AP CSP Unit 1 Flashcards
Terms : Hide Images [1]
9565862524 | innovation(s) | The process of imagining something that does not yet exist, but that has potential value, and making it real through the application of design, implementation, and production. | 0 | |
9565862525 | security breach | Unauthorized access of data, applications, services, networks and/or devices by bypassing underlying security mechanisms. | 1 | |
9565862526 | algorithm | A process or set of rules to be followed in calculations or other problems solving operations | 2 | |
9565862527 | flow patterns | Patterns that can emerge when data is transformed using computational tools | 3 | |
9565862528 | sequencing | To do things in order, one after another. Executing the statement one at a time, often called linear | 4 | |
9565862529 | iteration | Repetition. One complete step of a loop, repeated until a certain condition is met | 5 | |
9565862530 | selection | Uses "if...then" to tell computer how to select a step or to tell the sequence that should be executed | 6 | |
9565862531 | condition (Boolean) | A statement that has a particular outcome or result that is either true or false | 7 | |
9565862532 | loop | The repetition of some code. | 8 | |
9565862533 | indefinite Loops | When it is unknown how many times a loop will iterate, usually we are waiting for an event to occur such as "repeat until...." | 9 | |
9565862534 | definite Loops | Executes a predetermined set of times for a loop to be repeated | 10 | |
9565862535 | flowchart | A simple diagram with symbols showing the "flow" of a process | 11 | |
9565862536 | imperative statement | A command statement with a verb phrase that indicates an operation to perform (example: "move forward") | 12 | |
9565862537 | descriptive qualifier | A specific adverb or adjective that further qualifies or limits the meaning of a word (example: left shoe) | 13 | |
9565862538 | cryptography | Securing (or encrypting) information such that it is inaccessible by third parties. | 14 | |
9565862539 | plaintext | Text that is not written in code such as an unencrypted message. | 15 | |
9565862540 | ciphertext | The result of encryption performed on plaintext using an algorithm or cipher. | 16 | |
9565862541 | Caesar cipher | Also called substitution cipher. Substitutes each letter of the original, unencrypted message (plaintext)with a corresponding letter in the encrypted message(ciphertext) | 17 | |
9565862542 | Vigenere cipher | More sophisticated algorithms used to improve encryption from Caesar Cipher by adding a key phrase | 18 | |
9565862543 | cybersecurity | Measures taken to protect a computer or computer system against unauthorized access or attack | 19 | |
9565862544 | CIA Triad | Confidentiality, Integrity, Availability | 20 | |
9565862545 | confidentiality | The ability to limit access to information to a certain set of users | 21 | |
9565862546 | integrity | The certainty that information is accurate | 22 | |
9565862547 | availability | The reliability of access to information | 23 | |
9565862548 | authentication | The process of determining whether someone or something is who or what they claim to be. | 24 | |
9565862549 | Secure Sockets Layer (SSL) | Secure Sockets Layer, typically indicated with padlock icon in address bar | 25 | |
9565862550 | digital certificate | Validates the ownership of encrypted keys used in secured communications and are based on a trust model. | 26 | |
9565862551 | Distributed Denial-of-Service (DDoS) Attack | Distributed Denial of Service - an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. | 27 | |
9565862552 | firewall | Part of a computer system or network that is designed to block unauthorized access while permitting outward communication. | 28 | |
9565862553 | public key encryption | A non-symmetric encryption method that uses a paired public and private (asymmetric) key algorithm. | 29 | |
9565862554 | viruses | Code that is capable of copying itself and corrupting a system or destroying data. | 30 | |
9565862555 | symmetric encryption | A method of encryption involving one key for encryption and decryption. | 31 | |
9565862556 | social engineering | The psychological manipulation of people into performing actions or divulging confidential information | 32 | |
9565862557 | phishing | Obtaining confidential information by masquerading as an "official" person, site, or entity. A form of social engineering | 33 | |
9565862558 | malware | Software that is intended to damage or disable computers and computer systems. | 34 | |
9565862559 | ambiguity | Uncertainty or being open to more than one interpretation. | 35 | |
9565862560 | natural language | A complex, but structured language, both written and spoken, that has evolved naturally in humans through use, repetition and adaptation. | 36 | |
9565862561 | artificial language | A limited size language, usually developed by a small group for specific purposes, usually much simpler and structured. | 37 | |
9565862562 | visual programming language | A programming language that lets users drag and drop icons into organized blocks of code to create programs rather then typing text. | 38 | |
9565862563 | high-level language | A programming language that is is easier for humans to read, write and parse. Guaranteed to be unambiguous. | 39 | |
9565862564 | low-level language | A programming language that has little or no abstraction and communicates closely to the hardware using assembly or machine language. Less natural for humans. | 40 | |
9565862565 | source code | Programs that programmers write in high-level languages | 41 | |
9565862566 | machine code | Machine-level instructions that are uniquely read by computer processors using patterns of 1's and 0's. | 42 | |
9565862567 | compilation | Source code that has been translated into machine code. | 43 | |
9565862568 | compiler | A program that translates high-level, human-readable languages into a corresponding string of 1's and 0's for computer processing. | 44 | |
9565862569 | hardware | Physical components of a computer built using multiple levels of abstraction such as transistors, logic gates, chips, memory, motherboard, special purpose cards, and storage devices. | 45 | |
9565862570 | RAM | Random-access memory consists of tiny electrical circuits that dynamically store frequently used program instruction to increase speed of the system (volatile). | 46 | |
9565862571 | secondary storage | External/auxiliary memory such as a USB flash drive, hard drive, etc. | 47 | |
9565862572 | primary storage | Main storage or memory that stores data for quick access by the computer's processor (RAM) | 48 | |
9565862573 | Central Processing Unit | CPU - the processor or brains of the computer where calculations take place | 49 | |
9565862574 | pseudocode | An informal method or writing algorithmic instructions that do not necessarily follow grammatical rules and syntax of a particular language. | 50 | |
9565862575 | sequential execution | Program instructions are executed one at a time, in order. | 51 | |
9565862576 | undecidable problem | Where no algorithm can be made that always leads to a correct yes or no answer. | 52 | |
9565862577 | unsolvable problem | A problem that cannot be solved using any algorithm. | 53 | |
9565862578 | Halting Problem | There cannot be a program that will determine which computer programs will halt (or exit) and which programs will go on forever (infinite loop). | 54 | |
9565862579 | Moore's Law | Gordon Moore accurately predicted that the number of transistors that could fit on a chip would roughly double every one to two years. | 55 | |
9565862580 | scalability | How well do algorithms perform at increasingly larger scales. | 56 | |
9565862582 | sequential search | A linear search method of finding a targeted value within a list, looking one at a time until a match is found. | 57 | |
9565862583 | binary search | A method of searching by dividing the search interval in half each time. | 58 | |
9565862584 | logarithmic behavior | Doubling the size of a problem only requires one extra unit of work. | 59 | |
9565862585 | brute forcing | Trial and error method used to decode encrypted data such as passwords. | 60 | |
9565862586 | heuristics | A method for deriving an approximate solution - Rules of Thumb but not guaranteed an accurately correct answer. | 61 | |
9565862587 | distributed computing | Computers that interact with each other in order to achieve a common goal. | 62 | |
9565862588 | Botnets | A network of private computers infected with a malicious software and controlled as a group without the owners knowing. | 63 |