APCSP Unit 6 Vocab Review

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 78

flashcard set

Earn XP

Description and Tags

APCSP Unit 6

79 Terms

1

Computer Network

A group of two or more computers that are linked together.

New cards
2

World Wide Web (WWW)

Internet application of interlinked web pages based on the HTTP protocol.

New cards
3

Client

Computer or software application that requests services from a server located on the internet eg., a Web browser is an example of a client.

New cards
4

Server

A host that provides some kind of service eg., Google's Gmail Service.

New cards
5

Computing System

A group of computing devices and programs working together for a common purpose.

New cards
6

Protocol

A system of rules that govern the behavior of some system.

New cards
7

SMTP (Simple Mail Transfer Protocol) and POP (Post Office Protocol)

Sets of rules that govern the email services.

New cards
8

URI (Uniform Resource Identifier)

WWW identifier that uniquely identifies a resource on the WWW.

New cards
9

Digital Divide

Gap between those who have access to the internet and computers and those who do not, usually affected by socioeconomic, geographic, or demographic characteristics.

New cards
10

Ethernet

Network that uses wires to connect computers.

New cards
11

Bandwidth

The rate at which data is downloaded or uploaded in a network.

New cards
12

Latency

A measure of the time it takes for a piece of data to reach its destination.

New cards
13

Modem

A device that connects a computer to an Internet Service Provider (ISP).

New cards
14

LAN (Local Area Network)

Network that connects computers within a school or home.

New cards
15

WAN (Wide Area Network)

Network that connects devices over a broad geographic region -- e.g., a telephone network.

New cards
16

HTTP (HyperText Transfer Protocol)

The set of rules that governs the WWW application.

New cards
17

HTML (HyperText Markup Language)

A language for formatting Web pages.

New cards
18

Routing

The process of finding a path from sender to receiver.

New cards
19

Internet Service Provider (ISP)

A company that provides customers with Internet access.

New cards
20

Wifi

A network that uses radio waves to connect devices (computers, smart phones, printers).

New cards
21

Host

A computer that's connected directly to the Internet, often a computer that provides certain services or resources.

New cards
22

Ping

A networking utility used by network administrators to test the reachability of a host on the Internet.

New cards
23

Traceroute

A networking utility used to trace the route and measure delays of packets moving through the Internet.

New cards
24

Packet

A collection of data used by the TCP/IP protocol to transmit data across the Internet.

New cards
25

Packet Switching

The method by which information is transmitted through the Internet.

New cards
26

Fault-Tolerant

The capability of a system to continue operating properly in the event of the failure of one or more of its components.

New cards
27

Abstraction Layer

The Internet is organized into several of these layers that are controlled by various protocols.

New cards
28

Scalability

The capacity for the system to change in size to meet new demands.

New cards
29

Router

A device that transmits data between two different networks.

New cards
30

IP Address

A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.

New cards
31

IPv4

IP version 4 is an older 32 bit IP address.

New cards
32

IPv6

IP version 6 is a newer 128 bit IP address which allows for many more devices to be addressed.

New cards
33

Domain Name

A hierarchical name (such as trincoll.edu) that identifies a domain and an institution on the Internet.

New cards
34

DNS (Domain Name System)

An Internet service that translates domain names into IP addresses.

New cards
35

Cryptography

Means, literally, 'secret writing'.

New cards
36

Encryption

The process of using a secret key to convert plaintext into ciphertext.

New cards
37

Function

A procedure that computes and returns a value.

New cards
38

Local Variables

Variables that are declared and exist only inside a procedure or function.

New cards
39

Cipher

A system for creating secret messages.

New cards
40

Plaintext

The unencrypted, readable message.

New cards
41

Ciphertext

An unreadable, secret message.

New cards
42

Decryption

The process of using a secret key to convert ciphertext into plaintext.

New cards
43

Encryption Key

A piece of secret data used in by encryption and decryption algorithms.

New cards
44

Encryption Algorithm

Algorithm that uses a secret key to encrypt messages.

New cards
45

Symmetric Encryption

An encryption system where the same key is used for both encryption and decryption.

New cards
46

Substitution Cipher

A cipher where the letters from a ciphertext alphabet are substituted for the letters in a plaintext message in a systematic way.

New cards
47

Transposition Cipher

A cipher where the letters in the plaintext are rearranged without substitution.

New cards
48

Brute Force Attack

In cryptography, this attempts to try every possible encryption key to break a secret message.

New cards
49

Frequency Analysis

Counts the occurrence of the letters in an encrypted message in an effort to discover patterns that might reveal the encryption key.

New cards
50

Polyalphabetic Substitution

A system where multiple alphabets are used to encrypt a single message.

New cards
51

One Time Pad

An example of perfect (unbreakable) encryption, which is achieved by using, only once, a random polyalphabetic key that is as long as the message itself.

New cards
52

Symmetric Cipher

A cipher in which a single key is used for both encryption and decryption.

New cards
53

Asymmetric Cipher

A cipher in which separate but related keys are used for encryption and decryption.

New cards
54

Key Exchange Problem

The problem of sharing a secret cryptographic key between Alice and Bob without Eve being able to intercept it.

New cards
55

Public Key Cryptography

A cryptographic system that uses two keys -- a public key known to everyone and a private or secret key known only to the recipient of the message.

New cards
56

Diffie-Hellman

An algorithm used to establish a shared secret between two parties.

New cards
57

RSA (Rivest-Shamir-Adleman)

A cryptosystem for public-key encryption, and is widely used for securing sensitive data, particularly when being sent over an insecure network such as the Internet.

New cards
58

HTTPS

A protocol for secure (trusted, encrypted) communication over the Internet.

New cards
59

SSL (Secure Socket Layer)

A protocol for establishing an encrypted link between a web server and a browser.

New cards
60

Certificate Authority (CA)

An entity that issues digital certificates.

New cards
61

Digital Certificate

A data packet that certifies the holder of a public key.

New cards
62

Trust Model

The use of a trusted third party to verify the trustworthiness of a digital certificate.

New cards
63

Intractable

A computational problem is intractable if the only known way to solve the problem depends on an exponential algorithm.

New cards
64

Debugging

The process of removing errors from computer hardware or software.

New cards
65

Computer Bug

Informal term for error in computer hardware or software, term coined by Grace Hopper.

New cards
66

Syntax Error

Error that results from a violation of the programming language grammatical rules.

New cards
67

Logic/Semantic Error

Error in which the program is not working as it is designed to work.

New cards
68

Run-Time Error

Mistake in the program that occurs during the execution of a program.

New cards
69

Strong Password

Password that is easy for a user to remember but would be difficult for someone else to guess based on knowledge of that user.

New cards
70

Multi-Factor Authentication (MFA)

Users are asked to present several separate pieces of evidence involving knowledge, possession, and/or inherence.

New cards
71

Biometrics

Using unique physical characteristics such as fingerprints, face recognition, etc, for identification.

New cards
72

Malware

Software intended to damage a computing system or to take partial control over its operation.

New cards
73

Virus

Malicious program that can copy itself and gain access to a computer in an unauthorized way.

New cards
74

Ransomware

Malware that encrypts and locks computer systems until a ransom is paid.

New cards
75

Phishing

Technique that is used to trick a user into providing personal information usually through email.

New cards
76

Keylogger

Program to record every keystroke made by a computer user.

New cards
77

Rogue Access Point

Wireless access point that gives unauthorized access to secure networks.

New cards
78

Firewalls

Barriers that protect a network from unauthorized access.

New cards
79

Crowdsourcing

The practice of obtaining input or information from a large number of people via the Internet.

New cards
robot