AP CSP Terms

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/58

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:56 PM on 3/29/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

59 Terms

1
New cards

Bandwidth

The capacity of data transfer in a system. Measured by bitrate.

2
New cards

Bitrate

The number of bits a system can send per second.

3
New cards

Latency

The time it takes for a bit to travel from sender to receiver.

4
New cards

Network

A group of 2 or more computer systems linked together.

5
New cards

Protocol

A widely agreed upon set of rules that standardize communication between machines.

6
New cards
7
New cards

IP Address

A unique address, 32 or 128 bits, assigned by an ISP or router, that identifies a device on a network.

8
New cards

IP Protocol

A set of rules / standards for addressing and routing packets of data on the Internet or other network.

9
New cards

IPv4

Older version of IP Address with 32 bits, that looks like 255.255.255.255, limited to about 4 billion cases.

10
New cards

IPv6

Newer version of IP Address with 128 bits, that looks like 8 sets of 4 hex values, scalable for the future.

11
New cards

MAC Address

A unique permanent hardware address, always 48 bits, that identifies a device to an ISP or router.

12
New cards
13
New cards

Domain

Unique name, along with TLD suffix, that identifies an organization and its resources on the Internet.

14
New cards

DNS

Domain Name System translates domain names to IP Addresses.

15
New cards

Render

Process of turning HTML, CSS, and JS into a visual interactive web page.

16
New cards

Top-Level Domain

Highest level grouping of domains, including com, gov, org, edu, net, and 2 letter country codes.

17
New cards

URL

Uniform Resource Locator of format protocol://sub.domain.tld/path/resource.type

18
New cards
19
New cards

Fault Tolerant

The ability of a system to continue operating without interruption when one or more of its components fail.

20
New cards

Packet

A small part of a digital message, along with metadata about it like the order, origination, and destination.

21
New cards

Redundancy

Multiple components exist that serve the same purpose, protecting from the failure of any one component.

22
New cards

Router

A networking device that receives and forwards data packets between two or more computer networks.

23
New cards

Scalable

Easy to add or swap out single items or levels without impacting the larger set of items and levels.

24
New cards
25
New cards

Cryptography

Mathematical techniques, typically very complex and based on large numbers, for encrypting and decrypting messages.

26
New cards

HTTP

Standard protocol used to send and receive web resources like HTML, CSS, and JS.

27
New cards

HTTPS

Extension of the HTTP protocol with cryptographic security included by default, based on SSL or TLS.

28
New cards

TCP

Guarantees reliable, ordered, and error-checked delivery of packets. Typically used for web and email.

29
New cards

UDP

No guarantee of delivery, ordering, or duplicate packets. Typically used for real-time communication.

30
New cards
31
New cards

Distributed Computing

Working on multiple devices at a time, simultaneously. Scalable, fault-tolerant, and reliable, but very complex.

32
New cards

Parallel Computing

Completing multiple tasks at a time, simultaneously. Difficult to setup and troubleshoot.

33
New cards

Sequential Computing

Completing one task at a time, in order. Easier to setup and troubleshoot.

34
New cards

Private Key

Key used to decrypt messages that only the owner can use.

35
New cards

Public Key

Key used to encrypt messages that anyone can use.

36
New cards
37
New cards

Certificate Authority

Trusted organization that is used to verify public keys are in fact legitimate.

38
New cards

DDoS

An attempt to deny access to a website by flooding the website’s servers with millions of computer requests.

39
New cards

Hash

One-way algorithm to compress data into a smaller fixed-size that is similar to encryption but non-reversible.

40
New cards

Phishing

The fraudulent practice of sending messages claiming to be from someone else in order to induce revealing personal information.

41
New cards

Spoofing

A hacker overwrites a domain name in a DNS server, causing the IP for that domain to point to the hacker’s website rather than the intended website.

42
New cards
43
New cards

Authentication

Process of proving that a person or thing is genuinely who or what they claim to be, like an identity check.

44
New cards

Authorization

Process of granting the right for a person or thing to access a specific resource, like a permission check.

45
New cards

Copyright

Form of protection for intellectual property, usually applied to creative works like art, music, books, and more.

