AP Notes, Outlines, Study Guides, Vocabulary, Practice Exams and more!

AP CSP Unit 1 Flashcards

Terms : Hide Images
9565862524innovation(s)The process of imagining something that does not yet exist, but that has potential value, and making it real through the application of design, implementation, and production.0
9565862525security breachUnauthorized access of data, applications, services, networks and/or devices by bypassing underlying security mechanisms.1
9565862526algorithmA process or set of rules to be followed in calculations or other problems solving operations2
9565862527flow patternsPatterns that can emerge when data is transformed using computational tools3
9565862528sequencingTo do things in order, one after another. Executing the statement one at a time, often called linear4
9565862529iterationRepetition. One complete step of a loop, repeated until a certain condition is met5
9565862530selectionUses "if...then" to tell computer how to select a step or to tell the sequence that should be executed6
9565862531condition (Boolean)A statement that has a particular outcome or result that is either true or false7
9565862532loopThe repetition of some code.8
9565862533indefinite LoopsWhen it is unknown how many times a loop will iterate, usually we are waiting for an event to occur such as "repeat until...."9
9565862534definite LoopsExecutes a predetermined set of times for a loop to be repeated10
9565862535flowchartA simple diagram with symbols showing the "flow" of a process11
9565862536imperative statementA command statement with a verb phrase that indicates an operation to perform (example: "move forward")12
9565862537descriptive qualifierA specific adverb or adjective that further qualifies or limits the meaning of a word (example: left shoe)13
9565862538cryptographySecuring (or encrypting) information such that it is inaccessible by third parties.14
9565862539plaintextText that is not written in code such as an unencrypted message.15
9565862540ciphertextThe result of encryption performed on plaintext using an algorithm or cipher.16
9565862541Caesar cipherAlso called substitution cipher. Substitutes each letter of the original, unencrypted message (plaintext)with a corresponding letter in the encrypted message(ciphertext)17
9565862542Vigenere cipherMore sophisticated algorithms used to improve encryption from Caesar Cipher by adding a key phrase18
9565862543cybersecurityMeasures taken to protect a computer or computer system against unauthorized access or attack19
9565862544CIA TriadConfidentiality, Integrity, Availability20
9565862545confidentialityThe ability to limit access to information to a certain set of users21
9565862546integrityThe certainty that information is accurate22
9565862547availabilityThe reliability of access to information23
9565862548authenticationThe process of determining whether someone or something is who or what they claim to be.24
9565862549Secure Sockets Layer (SSL)Secure Sockets Layer, typically indicated with padlock icon in address bar25
9565862550digital certificateValidates the ownership of encrypted keys used in secured communications and are based on a trust model.26
9565862551Distributed Denial-of-Service (DDoS) AttackDistributed Denial of Service - an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.27
9565862552firewallPart of a computer system or network that is designed to block unauthorized access while permitting outward communication.28
9565862553public key encryptionA non-symmetric encryption method that uses a paired public and private (asymmetric) key algorithm.29
9565862554virusesCode that is capable of copying itself and corrupting a system or destroying data.30
9565862555symmetric encryptionA method of encryption involving one key for encryption and decryption.31
9565862556social engineeringThe psychological manipulation of people into performing actions or divulging confidential information32
9565862557phishingObtaining confidential information by masquerading as an "official" person, site, or entity. A form of social engineering33
9565862558malwareSoftware that is intended to damage or disable computers and computer systems.34
9565862559ambiguityUncertainty or being open to more than one interpretation.35
9565862560natural languageA complex, but structured language, both written and spoken, that has evolved naturally in humans through use, repetition and adaptation.36
9565862561artificial languageA limited size language, usually developed by a small group for specific purposes, usually much simpler and structured.37
9565862562visual programming languageA programming language that lets users drag and drop icons into organized blocks of code to create programs rather then typing text.38
9565862563high-level languageA programming language that is is easier for humans to read, write and parse. Guaranteed to be unambiguous.39
9565862564low-level languageA programming language that has little or no abstraction and communicates closely to the hardware using assembly or machine language. Less natural for humans.40
9565862565source codePrograms that programmers write in high-level languages41
9565862566machine codeMachine-level instructions that are uniquely read by computer processors using patterns of 1's and 0's.42
9565862567compilationSource code that has been translated into machine code.43
9565862568compilerA program that translates high-level, human-readable languages into a corresponding string of 1's and 0's for computer processing.44
9565862569hardwarePhysical components of a computer built using multiple levels of abstraction such as transistors, logic gates, chips, memory, motherboard, special purpose cards, and storage devices.45
9565862570RAMRandom-access memory consists of tiny electrical circuits that dynamically store frequently used program instruction to increase speed of the system (volatile).46
9565862571secondary storageExternal/auxiliary memory such as a USB flash drive, hard drive, etc.47
9565862572primary storageMain storage or memory that stores data for quick access by the computer's processor (RAM)48
9565862573Central Processing UnitCPU - the processor or brains of the computer where calculations take place49
9565862574pseudocodeAn informal method or writing algorithmic instructions that do not necessarily follow grammatical rules and syntax of a particular language.50
9565862575sequential executionProgram instructions are executed one at a time, in order.51
9565862576undecidable problemWhere no algorithm can be made that always leads to a correct yes or no answer.52
9565862577unsolvable problemA problem that cannot be solved using any algorithm.53
9565862578Halting ProblemThere cannot be a program that will determine which computer programs will halt (or exit) and which programs will go on forever (infinite loop).54
9565862579Moore's LawGordon Moore accurately predicted that the number of transistors that could fit on a chip would roughly double every one to two years.55
9565862580scalabilityHow well do algorithms perform at increasingly larger scales.56
9565862582sequential searchA linear search method of finding a targeted value within a list, looking one at a time until a match is found.57
9565862583binary searchA method of searching by dividing the search interval in half each time.58
9565862584logarithmic behaviorDoubling the size of a problem only requires one extra unit of work.59
9565862585brute forcingTrial and error method used to decode encrypted data such as passwords.60
9565862586heuristicsA method for deriving an approximate solution - Rules of Thumb but not guaranteed an accurately correct answer.61
9565862587distributed computingComputers that interact with each other in order to achieve a common goal.62
9565862588BotnetsA network of private computers infected with a malicious software and controlled as a group without the owners knowing.63

Need Help?

We hope your visit has been a productive one. If you're having any problems, or would like to give some feedback, we'd love to hear from you.

For general help, questions, and suggestions, try our dedicated support forums.

If you need to contact the Course-Notes.Org web experience team, please use our contact form.

Need Notes?

While we strive to provide the most comprehensive notes for as many high school textbooks as possible, there are certainly going to be some that we miss. Drop us a note and let us know which textbooks you need. Be sure to include which edition of the textbook you are using! If we see enough demand, we'll do whatever we can to get those notes up on the site for you!