AP Notes, Outlines, Study Guides, Vocabulary, Practice Exams and more!

AP CSP Unit 4 Flashcards

Vocabulary for the Code.org unit 4 on Big Data and Privacy.

Terms : Hide Images
8231640094Big DataA broad term for datasets so large or complex that traditional data processing applications are inadequate.0
8231654515Moore's LawA prediction (made by Gordon Moore) in 1965 that computing power will double every 1.5-2 years.1
8231661892Privacy PolicyA statement or legal document that discloses some or all of the ways a party gathers, uses, discloses, or manages a customer or client's data.2
8231677439EncryptionA process of encoding messages to keep them secret so only "authorized" parties can read them.3
8231685502DecryptionA process of encoding messages to keep them secret so only "authorized" parties can read it.4
8231691833CipherThe generic term for a technique (or algorithm) that performs encryption.5
8231694406Caesar's CipherA technique for encryption that shifts the alphabet by some number of characters.6
8231705351Random Substitution CipherAn encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.7
8231713077"Cracking" encryptionAttempting to decode a secret message without knowing all the specifics of the cipher.8
8231720017Frequency AnalysisA technique used to crack a substitution cipher that is based on how frequently certain letters appear in English versus other letters.9
8231750462Encryption algorithmSome method of doing encryption.10
8231755760Encryption keySpecific input that can be used to decrypt data.11
8231766529Computationally hardA "hard' problem for a computer to solve which means it cannot arrive at a solution in a reasonable amount of time.12
8231776832Vigenère CipherAn encryption algorithm that uses the same key to encrypt and decrypt the data.13
8231802533Symmetric encryptionThe same key is used to encrypt and decrypt the message.14
8231806268Asymmetric encryptionThe key to encrypt the message is different than the key to decrypt the message.15
8231812772CryptographyThe science concerned with the study of secret communication.16
8231815862Modulo or "MOD" operationFinds the remainder after division of one number by another.17
8231826074Public key encryptionAsymmetric encryption where the encryption key is made public while a separate (different) decryption key is kept private.18
8231857546One-way functionA mathematical function that is significantly easier to compute in one direction than in the opposite direction.19
8231880371Secure Sockets Layer (SSL)The standard security technology for establishing an encrypted link between a web server and a browser.20
8231889635Transport Layer Security (TLS)Refers to the latest version of SSL with newer security features.21
8231897310VirusA program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.22
8231907196Distribute Denial of Service (DDoS)A type of attack where multiple virus-infected computers are used to target a single system, overwhelming it with traffic, rendering it useless or unresponsive.23
8231912028PhishingThe act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.24
8231918319AntivirusA software utility that detects, prevents, and removes viruses, worms, and other malware from a computer.25
8231930324FirewallA network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.26
8231947524Certificate authoritiesResponsible for issuing digital certificates that validate the ownership of encrypted keys used in secure communication .27
8231968614Digital certificatesElectronic credentials that are used to certify the online identities of individuals, organizations, and computers (similar to online ID cards). Certificates are issued and certified by certificate authorities (CAs).28
8231986953MetadataData that describes other data.29
8231990144ScalabilityThe ability of a system to expand to handle a growing amount of work.30
8231997936Fault tolerantThe ability of a system to continue operating despite a component failure of some type.31

Need Help?

We hope your visit has been a productive one. If you're having any problems, or would like to give some feedback, we'd love to hear from you.

For general help, questions, and suggestions, try our dedicated support forums.

If you need to contact the Course-Notes.Org web experience team, please use our contact form.

Need Notes?

While we strive to provide the most comprehensive notes for as many high school textbooks as possible, there are certainly going to be some that we miss. Drop us a note and let us know which textbooks you need. Be sure to include which edition of the textbook you are using! If we see enough demand, we'll do whatever we can to get those notes up on the site for you!