apcsp midterm Flashcards

1
Q

digital divide

A

the disparity between those with access to digital technologies and those without
-the “digital divide” refers to differing access to computing devices and the
internet, based on socioeconomic, geographic, or demographic
characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

crowdsourcing

A

the practice of obtaining input or information from a large number of people via the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

citizen science

A

scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

creative commons

A

a public copyright license that enables the free distribution of an otherwise copyrighted work. this is used when the content creator wants to give others the right to share, use, and build upon the work they have created

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

personally identifiable information (PII)

A

information about an
individual that identifies, links, relates, or describes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

multifactor authentication

A

a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism, typically in at least two of the
following categories: knowledge (something they know), possession (something they have), and inherence (something they are)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

encryption

A

the process of encoding data to prevent unauthorized access. decryption is the process of decoding the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

computer virus

A

a malicious program that can copy itself and gain access to a computer in an unauthorized way; they often attach themselves to legitimate programs and start running independently on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

phishing

A

technique that attempts to trick a user into providing person information that can then be used to access sensitive online resources, such as bank accounts and emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

beneficial effects of computing

A

-advances in computing have generated and increased creativity in other fields, such as medicine, engineering, communications, and
the arts
-rapid sharing of a program or running a program with a large number
of users can result in significant impacts beyond the intended
purpose or control of the programmer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

harmful effects of computing

A

-targeted advertising is used to help businesses, but it can be misused at both individual and aggregate levels.
-machine learning and data mining have enabled innovation in medicine, business, and science, but information discovered in this way has also been used to discriminate against groups of individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

legal and ethical concerns of computing

A

-development of software that allows access to digital media downloads and streaming
-the development of algorithms that include bias
-the existence of computing devices that collect and analyze data by continuously monitoring activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

define a function

A

teach the computer a new command and explain what it should do when receiving that command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

call a function

A

actually gives the command, so the computer will run the code for that function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

decomposition

A

breaking your program into smaller parts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

comment

A

a message in your code that explains what is going on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

abstraction

A

managing complexity by taking away information and detail, in order to focus on the relevant concepts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

documentation

A

written instruction detailing the functions, methods, and variables available and how to use them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

for loops

A

repeats code a fixed number of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

if statement

A

executes nested code only if condition is true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

if else statement

A

control structure that runs either one section of code or another depending on a test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

while loop

A

repeat code as long as something is true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

bug

A

a problem in the code

24
Q

debugging

A

fixing a problem in the code

25
algorithim
a set of steps or rules to follow to solve a particular problem
26
sequencing
step by step execution of instructions in the order they are given
27
iteration
repetition of instructions a specified number of times, or until a condition is met
28
selection
using a condition to determine which part of an algorithm is executed
29
program
a collection of program statements that performs a specific task when run by a computer. it is often referred to as a software
30
program inputs
date sent to a computer for processing by a program
31
program outputs
data sent from a program to a device
32
syntax error
a mistake in the program where the rules of the programming language are not followed
33
logic error
a mistake in the algorithm or program that causes it to behave incorrectly or unexpectedly
34
computing innovations
the creation and development of new technologies, systems, or applications that improve or revolutionize the way we use computers
35
bias in computing
computing innovations can reflect existing human biases because of biases written into the algorithms or biases in the data used by the innovation -biases can be embedded at all levels of software development
36
effective collaborative teams
emphasizes the importance of teamwork and effective communication in solving complex problems and creating computational artifacts. it involves working with others to share ideas, divide tasks, and enhance project quality through diverse perspectives -no bias
37
bandwith
the capacity to transmit a fixed number of bits in a given time frame (measured in mbps)
38
computer network
an interconnected group of computing devices working together towards a shared goal
39
redundancy
a measure put in place to ensure uninterrupted network services in case of connection failures
40
fault tolerance
the capability to manage issues that arise within the network
41
computing device
a physical artifact capable of running a program
42
protocol
the established rules governing the connection and communication of computing devices on the internet
43
scalability
the ability to expand network infrastructure without the need for rewiring
44
sequential computing
processing data one instruction at a time
45
parallel computing
processing data by having multiple processors work on a task simultaneously
46
distributed computing
processing data by distributing tasks across multiple networks or servers
47
speed up time
the measurement of how much faster a task can be completed by using a parallel processing approach compared to a sequential approach
48
packets
units of binary information derived from digital data
49
fault tolerance concept
the internet is fault tolerant- it had the ability to handle issues that arise in the network -if a server, router, or tower goes offline, there are different paths your data packets can take, making it a reliable service. -this redundancy makes the Internet more reliable and also helps the Internet grow to scale, accommodating new devices as they are connected to the system
50
the internet
the internet works by connecting networks through routers which directs packets to their intended destination, which then allows for communication with each other and the access of information
51
the world wide web
-a system comprising linked pages, programs, and files -a way to share documents and information with pictures and links -made the internet easy to use and understand for everyone, not just tech experts -what we often think of as the "internet"
52
sequential, parallel, and distributed computing
sequential: operations are performed in order one at a time distributed: multiple devices are used to run a program parallel: operations are performed in smaller, sequential, and simultaneously
53
TCP, IP, HTTP
TCP/IP (transmission control protocol/internet protocol): main building blocks of the internet; they help computers find each other and make sure data gets delivered correctly HTTP (hypertext transfer protocol): protocol for your web pages; it's how your computer asks a web server to send a webpage so you can see it in your browser
54
TCP
-transmission control protocol -breaks down the information you wish to send into packets, those packets are then forwarded across the internet, once they are received by the IP address they were sent to, their TCP reassembles the packets in correct order
55
IP
-internet protocol -an IP address is a unique number given to EVERY device when it connects to the internet
56
HTTP
like a set of rules that computers use to communicate with each other on the web. it's the protocol that makes the world wide web work