AP CSP vocab and crap Flashcards

1
Q

a heuristic process may include running tests and getting results by

A

trial and error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the goal of heuristics is to develop a simple process that generates … (or …) results in an …

A

accurate; approximate; acceptable amount of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

digital certificate is the same thing as

A

public key certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a digital certificate is an electronic … that allows a person, computer, or organization to exchange information securely over the Internet using the

A

public key infrastructure (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a digital certificate provides …., is … resistant and can be … because it was issued by an …, … agency
contains the name of the certificate holder, a … number, … dates, a copy of the certificate holder’s … and the … of the certificate-issuing authority

A

identifying information; forgery; verified; official, trusted; serial; expiration; public key; digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

append: to add at the

A

end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DNS Subdomain: hostname that belongs to your domain

e.g.

A

about.example.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

selection: a generic term for a type of programming statement (usually an if-statement) that uses a … condition to determine/select whether or not to run a …

A

Boolean; certain block of statements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

iterate: to … in order to achieve, or get closer to, a desired goal

A

repeat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

bitmap: an array of … representing the values of … in an image/display

A

binary data; pixels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

floating-point number:

A

a real number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

statement: directs the computer to perform a …

A

specified action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

expression: a group of …. that represent a

A

symbols; value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

procedure: a set of coded instructions that tell a computer how to

A

run a program/calculation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

protocols: a set of rules governing the … or … of data between devices

A

exchange; transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

stepwise refinement: a top-down process in which the programmer starts with the … of the program and continually … into …

A

overall goal; breaks down the design; sub-functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

transistor: a device used to amplify its …, a … switch and the fundamental building block of ..

A

electrical input; binary; computer circuitry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

motherboard: holds together the …, … and … for … and … devices

A

CPU; memory; connectors; input; output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

procedural abstraction: … model of what we want a subprogram to do

A

mental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

data abstraction: the reduction of a particular body of data to a

A

simplified representation of the whole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

expression: any valid unit of code that resolves to a

A

value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

network switch: computer networking device that connects … on a … by using packet switching to receive, process, and forward data to the destination device

A

devices together; computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

chip can store … or provide …

A

computer memory; logic circuitry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Open Systems Interconnection (OSI model) is a conceptual model that characterizes and standardizes the … functions of a telecommunication or computing system without regard to its underlying … and …

