AP CSP Unit 6 Vocabulary

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

social media

1 / 63

64 Terms

1

social media

applications and websites that allow users to share content and participate in social networking that may have otherwise had socioeconomic barriers.

New cards
2

socioeconomic

the differences among groups based on geographical, social and economic factors.

New cards
3

search tools

directories and search engines on the Internet that are essential for finding information efficiently on the Web.

New cards
4

cloud computing

storing, accessing and processing data using remote servers over a network rather than a local server or computer.

New cards
5

client-server model

the client(s) are the end-user(s) and communicates with the server (a centralized computer) that services the clients.

New cards
6

digital divide

the gap between those who have ready access to computers and the Internet, and those who do not.

New cards
7

routing

the process of moving information (or packets) over a network via a device called a router.

New cards
8

SMTP protocol

Email communication standard developed and overseen by the Internet Engineering Task Force (Simple Mail Transfer Protocol)

New cards
9

HTTP

Hypertext Transfer Protocol developed by the Engineering Task Force, this protocol determines how data and messages are formatted, transmitted, and responded to via the Internet.

New cards
10

HTTPS

HTTP with a Secured Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer that encrypts and decrypts user data and requests for added security (Hypertext Transfer Protocol Secure)

New cards
11

Internet protocol

the protocol by which data is sent from one computer to another on the Internet.

New cards
12

TCP/IP

standard for packets and routing (Transmission Control Protocol/Internet Protocol)

New cards
13

SMS

Short Message Services. Text messaging that allows the user to send up to 160 characters to another device. If message is longer it may truncate, concatenate and/or split up into several individual messages.

New cards
14

interface

a user-friendly picture-oriented way to interact with technology, contributing to the widespread use of the Internet

New cards
15

protocols

a common set of rules that computers must abide by in order to connect with each other.

New cards
16

IP address

a unique numeric identification for each device that is connected to a computer network and uses Internet Protocol.

New cards
17

IPv6

Internet Protocol, Version 6 - 128-bit Internet address consisting of eight 4-character hexadecimal numbers to handle routing of many more devices.

New cards
18

IPv4

Internet Protocol, Version 4 - A 32-bit Internet address consisting of four numbers each between 0 through 255, separated by periods (represents 8 bits).

New cards
19

domain

a group of devices connected on a network using the same protocol to access and administer web pages.

New cards
20

domain name system (DNS)

the way that domain names are located and translated into Internet Protocol (IP) addresses.

New cards
21

packet switching

digital data is sent by breaking the data into blocks of bits called packets, which contain both the data being transmitted and control information for routing the data.

New cards
22

net neutrality

the Internet is built around the notion of free and open access to information with no blocking, no throttling or paid prioritization.

New cards
23

encryption

the process of converting information or data into a code, especially to prevent unauthorized access.

New cards
24

public-key encryption

an asymmetric encryption method that uses a public key (made available publicly) and a private key (available to owner only).

New cards
25

certificate authorities

CA's issue digital certificates that validate ownership of encrypted keys used in secured communications and are based on a trust model.

New cards
26

trust model

validation of one's identity necessary for an event or transaction to occur.

New cards
27

open platforms

software based on open standards where there is no single ownership and is freely available through open license.

New cards
28

closed platforms

proprietary software where the provider has control over the application and content and can restrict access

New cards
29

cybersecurity

measures taken to protect a computer or computer system against unauthorized access or attack

New cards
30

confidentiality

the ability to limit access to information to a certain set of users.

New cards
31

integrity

the certainty that information is accurate

New cards
32

availability

the reliability of access to information

New cards
33

firewall

part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

New cards
34

Secure Sockets Layer (SSL)

the standard security technology for establishing an encrypted link between a web server and a browser, typically indicated with padlock icon in the address bar.

New cards
35

DDoS Attack

Distributed Denial of Service - an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.

New cards
36

viruses

code that is capable of copying itself and corrupting a system or destroying data.

New cards
37

social engineering

the psychological manipulation of people into performing actions or divulging confidential information

New cards
38

malware

software that is intended to damage or disable computers and computer systems.

New cards
39

phishing

obtaining confidential information by masquerading as an "official" person, site, or entity. A form of social engineering

New cards
40

Internet

the network infrastructure composed of devices (or nodes) that communicate via protocols

New cards
41

World Wide Web

a network of online content formatted in html and accessed via HTTP (WWW)

New cards
42

Tim Berners-Lee

created the set of fundamental tools and technologies that make up the World Wide Web.

New cards
43

hyperlinks

clickable bits of text, images or other screen elements within an HTML document that a user can select to request another document or web location.

New cards
44

distributed computing

computers that interact with each other in order to achieve a common goal.

New cards
45

botnets

a network of private computers infected with a malicious software and controlled as a group without the owners knowing.

New cards
46

bitcoin mining

the processing of transactions in the digital currency system, in which the records of current Bitcoin transactions, known as a blocks, are added to the record of past transactions, known as the blockchain.

New cards
47

Internet of Things

the network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these objects to connect and exchange data.

New cards
48

autonomous technology

technology that can function without being told what to do - i.e. Robots.

New cards
49

computing innovation

a new method or idea utilizing computing that has meaningful impact on society, economy, culture or environment.

New cards
50

crowdfunding

entrepreneurs using online access to customers as a means of funding their project.

New cards
51

network

connection of devices and networks to communicate using addresses and protocols.

New cards
52

sensor networks

autonomous sensors that measure environmental conditions such as light, temperature and sound which facilitate new ways of interacting with the environment and with physical systems.

New cards
53

Application Program Interfaces (APIs)/Libraries

a set of routines, protocols, and tools for building software applications which simplify complex programming tasks

New cards
54

hierarchy

an arrangement of elements in a ranking of superiority. the Internet and systems are built from the top (root) down.

New cards
55

metadata

descriptive data about an image, a web page, or other complex objects (data about data)

New cards
56

bandwidth

a measure of bit rate of a system or data (measured in bits) that can be sent in a fixed amount of time over a system.

New cards
57

latency

the time elapsed between the transmission and the receipt of a request in a system.

New cards
58

open standard

a standard where documentation and specifications are open to the public.

New cards
59

closed standard

a standard where documentation and specifications are not available to the public.

New cards
60

open source

publicly available information that is free to use, distribute, modify, and study.

New cards
61

closed source

privately owned information that is proprietary.

New cards
62

symmetric key system

an encryption method where each pair of users share a secret key

New cards
63

asymmetric key system

an encryption method that uses different keys to encrypt and decrypt

New cards
64

User Datagram Protocol (UDP)

a communication protocol used to send messages to other hosts of an IP network; sends packets quickly with minimal error-checking and no resending of dropped packets

New cards

Explore top notes

note Note
studied byStudied by 132 people
... ago
5.0(1)
note Note
studied byStudied by 55 people
... ago
4.5(2)
note Note
studied byStudied by 7 people
... ago
5.0(1)
note Note
studied byStudied by 30 people
... ago
5.0(1)
note Note
studied byStudied by 37 people
... ago
5.0(1)
note Note
studied byStudied by 6 people
... ago
5.0(1)
note Note
studied byStudied by 16 people
... ago
5.0(1)
note Note
studied byStudied by 23129 people
... ago
4.8(187)

Explore top flashcards

flashcards Flashcard (21)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (93)
studied byStudied by 13 people
... ago
5.0(2)
flashcards Flashcard (27)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (58)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (83)
studied byStudied by 8 people
... ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (22)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (68)
studied byStudied by 29 people
... ago
5.0(2)
robot