APCSP UNIT 6 VOCAB

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/67

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:17 PM on 4/13/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

68 Terms

1
New cards

Social media

applications & websites that allow users to share content & participate in social networking that may have otherwise had socioeconomic barriers

2
New cards

Socioeconomic

Difference among groups based on geography, social , & economic factors

3
New cards

Search tools

Directories & search engines on the internet that are essential for finding information efficiently on the Web.

4
New cards

Crowdfunding

Entrepreneurs using online access to customers as a means of funding their project.

5
New cards

Metadata

data about data

6
New cards

Cloud computing

Storing, accessing & processing data using remote servers over a network rather than a local server or computer.

7
New cards

Client-server model

the clients are the end-users and communicate with the server (a centralized computer) that services the clients.

8
New cards

Internet

network infrastructure composed of devices (or nodes)that communicate via protocols

9
New cards

Network

connection of devices & networks to communicate using addresses & protocols

10
New cards

Routing

The process of moving information over a network via a device called a router.

11
New cards

Bandwidth

Measure of bit rate of a system or data (measured in bits) that can be sent in a fixed amount of time over a system.

12
New cards

Latency

The time elapsed between the transmission & the receipt of a request in a system.

13
New cards

Routing Redundancy

Having multiple options between two points increases the reliability of the internet & helps it scale to more devices & more people

14
New cards

WWW (World Wide Web)

System of linked pages, programs, & files that uses the internet in order to transmit content

15
New cards

SMTP Protocol

Email communication standard developed & overseen by the the internet engineering task force

16
New cards

HTTP

Hypertext Transfer Protocol developed by Internet Engineering Task Force, this protocol determines how data & messages are formatted, transmitted, & responded to via the internet

17
New cards

HTTPS

HTTP with a secured socket layer (SSL) or transport layer security (TLS) as a sublayer that encrypts & decrypts user data & requests for added security

18
New cards

Internet Protocol

The protocol by which data is sent from one computer to another on the internet

19
New cards

TCP/IP

Standard for packets & routing

20
New cards

SMS

Short message services. Text messaging allows users to send up to 160 characters to another device. If the message is longer it may truncate, concatenate and/or split up into several individual messages.

21
New cards

Interface

User friendly picture oriented way to interact with technology, contributing to the widespread use of the internet.

22
New cards

Protocols

Common set of rules that computers must abide by in order to connect with each other. The protocols used in the internet are open, which allows users to easily connect additional computing devices to the internet.

23
New cards

Application Program Interfaces (APIs)/Libraries

set of routines, protocols, & tools for building software applications which simplify complex programming tasks

24
New cards

IP Address

Unique identification for each device that's connected to a computer network & uses internet protocol.

25
New cards

IPv6

Internet protocol, version 6 - 128-bit internet address consisting of eight 4-character hexadecimal numbers to handle routing of many more devices.

26
New cards

IPv4

Internet Protocol, version 4 - A 32-bit internet address consisting of four numbers each between 0 through 255, separated by periods (represents 8 bits)

27
New cards

Domain

group of devices connected on a network using the same protocol to access & administer web pages.

28
New cards

Domain Name System (DNS)

The way that domain names are located & translated into Internet Protocol (IP) addresses.

29
New cards

Hierarchy

Arrangement of elements in a ranking of superiority. The internet & systems are built from the top (root) down.

30
New cards

Packet Switching

Digital datas sent by breaking the data into blocks of bits called packets, which contain both the data being transmitted and control information for routing the data

31
New cards

Data Stream

Information passed through the internet as a data stream. Data streams contain chunks of data, which are encapsulated in packets

32
New cards

Encryption

The process of converting information or data into a code, especially to prevent unauthorized access.

33
New cards

Decryption

Process of decoding the data that was encrypted

34
New cards

Symmetric key system

encryption method where each pair of users share a secret key

35
New cards

Asymmetric key system

encryption method that uses different keys to encrypt & decrypt

36
New cards

Public-key encryption

Asymmetric encryption method that uses a public key (made available publicly) & private key (available to owner only)

37
New cards

Certificate authorities

CA’s issue digital certificates that validate ownership of encrypted keys used in secured communications & are based on a trust model

38
New cards

Trust Model

Validation of one's identity necessary for an event or transaction to occur

39
New cards

Open platforms

Software based on open standards where there's no single ownership & is freely available through open license.

40
New cards

Closed Platforms

Proprietary software where the provider has control over the application & content & can restrict access

41
New cards

Open standard

Standard where documentation & specifications are open to the public

42
New cards

Closed standard

Standard where documentation & specifications are not available to the public

43
New cards

Open source

Publicly available information that is free to use, distribute, modify, & study.

44
New cards

Closed source

Privately owner information that is proprietary

45
New cards

Secure Sockets Layer (SSL)

The standard security technology for establishing an encrypted link between a web server and browser, typically indicated with a padlock icon in the address bar

46
New cards

Net neutrality

The internet is built around the notion of free & open access to information with no blocking, throttling, or paid prioritization

47
New cards

Cybersecurity

Measures taken to protect a computer or computer system against unauthorized access or attack

48
New cards

Confidentiality

Ability to limit access to information to a certain set of users

49
New cards

Integrity

The certainty that information is accurate

50
New cards

Availability

The reliability of access to information

51
New cards

Firewall

Part of a computer system or network that is designed to block unauthorized access while permitting outward communication

52
New cards

DDoS Attack

Distributed Denial of Service- an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources

53
New cards

Viruses

Code that's capable of copying itself & corrupting a system or destroying data

54
New cards

Social engineering

The psychological manipulation of people into performing actions or divulging confidential information

55
New cards

Malware

Software that's intended to damage or disable computers & computer systems

56
New cards

Phishing

Obtaining confidential information by masquerading as an “Official” person, site, or entity. A form of social engineering

57
New cards

Tim Berners-Lee

Created the set of fundamental tools & technologies that make up the World Wide Web

58
New cards

Hyperlinks

Clickable bits of text, images or other screen elements within an HTML document that a user can select to request another document or web location

59
New cards

Sequential computing

A computational model in which operations are performed in order one at a time

60
New cards

Parallel computing

A computational model where the program is broken into multiple smaller sequential computing operations, some of which are performed simultaneously

61
New cards

Distributed computing

A computational model in which multiple devices are used to run a program

62
New cards

Botnets

Network of private computers infected with a malicious software & controlled as a group without the owners knowing

63
New cards

Bitcoin Mining

The processing of transactions in the digital currency system, in which the records of current Bitcoin transactions, known as blocks, are indeed to the record of past transactions, known as the blockchain.

64
New cards

Internet of Things

The network of physical devices, vehicles, home appliances, & other items embedded with electronics, software, sensors, actuators, & connectivity which enables these objects to connect & exchange data

65
New cards

Sensor networks

Autonomous sensors that measure environmental conditions such as light, temperature & sound which facilitate new ways of interacting with the environment & with physical systems.

66
New cards

Autonomous technology

Technology that can function without being told what to do - i.e. Robots.

67
New cards
68
New cards