AP Computer Science Exam Vocab

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/50

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

51 Terms

1
New cards

The Internet

is a network of computing networks that is used for different locations to communicate with each other

2
New cards

Net Neutrality

the principle that all Internet traffic should be treated equally by Internet Service Providers (ISP).

3
New cards

Digital Divide

the gap between those who benefit from the Digital Age and those who don't.

4
New cards

Internet Censorship

control or suppression of what can be accessed, published, or viewed on the Internet enacted by regulators.

5
New cards

Computing Device

is a machine that can run a program, including computers, tablets, servers, routers, and smart sensors

6
New cards

Path

is connections between computing devices on a network starting with a sender and ending with a receiver

7
New cards

Bandwidth

is the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second

8
New cards

Copper cabling

bits transmitted via electricity

9
New cards

Fiber Optic Cable

bits transmitted via light

10
New cards

WiFi

bits transmitted via radio waves

11
New cards

Latency

is the time it takes for a bit to travel from its sender to its receiver.

12
New cards

Protocol

is a well known set of rules and standards on how to handle the information

13
New cards

HTTP (Hypertext Transfer Protocol)

is the set of rules for transferring files such as text, images, sound, video and other multimedia files over the web.

14
New cards

Domain Name System

is a system that can associate names with corresponding addresses

15
New cards

World Wide Web

refers to all the public websites or pages that users can access on their local computers and other devices through the internet.

16
New cards

DNS Spoofing

hacking into a DNS server and changing the IP addresses to send users to a fake website

17
New cards

Packets

are small chunks of information that have been carefully formed from larger chunks of information. They do NOT travel together when transferred.

18
New cards

TCP (Also called TCP/IP) Transmission Control Protocol

provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. It puts all the tiny data packets back together.

19
New cards

Redundancy/ Network Redundancy

is the inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network

20
New cards

Fault Tolerant

is when a system can continue to function even in the event of individual components failures. This is important because elements of complex systems like a computer network fail at unexpected times, often in groups

21
New cards

Integer

is a whole number data type

22
New cards

Boolean

is a True or False data type

23
New cards

Float

is a decimal data type

24
New cards

String

is a series of text data type

25
New cards

Parameter

acts as a placeholder when the function is created and will take in a specific value when the function is called

26
New cards

Argument

is the actual value for a parameter

27
New cards

Cybersecurity

Use of techniques or skills to protect data, networks, and systems from attacks

28
New cards

Phishing

A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

29
New cards

Keylogging

The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

30
New cards

Malware

Software intended to damage a computing system or to take partial control over its operation (short for malicious software)

31
New cards

Rogue Access Point

A wireless access point that gives unauthorized access to secure networks.

32
New cards

Multi Factor Authentication

Requires more than one distinct authentication factor for successful authentication.

33
New cards

HTTP

HyperText Transfer Protocol - the protocol used for transmitting web pages over the Internet. Send 'get requests' to worldwide servers for websites and HTML code is sent in response.

34
New cards

Computer Virus Scanning Software (Anti-virus software)

Protects a computing system against infection.

35
New cards

Encryption

A process of encoding messages to keep them secret, so only 'authorized' parties can read it.

36
New cards

Decryption

A process that reverses encryption, taking a secret message and reproducing the original plain text.

37
New cards

Cipher

The generic term for a technique (or algorithm) that performs encryption.

38
New cards

Caesar's Cipher

A technique for encryption that shifts the alphabet by some number of characters.

39
New cards

Cracking encryption

When you attempt to decode a secret message without knowing all the specifics of the cipher.

40
New cards

Symmetric Encryption

Involves one key for both encryption and decryption.

41
New cards

Asymmetric Encryption (Public Key Encryption)

Pairs a public key for encryption and a private key for decryption. The sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message.

42
New cards

Certificate Authority

Is an organization that acts to validate the identities of entities and binds them to cryptographic keys through the issuance of electronic documents known as digital certificates.

43
New cards

Digital Certificate

An electronic document that is tied to a cryptographic key pair and authenticates the identity of a website, individual, organization, user, device or server.

44
New cards

SSL (Secure Sockets Layers)

Uses encryption for transfer of data.

45
New cards

TLS

Transport Layer Security encrypts data sent over the Internet to ensure that eavesdroppers and hackers are unable to see what you transmit. (Improved SSL)

46
New cards

Protocol

Is a well known set of rules and standards on how to handle the information.

47
New cards

Linear Search

Checks each element in the list until a target value is found.

48
New cards

Binary Search

Checks the midpoint value in the list and compares the target value to the midpoint value.

49
New cards

Lossless Compression

A process for reducing the number of bits needed to represent something without losing any information. This process is reversible.

50
New cards

Lossy Compression

A process for reducing the number of bits needed to represent something in which some information is lost or thrown away. This process is not reversible.

51
New cards

Metadata

Data about data.