AP Notes, Outlines, Study Guides, Vocabulary, Practice Exams and more!

AP CSP Unit 4 Flashcards

Terms : Hide Images
8753688322Moore's Lawthe observation that computing power roughly doubles every two years.0
8753688323Big Dataa broad term for datasets so large or complex that traditional data processing applications are inadequate.1
8753688324One-pagerA business/corporate term for a one-page document that summarizes a large issue, topic or plan. The purpose is to distill and highlight the most important pieces of information in a digestible manner so that the reader can be quickly acquainted with the relevant details of the "big picture."2
8753688325Caesar Ciphera technique for encryption that shifts the alphabet by some number of characters3
8753688326Cipherthe generic term for a technique (or algorithm) that performs encryption4
8753688327Cracking EncryptionWhen you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption.5
8753688328Decryptiona process that reverses encryption, taking a secret message and reproducing the original plain text6
8753688329Encryptiona process of encoding messages to keep them secret, so only "authorized" parties can read it.7
8753688330Random Substitution Cipheran encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.8
8753688331Vigenère Ciphera method of encrypting text by applying a series of Caesar ciphers based on the letters of a keyword.9
8753688332Computationally Harda "hard" problem for a computer is one in which it cannot arrive at a solution in a reasonable amount of time.10
8753688333Symmetric Encryptiona type of encryption where the same key is used to encrypt and decrypt the message.11
8753688334Asymmetric Encryptionused in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt.12
8753688335Moduloa mathematical operation that returns the remainder after integer division.13
8753688336Private KeyIn an asymmetric encryption scheme the decryption key is kept private and never shared, so only the intended recipient has the ability to decrypt a message that has been encrypted with a public key.14
8753688337Public Key EncryptionUsed prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.15
8753688338Phishing ScamTypically a thief trying to trick you into sending them sensitive information. Typically these include emails about system updates asking you send your username and password, social security number or other things.16
8753688339DDoS (Distributed denial of service) AttackTypically a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed - doing this can render web services like DNS, or routers, or certain websites useless and unresponsive.17
8753688340Virusa program that runs on a computer to do something the owner of the computer does not intend; can be used as a Bot Net to trigger a DDoS-style attack, or they can spy on your computer activity, such as capturing all the keystrokes you make at the computer, or websites you visit, etc.18
8753688341Antivirus softwareusually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them.19
8753688342Firewallsoftware that runs on servers (often routers) that only allows traffic through according to some set of security rules.20
8753688343SSL (secure sockets layer) and TLS (transport layer security)use public key cryptography to establish a secure connection.21

Need Help?

We hope your visit has been a productive one. If you're having any problems, or would like to give some feedback, we'd love to hear from you.

For general help, questions, and suggestions, try our dedicated support forums.

If you need to contact the Course-Notes.Org web experience team, please use our contact form.

Need Notes?

While we strive to provide the most comprehensive notes for as many high school textbooks as possible, there are certainly going to be some that we miss. Drop us a note and let us know which textbooks you need. Be sure to include which edition of the textbook you are using! If we see enough demand, we'll do whatever we can to get those notes up on the site for you!