AP CSP U3

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/45

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:17 PM on 1/27/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

46 Terms

1
New cards

Asymmetric Encryption

Encryption where different keys are used for encryption and decryption.

2
New cards

Bandwidth

The amount of data that can be transmitted in a fixed amount of time, usually measured in megabits per second (Mbps).

3
New cards

Caesar Cipher

A simple encryption technique that shifts letters in the alphabet by a fixed number of places.

4
New cards

Cipher

A method for encrypting or decrypting data.

5
New cards

Computing Device

A machine that can run a program (e.g., smartphones, laptops, servers).

6
New cards

Computing Innovation

An innovation that includes a program as an integral part of its functionality.

7
New cards

Computing Network

A group of connected devices that can send and receive data.

8
New cards

Computing System

A group of computing devices and programs working together for a purpose.

9
New cards

Cracking Encryption

Attempting to decode or break a secure encryption.

10
New cards

Datastream

Data sent in packets over a network.

11
New cards

DDoS (Distributed Denial of Service)

An attack where multiple systems overwhelm a network or server with traffic.

12
New cards

Decryption

The process of converting encrypted data back into its original form.

13
New cards

Digital Divide

The gap between those who have access to technology and the Internet and those who do not.

14
New cards

Domain Name

A human-readable address for accessing websites (e.g., www.google.com).

15
New cards

DNS (Domain Name System)

The system that translates domain names into IP addresses.

16
New cards

Encryption

The process of encoding data to keep it secure from unauthorized access.

17
New cards

Fault Tolerance

The ability of a system to continue functioning when part of it fails.

18
New cards

HTTP (HyperText Transfer Protocol)

Protocol for transferring web pages.

19
New cards

HTTPS

A secure version of HTTP using encryption.

20
New cards

Internet

A global network of interconnected devices using standard communication protocols.

21
New cards

IP (Internet Protocol)

A protocol for sending data across networks.

22
New cards

IP Address

A unique identifier for a device on a network.

23
New cards

Keylogging

Recording the keystrokes of a user, often maliciously.

24
New cards

Malware

Malicious software designed to damage or disrupt systems.

25
New cards

Man in the Middle

An attack where a third party intercepts communication between two devices.

26
New cards

Multifactor Authentication

A security measure requiring two or more verification methods.

27
New cards

Packet

A unit of data transmitted over a network.

28
New cards

Packet Metadata

Information about a packet used for routing and reassembly.

29
New cards

Password Attacks/Theft

Methods to gain unauthorized access to passwords.

30
New cards

Path

A sequence of connections between devices on a network.

31
New cards

Phishing Attacks

Attempts to trick users into providing sensitive information.

32
New cards

Private Key Encryption

key that is kept secret and used to decrypt encrypted data. It is unique to a given entity.

33
New cards

Public Key Encryption

Encryption using different keys for encryption (public) and decryption (private).

34
New cards

Ransomware

Malware that locks a user’s data until a ransom is paid.

35
New cards

Redundancy

Duplication of critical components to increase reliability.

36
New cards

Rogue Access Point

An unauthorized wireless access point.

37
New cards

Router

A device that directs packets to their destination.

38
New cards

Scalability

The ability of a system to handle increasing amounts of work.

39
New cards

Social Engineering

Manipulating people into revealing confidential information.

40
New cards

SSL (Secure Sockets Layer)

A standard for encrypting data between web servers and browsers.

41
New cards

Symmetric Encryption

Encryption using the same key for both encryption and decryption.

42
New cards

TCP (Transmission Control Protocol)

A protocol for reliable, ordered delivery of packets.

43
New cards

TLS (Transport Layer Security)

An updated version of SSL.

44
New cards

UDP (User Datagram Protocol)

A protocol for fast but unreliable data transmission.

45
New cards

World Wide Web

A system of linked pages, programs, and files accessed via the Internet.

46
New cards

Zero Day Exploits

Security vulnerabilities discovered and exploited before developers can fix them.