AP CSP Semester 1 Final

0.0(0)
studied byStudied by 1 person
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/125

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

126 Terms

1
New cards

What is the Internet?

a tangible, physical system that was made to move information; fully distributed; made up of independently operated networks; no central control; internetworking protocol; open, public, shared, plain text

2
New cards

What type of information does the Internet ship?

bits

3
New cards

What is a bit?

a binary pair of opposites (on/off, yes/no, 1/0)

4
New cards

How are bits organized?

8 bits = 1 byte

1000 bytes = 1 kilobyte

1000 kilobytes = 1 megabyte

5
New cards

How do we send bits?

electricity

light

radio waves

6
New cards

bandwidth

the maximum transmission capacity of a device; measured by bitrate

7
New cards

bitrate

the number of bits per second a system can transmit

8
New cards

latency

the amount of time it takes for one bit to travel from sender to receiver

9
New cards

electricity mode

sending through a wire (e.g. Ethernet cable); cheap but signal lost

10
New cards

light mode

fast, no signal loss (e.g. fiber optic cables that reflect light); expensive and hard to work with

11
New cards

radio wave mode

wireless; translate 1s and 0s into radio waves and back into 1s and 0s; signal loss

12
New cards

Vint Cerf & Bob Kahn

Internet founders (early 1970s)

13
New cards

ARPANET

Advanced Research Projects Agency NETwork (department of defense experiment); first Internet

14
New cards

Paul Baran

computer network pioneer; department of defense; came up with the distributed packet-switched network

15
New cards

ISP

Internet Service Provider (AT&T, Verizon, Time Warner) that connects you to other devices

16
New cards

protocol

a well-known set of rules and standards used to communicate between machines

17
New cards

IP address

Internet Protocol; a number unique to each computer or device at the edge of the network; 4 numbers each from 0 to 225, 8 bits per number, 32 bits total

18
New cards

IPv4

4 billion unique addresses; earliest IP system

19
New cards

IPv6

128 bits per address; 340 undecillion unique addresses

20
New cards

DNS

Domain Name System; associates names (www.example.com) with corresponding IP addresses; connected in a distributed hierarchy; open public communication protocol

21
New cards

NAT

Network Address Translation; conserves IP addresses

22
New cards

buffer

memory which stores packets temporarily

23
New cards

DNS spoofing

a hacker matches the domain name with the wrong IP address

24
New cards

direct dedicated connection

NOT how the Internet works

25
New cards

packet

about 1500 bytes; does not travel in a fixed route; each has the "to" and "from" IP addresses; identification serial number for tracking purposes

26
New cards

router

traffic managers that keep packets moving smoothly along paths; connects pathways; chooses the cheapest available path for each packet based on destination; fault-tolerant and reliable

27
New cards

TCP

Transmission Control Protocol; manages sending and receiving of packets at the edge; does a full inventory and sends back acknowledgements of all packets received; packets are resent if necessary

28
New cards

web browser

the app you use to access the Internet (Chrome, Firefox, Safari)

29
New cards

URL

Uniform Resource Locator

30
New cards

HTTP

HyperText Transfer Protocol; the language used to communicate between web browsers and servers

31
New cards

SMTP

Simple Mail Transport Protocol; used for sending email

32
New cards

IETF

Internet Engineering Task Force; working group that adopts protocols

33
New cards

server

what your computer communicates with

34
New cards

"get" request

client request to server to get info on a page and send it

35
New cards

"post" request

request that a web server accepts the data enclosed in the request message's body for storage

36
New cards

cookie

ID number that is stored in your web browser for identification

37
New cards

HTML

Hyper Text Markup Language; tells a web browser how to make a page look (bold, font, italic, image, alignment, etc.)

38
New cards

SSL & TLS

Secure Sockets Layer & Transport Layer Security (https & lock symbol)

39
New cards

digital certificate

official ID card proving it is the website it claims to be

40
New cards

certificate authorities

trusted entities that verify identities of websites and issue certificates for them

41
New cards

How does DNS work?

URL - web browser - operating system - resolving name server - root name server - TLD name server - authoritative name server

42
New cards

Resolving Name Server

knows where to find the root name servers; stores information from servers

43
New cards

TLD

Top Level Domain; .com, .net, .org, etc.

