Final Project Topics for AP Exam Preparation

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/75

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

76 Terms

1
New cards

Server computers

Big computers made to talk and send information from other computers.

2
New cards

HTTP

Hyper Text Transfer Protocol; the language that computers use to speak to each other.

3
New cards

IP address

A unique address assigned by your Internet service provider that identifies a device on the network.

4
New cards

Cloud computing

A method of delivering computing services—like storage, processing power, and software—through the internet instead of local machines.

5
New cards

IaaS

Infrastructure as a Service; provides virtualized computing resources.

6
New cards

PaaS

Platform as a Service; offers hardware and software tools over the internet.

7
New cards

SaaS

Software as a Service; allows users to use software applications online, usually by subscription.

8
New cards

Benefits of cloud computing

Reduces expenses, improves scalability, and renders sophisticated technologies more accessible.

9
New cards

Physical computing

Using electronic components to build a device that interacts with the real world and the environment.

10
New cards

Actuators

Devices that convert electrical directions to real actions that affect the environment.

11
New cards

Sensors

Devices that convert some phenomenon into an electrical impulse that determines the reading.

12
New cards

Controllers

Devices that read input from sensors and send commands to actuators.

13
New cards

Microcontroller

A small computer on a single integrated circuit, programmed to perform a specific task.

14
New cards

HTML

HyperText Markup Language; the language used to build web pages.

15
New cards

Browser

An application that reads HTML files and displays them as formatted web pages.

16
New cards

Markup Language

A system that uses special syntax (called tags) to define how content should be displayed.

17
New cards

Tags

The basic building blocks of HTML, written inside angle brackets (< >).

18
New cards

Opening tag

The first part of a tag that indicates the start of an element, e.g.,

.

19
New cards

Closing tag

The second part of a tag that indicates the end of an element, e.g., .
20
New cards

HTML page layout

A specific structure that includes elements like to indicate the version of HTML.

21
New cards

Tells the browser we're using HTML5 (not technically a tag).

22
New cards

Wraps everything in the HTML page.

23
New cards

Contains metadata, such as the page title, stylesheets, or scripts.

24
New cards

Contains the visible content of the page—headings, paragraphs, links, images, etc.

25
New cards

Paragraph. Separates large blocks of text.

27
New cards

Cybersecurity

The practice of protecting systems, networks, and programs from digital attacks.

28
New cards

Encryption

Converting data into code to prevent it from being accessed.

29
New cards

Cyberattack

A malicious and deliberate attempt to breach the information system of another individual or organization.

30
New cards

Ransomware

A type of cyberattack that encrypts private files and demands a ransom for their freedom.

31
New cards

Malware

Software designed to get unauthorized access to your computer systems.

32
New cards

Firewalls

Gateway that monitors network traffic based on predetermined rules set in place.

33
New cards

DNS

Domain name system acts as a filter for fake websites.

34
New cards

Malware protection

When it detects malicious code, it quarantines and/or deletes that code to protect computer.

35
New cards

Zero trust protectal

The zero trust security model uses identity and context information to continually verify trust before granting least-privilege access.

36
New cards

Multi factor authentication

Requires user to go through multiple authentication processes to access the information they want.

37
New cards

Phishing

The practice of sending fraudulent emails that resemble emails from reputable sources.

38
New cards

Viruses

Code that attaches to files and spreads across other files encrypting or destroying them.

39
New cards

Adware

Most commonly called spam. Advertisements are shown on websites and when you click them it downloads malicious code into your computer.

40
New cards

Spyware

Monitoring your searches and sending them to other people without your permission.

41
New cards

Trojan

Malicious software designed to appear legitimate.

42
New cards

Social engineering

A tactic that adversaries use to trick you into revealing sensitive information.

43
New cards

Cryptography

The act of turning messages into secret codes so only the people with the right access can read them.

44
New cards

Encryption (in cryptography)

When you turn a regular message into a scrambled message.

45
New cards

Decryption

Turning the scrambled message back into something you can understand.

46
New cards

Digital certificates

Verify the identity of a person, device, or website.

47
New cards

Certificate authorities

Trusted organizations that issue the digital certificates.

48
New cards

Symmetric encryption

When one key is used for encryption and decryption and the sender and receiver have the same key.

49
New cards

Public key encryption

Asymmetric encryption using a public key for encryption and a private key for decryption.

50
New cards

Authentication

Proving your identity to a computer system.

51
New cards

Strong password characteristics

12 characters (the more the better); a mix of uppercase, lowercase, numbers, and symbols; doesn't use common words or personal information.

52
New cards

AI (Artificial Intelligence)

When machines and computer systems work to simulate human intelligence, mimicking abilities like communication and decision-making.

53
New cards

Machine Learning

A subset of AI where computers learn patterns from data and improve without being told to.

54
New cards

Supervised learning

A type of machine learning where the model is trained on labeled data that includes inputs and outputs.

55
New cards

Unsupervised learning

A type of machine learning where the model finds patterns in data without labeled answers.

56
New cards

Model

A trained program that can make decisions based on data.

57
New cards

Email Spam Filtering

Supervised learning example where the model is trained using labeled emails marked as 'spam' or 'not spam.'

58
New cards

Loan Approval

Supervised learning example where AI reviews applicant data to predict risk based on past approval decisions.

59
New cards

Facial Recognition

Example of supervised and unsupervised learning trained on thousands of labeled facial images.

60
New cards

Social Media Feeds

Reinforcement and unsupervised learning that learns user behavior to adjust content shown.

61
New cards

Data Analysis

Process of collecting, cleaning, organizing, and interpreting data to find patterns, trends, and relationships.

62
New cards

Excel

Tool for data analysis that includes functions like SUM(), IF(), AVERAGE(), and charts.

63
New cards

Google Sheets

Tool for data analysis that includes features like filter, sort, and grading.

64
New cards

Python

Open source programming language used for data analysis, AI, with libraries, conditionals, and loops.

65
New cards

R

Programming language used for graphs, statistics, and visualizations.

66
New cards

Data

Information processed by computers.

67
New cards

Variables

Named storage for values.

68
New cards

Statistics

Tools to make sense of data.

69
New cards

Algorithm

Step-by-step solution method.

70
New cards

Importance of Data Analysis

Identifies market trends, shows customer behavior, helps with risk management, tracks performance, ensures compliance.

71
New cards

Step by Step Processes in Data Analysis

Includes collecting, cleaning, organizing, analyzing, interpreting, and sharing data.

72
New cards

Real Life Example: Weather Forecasting

Uses historical weather data and satellite imagery to model atmospheric pressure, humidity, and wind speed.

73
New cards

Real Life Example: Sales Forecasting

Analyzes past trends to predict sales and optimize inventory and advertising timing.

74
New cards

Real Life Example: Healthcare

Detects patterns in patient symptoms for early diagnosis and optimizes treatments.

75
New cards

Real Life Example: Finance

Involves risk prediction for loans, analyzing stock trends, and detecting fraud.

76
New cards