click below
click below
Normal Size Small Size show me how
AP CSP
AP CSP words to know
Term | Definition |
---|---|
Abstraction | a simplified representation of something more complex. Abstractions allow you to hide details to help you manage complexity, focus on relevant concepts, and reason about problems at a higher level. |
ASCII | American Standard Code for Information Interchange; the universally recognized raw text format that any computer can understand |
Binary | A way of representing information using only two options. |
Bit rate | (sometimes written bitrate) the number of bits that are conveyed or processed per unit of time. e.g. 8 bits/sec. |
Bit | A contraction of "Binary Digit"; the single unit of information in a computer, typically represented as a 0 or 1 |
DNS | short for Domain Name System, this system translates domain names (like example.com) to IP addresses (like 93.184.216.34) |
HTTP | HyperText Transfer Protocol - the protocol used for transmitting web pages over the Internet |
IETF | Internet Engineering Task Force - develops and promotes voluntary Internet standards and protocols, in particular the standards that comprise the Internet protocol suite (TCP/IP). |
Innovation | A new or improved idea, device, product, etc, or the development thereof |
Internet | A group of computers and servers that are connected to each other. |
IP Address | A number assigned to any item that is connected to the Internet. |
Latency | Time it takes for a bit to travel from its sender to its receiver. |
Net Neutrality | the principle that all Internet traffic should be treated equally by Internet Service Providers. |
Network Redundancy | having multiple backups to ensure reliability during cases of high usage or failure |
Packets | Small chunks of information that have been carefully formed from larger chunks of information. |
Protocol | A set of rules governing the exchange or transmission of data between devices. |
Router | A type of computer that forwards data across a network |
TCP | Transmission Control Protocol - provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing. |
URL | An easy-to-remember address for calling a web page (like www.code.org). |
Heuristic | a problem solving approach (algorithm) to find a satisfactory solution where finding an optimal or exact solution is impractical or impossible. |
Hexadecimal | A base-16 number system that uses sixteen distinct symbols 0-9 and A-F to represent numbers from 0 to 15. |
Image | A type of data used for graphics or pictures. |
Lossless Compression | a data compression algorithm that allows the original data to be perfectly reconstructed from the compressed data. |
Lossy Compression | (or irreversible compression) a data compression method that uses inexact approximations, discarding some data to represent the content. Most commonly seen in image formats like .jpg. |
metadata | is data that describes other data. For example, a digital image may include metadata that describe the size of the image, number of colors, or resolution. |
Pixel | short for "picture element", the fundamental unit of a digital image, typically a tiny square or dot that contains a single point of color of a larger image. |
RGB | the RGB color model uses varying intensities of (R)ed, (G)reen, and (B)lue light are added together in to reproduce a broad array of colors. |
Antivirus Software | usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them. |
asymmetric encryption | used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt. |
Big Data | a broad term for datasets so large or complex that traditional data processing applications are inadequate. |
Caesar Cipher | a technique for encryption that shifts the alphabet by some number of characters |
Cipher | the generic term for a technique (or algorithm) that performs encryption |
Computationally Hard | a "hard' problem for a computer is one in which it cannot arrive at a solution in a reasonable amount of time. |
Cracking encryption | When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption. |
DDoS Attack | Distributed Denial of Service Attack. Typically a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed. |
Decryption | a process that reverses encryption, taking a secret message and reproducing the original plain text |
Encryption | a process of encoding messages to keep them secret, so only "authorized" parties can read it. |
Firewall | software that runs on servers (often routers) that only allows traffic through according to some set of security rules. |
modulo | a mathematical operation that returns the remainder after integer division. Example 7 MOD 4 = 3 |
Moore's Law | a predication made by Gordon Moore in 1965 that computing power will double every 1.5-2 years, it has remained more or less true ever since. |
One-pager | A business/corporate term for a one-page document that summarizes a large issue, topic or plan. |
Phishing Scam | a thief trying to trick you into sending them sensitive information. Typically these include emails about system updates asking you send your username and password, social security number or other things. |
Private Key | In an asymmetric encryption scheme the decryption key is kept private and never shared, so only the intended recipient has the ability to decrypt a message that has been encrypted with a public key. |
Public Key Encryption | Used prevalently on the web, It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private. |
Random Substitution Cipher | an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet. |
SSL/TLS | Secure Sockets layer / Transport Layer Security - An encryption layer of HTTP that uses public key cryptography to establish a secure connection. |
Virus | a program that runs on a computer to do something the owner of the computer does not intend. |