APCSP Vocab Unit 5

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/31

flashcard set

Earn XP

Description and Tags

Here is the vocab list for AP Computer Science Principles unit 5.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

32 Terms

1
New cards

Bias

favoring one group/party over another discrimination, prejudice, or anatognist

2
New cards

Classifying Data

distributing data into groups based on common characteristics.

3
New cards

Cleaning Data

the process of making the data uniform without changing its meaning (such as replacing abbreviations, spellings, and capitalizations with the intended word or converting miles to kilometers). Programmers can use programs to filter and clean digital data, thereby gaining insight and knowledge.

4
New cards

Filtering Data

cleaning and grouping data under certain conditions

5
New cards

Patterns in Data

recurring elements in data that show a trend

6
New cards

Scalability

The ability of a system to adjust in scale to meet new demands

7
New cards

Internet

a computer network that uses open protocols to standardize communication. A computing device connected to an Internet

8
New cards

Computer System

is a group of computing devices and programs working together for a common purpose.

9
New cards

Computer Network

is an interconnected computing system that is capable of sending or receiving data.

10
New cards

Computing Device

is a physical object that can run a program, such as computers, tablets, cell phones, and smart sensors.

11
New cards

Bandwidth

is the maximum amount of data that can be sent in a fixed amount of time (for digital data, it is measured in bits per second). Higher bandwidth is better because the data will travel more quickly.

12
New cards

Distributed Computing System

is a form of parallel computing that uses multiple computers (perhaps even spread out around the world).

13
New cards

Fault Tolerance

is the ability of a system to work around problems.

14
New cards

IP Address

is a unique number assigned to each device on a computer network.

15
New cards

TCP (Transmission Control Protocol)

lets your computer pretend it has a reliable connection to the other computer. The computers (including servers) at the two endpoints of a communication run TCP, which guarantees that packets arrive successfully.

16
New cards

Packets

is a small chunk of any kind of data (text, numbers, lists, etc.) and metadata (information about the data) that is passed through the Internet as a data stream.

17
New cards

Parallel Computing System

the program is broken into smaller steps, some of which are performed at the same time. Modern computers have multiple processors (2, 4, or 8) in a single computer, so you can do small

18
New cards

Protocols

is set of rules that specify the behavior of a system.

19
New cards

Redundancy

is the inclusion of back

20
New cards

Router

is a computer that passes information from one network to another.

21
New cards

Sequential Computing System

operations are performed in order one at a time.

22
New cards

World Wide Web

is a system of linked pages, programs, and files that uses the Internet.

23
New cards

Encryption

is the process of encoding data to prevent unauthorized access.

24
New cards

Decryption

is the process of decoding the data.

25
New cards

Certificate Authority

are organizations that issue digital certificates to verify who owns the encryption keys used for secured communications.

26
New cards

Public Key Encryption

uses a pair of keys: a public key for encryption and a private key for decryption. The sender uses the public key to encrypt the message, and receiver uses their private key to decrypt it.

27
New cards

Multifactor

A method of user authentication which requires the user to present multiple pieces of evidence in multiple categories

28
New cards

Authentication

The process of verifying a claimed identity of a user, device, or other entity in a computer system.

29
New cards

Asymmetric Ciphers

a process that uses a pair of related keys

30
New cards

Symmetric Key Encryption

Substitution ciphers are examples of symmetric encryption because they use the same key for both encryption and decryption.

31
New cards

Crowdsourcing

is the general term for using the Internet to get a lot of people to help solve a problem. (Citizen science is a type of crowdsourcing.)

32
New cards