APCSP Vocab Unit 5

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 31

flashcard set

Earn XP

Description and Tags

Here is the vocab list for AP Computer Science Principles unit 5.

32 Terms

1

Bias

favoring one group/party over another discrimination, prejudice, or anatognist

New cards
2

Classifying Data

distributing data into groups based on common characteristics.

New cards
3

Cleaning Data

the process of making the data uniform without changing its meaning (such as replacing abbreviations, spellings, and capitalizations with the intended word or converting miles to kilometers). Programmers can use programs to filter and clean digital data, thereby gaining insight and knowledge.

New cards
4

Filtering Data

cleaning and grouping data under certain conditions

New cards
5

Patterns in Data

recurring elements in data that show a trend

New cards
6

Scalability

The ability of a system to adjust in scale to meet new demands

New cards
7

Internet

a computer network that uses open protocols to standardize communication. A computing device connected to an Internet

New cards
8

Computer System

is a group of computing devices and programs working together for a common purpose.

New cards
9

Computer Network

is an interconnected computing system that is capable of sending or receiving data.

New cards
10

Computing Device

is a physical object that can run a program, such as computers, tablets, cell phones, and smart sensors.

New cards
11

Bandwidth

is the maximum amount of data that can be sent in a fixed amount of time (for digital data, it is measured in bits per second). Higher bandwidth is better because the data will travel more quickly.

New cards
12

Distributed Computing System

is a form of parallel computing that uses multiple computers (perhaps even spread out around the world).

New cards
13

Fault Tolerance

is the ability of a system to work around problems.

New cards
14

IP Address

is a unique number assigned to each device on a computer network.

New cards
15

TCP (Transmission Control Protocol)

lets your computer pretend it has a reliable connection to the other computer. The computers (including servers) at the two endpoints of a communication run TCP, which guarantees that packets arrive successfully.

New cards
16

Packets

is a small chunk of any kind of data (text, numbers, lists, etc.) and metadata (information about the data) that is passed through the Internet as a data stream.

New cards
17

Parallel Computing System

the program is broken into smaller steps, some of which are performed at the same time. Modern computers have multiple processors (2, 4, or 8) in a single computer, so you can do small

New cards
18

Protocols

is set of rules that specify the behavior of a system.

New cards
19

Redundancy

is the inclusion of back

New cards
20

Router

is a computer that passes information from one network to another.

New cards
21

Sequential Computing System

operations are performed in order one at a time.

New cards
22

World Wide Web

is a system of linked pages, programs, and files that uses the Internet.

New cards
23

Encryption

is the process of encoding data to prevent unauthorized access.

New cards
24

Decryption

is the process of decoding the data.

New cards
25

Certificate Authority

are organizations that issue digital certificates to verify who owns the encryption keys used for secured communications.

New cards
26

Public Key Encryption

uses a pair of keys: a public key for encryption and a private key for decryption. The sender uses the public key to encrypt the message, and receiver uses their private key to decrypt it.

New cards
27

Multifactor

A method of user authentication which requires the user to present multiple pieces of evidence in multiple categories

New cards
28

Authentication

The process of verifying a claimed identity of a user, device, or other entity in a computer system.

New cards
29

Asymmetric Ciphers

a process that uses a pair of related keys

New cards
30

Symmetric Key Encryption

Substitution ciphers are examples of symmetric encryption because they use the same key for both encryption and decryption.

New cards
31

Crowdsourcing

is the general term for using the Internet to get a lot of people to help solve a problem. (Citizen science is a type of crowdsourcing.)

New cards
32
New cards

Explore top notes

note Note
studied byStudied by 37 people
912 days ago
5.0(1)
note Note
studied byStudied by 8 people
95 days ago
5.0(2)
note Note
studied byStudied by 17 people
855 days ago
4.5(2)
note Note
studied byStudied by 81 people
693 days ago
5.0(1)
note Note
studied byStudied by 18 people
836 days ago
5.0(1)
note Note
studied byStudied by 98 people
804 days ago
5.0(1)
note Note
studied byStudied by 29 people
1064 days ago
5.0(1)
note Note
studied byStudied by 13 people
33 days ago
5.0(1)

Explore top flashcards

flashcards Flashcard (121)
studied byStudied by 4 people
659 days ago
5.0(1)
flashcards Flashcard (38)
studied byStudied by 91 people
392 days ago
5.0(1)
flashcards Flashcard (24)
studied byStudied by 5 people
784 days ago
5.0(1)
flashcards Flashcard (22)
studied byStudied by 2 people
245 days ago
5.0(1)
flashcards Flashcard (53)
studied byStudied by 3 people
379 days ago
5.0(1)
flashcards Flashcard (22)
studied byStudied by 1 person
713 days ago
4.0(1)
flashcards Flashcard (21)
studied byStudied by 6 people
749 days ago
5.0(1)
flashcards Flashcard (25)
studied byStudied by 212 people
895 days ago
5.0(5)
robot