AP CSP Internet
Anonymity and Censorship on the Internet
Anonymity: Ability of users to operate without revealing their identities.
- Pros: Offers equal standing to all users, eliminates discrimination.
- Cons: Can lead to lack of accountability (e.g., cyberbullying).Censorship: Regulation of content on the internet by governments or corporations.
- Considerations: Balancing freedom of speech with preventing harmful content.
Internet Infrastructure
The Internet is a massive network of networks, made possible by various protocols.
Protocols: Sets of rules that allow different computing devices to communicate, similar to spoken languages.
Types of Computing Devices
Computing Devices: Physical artifacts that can run a program and process data.
- Examples: Laptops, smartphones, tablets.
- Definition: A machine that takes input, processes it, and provides output.Input Devices: Used to send data to a computer.
- Examples: Keyboard, mouse, microphone, scanner.
- User Input Devices: Specific input devices operated by humans, such as keyboards and mice.Output Devices: Used to convey data from a computer to a user.
- Examples: Monitors, printers, speakers.Storage Devices: Used to save data for later use.
- Examples: Hard drives, SSDs, USB flash drives.Network Devices: Allow communication between computers.
- Examples: Routers, modems.
Networking Basics
Computer Network: A collection of interconnected devices that can send/receive data.
Bandwidth: Maximum data transfer capacity of a network.
Latency: Time taken for data to travel from sender to receiver (lower latency is preferred).
Bitrate: Number of bits processed in a given amount of time.
Internet Addresses and Protocols
IP Address: Unique address for each device on the Internet, structured hierarchically.
- IPv4: 32-bit addresses (4 octets); limited supply.
- IPv6: 128-bit addresses; allows for a vastly larger number of devices.Domain Name System (DNS): Translates human-readable domain names (like www.example.com) to IP addresses.
URL: Uniform Resource Locator; consisting of the domain and path to a specific resource.
Data Transfer and Communication
Data is sent in packets, which are units of data broken down for transmission.
HTTP (HyperText Transfer Protocol): Defines how messages are formatted and transmitted over the web.
- HTTP Request: The message sent by a client (browser) requesting information.
- HTTP Response: The server's reply containing requested information.Cookies: Small pieces of data stored on a user's device to enhance the web experience.
Cybersecurity Concerns
Cybercrime: Criminal acts involving the use of computers or networks.
- DDoS Attacks: Distributed denial of service attacks that overwhelm a server, causing service outage.
- DNS Spoofing: A hacker redirects a user from a legitimate site to a malicious one by providing a fake IP address.SSL/TLS (Secure Sockets Layer/Transport Layer Security): Protocols for encrypting internet communication to ensure data privacy.
Phishing: Attempting to obtain sensitive information by impersonating legitimate institutions.
Public Key Encryption: A system where one key encrypts data, and a different key decrypts it, enhancing security.
Computing Models
Sequential Computing: Tasks are completed one after another.
Parallel Computing: Multiple tasks are completed simultaneously on multiple processors.
Distributed Computing: Uses multiple connected computers to work on tasks concurrently, enhancing reliability and scalability.
Impact of the Internet
Positive Effects:
- Enhanced collaboration across geographical barriers.
- Increased access to information and knowledge sharing.
- Online learning opportunities and e-commerce growth.Negative Effects:
- Anonymity leading to potential misbehavior online (bullying, harassment).
- Censorship and control over content accessibility.
Legal and Ethical Issues
Copyright Issues: Protects creators' rights over their intellectual property.
- Digital Millennium Copyright Act (DMCA): Legislation to combat unauthorized sharing of copyrighted content.
- Creative Commons: Licensing that allows creators to grant certain usage rights to the public while retaining specific rights.
Ethical Debate on Internet Access
Digital Divide: Unequal access to the internet across different demographics or regions impacting education and opportunity.
Efforts to bridge the gap include projects to enhance internet infrastructure in underserved areas, underlying the necessity of connectivity for modern life.