and checks each element of the list one by one until it finds the item it is searching for

Logical Error – The program runs but produces incorrect or unexpected results (Using + instead of -, placing a condition in the wrong spot, calculating an average without dividing by the number of values)

Lossless – data compression that does not lose data during compression

Lossy – data compression that loses data during compression

M

Main memory – memory that temporarily stores information while it is being sent to the CPU, also called RAM

Malware – malicious software intended to cause damage to a computer or network

Metadata –additional data about the main data, usually at the beginning of a file

Modular arithmetic – using the remainder when dividing, also known as clock arithmetic

Moore’s Law – the trend of exponentially increasing transistor density, doubling approximately every two years 

Multi-factor authentication (MFA) – using two or more methods for verifying a user

N

Name Server – a server that contains many IP addresses and their matching domain names

Network – a group of computers that are connected so they can share resources using a data link

O

One-way Function – a problem that is easy in one direction and difficult in the other

Operating System – software that serves as an intermediate between the hardware and the applications and is in charge of keeping the entire system running smoothly

OR – basic logic gate where any part of a statement can be true for the entire statement to be true

Overflow Error – a specific type of run-time error that occurs when a computer attempts to handle a number that is outside of the defined range of values

P

Packets – small chunks of data used in TCP/IP

Parallel Computing – breaks a program into multiple smaller sequential computing operations, some of which are performed simultaneously

Peripherals – the input and output (I/O) devices and the secondary memory

Phishing – using “bait” to trick the user into entering sensitive information like usernames, passwords, or credit card numbers

Pixel – short for picture element. The basic unit of color on a computer display

Privacy – deals with your personal information, how it is stored, and how it is shared

Private Key – a shared secret needed to decrypt a message

Procedural abstraction – the process of using a function or method to hide the details of a specific task

Protocol – a specific set of rules

Public Key – a system that allows a key to be publicly published

R

Random Access Memory (RAM) –memory that can be retrieved or written to anywhere without having to go through all the previous memory

Redundancy – finding frequencies or patterns in code

Reliable – a protocol that lets the client know if the server received all sent packets

RGB – color model used for most monitors or screens. Stands for red, green, and blue, referring to the color of light

Root Name Server – one of thirteen servers that contain every IP address and its matching domain name

Round-off Error – a type of error that can occur when working with real that are represented as approximations in computer storage

Router – a networking device that routes Internet traffic to the destination

Run-Length Encoding – looking for redundancy or patterns as runs in the code

Run-time Error – a programming error that occurs during the execution of the program (like dividing by zero, accessing an undefined variable, trying to read a file that doesn’t exist)

S

Secondary Memory – used for long term storage and is physically changed when files are saved or deleted

Second-Level Domain – the second highest level in the DNS hierarchy, found directly to the left of the top-level domain in a domain name

Security – refers to the steps companies take to protect your data

Selection – the logic structure in programming that uses if statements to select certain values

Sequence – the structure that runs one line after another in order

Sequential Computing – a model in which operations are performed in order, one at a time

Server – any computer that provides a service

Software – includes the operating system and the applications. It is usually stored on a computer’s hard drive and cannot physically be touched. At the lowest level, it is a series of ones and zeros

Spear phishing – a type of phishing attack that targets a specific person or group using pre-existing knowledge

SSL – Secure Sockets Layer, issues digital certificates for websites

Subdomain – precedes the domain name, owned by the domain https://subdomain.domain.com

Symmetric Key Encryption – the same key is used to encrypt and decrypt a message

Syntax Error – a programming error which occurs when the rules of the programming language are not followed (Missing semicolon, unmatched parentheses, misspelled keyword)

T

TCP – Transmission Control Protocol, a set of rules for breaking down requests into smaller, more manageable, numbered packets

Text-Based Interface – an interface made up of purely text input from the user

TLS – Transport Layer Security, issues digital certificates for websites

Top-Level Domain – the highest level in the DNS hierarchy, found to the right of the final period in a domain name

Traveling Salesman Problem (TSP) – an NP-hard problem that, when given distances between pairs of cities, seeks to map out the shortest route between many cities and return back to the original city

Two-factor Authentication (2FA) – a subset of MFA where exactly two methods for verifying a user are implemented

U

UDP – User Datagram Protocol, like TCP and usually used for streaming audio/video

Uncompressed– all the information from an original file in the same format

Unicode – a 16-bit encoding scheme that built upon ASCII

URL – Uniform Resource Locator, specifies where to find a file on a domain

V

Variable – used in coding to store a value that can change

VPN – virtual private network

W

Web (World Wide Web) – the part of the Internet that uses HTTP and HTTPS

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z



Daily Lesson Plans 

This material contains a comprehensive collection of 90-minute lesson plans for a semester’s worth of instruction in AP Computer Science Principles to serve as a companion to this textbook. Each lesson plan includes clear objectives, related requirements, a list of necessary materials, a detailed procedure, an assessment method, and a reflection section. The lessons are designed to be engaging and interactive, incorporating a variety of teaching techniques to help students understand and apply the key concepts of computer science. In order to modify the course for a year-long course with approximately 180 instruction days, each lesson plan can easily be spread across two days of instruction. 


Textbook 

Computer Science Principles: The Foundational Concepts of Computer Science, 5th Edition, Kevin Hare – Yellow Dart Publishing – 2024


Daily Practice Questions

Enjoy complimentary access to a daily selection of 5 random questions from our extensive pool of over 500 thoughtfully crafted questions – even if you’re not a member. Dive into the excitement of learning with these free, rotating questions that change every 24 hours, offering a taste of the variety and depth our content and book have to offer.


Membership

For those hungry for more, our membership unlocks the full spectrum of over 500 questions, providing a comprehensive exploration of the diverse topics covered in our content and book. Delve deeper into the world of computer science, enhance your understanding, and master the principles that matter. Our membership also grants you exclusive access to detailed units from the comprehensive book and on our website. From foundational concepts to advanced topics, our units offer invaluable resources to support your learning journey. Elevate your exploration of computer science and make the most of your membership!

Ready to take the plunge into the world of computer science? Start Your Membership Today and enjoy free daily questions along with a treasure trove of over 500 more!


Subscribe to our Newsletter