click below
click below
Normal Size Small Size show me how
AP CompSci Review
Around The World Vocab Game
Definition | Term |
---|---|
Distributed Denial-of-Service (DDoS) Attack | an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. |
Abstraction | The process of removing or suppressing details to create a manageable level of complexity. |
Parameters | A variable that defines a procedure or sets the conditions of an operation (example: REPEAT n times). |
Bits | The foundational to digital computing (1's and 0's) - short for binary digits |
Bit string | A sequence of bits that can be used to represent sets or to manipulate binary data. |
Debugging | Locating and correcting errors in a program. |
Lossless data compression | Compression that has occurred with no loss of information so when decompression occurs, no data is ever lost if reverting back. |
Lossy compression | Irreversible compression that uses a more aggressive compression ratio through approximations resulting in partial data loss. |
Innovation | The process of imagining something that does not yet exist, but that has potential value, and making it real through the application of design, implementation, and production. |
Cloud computing | Storing, accessing and processing data using remote servers over a network rather than a local server or computer. |
Metadata | Descriptive data about an image, a web page, or other complex objects (data about data). |
Data abstraction | Focusing on important details and characteristics and filtering out the unwanted details or explanations. A means of separating behavior from implementation. |
Bandwidth | A measure of bit rate of a system or data measured in bits) that can be sent in a fixed amount of time over a system. |
Streaming | The transmission and receiving of data (such as a video or music) over a network using a continuous, steady flow where a user can access before the entire file is downloaded. |
ReCAPTCHA | A digital tool used to deter automated form-filling and exploitation of web-based registration systems. |
Crowdsourcing | Obtaining information from a large number of people, either paid or unpaid, voluntary or involuntary. |
Algorithm | A process or set of rules to be followed in calculations or other problems solving operations |
Security breach | Unauthorized access of data, applications, services, networks and/or devices by bypassing underlying security mechanisms. |
Caesar cipher | Also called substitution cipher. Substitutes each letter of the original, unencrypted message (plaintext)with a corresponding letter in the encrypted message |
Condition (Boolean) | A statement that has a particular outcome or result that is either true or false |