AP CSP - Unit 4

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/55

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

56 Terms

1
New cards

What is a bit?

a single unit of data that can only have one of two values; usually represent the two values with 0 (off) and 1 (on)

2
New cards

What is a byte

eight bits

3
New cards

What is a word

a sequence of however many bits the CPU processes at a time; usually either 32 or 64 bits

4
New cards

What is a binary sequence

a string of ones and zeros; can represent text, pictures, sound, and video

5
New cards

Difference between analog and discrete data

analog data has values that change smoothly, digital data has values that change in discrete intervals

6
New cards

Sampling

measuring values, called samples, of an analog signal at regular intervals

7
New cards

Sampling rate

number of samples measured per second

8
New cards

Width

the number of bits that a CPU processes at a time

9
New cards

Word

binary sequence of that many bits; most modern computers have 64 bits

10
New cards

What is an overflow error

when a number or operation result is too big,, an overflow error results

11
New cards

How do non-integer numbers get stored?

with a floating point number which is any numbers with decimals; scientific notation uses powers of ten to represent very large or very small values, floating point uses powers of two

12
New cards

What happens if a value exceeds the limitation of floating point values?

a round-off error occurs

13
New cards

How to translate from base 10 to base 2

1. find the largest power of two that is less than the number. Write out the binary place values from right to left

2. Subtract the largest power of two from the number

3. Record a 1 in that place for the power of two

4. Determine if the next power of two is less than or equal to the new remaining number. If so, repeat #2 and #3. If not, record a zero for that power of two

5. Repeat until you have a bit (0 or 1) for all places

14
New cards

Why compress data

the size of data affects the amount of time it takes to be sent, compression algorithms reduce the size of data

15
New cards

Lossless data compression

algorithms are reversible (there is no loss in quality), you can reconstruct the original data; works by removing redundant data

16
New cards

Lossy data compression

algorithms that are not fully reversible; you can reconstruct only an approximation of the original data; works by removing details that people aren't likely to notice

17
New cards

What is the internet

a computer network that uses open protocols to standardize communication

18
New cards

Computer network

interconnected computing system that is capable of sending or receiving data

19
New cards

Computing system

group of computing devices and programs working together for a common purpose

20
New cards

Computing device

a physical object that can run a program such as computers, tablets, cell phones, and smart sensors

21
New cards

The World Wide Web

a system of linked pages, programs, and files that uses the internet

22
New cards

Router

computer that passes information from one network to another

23
New cards

ISPs (Internet Service Providers)

the companies who sell internet access to homes and institutions; computer connected to the internet and the connections among them don't belong to any one organization as different ISPs provide the internet to difference communities

24
New cards

Bandwidth

the maximum amount of data that can be sent in a fixed amount of time (for digital data it is measured in bits per second); higher the bandwidth the better because data travels more quickly

25
New cards

The cloud

data stored in the cloud means storing it somewhere on the internet, but you don't know where; the cloud service provider manages the actual storage location

26
New cards

A path

a sequence of directly connected computing devices that connect a sender to a reciever

27
New cards

Routing

the process of finding a path from sender to receiver

28
New cards

Scalability

the ability of the Internet to keep working as it grows

29
New cards

Redundancy

the inclusion of back-up elements in case one part fails

30
New cards

Fault tolerance

the ability of a system to work around problems

31
New cards

Protocol

a set of rules that specify the behavior of a system

32
New cards

IP Address

a unique number assigned to each device on a computer network

33
New cards

Packet

a small chunk of any kind of data and metadata that is passed through the internet as a data stream

34
New cards

Packet switching

the internet sends short bursts of information, not long continuous strings

35
New cards

What is TCP/IP

a pair of protocols that provide two levels of abstraction

36
New cards

IP (Internet Protocol)

lets your computer pretend it has a direct connection to another computer. the routers at every connection point on the internet run IP, which transmits packets from one IP address to another

37
New cards

TCP (Transmission Control Protcol)

lets your computer pretend it has a reliable connection to the other computer. The computers at the two endpoints of a communication run TCP, which guarantees the packets arrive successfully

38
New cards

Encryption

the process of encoding data to prevent unauthorized access

39
New cards

Decryption

the process of decoding data

40
New cards

Symmetric encryption

uses the same key for encryption and decryption (Ex: substitution ciphers)

41
New cards

Public key encryption

uses a public key for encryption and a private key for decryption. The sender uses the public key to encrypt the message, and receiver uses their private key to decrypt it

42
New cards

SSL/TLS

the standard used for cryptographically secured information transfer on the Internet.

43
New cards

Certificate authorities

organizations that issue digital certificates to verify who owns the encryption keys used for secured communications; instead of trusting the website is who they claim to be, you have to trust the certificate authority

44
New cards

Malware

software that was designed to harm or take partial control over your computer

45
New cards

Keylogging software

a kind of malware that records every key pressed by a user

46
New cards

Computer virus

a type of malware that spreads and infects other computers; viruses can attach themselves to legitimate programs

47
New cards

Antivirus or anti-malware software

software designed to scan your files and internet transmissions looking for malware

48
New cards

Firewall

a security system that controls the kinds of connections that can be made between a computer or network and the outside world

49
New cards

Phishing

a common security attack in which the victim is tricked into giving up personal information or downloading malware; attacker can then use your personal information to gain access to personal online resources

50
New cards

DoS (Denial of Service) attack

sending a lot of requests to a server at the same time to overload the server's network bandwidth; doesn't destroy data or collect passwords just makes it so the user of that server is denied service

51
New cards

DDoS (Distributed Denial of Service) attack

uses a virus to flood a server with many requests from many computers at once so that users of that server are denied server; the attacker first uses viruses and other malware to take control of many computer around the world and this network of computers is called a botnet; the attacker then launches a DoS attack from all of the victims' computers at the same time; DDoS makes it harder to determine who's at fault

52
New cards

Rogue access point

a wireless access point that gives access to a secure network without the authorization of the network administrator

53
New cards

Digital divide

refers to unequal access to computers and the internet based on poverty, racism, sexism, isolation in the countryside, age, and other factors; affects both individuals within a country and countries themselves

54
New cards

Citizen science

scientific research conducted in a whole or part by distributed individuals who contribute relevant data to research using their own computing devices

55
New cards

Crowdsourcing

general term for using the internet to get a lot of people to help solve a problem

56
New cards

Computing innovation

can be physical or non-physical software, or conceptual, but regardless of the form they must include a program as an integral part of their function