AP CSP BJC Unit 4 Vocabulary

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/76

flashcard set

Earn XP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

77 Terms

1
New cards

Internet

computer network that uses open protocols to standardize communication and involves interconnected but separate computing devices

2
New cards

computer network

interconnected computing system capable of sending and receiving data

3
New cards

computing system

group of computing devices and programs working together for a common purpose

4
New cards

computing device

physical object that can run a program

5
New cards

World Wide Web (www)

system of linked pages, programs, files that can use the Internet

6
New cards

fault tolerance

capability to work around problems (e.g. part of network breaks down)

7
New cards

protocol

type of abstraction; set of rules that specify the behavior of a system; communication standards

8
New cards

redundant network

multiple pathways to create redundancy, allowing for fault tolerance

9
New cards

open protocol

available for use by anyone so that anyone can connect to the network

10
New cards

router

connection between networks that transfers information

11
New cards

internet service provider (ISP)

company that sells internet to homes and institutions

12
New cards

bandwidth

maximum amount of data that can be sent in a fixed amount of time (e.g. bits per second)

13
New cards

cloud

place in Internet to store data; location managed by cloud service provider

14
New cards

routing

process of finding path from sender to receiver

15
New cards

scalability

ability of Internet to keep working as it grows

16
New cards

redundancy

inclusion of backup elements in case one part fails

17
New cards

Internet Protocol (IP) address

unique number assigned to each device on a computer network

18
New cards

Internet Protocol (IP)

direct connections to computers; specifies how a router handles a request for a different IP address

19
New cards

packet

small chunk of data (text, numbers, lists, etc.) and metadata (information about the data) passed through the Internet as a data stream

20
New cards

packet switching

Internet sends short bursts of information, not long continuous strings

21
New cards

Transmission Control Protocol (TCP)

reliable connections to computers; sends packets until they are acknowledged as received

22
New cards

Application Layer Protocols

highest level of abstraction; manage how data is interpreted and displayed; give meaning to bits; e.g. HTTP

23
New cards

Transport Layer Protocols

manage breakdown of message into packets and reconstruction of packets upon arrival; e.g. TCP

24
New cards

Internet Layer Protocols

manage pathways that packets travel; abstraction of Internet as one large network instead of multiple subnetworks; e.g. IP

25
New cards

Network Interface Hardware

manage connection between Internet device and local network; e.g. using WiFi

26
New cards

open standard

anyone can look up a protocol and use it to make new hardware/software without permission

27
New cards

domain name

human-readable way of locating an Internet site

28
New cards

IP address

machine-readable way of locating an Internet site

29
New cards

hierarchy

arrangement with biggest category at the top and subcategories below

30
New cards

domain name system (DNS)

Internet protocol for translating domain names to IP addresses

31
New cards

Internet Engineering Task Force (IETF)

experts in charge of developing and approving protocols for the Internet

32
New cards

encryption

encoding data to prevent unauthorized access

33
New cards

decryption

decoding encrypted data

34
New cards

substitution cipher

substitutes each letter with another letter (symmetric)

35
New cards

symmetric encryption

use the same key for both encryption and decryption

36
New cards

Caesar/shift cipher

shifts the letters in order

37
New cards

public key/asymmetric encryption

uses two keys: public key for encryption, private key for decryption

38
New cards

Secure Sockets Layer, Transport Layer Security (SSL/TLS)

standard used for cryptographically secured information transfer on the Internet

39
New cards

certificate authorities

organizations that issue digital certificates to verify who owns the encryption keys used for secured communications

40
New cards

malware

software that was designed to harm or take partial control over your computer

41
New cards

keylogging software

malware that records every key pressed by a user

42
New cards

computer virus

malware that spreads and infects other computers; can attach to legitimate programs

43
New cards

antivirus/anti-malware software

software designed to scan files and Internet transmissions for malware

44
New cards

firewall

security system that controls the kinds of connections that can be made between a computer or network and the outside world

45
New cards

phishing

security attack in which the victim is tricked into giving up personal information or downloading malware

46
New cards

Denial of Service (DoS) attack

sending a lot of requests to the server at the same time

47
New cards

Distributed Denial of Service (DDoS) attack

uses a virus to flood a server with many requests from many computers at once so that users of that server are denied service

48
New cards

rogue access point

wireless access point that gives access to a secure network without the authorization of the network administrator

49
New cards

secure

transmission cannot be read if it is intercepted

50
New cards

verifiable

transmission is guaranteed to be from who it claims to be from

51
New cards

cryptography

methods for encoding and decoding messages

52
New cards

citizen science

scientific research conducted in whole or part by distributed individuals (many of whom may not be scientists) who contribute relevant data to research using their own computing devices (crowdsourcing)

53
New cards

crowdsourcing

general term for using the Internet to get a lot of people to help solve a problem

54
New cards

computing innovation

must include a program as an integral part of their function; can be physical, non-physical software, or conceptual

55
New cards

bit

single unit of data that can only have one of two values: 0 (off), 1 (on); short for binary digit

56
New cards

transistor

fundamental building block of computer circuitry

57
New cards

byte

group of eight bits

58
New cards

word

sequence of however many bits the CPU processes at a time

59
New cards

binary sequence/bitstream

string of ones and zeros

60
New cards

analog data

values that change smoothly

61
New cards

digital data

values change in discrete intervals

62
New cards

sampling

measuring values (samples) of an analog signal in regular intervals

63
New cards

sampling rate

number of samples measured per second

64
New cards

width

number of bits that a CPU processes at a time

65
New cards

bignum

multiple-word integer

66
New cards

floating point

represents numbers using powers of two (like scientific notation does for ten)

67
New cards

NaN

not a number; result of “illegal” computations

68
New cards

lossless data compression

reversible algorithms; there is no loss in quality; can reconstruct the original data

69
New cards

lossy data compression

algorithms are not fully reversible; can reconstruct only an approximation of the original data

70
New cards

kilo-

10³ units; thousand

71
New cards

mega-

10^6 units; million

72
New cards

giga-

10^9 units; billion

73
New cards

tera-

10^12 units; trillion

74
New cards

peta-

10^15 units; quadrillion

75
New cards

Hypertext Transfer Protocol (HTTP)

ALP; interprets HTML for web formatting

76
New cards

Transmission Control Protocol (TCP)

TLP; simulates reliable, long-term connection by only displaying data once all packets arrive

77
New cards

Simple Mail Transfer Protocol (SMTP)

for sending and receiving emails between servers