Creativity,One of the seven big ide Flashcards

(280 cards)

1
Q

Creativity

A

One of the seven big ideas - the use of the imagination or original ideas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Abstraction

A

One of the seven big ideas - technique in computing that hides detail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data and Information

A

One of the seven big ideas - emphasizes how computers are used to analyze data and create new knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Algorithms

A

One of the seven big ideas - the process or set of rules to be followed in calculations or other problem-solving operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Internet

A

One of the seven big ideas - a global computer network providing a variety of information and communication facilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Global Impact

A

One of the seven big ideas - focuses on how computing and technology has impacted our world positively and negatively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Computer Science

A

The study of the ideas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Imagination Age

A

A theoretical period beyond the information age where creativity and imagination will become the primary creators of economic value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information Age

A

A shift in human history from traditional industry to an economy based on information computerization using analysis and thinking - AKA: Digital Age.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Program

A

A systematic plan or sequence of instructions for a computer to solve a problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Programming

A

The action or process of writing computer programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RAM

A

Random Access Memory consists of tiny electrical circuits that dynamically store frequently used program instruction to increase speed of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Compilation

A

The process of source code being translated into machine code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Compiler

A

A program that translates high level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Bit

A

Short for binary digit - a single binary value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Central Processing Unit (CPU)

A

The processor or brains of the computer where calculations take place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Source Code

A

Programs written in high-level languages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Machine Code

A

Programs written in machine-level instructions that are uniquely read by computer processors using patterns of 1s and 0s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Hardware

A

Physical components of a computer built using multiple levels of abstraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Primary Storage

A

Main storage or memory that stores data for quick access by the computer’s processor (RAM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Secondary Storage

A

External/Auxiliary memory such as a USB flash drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Binary

A

Machine code that is a direct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Create Performance Task

A

One of the two performance tasks on the AP CSP exam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Explore Performance Task

