Here are definitions and examples for your AP Computer Science Principles (AP CSP) test:
Definition:
Citizen science is when the general public contributes to scientific research by collecting or analyzing data. Crowdsourcing is a broader concept where a task is outsourced to a large group of people, often via the internet.
Example:
NASA’s Globe Observer program allows people to submit photos of clouds to help improve weather and climate models.
Definition:
MFA is a security process that requires more than one method of authentication to verify a user’s identity.
Example:
Logging into an email account requires a password (something you know) and a code sent to your phone (something you have).
Definition:
Safe computing refers to best practices that protect devices and personal information from cyber threats.
Example:
Using strong passwords, keeping software updated, and avoiding suspicious links help prevent malware infections.
Definition:
Legal and ethical concerns in computing include privacy, data security, intellectual property rights, and responsible internet use.
Example:
A company collecting user data without permission could be both unethical and illegal under privacy laws like GDPR.
Definition:
The Digital Millennium Copyright Act (DMCA) is a U.S. law that protects copyrighted content, especially digital media, and prevents unauthorized distribution.
Example:
YouTube removes videos that use copyrighted music without permission due to DMCA takedown requests.
Definition:
Keylogging is a type of malware or software that secretly records every keystroke a user types, often used to steal passwords or sensitive information.
Example:
A hacker installs a keylogger on a public computer to steal users' login credentials when they enter passwords.
Definition:
Phishing is a cyberattack where an attacker tricks someone into giving away personal information, like passwords or credit card numbers, by pretending to be a trustworthy source.
Example:
An email pretending to be from a bank asks you to "verify your account" by clicking a fake link and entering your login details.
Definition:
A rogue access point is an unauthorized Wi-Fi hotspot that attackers use to intercept data from unsuspecting users.
Example:
A hacker sets up a free Wi-Fi network named "CoffeeShop_WiFi" in a café to steal personal data from people who connect to it.
Definition:
A Trojan is malware that disguises itself as a legitimate program but contains harmful code.
Example:
A user downloads a "free antivirus" program that secretly installs a backdoor, giving hackers access to their computer.
Definition:
Phishing is a type of cyber fraud that tricks people into revealing sensitive information through deceptive messages or websites.
Example:
A fake Amazon email claims there’s a problem with your order and asks you to enter your login details on a fraudulent website.
Definition:
Public key encryption (asymmetric encryption) uses two keys: a public key to encrypt data and a private key to decrypt it.
Example:
When you visit a secure website (HTTPS), your browser uses public key encryption to securely exchange information with the website.
Symmetric Encryption:
Uses the same key for encryption and decryption.
Example: A ZIP file that requires a password to open uses symmetric encryption.
Asymmetric Encryption:
Uses a public key to encrypt and a private key to decrypt data.
Example: Secure email communication (PGP encryption) uses asymmetric encryption to keep messages safe.
Definition:
Dropbox is a cloud storage service that allows users to upload, store, and share files online.
Example:
A student saves their essay in Dropbox so they can access it from any device later.
That should help you for your AP CSP test! Let me know if you need more explanations. 🚀