AP CSP Unit 11

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/35

flashcard set

Earn XP

Description and Tags

STUDY!!!!

Last updated 6:16 PM on 4/17/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

36 Terms

1
New cards

Internet

A philosophy of making information and knowledge open and accessible to all people. A network of networks built on open, agreed upon protocols

2
New cards

Protocol

A widely agreed upon set of rules that standardize communication between machines

3
New cards

Network

A group of two or more computer systems linked together

4
New cards

Bitrate

The amount of data (in bits) that can be sent in a fixed amount of time

5
New cards

Bandwidth

The capacity of data transfer in a system. Measured by bitrate

6
New cards

Latency

Time it takes for a bit to travel from sender to receiver. Fiber optic cables have low latency

7
New cards

network device

An electronic device which is required for communication between devices

8
New cards

Computing Devices

Physical artifact that can run a program

9
New cards

Input Devices

Computing devices that are used to take in information from a user or another device

10
New cards

Output Devices

Computing devices that are used to send computer data to the user

11
New cards

Storage Devices

Computing devices that remember information

12
New cards

Computing Systems

Group of computing devices and programs working together for a common purpose

13
New cards

Computer Network

A group of interconnected computing devices capable of sending or receiving data

14
New cards

Internet Protocol (IP)

A protocol that defines the structure of an Internet address and assigns a unique address to every device on the Internet

15
New cards

IPv6

A new 128 bit version of the Internet Protocol.

16
New cards

URL

Stands for Uniform Resource Locator. You are locating a resource that exists somewhere on the internet

17
New cards

HTTP Request

A request is made by a client, to a named host, which is located on a server. The aim of the request is to access a resource on the server

18
New cards

HTTP Response

A response made by a server to a client. The aim of the response is to provide the client with the resource it requested

19
New cards

Domain Name System (DNS)

Used to translate domain names into IP addresses

20
New cards

Digital Information

Generally comprises data that is created by, or prepared for, electronic systems and devices such as computers, screens, calculators, communication devices and so on, and can be stored on those devices or in the Cloud

21
New cards

Routing

The process of sending data between two computers on the internet. The data is sent through routers that determine the route

22
New cards

Redundancy

When multiple paths exist between two points. This improves reliability and makes the internet fault tolerable. Makes the routing system scalable

23
New cards

Internet Protocol (IP)

A protocol that defines the structure of an Internet address and assigns a unique address to every device on the Internet

24
New cards

Packets

The units of data that are sent over the network

25
New cards

HTTP

A protocol that standardizes the language for talking to web servers to send and receive web pages, or HyperText information (HTML pages)

26
New cards

Transmission Control Protocol (TCP)

Allows for sending MULTIPLE packets between two computers. TCP checks that all packets arrived and can be put back in the proper order. The metadata must include a destination IP address, a from IP address, the message size and the packet order number

27
New cards

Sequential Programming

Refers to programs that are executed sequentially – once through, from start to finish, without other processing executing

28
New cards

Parallel and Distributed Programming

Completes multiple tasks at a time, simultaneously

29
New cards

DNS Spoofing

Pretending to be a DNS name resolver. Feed your computer the wrong IP address for a given website, and your browser now goes to a false website

30
New cards

DDoS Attack

Spam a web server with so many requests so close together that it crashes. Sometimes spitting out valuable information as it crashes

31
New cards

Cybersecurity

Protocols for encrypting/decrypting information. Most cybersecurity breaches happen due to human error, not software bugs

32
New cards

Cybercrime

Identity theft, stealing money, stealing private information, controlling private computers

33
New cards

Public Key Encryption

A type of asymmetric key encryption. There’s one key that encrypts the information and there is a different key that decrypts the information

34
New cards

certificate

Confirms the identity and authenticity of a website

35
New cards

Copyright

A law that grants the creator of an original work exclusive rights to its use, distribution, and sale

36
New cards

Public domain

Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public