Here is the vocab list for AP Computer Science Principles unit 5.
Bias
favoring one group/party over another discrimination, prejudice, or anatognist
Classifying Data
distributing data into groups based on common characteristics.
Cleaning Data
the process of making the data uniform without changing its meaning (such as replacing abbreviations, spellings, and capitalizations with the intended word or converting miles to kilometers). Programmers can use programs to filter and clean digital data, thereby gaining insight and knowledge.
Filtering Data
cleaning and grouping data under certain conditions
Patterns in Data
recurring elements in data that show a trend
Scalability
The ability of a system to adjust in scale to meet new demands
Internet
a computer network that uses open protocols to standardize communication. A computing device connected to an Internet
Computer System
is a group of computing devices and programs working together for a common purpose.
Computer Network
is an interconnected computing system that is capable of sending or receiving data.
Computing Device
is a physical object that can run a program, such as computers, tablets, cell phones, and smart sensors.
Bandwidth
is the maximum amount of data that can be sent in a fixed amount of time (for digital data, it is measured in bits per second). Higher bandwidth is better because the data will travel more quickly.
Distributed Computing System
is a form of parallel computing that uses multiple computers (perhaps even spread out around the world).
Fault Tolerance
is the ability of a system to work around problems.
IP Address
is a unique number assigned to each device on a computer network.
TCP (Transmission Control Protocol)
lets your computer pretend it has a reliable connection to the other computer. The computers (including servers) at the two endpoints of a communication run TCP, which guarantees that packets arrive successfully.
Packets
is a small chunk of any kind of data (text, numbers, lists, etc.) and metadata (information about the data) that is passed through the Internet as a data stream.
Parallel Computing System
the program is broken into smaller steps, some of which are performed at the same time. Modern computers have multiple processors (2, 4, or 8) in a single computer, so you can do small
Protocols
is set of rules that specify the behavior of a system.
Redundancy
is the inclusion of back
Router
is a computer that passes information from one network to another.
Sequential Computing System
operations are performed in order one at a time.
World Wide Web
is a system of linked pages, programs, and files that uses the Internet.
Encryption
is the process of encoding data to prevent unauthorized access.
Decryption
is the process of decoding the data.
Certificate Authority
are organizations that issue digital certificates to verify who owns the encryption keys used for secured communications.
Public Key Encryption
uses a pair of keys: a public key for encryption and a private key for decryption. The sender uses the public key to encrypt the message, and receiver uses their private key to decrypt it.
Multifactor
A method of user authentication which requires the user to present multiple pieces of evidence in multiple categories
Authentication
The process of verifying a claimed identity of a user, device, or other entity in a computer system.
Asymmetric Ciphers
a process that uses a pair of related keys
Symmetric Key Encryption
Substitution ciphers are examples of symmetric encryption because they use the same key for both encryption and decryption.
Crowdsourcing
is the general term for using the Internet to get a lot of people to help solve a problem. (Citizen science is a type of crowdsourcing.)