A

One of the two performance tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Computational Thinking
Understanding the logic and processes computers use to solve problems and run programs.
26
Innovating
The process of imagining something that does not yet exist
27
Iteration
Repeatedly applying a process with the goal of coming closer and closer to a solution.
28
Iterative Development Process
The process by which computer programs are designed
29
Debug
To identify and remove errors from a computer program.
30
Sequencing
Executes statements one at a time - in order
31
Selection
Uses 'if...then' to tell a computer how to select a step or to tell the sequence that it should be executed.
32
Imperative Statement
A command statement with a verb phrase that indicates an operation to perform (example: move forward)
33
Descriptive qualifier
A specific adverb or adjective that further qualifies or limits the meaning of a word (example: left shoe)
34
Natural Language
A complex
35
Artificial Language
A limited size language
36
Ambiguity
Uncertainty or being open to more than one interpretation.
37
Visual Programming Language
A programming language that lets users drag and drop icons into organized blocks of code to create programs rather than typing text.
38
High-Level Language
A programming language that is easier for humans to read
39
Low-Level Language
A programming language that has little or no abstraction and communicates closely to the hardware using machine language. Less natural for humans.
40
Sprite
An object in Scratch that performs functions through scripting.
41
Stage
The background of a project in Scratch which can have scripts
42
Costume
The appearance of a sprite.
43
Motion Blocks
Medium-blue colored blocks used to control a sprite's movement in Scratch.
44
Reporter Blocks
A block in Scratch with round edges that contains a value (numbers
45
Looks Blocks
Purple-colored blocks of code in Scratch that are used to control a sprite's appearance.
46
Sensing Blocks
Light-blue colored Boolean blocks that are used to detect different factors of a project such as touching.
47
Operator Blocks
Light-green colored blocks of code used to handle strings and math equations in Scratch.
48
Events
Blocks of code that trigger corresponding behavior (example: Green Flag - starts program)
49
Broadcast
When blocks of code are executed at a given time by communicating (or broadcasting) a message.
50
Input
User interaction with a program via clicking
51
Storage
What the computer 'stores' or needs to remember to execute a program.
52
State
A description of what the computer is doing or the values of variables at any given moment.
53
Attributes
A descriptor used to describe the state
54
Process
The program code and current activity that is being executed in a computer program.
55
Position
The x and y coordinates on the stage in Scratch.
56
Placeholder
A variable for a particular value or attribute.
57
Variable
A placeholder to store a particular value or attribute such as x and y in an algebraic equation or calculation.
58
Integer
A whole number; a number that is not a fraction that is used in programs.
59
Character
A single letter
60
String
A series of characters at any length. Can be a type of variable.
61
Boolean Values
A variable to represent true or false.
62
Array
Lists of other variables.
63
Floating Point Number
A number that may have digits after the decimal place. Can be a type of variable.
64
Declaring Variables
Creating variables in a programming language.
65
Algorithm
A process or set of rules to be followed in calculations or other problem solving operations.
66
Sequencing
Logic structure where instructions are executed in order
67
Flowchart
A simple diagram with symbols showing the 'flow' of a process.
68
Flow Pattern
Pattern that can emerge when data is transformed using computational logic structures (sequencing
69
Sequential Execution
Program instructions that are executed one at a time
70
Parameter
A variable that defines a procedure or sets the conditions of an operation.
71
Procedure
A named collection of steps in an algorithm that can be reused anytime it is needed without restating the detailed procedures (abstraction).
72
procedure
a named collection of steps in an algorithm that can be reused anytime it is needed without restating the detailed procedures (abstraction)
73
comments
an annotation in the code of a computer program
74
remix
to modify and share a version of an uploaded existing project
75
selection
algorithmic structure that uses 'if...then' to tell computer how to select a step or to tell the sequence that should be executed.
76
if statement
type of selection statement that only executes when a certain criteria is met.
77
if else statement
a more thorough version of an if statement that stipulates what is to happen when a certain criteria is not met.
78
operators
symbols that imply a comparison in conditional selection statements.
79
control flow
the direction the computer program moves from instruction to instruction over time. Can also be controlled by if statements and other binary conditions.
80
Operator block
light-green colored blocks of code used to handle strings and math equations in Scratch.
81
If block
a set of instructions within an if block that is executed only if the condition in the if statement is met.
82
If else block
a set of instructions within an if block is executed if a specified condition is true and instructions within the else block are executed if the same condition is false.
83
branching
instruction in a computer program that can cause a computer to begin executing a different sequence of instructions.
84
conditionals
only executes if a certain designated condition is true.
85
Boolean values
binary values (usually denoted true and false)
86
switching
turning on or off (binary)
87
nesting
where different logic structures sequence
88
iteration
repetition - one complete step of a loop
89
loop
the repetition of some code
90
indefinite loop
when it is unknown how many times a loop will iterate
91
definite loop
executes a predetermined set of times for a loop to be repeated
92
repetition
one complete step of a loop
93
unsolvable problem
a problem that cannot be solved using any algorithm
94
Halting Problem