A

communication; internal structure; technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
privatization is the process of transferring an enterprise or industry from the ... to the ...
public sector; private sector
26
cryptography is the science of ... by transforming it into a secure format. It is used to protect ...
protecting information; digital data
27
virus: a type of malicious software program that, when executed, replicates itself by modifying other ... and inserting its own...
computer programs; code
28
major characteristics of viruses: the ability to ... itself, and the ability to .... to another ...
replicate; attach itself; computer file
29
a computer virus needs another ... in order to be able to be activated and infect other computer files. essentially, a computer virus piggybacks on another file in your computer
program
30
phishing: a thief trying to trick you into sending them ... Typically these include ... about ... asking you to send your ... and ..., ... or other things
sensitive information; emails; system updates; username; password; social security number
31
symmetric encryption: a form of computerized cryptography using a singular ... to guise an ... its data conversion uses a mathematical algorithm along with a ..., which results in the inability to ...
encryption key; electronic message; secret key; make sense out of a message
32
public key encryption: used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, ... It uses an ... in which the encryption key is made ..., but the decryption key is kept ...
a secret key; asymmetric encryption scheme; public; private
33
vigenere cipher: a method of encrypting alphabetic text by using a series of interwoven ... based on the letters of a ...
Caesar ciphers; keyword
34
certificate authority: a trusted entity that issues ... that verify a ... on the Internet essential part of secure communication and play an important part in the public key infrastructure
electronic documents; digital entity's identity
35
trust model of the internet: users must ... if they want them to do anything useful on their computers
trust applications
36
open standards: standards made available to the ... and are developed (or approved) and maintained via a ... and ... driven process
general public; collaborative; consensus
37
distributed denial of service (DDoS) attack: occurs when ... flood the bandwidth/resources of a targeted system, usually one or more ... --> often the result of multiple ...
multiple systems; web servers; compromised systems
38
denial of service (DOS): an interruption in an authorized user's ..., typically one caused with malicious intent
access to a computer network
39
404 error: website's server could not find the ... requested by the user
URL
40
DNS spoofing: a type of computer attack wherein a user is forced to navigate to a ... disguised to look like a real one, with the intention of diverting ... or stealing .. of the users
fake website; traffic; credentials
41
firewall: software that runs on ... (often ...) that only allows traffic through according to some set of ...
servers; routers; security rules
42
DNS: the service that translates ... to ...
URLs; IP addresses
43
sequencing: putting commands in ... so computers can ...
correct order; read the commands
44
network redundancy: having multiple ... to ensure ... during cases of ... or ...
backups; reliability; high usage; failure
45
Internet Engineering Task Force (IETF): develops and promotes ... Internet ... and ... in particular, the standards that comprise the ... (.../...)
voluntary; standards; protocols; Internet protocol suite (TCP/IP)
46
top-level domain: last segment of the domain name, the part that follows immediately after the
dot symbol
47
metadata: data that ... other data. For example, a digital image may include metadata that describe the ... of the image, number of ..., or ....
describes; size; colors; resolution
48
packets: small chunks of information that have been carefully formed from
larger chunks of information
49
packet: contains the ... and ...in addition to the data
destination address; origin address
50
machine learning: a field of computer science that uses ... techniques to give computer systems the ability to ... with data, without being explicitly programmed
statistical; learn
51
low-level programming language provides little/no ... from a computer's instruction set architecture and generally refers to either ... or ...
abstraction; machine code; assembly language
52
high-level language: enables a programmer to write programs that are more or less ... of a particular ... --> closer to ...
independent; type of computer; human languages
53
innovation: a new/improved ..., ..., ..., etc, or the ... thereof
idea; device; product; development
54
binary: a way of representing information using only
two options
55
bit: a contraction of ..., the single unit of information in a computer, typically represented as a ... or ...
binary digit; 0; 1
56
bandwidth: ... measure by ...
transmission capacity; bit rate
57
bit rate: the number of ... that are conveyed or processed per ...
bits; unit of time
58
latency: time it takes for a bit to
travel from its sender to its receiver
59
ASCIII: American Standard Code for Information Interchange; the universally recognized ... that any computer can understand
raw text format
60
internet: a group of ... and ... that are connected to each other
computers; servers
61
net neutrality: the principle that all Internet traffic should be ... by Internet Service Providers
treated equally
62
IP Address: a number assigned to any ... that is connected to the internet
item
63
router: a type of computer that
forwards data across a network
64
Transmission Control Protocol (TCP): provides ..., ..., and ... delivery of a stream of ... on the internet. Tightly linked with ...
reliable; ordered; error-checked; packets; IP
65
HyperText Transfer Protocol (HTTP): the protocol used for ... over the Internet
transmitting web pages
66
URL: an easy-to-remember address for calling a
web page
67
lossless compression: a data compression algorithm that allows the original data to be perfectly
reconstructed from the compressed data
68
pixel: short for picture element, the fundamental unit of a ..., typically a tiny square/dot that contains a single point of color of a larger image
digital image
69
