PLTW AP CSP Lesson 2.1 Review

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/48

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

49 Terms

1
New cards

Application Programming Interface (API) (2.1.4)

A way programmers share their code with other programmers; specifies the methods of each class.

2
New cards

Arguments (2.1.4)

An input value to a command that specifies the values of the parameters when a procedure is called.

3
New cards

Asymmetric Encryption (2.1.2)

An encryption method that uses two keys, a public key and a private key, belonging to one owner.

4
New cards

Authenticate (2.1.2, 2.1.3)

Confirm your identity using knowledge known only to you or information interpreted by you

5
New cards

Authorize (2.1.3)

To give permission, for example, to access information.

6
New cards

Boolean Expression (2.1.5)

An expression that evaluates to either true or false; used in the conditional of an if structure.\

7
New cards

Breakpoint (2.1.5)

A designated stopping place in your code.

8
New cards

Brute Force (2.1.2)

A method for determining a solution to a problem by sequentially testing all possible solutions.

9
New cards

Brute Force Attack (2.1.3)

An attempt to discover information, especially passwords, through trial and error. Attackers try as many passwords or phrases as possible, hoping one of the guesses is correct.

10
New cards

Certificate Authority (2.1.2)

A business or organization that issues a digital certificate verifying that a given public key is owned by the entity named on the certificate.

11
New cards

config method (2.1.4)

A method that can change the widget after it has been created

12
New cards

Cookie (2.1.1)

Small text-based bits of information about your browser that a web server saves.

13
New cards

Cryptogram (2.1.2)

A type of puzzle that consists of a short piece of encrypted text

14
New cards

Cryptography (2.1.2)

The science and art of delivering a message securely and confidentially.

15
New cards

Data Breach (2.1.1)

The unauthorized access or retrieval of confidential or otherwise protected data.

16
New cards

Debugging (2.1.5)

The process of figuring out why code doesn't behave as expected and eliminating bugs to make it work as desired.

17
New cards

Decrypt (2.1.1)

The process of decoding the data, the reverse of the encryption process, making the data human-readable again.

18
New cards

Encryption (2.1.2)

The process of encoding data to prevent unauthorized access, such as converting plaintext to ciphertext.

19
New cards

Frame (2.1.4)

A rectangular portion of the screen in a web browser.

20
New cards

Graphical User Interface (GUI) (2.1.3, 2.1.4)

Currently the dominant method for designing human-computer interaction.

21
New cards

Hacking (2.1.1)

Figuring out ways to use hardware and software that were unintended by the engineers who created it, usually used in the context of cybersecurity.

22
New cards

Internet (2.1.1)

A global computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols. It relies on TCP/IP for communication between devices.

23
New cards

Key (2.1.2)

Part of a key-value data structure often referred to as key-value pairs. Each one maps to a value.

24
New cards

Keystroke Logger (2.1.1)

The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.

25
New cards

Library (2.1.4)

A collection of modules; a reusable chunk of code that you may want to include in your programs/ projects;

26
New cards

Logic Error (2.1.5)

A mistake in the algorithm or program that causes it to behave incorrectly, unexpectedly, or with undesirable results; the code compiles and runs but causes problems elsewhere

27
New cards

Magic Number (2.1.5)

A literal value (such as 5 or "hello") that is hard coded into a program instead of being assigned to a well-named variable.

28
New cards

Malicious URL (2.1.1)

A link created with the purpose of promoting scams, attacks and frauds.

29
New cards

Malware (2.1.1)

Software intended to damage a computing system or to take partial control over its operation.

30
New cards

Module (2.1.4)

An encapsulated collection of one or more related classes, each with its own methods and attributes.

31
New cards

Multifactor Authentication (2.1.3)

A method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism, typically in at least two of the following categories: knowledge (something they know); possession (something they have), and inherence (something they are).

32
New cards

Paired Keys (2.1.2)

Two keys that are related in such a way that one can be used to encrypt data, which can then only be decrypted by the other key.

33
New cards

Personally Identifiable Information (PII) (2.1.1)

Information about an individual, such as social security number, age, race, phone number(s), medical information, financial information, and biometric data such as fingerprint records and retina scans.

34
New cards

Phishing (2.1.1)

Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.

35
New cards

Private Key encryption (2.1.2)

An encryption method where the sender and receiver share a private key (such as a number, word, or phrase) to use in the encryption algorithm.

36
New cards

Public Key Encryption (2.1.2)

A method of paired key encryption in which the key used to encrypt data is made available to anybody and its corresponding decryption key is kept secret.

37
New cards

Python Framework (2.1.4)

A collection of modules and packages which allow developers to build applications quickly, without the need to take care of involved details

38
New cards

Python Package (2.1.4)

A way of structuring Python's module namespace by using "dotted module names". namespaces which contain multiple packages and modules themselves. They are simply directories

39
New cards

Rogue Access Point (2.1.1)

A wireless access point that gives unauthorized access to secure networks.

40
New cards

RSA Algorithm (2.1.2)

An example of public key encryption developed by Rivest, Shamir, and Adelman, the founders of RSA, an American computer and network security company.

41
New cards

Runtime Error (2.1.5)

A mistake in the program that occurs during the execution of a program.

42
New cards

Search Engine (2.1.1)

A program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web.

43
New cards

SSL Certificate (2.1.2)

A digital document used to verify the authenticity of a server or public key.

44
New cards

Substitution Cipher (2.1.2)

A cipher in which each letter in an alphabet is replaced with a different character or symbol.

45
New cards

Symmetric Key Encryption (2.1.2)

A process in which a single key is used in both the encryption and decryption algorithm to encode/decode data.

46
New cards

Syntax (2.1.5)

Precise rules defining how the letters, words, and punctuation of a programming language are required to be used together.

47
New cards

System Administrator (2.1.3)

A person who is responsible for managing computers, networks, servers, and other computing resources for an organization or group.

48
New cards

ValueError Runtime Error (2.1.5)

An error that occurs because the program is only prepared to handle input values that are integers

49
New cards

Website (2.1.1)

a location connected to the Internet that maintains one or more pages on the World Wide Web.