there cannot be a program that will determine which computer programs will halt (or exit) and which programs will go on forever (infinite loop) where no algorithm can be made that always leads to a correct yes or no answer.
95
undecidable problem
where no algorithm can be made that always leads to a correct yes or no answer.
96
scalability
how well do algorithms perform at increasingly larger scales.
97
Big-O Notation
a mathematical concept used by computer scientists to determine how well algorithms scale - performances classified into different categories.
98
sequential search
a linear search method of finding a targeted value within a list
99
binary search
a method of searching by dividing the search interval in half each time.
100
logarithmic behavior
doubling the size of a problem only requires one extra unit of work.
101
brute forcing
trial and error method used to decode encrypted data such as passwords.
102
Moore's Law
developed by Gordon Moore
103
heuristics
a method for deriving an approximate solution - Rules of Thumb but not guaranteed an accurately correct answer.
104
logic gate
a hardware abstraction that is modeled by a Boolean function.
105
concatenation
chaining together or placing two or more separate things side by side so that they are treated as one.
106
string
a linear sequence of characters
107
dichotomous
in which something can only be one thing or another (yes or no).
108
dichotomous
in which something can only be one thing or another (yes or no)
109
binary code
code represented with the two symbols of 1 and 0
110
bits
the foundation for digital computing (1s and 0s) - short for binary digits
111
digital
how information is stored
112
state space
the space of potential possibilities
113
exponential growth
the rate of growth that rapidly increases in proportion to the growing total number or size.
114
decimal
describes the base-10 number system. The most commonly used number system.
115
ASCII (American Standard Code for Information Interchange)
a table that outlines a common set of conventions established for converting between binary values and alphanumeric (represents 128 different characters)
116
alphanumeric
the characters that consists of uppercase and lowercase letters in addition to numerals 0-9.
117
digital noise
irrelevant or meaningless data that has found its way into otherwise meaningful code.
118
abstraction
the process of removing or suppressing details to create a manageable level of complexity.
119
bit string
a sequence of bits that can be used to represent sets or to manipulate binary data.
120
mapping
associating each element of a given set with one or more elements of a second set.
121
data
characters
122
unicode
a binary encoding system that can represent much more of the world's text than ASCII can (represents 65
123
hexadecimal
a base-16 number system utilizing numbers 0-9 and letters A-F used to represent eight binary digits or one byte.
124
Morse Code
a code where letters are represented by combinations of long and short signals of light or sound.
125
Baudot Code
a binary code invented by Emile Baudot in 1870 that uses crosses and dots in order to encode 2^5 or 32 characters.
126
variable-width encoding
using codes of different lengths to encode a character set for representation (example: Morse Code)
127
fixed-width encoding
using codes with a fixed width to encode a character set for representation (example: Baudot Code)
128
discrete
separate or divided (digital)
129
continuous
unbroken
130
approximation
digital copies are only approximations of the natural object.
131
analog
non-digital signals or information represented by a continuously variable physical quantity such as spatial position or voltage.
132
list
a data structure (also called an array) that stores multiple pieces of information at once.
133
data structure
a particular way of organizing and storing data such as an array
134
index value
the representation of the location of each item in a list.
135
output
observable behaviors generated by the computer such as animation
136
join
block in Scratch that concatenates
137
linear search
a method for finding a target value within a list (whether presorted or not) by checking each value until a match is found or until all the elements have been searched.
138
substring
a subset of a string of alphanumeric fields or variables.
139
Function
A set of commands which can be run by calling it by name.
140
Parameter
Information sent to a function.
141
If statement
Command that tests a true/false condition.
142
Relational Operators
The symbols used to compare values in true/false tests.
143
Syntax
the set of rules that defines the combinations of symbols that are considered to be correctly structured programs in a programming language.
144
Processing language
a text-based open-source programming language built for visual and electronic media design and manipulation.
145
semicolon
in some programming languages
146
braces
Braces (aka: curly braces) are used to group the statements in an if statement
147
debugging
locating and correcting errors in a program.
148
bug
any unwanted or unintended property of a program or piece of hardware
149
phi phenomenon
the optical illusion that is created when looking in rapid succession at a series of photos
150
pixel
pixel (picture element) is the smallest element or unit that makes up a digital image that can be individually processed.
151
setup() function
a function used in the Processing language that runs and sets up the initial properties such as screen size
152
draw() function
an implicit looping structure that is executed every time the screen is redrawn in the Processing language.
153
while loop
a control flow statement that allows code to be executed repeatedly according to a given Boolean condition (consists of Initialization
154
iterative
repeating a process to generate an unbounded sequence of outcomes
155
initialization
to set a variable to an initial value (example: int numberDrawn = 0;)
156
RGB
an additive color model where Red Green and Blue light are added together to produce a variety of colors to display electronically.
157
CMYK
a subtractive color model where Cyan
158
hexadecimal
a positional number system based on 16 and uses 16 symbols to represent values (0-9
