AP Computer Science Principles - Unit 8 Vocabulary

5.0(1)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

Computing Innovation

Includes a program as an integral part of its function, which can be a physical object (e.g., self-driving car), non-physical software (e.g., picture editing software), or non-physical concepts (e.g., e-commerce).

2
New cards

Personally Identifiable Information (PII)

Information about an individual that identifies, links, relates, or describes them.

3
New cards

Phishing

A technique that attempts to trick a user into providing personal information for accessing sensitive online resources.

4
New cards

Keylogging

The use of a program to record every keystroke made by a computer user to gain access to passwords and other confidential information.

5
New cards

Malware

Software intended to damage a computing system or take partial control over its operation.

6
New cards

Freeware

Untrustworthy (often free) downloads from freeware or shareware sites that can contain malware.

7
New cards

Rogue Access Point

A wireless access point that provides unauthorized access to secure networks.

8
New cards

Virus

A malicious program that copies itself and gains access to a computer in an unauthorized way.

9
New cards

Encryption

A process of encoding messages to keep them secret, accessible only by authorized parties.

10
New cards

Decryption

The process that reverses encryption, reproducing the original plain text from a secret message.

11
New cards

Symmetric Key Encryption

Involves one key used for both encryption and decryption.

12
New cards

Public Key Encryption

Pairs a public key for encryption with a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message

13
New cards

Strong Password

Easy for a user to remember but difficult for someone else to guess.

14
New cards

Multi-factor Authentication

A system that requires at least two steps to unlock protected information, adding layers of security.