RGB: the RGB color model uses varying intensities of Red, Green, and Blue light that are added together to reproduce a
broad array of colors
70
lossy compression (irreversible compression): a data compression method that uses ..., discarding some data to represent the ... Most commonly seen in image formats like ...
inexact approximations; content; .jpg
71
abstraction: a simplified representation of something more .... allow you to hide details to help you manage ..., focus on ...., and reason about problems at a ...
complex; complexity; relevant concepts; higher level
72
pivot table: name of the tool used to create
summary tables
73
summary table: a table that shows the results of aggregations performed on data from a ..., hence a "..." of larger data
larger data set; summary
74
algorithm: a precise sequence of instructions for processes that can be
executed by a computer
75
turtle programming: a classic method for learning programming with commands to control ... and ... of an on-screen robot called a ..
movement; drawing; turtle
76
function: a named group of ...; reusable ... that reduce the complexity of ... and ... programs
programming instructions; abstractions; writing; maintaining
77
API: a collection of ... made available to a programmer
commands
78
documentation: a description of the behavior of a ..., ..., ..., ....
command; function; library; API
79
library: a collection of .../..., typically with a ... purpose
command; functions; shared
80
parameter: an extra piece of information passed to a function to customize it for a
specific need
81
loop: the action of doing something
over and over again
82
for loop: loops that have a predetermined ..., ..., and ...
beginning; end; increment
83
big data: a broad term of datasets so ... or ... that traditional data processing applications are ...
large; complex; inadequate
84
moore's law: a predication made by Moore in 1965 that computing power will ... every 1.5-2 years, it has remained more or less true
double
85
caesar cipher: a technique for encryption that shifts the alphabet by some
number of characters
86
cracking encryption: when you attempt to decode a secret message without knowing all the ..., you are trying to "crack" the encryption
specifics of the cipher
87
decryption: a process that reverses ..., taking a secret message and reproducing the original plain text
encryption
88
encryption: a process of ... to keep them secret, so only "authorized" parties can read it
encoding messages
89
random substitution cipher: a process of encoding messages to keep them ..., so only ... can read it
secret; authorized parties
90
computationally hard: a hard problem for a computer is one in which it cannot arrive at a ... in a ...
solution; reasonable amount of time
91
assymetric encryption: used in public key encryption, it is scheme in which the key to encrypt data is different from the
key to decrypt
92
modulo: a mathematical operation that returns the
remainder after integer division (MOD)
93
private key: in an assymetric encryption scheme the decryption key is kept ... and never shared, so only the intended recipient has the ability to ... a message that has been encrypted with a public key
secret; decrypt
94
antivirus software: usually keeps big ... of ... and ... your computer looking for the virus programs in order to get rid of them
lists; known viruses; scans
95
SSL/TLS (Secure sockets layer/ transport layer security): an encryption layer of HTTP that uses .... to establish a ...
public key cryptography; secure connection
96
callback function: a function specified as part of an ...; it is written by the ... but called by the ... as the result of an ...
event listener; programmer; system; event trigger
97
event-driven program: a program designed to run blocks of code/functions in response to
specified events
98
event handling: an overarching term for the coding tasks involved in making a program
respond to events by triggering functions
99
event listener: a command that can be set up to trigger a function when a particular type of event occurs on a
particular UI element
100
UI element: ..., like buttons, images, text boxes, pull down menus, screens and so on
on-screen objects
101
User Interface: the ... elements of a program through which a user ... or ... with the application (UI)
visual; controls; communicates
102
debugging: ... and ... problems in an algorithm or program
finding; fixing
103
==
the equality operator
104
global variable: a variable whose scope is ... to the ..., it can be used and updated by ... of the code. Its global scope is typically derived from the variable being declared (created) outside of any function, object, or method
global; program; any part of the code
105
fixed variable: a variable that remains
constant
106
local variable: a variable with local scope is one that can only be seen, used, and updated by code within ... Typically this means the variable was declared inside a ...--includes function ...
the same scope; function; parameter variables
107
variable scope: dictates which portions of the code can "..." or ... a variable, typically derived from where the variable was first
see; use; created
108
concatenate: to ... or ... Typically used when ... in programming
link together; join; joining together text Strings
109
String: any sequence of characters between
quotation marks
110
conditionals: statements that only run under
certain conditions
111
models and simulations: a program which replicates or mimics key features of a real world event in order to investigate its behavior without the ..., ..., or ... of running an experiment in real life
cost; time; danger
112
array: a ... in JavaScript used to represent a ...
data structure; list
113
list: a generic term for a programming data structure that
holds multiple items
114
Key Event: in JavaScript an event triggered by ... or ... a ... on the ...
pressing; releasing; key; keyboard
115
return value: a value sent back by a function to the place in the code where the function was ...- typically asking for ... or the result of a ... or .... of some kind. Most programming languages have many built-in functions that return values, but you can also write your own
called from; value; calculation; computation
116
canvas: a user interface element to use in HTML/JavaScript which acts as a ..., allowing the programmatic ... and manipulation of ..., ...., ... and ...
digital canvas; drawing; pixels; basic shapes; figures; images