159
raster format image
an image represented by a grid of pixels - also known as bitmap. Can be scaled down with no quality loss
160
bitmap
a file format used to store digital images comprised of a map of bits.
161
vector format image
a graphic image made up of paths
162
raw format image
an original image from a digital camera that is neither processed nor compressed and is a larger file format.
163
jpeg format image
a processed and compressed image that is more accessible and generally has a smaller file format.
164
file formats
the way a file is encoded for structure and storage. Denoted with file extensions: .jpg
165
encoding
the process of putting a sequence of characters (letters
166
run-length encoding (RLE)
Lossless data compression where sequences of the same data value are stored as a single value. Example: WWWWWWWWWEEEEEEEE would be compressed to 9W8E.
167
encoding scheme
the conversion of a sequence of characters (letters
168
filter
a technique that changes the appearance of an image by altering shades and colors of pixels.
169
remix
to alter a piece of media by adding
170
sampling
a technique for measuring the sound wave and digitally encoding sound to make a digital representation.
171
sampling rate
the number of samples of sound that can be taken per second to represent the sound digitally.
172
autotune
digitally transforming out-of-tune bits of an audio file to improve the pitch and sound quality.
173
frequency
the speed of the vibration which determines the pitch of sound. Measured in wave cycles that occur in one second (Hertz).
174
Theremin
an electronic musical instrument where tone is generated through high-frequency and the pitch is controlled by hand motions to and from the circuit.
175
backmasking
a technique for recording audio backward.
176
amplitude
the length and width of soundwaves - volume or loudness.
177
compression algorithm
the reduction in the amount of data needed to represent an audio sample.
178
lossless compression
compression that has occurred with no loss of information so when decompression occurs
179
lossy compression
irreversible compression that uses a more aggressive compression ratio through approximations resulting in partial data loss.
180
big data
large amounts of structured and unstructured data that can potentially be mined
181
data processing
converting information that can be understood by a computer.
182
useable data
data that is capable of being used - i.e.
183
useful data
can someone use the data to make predictions
184
data collection
gathering and measuring information on targeted variables in order to answer questions and evaluate outcomes.
185
collaboration
working together to facilitate the application of multiple perspectives and diverse talents and skills.
186
unstructured data
raw data with no connections and/or relationships among data detected - requires more storage space.
187
structured data
data that is organized in some fashion - utilizes less storage space.
188
data set
a collection of numbers or values that relate to a particular subject usually portrayed in a relational database table. Example: column header and row contents for test scores for each student.
189
knowledge extraction
knowledge created from structured relational databases.
190
relational database
a collection of data organized and retrieved in various ways between database tables.
191
data vs. information
data are figures and facts while information is data that is processed
192
data storage
the retention and retrieval of data.
193
extraction
retrieving or processing data from unstructured data sources for further data processing
194
spiderbot
a virtual robot (program) that visits web sites and reads information to create entries for a search engine index.
195
screen scraping
extracting information that is formatted for human use and converting it into a format for computer use (example: scanner or pdf converter).
196
generation loss
the loss of quality between copies of data
197
browser
a computer program used to navigate and search the World Wide Web and display HTML files in a graphical format (example: Google Chrome
198
data persistence
information that is not often accessed and rarely modified.
199
data storage
static storage of various capacities and speed such as CDs'
200
indexing
the specific organization and method of keeping track of data.
201
filter bubble
limiting a user's perspective by having an algorithm selectively determine what type of information a user would like to see based on past search history and behavior.
202
privacy concerns
digitization of personal data means your data is now easier to reproduce
203
utility
the measurement of usefulness - example: sharing personal digital data in order to receive something of value in return.
204
cache
a memory location to store active data temporarily to shorten data access times and reduce latency.
205
reCAPTCHA
a digital tool used to deter automated form-filling and exploitation of web-based registration systems.
206
crowdsourcing
obtaining information from a large number of people
207
human computation
using human cognition to provide computational data via techniques such as crowdsourcing.
208
descriptive analytics
information about collected data using statistics (mean
209
predictive analytics
information about future events based on collected and analyzed data.
210
analytics
information resulting from the systematic analysis of data or statistics.
211
automated summarization
summarizing data to a simpler state by removing redundant or less significant details.
212
visualization
the representation of information using a chart
213
regression analysis
the forecasting of change through statistical analysis of the strength of the relationship between one dependent variable and other changing independent variables.
214
metadata
descriptive data about an image
215
curation of information
gathering information pertaining to a specific topic.
216
models
physical or virtual representations of an object.
217
simulations
test a hypothesis of a situation using a model.
218
social media
applications and websites that allow users to share content and participate in social networking that may have otherwise had socioeconomic barriers.
219
