Semester 2 AP CSP

studied byStudied by 3 people
0.0(0)
Get a hint
Hint

World Wide Web

1 / 59

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

60 Terms

1

World Wide Web

which was originally designed for scientists to share their research.

New cards
2

Targeted advertising

which can be helpful for businesses and consumers when looking for a specific item.

New cards
3

Social media

which has been used to stream events across the globe, sometimes helps to change history.

New cards
4

Machine learning and data mining

help find patterns and identify insights in data, leading to new innovations.

New cards
5

Online learning

is an education model that would not be possible without the tools of communication available via the Internet.

New cards
6

Programmers and businesses

try to identify potential negative uses, but it is seldom possible to think of all the ways other people could use an innovation.

New cards
7

Cloud computing

offers new ways for people to communicate, making collaboration easier and more efficient.

New cards
8

Technology

has had a major impact on the world, enabling innovation through the sharing of resources and computational artifacts.

New cards
9

Bias

which is intentional or unintentional prejudice for or against certain groups of people, shows up in computing innovations too.

New cards
10

Humans

write the algorithms, and our biases can make their way into the algorithms and the data used by innovations without us realizing it.

New cards
11

Artificial intelligence programs

are used more and more in ways such as screening applications of job candidates, determining if a person merits credit to purchase a house, and locating what areas have more crime.

New cards
12

Crowdsourcing

allows people to share information and ask the “crowd”— anyone who accesses the site—for feedback, to help solve problems, find employment, or for funding.

New cards
13

Peer-to-peer networks

exist that are used to illegally share files of all types.

New cards
14

Creative Commons

provides a way for creators of software, images, music, videos, and any computational artifact to share their creations with stipulations for sharing and permission from the author clearly indicated.

New cards
15

Digital data

is easy to find, copy, and paste, so ensuring you have written permission from the creator or owner is important.

New cards
16

Open source software

is software that is freely shared, updated, and supported by anyone who wants to do so.

New cards
17

Social media sites

as well as search engines publish what the most frequent searches and posts are about.

New cards
18

Analytics

identify trends for marketing purposes and help businesses determine what and where customers are searching for their products and their competitors’ products, how long an item sits in a virtual shopping cart, and when people buy.

New cards
19

Data mining

is a field of study that analyzes large datasets.

New cards
20

Machine learning

is a subset of data mining.

New cards
21

Digital footprints and fingerprints

are the trail of little pieces of data we leave behind as a sign of our presence as we go through our daily lives.

New cards
22

Cybersecurity

has a global impact because now anyone from anywhere can attempt to gain unauthorized entry to someone else’s computer, data, servers, or network.

New cards
23

Strong passwords

help block those trying to gain unauthorized access.

New cards
24

Multifactor authentication

is another layer that is increasingly used.

New cards
25

Cybersecurity

protects our electronic devices and networks from attacks and unauthorized use.

New cards
26

Data

may be damaged or the device may be used to further spread the malware.

New cards
27

Phishing

attacks create e-mail and/or websites that look a legitimate hoping to induce a person to click on the malicious link.

New cards
28

Computer viruses

are like human viruses.

New cards
29

Keylogging software

is a form of malware that captures every keystroke and transmits it to whomever planted it.

New cards
30

Cryptography

is the writing of secret codes.

New cards
31

Encryption

is converting a message to a coded format.

New cards
32

Deciphering

the encrypted message is called decryption.

New cards
33

Security

also relates to encrypting data before it is transmitted to ensure it remains secure if it is intercepted during transmission.

New cards
34

Public key encryption

uses open standards, meaning the algorithms used are published and available to everyone and are discussed by experts and interested parties and known by all.

New cards
35

Internet

is a network of networks.

New cards
36

Routers

are computing devices along a path that send the information along to the next stop on the path.

New cards
37

Routing

is the process of finding a path from sender to receiver

New cards
38

Bandwidth

is a measure of the maximum amount of data that can be transferred through a channel or network connection.

New cards
39

Internet protocol (IP)

is responsible for addressing and routing your online requests.

New cards
40

Transmission control protocol (TCP)

is a protocol that defines how computers send packets of data to each other.

New cards
41

User datagram protocol (UDP)

is a protocol that allows computer applications to send messages without checking for missing packets to save on time needed to retransmit missing packets.

New cards
42

Scalability

is the ability for a system, network or process to handle a growing amount of work in an efficient manner.

New cards
43

Hardware failure

is when a hardware device, such as a computer or printer, stops working properly due to an issue with the physical components.

New cards
44

Operational failures

are any issues or breakdowns in the operation of a business, machine, system, process, etc.

New cards
45

Cyberattacks

are malicious attempts to damage or disrupt computer systems, networks, and data.

New cards
46

Natural disasters

could cause the hardware to be destroyed, bringing the network activity to a halt.

New cards
47

Solar Flare

is an intense radiation that is released from the sun.

New cards
48

Parallel computing

can consist of a parallel portion and a sequential portion.

New cards
49

Multiple processors

can operate independently but share the same memory resources.

New cards
50

Distributed computing

allows problems to be solved that could not be solved on a single computer because of either the processing time or storage needs involved.

New cards
51

Programming

is a collaborative and creative process that brings ideas to life through the development of software.

New cards
52

Software development processes

used in the industry often require students to work together in teams.

New cards
53

computing innovation

uses a computer program to take in data, transform data and output data.

New cards
54

Collaboration

can occur in the planning, designing, or testing (debugging) part of the development process.

New cards
55

Collaborative learning

can occur peer-to-peer or in larger groups.

New cards
56

Syntax Error

A mistake in which the rules of the programming language are not followed.

New cards
57

Runtime Error

A mistake that occurs during the execution of a program that ceases the execution.

New cards
58

Logic Error

A mistake in the algorithm or program that causes it to behave incorrectly or unexpectedly.

New cards
59

Overflow Error

A mistake that occurs when a computer attempts to handle a number that is outside of the defined range of values.

New cards
60

Debugging

is the process of finding and fixing errors.

New cards

Explore top notes

note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 6 people
... ago
5.0(1)
note Note
studied byStudied by 15 people
... ago
5.0(1)
note Note
studied byStudied by 3 people
... ago
5.0(1)
note Note
studied byStudied by 113 people
... ago
5.0(6)
note Note
studied byStudied by 10 people
... ago
5.0(1)
note Note
studied byStudied by 10 people
... ago
5.0(1)
note Note
studied byStudied by 18 people
... ago
5.0(1)

Explore top flashcards

flashcards Flashcard (40)
studied byStudied by 134 people
... ago
5.0(1)
flashcards Flashcard (64)
studied byStudied by 13 people
... ago
5.0(1)
flashcards Flashcard (27)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (66)
studied byStudied by 61 people
... ago
5.0(1)
flashcards Flashcard (35)
studied byStudied by 38 people
... ago
5.0(1)
flashcards Flashcard (42)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (42)
studied byStudied by 5 people
... ago
5.0(2)
robot