AP Computer Science Principles
abstraction: filtering out – essentially, ignoring - the characteristics that we don't need in order to concentrate on those that we do. high abstraction = move left, low abstraction = 010110011
symmetric encryption - uses single key to decrypt and encrypt , must be kept private
distributed computing: A computational model which uses multiple devices to run different parts of a program.
parallel computing:
Parallel computing on a single computer uses multiple processors to process tasks in parallel
fault tolerance:
a system's ability to continue operating uninterrupted despite the failure of one or more of its components.
subdomains, domains, addresses, etc.
sequencing: The sequential execution of steps in an algorithm or code in a program (like steps in a recipe)
selection: A Boolean condition to determine which of two paths are taken in an algorithm or program.
iteration: The repetition of steps in an algorithm or program for a certain amount of times or until a certain condition is met.
heuristic: A technique that helps an algorithm find a good solution in a hard problem (like always walking toward the north star when you are stuck in a forest)
bandwidth: The maximum amount of data that can be sent in a fixed period of time over a network connection, typically measured in bits per second.
IP (Internet Protocol): The protocol that determines how to address nodes on the network (with IP addresses) and how to route data from one node to a destination node (using routers).
World Wide Web: A system of linked pages, media, and files, browsable over HTTP.
HTTP (Hypertext Transfer Protocol): The protocol that powers the Web, used to request webpages from servers and submit form data to servers.
crowdsourcing: A model in which many online users combine efforts to help fund projects, generate ideas, or create goods or services (like Wikipedia).
citizen science: Crowdsourcing for science! The participation of volunteers from the public in a scientific research project (like collecting rain samples or counting butterflies).
Creative Commons: An alternative to copyright that allows people to declare how they want their artistic creations to be shared, remixed, used in noncommercial contexts, and how the policy should propagate with remixed versions.
encryption: The process of scrambling data to prevent unauthorized access.
symmetric encryption: A technique for encrypting data where the same key is used to both encrypt and decrypt data.
public key encryption: An asymmetric encryption technique that uses different keys for encrypting versus decrypting data.
cookie: A small amount of text that tracks information about a user visiting a website.
phishing: An attack where a user is tricked into revealing private information, often via a deceptive email.
rogue access point: A wireless access point that provides an attacker with unauthorized access to the traffic going over the network.
cookies: A small amount of text that tracks information about a user visiting a website.