46
New cards

Digital Divide

Refers to the fact that different countries, socio-economic groups, and individuals have different levels of computing access.

47
New cards

DMCA

Criminalizes the act of circumventing, or getting around, access controls that block access to copyrighted works.

48
New cards
49
New cards

Big O Notation

A measure of the worst-case execution time of an algorithm, relative to the number of inputs. Logarithmic, linear, and factorial are examples.

50
New cards

Complexity

A measure of both the execution time and memory usage of an algorithm, often represented using Big O Notation.

51
New cards

Efficiency

A measure of the amount of logical reasoning, sometimes measured in lines of code, required to create an algorithm.

52
New cards

Heuristic

A technique that may allow us to find an approximate solution when typical methods fail to find an exact solution or are too slow.

53
New cards

Simulation

Simplified model of more complex objects or phenomena. They mimic real-world events without the cost or danger of building and testing the phenomena in the real world.

54
New cards
55
New cards

Brute Force

A technique to find a solution by attempting to verify solutions one at a time until one is found. Brute force ignores efficiency, but computers still make it possible. Sometimes referred to as trial-and-error.

56
New cards

Decidable

A problem in which an algorithm can be constructed to answer “yes” or “no” for all inputs (e.g. “Is the number even?”). Usually specific cases are decidable, but often a more generalized version may not be decidable.

57
New cards

Intractable

A problem that cannot be solved in a reasonable time, even for small input sizes. Heuristic approaches may be helpful to find solutions in reasonable times. Examples are traveling salesmen and packaging optimizations. Also called computationally hard.

58
New cards

Undecidable

A problem in which no algorithm exists that always leads to a correct yes-or-no answer. It may have instances that have an algorithmic solution, but there is no algorithmic solution that solves all instances of the problem.

59
New cards

Unsolvable

A problem that cannot be solved exactly using any algorithm. Heuristic approaches may be helpful to find an approximate solution. Password hash algorithms are by definition one-way without a reversing algorithm.

Explore top notes

note
AP Gov: Chapter 1 Vocab
Updated 1299d ago
0.0(0)
note
Unit 7: Evolution (Biology)
Updated 710d ago
0.0(0)
note
Mitosis
Updated 751d ago
0.0(0)
note
diplomacy
Updated 1251d ago
0.0(0)
note
Le Chatelier's Principle
Updated 1158d ago
0.0(0)
note
AP Gov: Chapter 1 Vocab
Updated 1299d ago
0.0(0)
note
Unit 7: Evolution (Biology)
Updated 710d ago
0.0(0)
note
Mitosis
Updated 751d ago
0.0(0)
note
diplomacy
Updated 1251d ago
0.0(0)
note
Le Chatelier's Principle
Updated 1158d ago
0.0(0)

Explore top flashcards

flashcards
Kite Runners Vocab
35
Updated 68d ago
0.0(0)
flashcards
Midterm
238
Updated 389d ago
0.0(0)
flashcards
Describing People SPN2 PreAP
91
Updated 221d ago
0.0(0)
flashcards
Cellular Respiration Review
22
Updated 1215d ago
0.0(0)
flashcards
apush 3.1-3.4
52
Updated 578d ago
0.0(0)
flashcards
Chapter 9 Med Term
25
Updated 1217d ago
0.0(0)
flashcards
Posterior Muscles
47
Updated 1244d ago
0.0(0)
flashcards
SALUD Y BIENESTAR vocabulario
33
Updated 913d ago
0.0(0)
flashcards
Kite Runners Vocab
35
Updated 68d ago
0.0(0)
flashcards
Midterm
238
Updated 389d ago
0.0(0)
flashcards
Describing People SPN2 PreAP
91
Updated 221d ago
0.0(0)
flashcards
Cellular Respiration Review
22
Updated 1215d ago
0.0(0)
flashcards
apush 3.1-3.4
52
Updated 578d ago
0.0(0)
flashcards
Chapter 9 Med Term
25
Updated 1217d ago
0.0(0)
flashcards
Posterior Muscles
47
Updated 1244d ago
0.0(0)
flashcards
SALUD Y BIENESTAR vocabulario
33
Updated 913d ago
0.0(0)