socioeconomic
the differences among groups based on geographical
220
search tools
directories and search engines on the Internet that are essential for finding information efficiently on the Web.
221
cloud computing
storing
222
client-server model
the client(s) are the end-user(s) and communicates with the server (a centralized computer) that services the clients.
223
digital divide
the gap between those who have ready access to computers and the Internet
224
routing
the process of moving information (or packets) over a network via a device called a router.
225
SMTP protocol
Email communication standard developed and overseen by the Internet Engineering Task Force (Simple Mail Transfer Protocol).
226
HTTP
Hypertext Transfer Protocol developed by the Engineering Task Force
227
HTTPS
HTTP with a Secured Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer that encrypts and decrypts user data and requests for added security (Hypertext Transfer Protocol Secure).
228
Internet protocol
the protocol by which data is sent from one computer to another on the Internet.
229
TCP/IP
standard for packets and routing (Transmission Control Protocol/Internet Protocol).
230
SMS
Short Message Services. Text messaging that allows the user to send up to 160 characters to another device. If message is longer it may truncate
231
interface
a user-friendly picture-oriented way to interact with technology
232
protocols
a common set of rules that computers must abide by in order to connect with each other.
233
IP address
a unique numeric identification for each device that is connected to a computer network and uses Internet Protocol.
234
IPv6
Internet Protocol
235
IPv4
Internet Protocol
236
domain
a group of devices connected on a network using the same protocol to access and administer web pages.
237
domain name system (DNS)
the way that domain names are located and translated into Internet Protocol (IP) addresses.
238
packet switching
digital data is sent by breaking the data into blocks of bits called packets
239
net neutrality
the Internet is built around the notion of free and open access to information with no blocking
240
encryption
the process of converting information or data into a code
241
public-key encryption
an asymmetric encryption method that uses a public key (made available publicly) and a private key (available to owner only).
242
certificate authorities
CA's issue digital certificates that validate ownership of encrypted keys used in secured communications and are based on a trust model.
243
trust model
validation of one's identity necessary for an event or transaction to occur.
244
open platforms
software based on open standards where there is no single ownership and is freely available through open license.
245
closed platforms
proprietary software where the provider has control over the application and content and can restrict access.
246
cybersecurity
measures taken to protect a computer or computer system against unauthorized access or attack.
247
confidentiality
the ability to limit access to information to a certain set of users.
248
integrity
the certainty that information is accurate.
249
availability
the reliability of access to information.
250
firewall
part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
251
Secure Sockets Layer (SSL)
the standard security technology for establishing an encrypted link between a web server and a browser
252
DDoS Attack
Distributed Denial of Service - an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.
253
viruses
code that is capable of copying itself and corrupting a system or destroying data.
254
social engineering
the psychological manipulation of people into performing actions or divulging confidential information.
255
malware
software that is intended to damage or disable computers and computer systems.
256
phishing
obtaining confidential information by masquerading as an 'official' person
257
Internet
the network infrastructure composed of devices (or nodes) that communicate via protocols.
258
World Wide Web
a network of online content formatted in html and accessed via HTTP (WWW).
259
Tim Berners-Lee
created the set of fundamental tools and technologies that make up the World Wide Web.
260
hyperlinks
clickable bits of text
261
distributed computing
computers that interact with each other in order to achieve a common goal.
262
botnets
a network of private computers infected with a malicious software and controlled as a group without the owners knowing.
263
bitcoin mining
the processing of transactions in the digital currency system
264
Internet of Things
the network of physical devices
265
autonomous technology
technology that can function without being told what to do - i.e. Robots.
266
computing innovation
a new method or idea utilizing computing that has meaningful impact on society
267
crowdfunding
entrepreneurs using online access to customers as a means of funding their project.
268
network
connection of devices and networks to communicate using addresses and protocols.
269
sensor networks
autonomous sensors that measure environmental conditions such as light
270
Application Program Interfaces (APIs)/Libraries
a set of routines
271
hierarchy
an arrangement of elements in a ranking of superiority. the Internet and systems are built from the top (root) down.
272
bandwidth
a measure of bit rate of a system or data (measured in bits) that can be sent in a fixed amount of time over a system.
273
latency
the time elapsed between the transmission and the receipt of a request in a system.
274
open standard
a standard where documentation and specifications are open to the public.
275
closed standard
a standard where documentation and specifications are not available to the public.
276
open source
publicly available information that is free to use
277
closed source
privately owned information that is proprietary.
278
symmetric key system
an encryption method where each pair of users share a secret key.
279
asymmetric key system
an encryption method that uses different keys to encrypt and decrypt.
280
User Datagram Protocol (UDP)
a communication protocol used to send messages to other hosts of an IP network; sends packets quickly with minimal error-checking and no resending of dropped packets.