ap CSP EXAM

studied byStudied by 1 person
0.0(0)
get a hint
hint

Overflow

1 / 214

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

215 Terms

1

Overflow

error that results when the number of bits is not enough to hold the number, like a car's odometer "rolling over"

New cards
2

Round

off

New cards
3

Lossy

Compressing data in a way that throws some data away and makes it almost impossible to recover the original, great compression, like JPEG images

New cards
4

Lossless

Compressing data in a way that preserves all data away and allows full recovery of the original, good compression

New cards
5

Metadata

data about data, like a camera storing the location, aperture, shutter speed, etc. for a digital photo

New cards
6

Sequencing

code flows line by line, one after another, like a recipe

New cards
7

Selection

a boolean condition to determine which of two algorithmic paths are taken, aka if

New cards
8

Iteration

using a looping control structure, like while, for, foreach, repeat, repeat

New cards
9

Reasonable Time

polynomial in the number of steps an algorithm takes in the worst case based on the input size

New cards
10

Not reasonable time

Usually exponential in the number of steps, like doubling every time your input grows by one

New cards
11

Heuristic

using a "rule" to guide an algorithm, like always walking toward the north star if you were stuck in a forest

New cards
12

Undecidable

A problem that is so difficult, we can't ever create an algorithm that would be able to answer yes or no for all inputs, like determining if a user's program run on some input would always stop and not run forever

New cards
13

Linear Search

Going one by one vs starting in the middle and going left/right like looking for a word in the dictionary

New cards
14

Binary Search

requires the list to be sorted in order and then cutting the list in half

New cards
15

APIs

Application Programming Interface

New cards
16

Citizen Science

Lots of people to help with a scientific project, like asking everyone around the world to count the butterflies they see one day

New cards
17

Cloud Computing

Using distributed calculations and/or storage for big data or a web application

New cards
18

Crowdsourcing

Asking lots of users online to help with something, like funding a project, or running SETI@Home to help look for extraterrestrial signals

New cards
19

Creative Commons

An alternative to copyright that allows people to declare how they want their artistic creations to be shared, remixed, used in noncommercial contexts, and how the policy should propagate with remixed versions

New cards
20

Open Access

A policy that allows people to have read access to things, e.g., libraries or online data

New cards
21

Moore's Law

The # of transistors on a chip doubles every two years

New cards
22

Peer

to

New cards
23

Digital Divide

The idea that some communities / populations have less access to computing than others

New cards
24

ISP

Internet Service Provider

New cards
25

How does internet communication arrive at its destination?

Speech on the Internet goes from the source to an ISP, into the cloud, out of the cloud to another ISP, and to its destination

New cards
26

How can the government control speech on the Internet?

  1. It can try to control the speaker or the speaker's ISP, by criminalizing certain kinds of speech. But that won't work if the speaker isn't in the same country as the listener.

New cards
27

2)It can try to control the listener, by prohibiting possession of certain kinds of materials. In the U.S., possession of copyrighted software without an appropriate license is illegal, as is possession of other copyrighted material with the intent to profit from redistributing it.

New cards
28
  1. The government can try to control the intermediaries.

New cards
29

How can Internet posters evaded being convicted for defamation/slander on the Web?

The posters could evade responsibility as long as they remained anonymous, as they easily could on the Internet.

New cards
30

What has Congress given ISPs relating to an Internet Defamation case?

Congress had given the ISPs a complete waiver of responsibility for the consequences of false and damag

New cards
31

Internet Protocol Hourglass

Each protocol interfaces only to those in the layers immediately above and below it, and all data is turned into IP bit packets in order to pass from an application to one of the physical media that make up the network.

New cards
32

Email, Web, Phone

New cards
33

SMTP, HTTP

New cards
34

TCP, UDP

New cards
35

IP

New cards
36

Wire, Fiber, Radio

New cards
37

TCP

Transmission Control Protocol

New cards
38

Guarantees reliable transmission by breaking messages into packets, keeping track of which packets have been received successfully, resending any that have been lost, and specifying the order for reassembling the data on the other end.

New cards
39

UDP

User Datagram Protocol

New cards
40

provides timely but unreliable message delivery

New cards
41

HTTP

HyperText Transport Protocol

New cards
42

which is used for sending and receiving web pages

New cards
43

SMTP

Simple Mail Transport Protocol

New cards
44

used for sending email.

New cards
45

What does "End to End" mean in regards to the Internet?

"End to End," in the Internet, means that the switches making up the core of the network should be dumb—optimized to carry out their single limited function of passing packets.

New cards
46

RFC

Request for Comment

New cards
47

Standards adopted through a remarkable process of consensus

building, nonhierarchical in the extreme. Someone posts a proposal, and a cycle of comment and revision, of buy

New cards
48

Shortcut for going from binary to hexadecimal

To translate a binary numeral (like 11010111012) to hexadecimal, start by splitting it into groups of four bits, from right

New cards
49
New cards
50

Then determine the value of each group and write the corresponding hex digit.

New cards
51

Internet

A network of independent but connected devices all over the world.

New cards
52

World Wide Web

The collection of interlinked website documents (such as HTML files) that you can view with a web browser by typing addresses like http://bjc.berkeley.edu/website/privacy.html.

