Unit 11 AP computer science principles

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/36

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

37 Terms

1
New cards

internet

a philosophy of making information and knowledge open and accessible to all people. A network of networks built an open agreed upon protocols.

2
New cards

protocol

a widely agreed upon set of rules that standardizes communication between machines

3
New cards

network

a group of two or more computer systems linked together

4
New cards

Birate

the amount of data in bits that can be sent in a fixed amount of time

5
New cards

bandwidth

the capacity of data transfer in a system. Measured by bitrate

6
New cards

latency

the latency of a system is the time it takes for a bit to travel from a sender to a receiver. Fiber optic cables have low latency

7
New cards

network devices

an electronic device which is required for communication between devices

8
New cards

computing devices

a computing device is a physical artifact that can run a program

9
New cards

input devices

are commuting devices that are used to take in information from a user or another device

10
New cards

output devices

computing devices that are used to send computer data to the user

11
New cards

storage devices

devices that remember information

12
New cards

computing systems

a computing system is a group of computing devices and programs working together for a common purpose

13
New cards

computer network

a computing network is a group of interconnected computing devices capable of sending and receiving data

14
New cards

internet protocol

the protocol that defines the structure of an internet address and assigns a unique address to every device on the internet

15
New cards

IPv6

a new 128 bit version of the internet protocol

16
New cards

URL

stands for uniform resource locator. You are locating a resource that exists somewhere on the internet

17
New cards

HTTP Request

an HTTP is made by a client, to a named host, which is located on a server. The aim of the request is to access a resource on the server

18
New cards

HTTP Response

An HTTP response is made by a server to a client. The aim of the response is to provide the client with the resource it request.

19
New cards

Domain Name System

used to translate domain names into IP address

20
New cards

IP (Internet Protocol)

Digital information generally comprises data that is created by or prepared for, electronic systems and devices such as computers , screens, calculators, communication devices,and so on, and can be stored on those devices or in the cloud

21
New cards

Routing

the process of sending data between two computers on the internet . The data is sent through routers that determine the route

22
New cards

redundancy

when multiple paths exist between two points. This improved reliability and makes the internet fault tolerable. Makes the routing system scalable

23
New cards

packets

packets are the units of data that are sent over the network

24
New cards

HTTP

hypertext transfer protocol that standardizes the language for taking to the web servers to send and receive web pages or hypertext information

25
New cards

Transmission Control Protocol (TCP)

allows sending MULTIPLE packets between two computers. TCP checks that all packets arrived and can be put back in the proper order. The metadata must include a destination IP address , a from iP address the message and the packet order number

26
New cards

Sequential Programming

sequential programming refers to programs

That are executed sequentially one thought , from start to finish, without other processing executing

27
New cards

Parallel and Distributed Programming

completes multiple tasks simultaneously

28
New cards

DNS spoofing

pretending to be a DNS name resolver. Feed your computer the wrong Ip address for a given website, and your browser now goes to a false website

29
New cards

DDoS attack (Distributed Denial of Service attack)

Distributed Denial Of Service attack. Spam a web server with so many requests so close together that it crashes. Sometimes spitting out valuable information as it crashes

30
New cards

Cybersecurity

Protocols for encrypting/decrypting information. Most cybersecurity breaches happen due to human error, not software bugs.

31
New cards

Cybercrime

Identity theft, stealing money, stealing private information, controlling private computers

32
New cards

Public Key Encryption

Public key encryption is a type of asymmetric key encryption, There's one key that encrypts the information and there is a different key that decrypts the information

33
New cards

Certificate

Confirms the identity and authenticity of a website

34
New cards

Anonymity

anonymity describes situations where the acting persons identity is unknown.

35
New cards

Censorship

Censorship is the suppression of words, images, or ideas that are "offensive"

36
New cards

Digital Divide

The digital divide is a gap between those who have access to digital technology and those who don't

37
New cards

Copyright

a law that grants the creator of an original work exclusive rights to its use, distribution, and sale