44
New cards

ANS

Authoritative Name Server; most specific (webkinz.com, example.net, gov.org)

45
New cards

What does the invisible dot at the end of .com represent?

the root of the Internet's name space

46
New cards

cache

computer memory that stores past IP addresses so your computer doesn't have to search for it again

47
New cards

encryption

scrambling or changing a message to nide it

48
New cards

decryption

unscrambling an encrypted message to make it readable

49
New cards

Caesar's cipher

shifting each letter a certain number down the alphabet

50
New cards

key

a secret password that only the sender and receiver know for unlocking a message

51
New cards

multiple digit keys

shift each letter a different distance; longer keys exponentially increase amount of time to crack

52
New cards

256 bit keys

typical key lengths today (used to be 128)

53
New cards

symmetric encryption

sender and receiver use the same key to encrypt/decrypt a message (secret key has to be agreed upon ahead of time)

54
New cards

asymmetric encryption

a public key that can be exchanged with anyone and a private key that is not shared

55
New cards

public key

shared with everybody so anybody can encrypt a message

56
New cards

private key

can only be decrypted by a computer with access

57
New cards

computer virus

an executable program that gets installed (usually unintentionally) and harms a user and their computer; can spread to other computers; fake programs, self-installing; can steal, delete, or control information and programs

58
New cards

DDoS

Distributed Denial of Service attacks; work through botnets to overwhelm a website with too many requests

59
New cards

BotNet

armies of infected computers that attack and take down websites

60
New cards

phising

trick people into sharing sensitive information

61
New cards

edge

what we see (your computer and mine)

62
New cards

core

the inside of the Internet; all the computers that connect and pass the message along

63
New cards

net neutrality

carriers are just packet deliverers and can do nothing else

64
New cards

end to end

the switches at the core of the Internet just pass packets and don't know anything else

65
New cards

RFC

Request for Comment; Internet standards adopted through a remarkable process of consensus-building, non hierarchical in the extreme

66
New cards

UDP

another high-level protocol that relies on IP for packet delivery; the packets are put in the Internet and sent on their way with no provision made for data loss; timely but unreliable

67
New cards

Enigma

the early cryptography machine that used a series of wheels to randomize the code used for government secrets

68
New cards

Alan Turing

he made breakthroughs in both code breaking and computer design; worked with the enigma machine; father of computer science

69
New cards

Auguste Kerckhoffs

the safest code is in the system everyone knows; it's safest if the enemy knows your cryptography system

70
New cards

Charles Babbage

an English mathematician, philosopher, inventor and mechanical engineer who is best remembered for originating the concept of a programmable computer

71
New cards

Effective cyber security involves...

human behavior

software

hardware

72
New cards

frequency analysis

allows simple substitution ciphers to be broken based on common word structures

73
New cards

algorithm

a set of steps to accomplish a task; solves a problem and does so efficiently

74
New cards

asymptotic analysis

allows algorithms to be compared independently to see which are the most efficient

75
New cards

pair programming

programmers work as a team (two people, one computer); more creativity and ideas; one driver, one navigator; communication is key

76
New cards

driver

sits at the computer and uses the keyboard and mouse; controls main actions of the computer

77
New cards

navigator

prompts the driver by answering questions and pointing out potential problems or mistakes

78
New cards

RFID

Radio Frequency Identification; similar to barcodes; read by radio waves rather than visible light

79
New cards

EDR

Event Data Recorder; records and stores details about an event

80
New cards

Privacy Act

1974 act mandating that all government files about private citizens be kept confidential

81
New cards

structure

basic unit of programming logic (sequence, selection, or iteration)

82
New cards

sequence

performs actions in order; no branching or skipping

83
New cards

selection

decision; asks a yes/no question and takes one of two actions; if-then

84
New cards

dual-alternative ifs

if-then-else

85
New cards

single-alternative ifs

if-then

86
New cards

null case

situation where nothing is done

87
New cards

iteration

loop; repeats actions while a condition remains true; for, while, repeat

88
New cards

start and end symbol (terminal)

oval

89
New cards

input/output symbol

parallelogram

90
New cards

process symbol

rectangle

91
New cards

decision symbol

diamond

92
New cards

connector symbol (used to connect breaks in the flowchart)

circle

93
New cards

How are programming structures connected?

nested or stacked (NOT interwoven or overlapped)

94
New cards

block

a group of programming statements that execute as a single unit

95
New cards

end-structure statement

indicates the end of a structure (endif, endwhile)

96
New cards

Machine Language

The language a computer understands but people find difficult.

97
New cards

Compiler

A program that converts a Source File into Machine Language.

98
New cards

Project

The Source File and other files needed to make your program work.

99
New cards

System(Pause);

Command that pauses the program and tells the user to "Press Any Key to Continue..."

100
New cards

//

Used to start a comment in a program.