New cards
53

HTML

Hypertext markup language

New cards
54

Most web pages are written with ________

New cards
55

URL

Uniform Resource Locator

New cards
56

An address for accessing specific web data located on a server

New cards
57

Server

A computer hosting data for others to access

New cards
58

Protocol

the standard for communication between browsers and servers (usually "http" or "https")

New cards
59

Sometimes not visible in browsers like Google Chrome

New cards
60

Domain Name

The name of the server that hosts the data

New cards
61

(bjc.berkeley.edu)

New cards
62

Path

the location of the data in a hierarchy of folders on the server

New cards
63

(Website/privacy.html)

New cards
64

Protocols

Standards for communication

New cards
65

IP

Internet Protocol

New cards
66

An addressing system that finds paths to distant computers

New cards
67

Specifies how a router handles a request for another IP address.

New cards
68

Redundant

There are multiple pathways among the physical connections of the Internet to create redundancy. Even if one pathway is unavailable, there is still another way to transmit a message from sender to receiver

New cards
69

Hiearchial

There are two ____________ Internet addressing systems, domain names and IP addresses. These address ______________ works much like the postal system, which locates people first by state, then city, then street, then house number, then apartment, and then finally person.

New cards
70

Fault Tolerance

ability to work around problems

New cards
71

Scalability

the ability of the net to keep working even as the size of the network and the amount of traffic over the network increase.

New cards
72

Virus

A kind of malware that tries to spread itself over the network to other computers.

New cards
73

Antivirus Software

Helps protect against virus attacks

New cards
74

Phishing

An attacker sends you an email that appears to be from some official organization (such as your bank) and tricks you into giving information to the attackers (such as your bank password).

New cards
75

DDoS

Distributed Denial of Service

New cards
76

Consists of sending a lot of requests to a server at the same time. This can overload the server's network bandwidth.

New cards
77

Causes a temporary inability to reach the targeted server so other users of that server are denied service.

New cards
78

Which protocols are used to keep secure HTTP connections?

Transport Layer Security (TLS) or maybe an older version called Secure Sockets Layer (SSL)

New cards
79

With these protocols, the site you are visiting sends its public key, and your browser uses it to encrypt the information you send.

New cards
80

Certificate Authorities

Used by many websites for encryption to protect files and information that is transmitted over the Internet. They issue certificates to verify the identity of a user or computer.

New cards
81

Public IP Address

The IP address that is logged by various servers/devices when you connect to them through your internet connection.

New cards
82

Private IP Address

An IP address that's reserved for internal use behind a router or other Network Address Translation (NAT) device, apart from the public.

New cards
83

IP v4

This address is big enough to support 2^32 computers. That's about four billion (4 · 109), but there are more than seven billion people on Earth, so there aren't enough IP addresses to go around. Each of the four numbers in a typical IP address today is an eight

New cards
84

IP v6

The long

New cards
85

Routers

The "connection points" of the Internet.

New cards
86

Networking devices that route traffic between subnetworks on the Internet.

New cards
87

Packets

When you send a message over the Internet, your computer divides it into small chunks called __________ that it sends individually, each on its own path. A __________ can include any kind of data: text, numbers, lists, etc.

New cards
88

Packet Switching Network

A digital networking communications method that groups all transmitted data into suitably sized blocks, called packets, which are transmitted via a medium that may be shared by multiple simultaneous communication sessions.

New cards
89

Example : Internet

New cards
90

Hierarchy of Abstractions

Manages the complexity of the Internet by hiding the details of lower levels of the system. The highest level of abstraction includes the most general features of the Internet that have to work the same across all devices. At lowers levels of abstraction, things get more device

New cards
91

Application Layer Protocols

The highest level of abstraction because they manage how data is interpreted and displayed to users. These protocols give meaning to the bits sent by lower

New cards
92

Transport Layer Protocols

Manage the breakdown of a message into packets to be transmitted by lower level protocols and also the reconstruction of the message from the packets upon arrival.

New cards
93

Internet Layer Protocols

Manage the pathways that the data packets travel across networks. These protocols treat the Internet like one large network even though the physical reality on the lower level is one of many tiny subnetworks.

New cards
94

Network Interface Hardware

Also known as Link Layer

New cards
95

All Internet devices connect through a physical interface that uses a protocol to manage the connection to the local network. These local protocols are the least abstract because they deal directly with your physical hardware.

New cards
96

DNS

Domain Name System

New cards
97

The hierarchical addressing protocol that is human

readable

New cards
98

Who is in charge of the Internet?

The computers on the Internet and the connections among them don't belong to any one organization.

New cards
99

ICANN

the Internet Corporation for Assigned Names and Numbers

New cards
100

Controls the DNS hierarchy and the allocation of IP addresses.

New cards

Explore top notes

note Note
studied byStudied by 17 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 430 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 3906 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 62 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 14 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 111798 people
Updated ... ago
4.9 Stars(534)

Explore top flashcards

flashcards Flashcard443 terms
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard39 terms
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard49 terms
studied byStudied by 30 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard94 terms
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard32 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard41 terms
studied byStudied by 107 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard62 terms
studied byStudied by 189 people
Updated ... ago
5.0 Stars(8)