AP CSP Big Idea 5: IOC Key Terms

5.0(1)
studied byStudied by 8 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/21

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

22 Terms

1
New cards

strong password

a password that is easy for a user to remember but would be difficult for someone else to guess based on knowledge of that user

2
New cards

encryption

the process of encoding data to prevent unauthorized access

3
New cards

decryption

the process of the process of decoding the data

4
New cards

algorithmic bias

bias embedded into algorithms and any level of software development

5
New cards

Creative Commons

a public copyright license that enables the free distribution of an otherwise copyrighted work

6
New cards

open source

programs that are made freely available and may be redistributed and modified

7
New cards

open access

online research output free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions

8
New cards

citizen science

scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices

9
New cards

crowdsourcing

the practice of obtaining input or information from a large number of people via the Internet

10
New cards

personally identifiable information (PII)

information about an individual that identifies, links, relates, or describes them

11
New cards

digital divide

the differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics

12
New cards

Asymmetric Key Encryption

encryption that pairs a public key for encryption and a private key for decryption

13
New cards

multifactor authentication

a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism, typically in at least two of the following categories: knowledge (something they know); possession (something they have), and inherence (something they are)

14
New cards

malware

software intended to damage a computing system or take partial control over its operation

15
New cards

computer virus

a malicious program that can copy itself and gain access to a computer in an unauthorized way

16
New cards

phishing

a technique that attempts to trick a user into providing personal information

17
New cards

keylogging

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

18
New cards

rogue access point

a wireless access point that gives unauthorized access to secure networks

19
New cards

cookie

A small amount of text that tracks information about a user visiting a website.

20
New cards

certificate authority

issue digital certificates that validate the ownership of encryption keys used in secure communications and are based on a trust model.

21
New cards

freeware

Untrustworthy (often free) downloads from freeware or shareware sites can contain malware.

22
New cards

Symmetric Key Encryption

involves one key for both encryption and decryption.