Untitled Flashcards Set

Here are definitions and examples for your AP Computer Science Principles (AP CSP) test:


1. Citizen Science and Crowdsourcing

Definition:
Citizen science is when the general public contributes to scientific research by collecting or analyzing data. Crowdsourcing is a broader concept where a task is outsourced to a large group of people, often via the internet.

Example:
NASA’s Globe Observer program allows people to submit photos of clouds to help improve weather and climate models.


2. Multifactor Authentication (MFA)

Definition:
MFA is a security process that requires more than one method of authentication to verify a user’s identity.

Example:
Logging into an email account requires a password (something you know) and a code sent to your phone (something you have).


3. Safe Computing

Definition:
Safe computing refers to best practices that protect devices and personal information from cyber threats.

Example:
Using strong passwords, keeping software updated, and avoiding suspicious links help prevent malware infections.


4. Legal and Ethical Concerns

Definition:
Legal and ethical concerns in computing include privacy, data security, intellectual property rights, and responsible internet use.

Example:
A company collecting user data without permission could be both unethical and illegal under privacy laws like GDPR.


5. DMCA Copyright Laws

Definition:
The Digital Millennium Copyright Act (DMCA) is a U.S. law that protects copyrighted content, especially digital media, and prevents unauthorized distribution.

Example:
YouTube removes videos that use copyrighted music without permission due to DMCA takedown requests.


6. Keylogging

Definition:
Keylogging is a type of malware or software that secretly records every keystroke a user types, often used to steal passwords or sensitive information.

Example:
A hacker installs a keylogger on a public computer to steal users' login credentials when they enter passwords.


7. Phishing Attacks

Definition:
Phishing is a cyberattack where an attacker tricks someone into giving away personal information, like passwords or credit card numbers, by pretending to be a trustworthy source.

Example:
An email pretending to be from a bank asks you to "verify your account" by clicking a fake link and entering your login details.


8. Rogue Access Points

Definition:
A rogue access point is an unauthorized Wi-Fi hotspot that attackers use to intercept data from unsuspecting users.

Example:
A hacker sets up a free Wi-Fi network named "CoffeeShop_WiFi" in a café to steal personal data from people who connect to it.


9. Trojan (Trojan Horse Virus)

Definition:
A Trojan is malware that disguises itself as a legitimate program but contains harmful code.

Example:
A user downloads a "free antivirus" program that secretly installs a backdoor, giving hackers access to their computer.


10. Phishing (Similar to #7, but general definition)

Definition:
Phishing is a type of cyber fraud that tricks people into revealing sensitive information through deceptive messages or websites.

Example:
A fake Amazon email claims there’s a problem with your order and asks you to enter your login details on a fraudulent website.


11. Public Key Encryption

Definition:
Public key encryption (asymmetric encryption) uses two keys: a public key to encrypt data and a private key to decrypt it.

Example:
When you visit a secure website (HTTPS), your browser uses public key encryption to securely exchange information with the website.


12. Symmetric vs. Asymmetric Encryption

Symmetric Encryption:
Uses the same key for encryption and decryption.

  • Example: A ZIP file that requires a password to open uses symmetric encryption.

Asymmetric Encryption:
Uses a public key to encrypt and a private key to decrypt data.

  • Example: Secure email communication (PGP encryption) uses asymmetric encryption to keep messages safe.


13. What in the World Is a Dropbox?

Definition:
Dropbox is a cloud storage service that allows users to upload, store, and share files online.

Example:
A student saves their essay in Dropbox so they can access it from any device later.


That should help you for your AP CSP test! Let me know if you need more explanations. 🚀

robot