AP Pseudocode
Internet Vocabulary
Data Collection
Algorithmic Efficiency
Mixed
100

The assignment operator, for example, how AP CSP would write score = 0

score <-- 0 

100

The set of rules and standards followed by everyone to allow the global internet to work as smoothly as it does.

What is internet protocol (IP)?

100

The word for summary values about a data set, such as dates, places, size.

What is metadata?

100

Looking for something in a data set by starting at the beginning and checking one by one until finding it or coming to the end of the data set.

What is linear search?

100

A type of copyright that allows anyone to access and use a product, as long as they acknowledge the source.

What is a Creative Commons license?

200

The modulus operator in AP CSP, for example

11%2

MOD

11 MOD 2

200

The internet is the collection of interconnected physical devices, while the collection of interconnected pages and apps that can be accessed through a browser is called....

What is the World Wide Web?

200

The word for data with continous values, such as wavelengths.  This type must be sampled at regular intervals to convert to digital form.

What is analog?

200

Looking for something by repeatedly choosing the middle value in a SORTED data set and testing if it is two high or too low, then finding the middle of the remaining half of the data set...

What is binary search?

200

The number 23 in binary.

What is 10111?

300

The full command, in AP CSP, to add "Fruit loops" to the end of a list called cereal.

APPEND( cereal, "Fruit Loops")

300

Data is broken up into _____________ and then sent over the internet, rather that the whole file.

packets

300

The word for collecting data, opinions, funding or other things from a large group of the public, for any purpose.

What is crowdsourcing?

300

A good enough approximate solution to a problem when the known algorithm would take unreasonable time.

What is a heuristic?

300

The general term for encryption using two different keys - one that encodes, and one that decodes.  (PKE is an example).

What is asymmetric encryption?

400

The full command, in AP CSP, to insert "Bob" at index 9 in a list called names.

INSERT(names, 9, "Bob")

400

The term for the many paths that a packet can take over the internet, to ensure fault tolerance

What is redundant routing?

400

A form of crowdsourcing, the phrase for collecting scientific data from the public, such as bird sightings being logged on the Cornell app "Ebird".

What is citizen science?

400

Algorithms that run in reasonable time can mostly have their time complexity modeled by this type of function (n, n^2, n^3...)

What is polynomial time?

400

While one key is sent over the internet for anyone to see, this type is used by the recipient to complete the decryption.

What is a private key?

500

The full command, in AP CSP, to change (reassign) the first value in a list called winners to the value at the end of that list.

winners[1] <-- winners[length(winners)]

500

Lowering the file size using a method that loses some data, like making a large picture lower resolution

What is lossy compression?
500

When experimenting in the real world may be expensive, time-consuming, dangerous or unethical, scientists often use an abstraction called a ....

What is a simulation?

500
Problems whose algorithms take UNreasonable time are generally modeled by factorials! (eg 6! = 6x5x4x3x2x1) or this type of function time...

What is exponential time?

500

A Wi-Fi router or entry point connected to a secure, private network without authorization from the network administrator. It creates a "backdoor" that bypasses security, allowing unauthorized users to steal data, intercept traffic, or hack into the network, often hidden behind firewalls.

What is a rogue access point?