AP CSP REVIEW

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

flashcard set

Earn XP

Description and Tags

AP Computer Science

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

Creative Commons

used when an author wants to give people the right to share, use, and build upon a work that they have created

2
New cards

Intellectual Property

A work or invention that is the result of creativity, such as a piece of writing or a design, to which one has rights and for which one may apply for a patent, copyright, trademark, etc.

3
New cards

Open Access

online research output free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions

4
New cards

Open Source

programs that are made freely available and may be redistributed and modified

5
New cards

Certificate authority

issue digital certificates that validate the ownership of encryption keys used in secure communications and are based on a trust model .

6
New cards

Pair Programming

a collaborative programming style in which two programmers switch between the roles of writing code and tracking or planning high level progress

7
New cards

Linear Search

a search algorithm which checks each element of a list, in order, until the desired value is found or all elements in the list have been checked.

8
New cards

Binary Search

a search algorithm that starts at the middle of a sorted set of numbers and removes half of the data; this process repeats until the desired value is found or all elements have been eliminated.

9
New cards

Reasonable Time

Algorithms with a polynomial efficiency or lower (constant, linear, square, cube, etc.) are said to run in a reasonable amount of time.

10
New cards

Unreasonable Time

Algorithms with exponential or factorial efficiencies are examples of algorithms that run in an unreasonable amount of time.

11
New cards

Heuristic

provides a "good enough" solution to a problem when an actual solution is impractical or impossible

12
New cards

Undecidable Problem

a problem for which no algorithm can be constructed that is always capable of providing a correct yes-or-no answer

13
New cards

Parallel Computing

a model in which programs are broken into small pieces, some of which are run simultaneously

14
New cards

Distributed Computing

a model in which programs are run by multiple devices

15
New cards

Speedup

the time used to complete a task sequentially divided by the time to complete a task in parallel

16
New cards

Citizen Science

scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices.

17
New cards

Data bias

data that does not accurately reflect the full population or phenomenon being studied

18
New cards

Personally Identifiable Information (PII)

information about an individual that identifies, links, relates, or describes them.

19
New cards

Rogue Access Point

a wireless access point that gives unauthorized access to secure networks.

20
New cards

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

21
New cards

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text.

22
New cards

Symmetric Key Encryption

involves one key for both encryption and decryption.

23
New cards

Public Key Encryption

pairs a public key for encryption and a private key for decryption. The sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message

24
New cards

asymmetric encryption

two keys are used; one key encodes the message, and the other key decodes the message

25
New cards

Keylogging

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

26
New cards

Phishing

a technique that attempts to trick a user into providing personal information.

27
New cards

Copyright

the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.

28
New cards

Certificate Authority

certifies the safety of a particular website.

29
New cards

TCP (Transmission Control Protocol)

provides reliable, ordered, and error-checked delivery of a stream of packets on the internet.

30
New cards

Open Souce Software

Free software that is available to download because the 'source code' is created by anybody who is able to and not by a single company.