Ap Computer Science Principles Review Flashcards
The Internet
A collection of networks or network of networks, hierarchical, redundant
End-to-end architecture
In a network, the end nodes (server and client) provide the functionalities. The routers, etc. (intermediaries) only move the bits.
Devices
A thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment
Network(s)
A group of connected devices connected by cable, wi-fi, or satellite
Internet Protocol (IP)
Set of rules governing format of data sent over the Internet.
Domain Name System (DNS)
The protocol for translating between domain names and IP addresses (converts web addresses into IP addresses)
IP address(es)
A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network. Hierarchial
IPv6
New IP address system, will provide 2^128 (about an undecillion) addresses. 128 bits for each address
IPv4
Old IP address system, 2^32 addresses (about 4 billion)
HTTP/HTTPS
Hypertext Transfer Protocol. A conventional set of communication rules for controlling how Web browsers and servers pass information back and forth over the Internet.
SMTP
Simple Mail Transfer Protocol, protocol for email transmission
IETF
Internet Engineering Task Force, group of volunteers, defines standard Internet operating protocols such as TCP/IP.
Hierarchy
Arranged in an order. Examples: IPv4-Domain, sub-domain, host; DNS-root domain, domain, subdomain; the Internet is hierarcial
Redundancy
Duplication of critical components in case some part goes down. Example: the Internet has many paths between networks
Routing
Routers send packets (~1500 bytes) as they see fit.
Reliability
The extent to which we can depend on something to work
Protocols (include TCP/IP)
A well known set of rules or procedures
Interfaces
shared boundary over which information is shared
Open Standards
standards made available to the general public, non-proprietary protocols or specifications
Packet Switching
group data into packets for transmission
TCP/IP
Basic communication protocol of the Internet
Browser
software for presenting Web content (Chrome, Internet Explorer, etc.)
SSL/TLS
Cryptographic protocols for communications security
Bandwidth
The amount of data that can be transmitted in a fixed amount of time
Latency
How much time it takes for a packet to get from one point to another point
Trust model
used to determine security strength of your data in the cloud for example
Cybersecurity
protecting networks, computers, etc. from attack
Cyber warfare
the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
cybercrime
criminal activities carried out by means of computers or the Internet.
DDoS
Distributed Denial of Service, multiple systems flood the bandwidth causing it to run extremely slow or completely shut down
Phishing
sending fraudulent emails in order to induce individuals to reveal information
Viruses
malicious software program that replicates
Antivirus software
detect, prevent, remove viruses
Firewall
software that blocks unauthorized access
Cryptography
a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Examples: Caesar's, Vigenere's, One Time pads
Symmetric Encryption
private key, uses a singular encryption key (Caesar's, Vigenere's, One Time pads)
Asymmetric Encryption
Modern public key encryption, makes online secure transactions possible
Certificate Authorities
Who you purchase digital certificates from
Digital Certificates
Verifies that a user sending a message is who he or she claims to be
Computing Innovations
Technology the adds to previously existing technology in order to improve it
messages distributed by electronic means from one computer user to one or more recipients via a network.
Cloud computing
use of remote servers to store, manage, and process data
Dissemination
spreading information
Public data
Data available to anyone
GPS
Global positioning system, a radio navigation system that allows land, sea, and airborne users to determine their exact location, velocity, and time 24 hours a day, in all weather conditions, anywhere in the world
Sensor Networks
networks of sensors to monitor physical or environmental conditions
"smart"
performs many of the functions of a computer, typically having a touchscreen interface, Internet access, and an operating system capable of running downloaded applications
Assistive technology
Assistive, adaptive, rehabilitative devices for people with disabilites
Internet vs WWW
Internet is a collection of networks, WWW is a collection of HTML documents
e-commerce
commercial transactions conducted electronically on the Internet
Citizen science
involving the public in scientific research
Distributed Solutions
A distributed approach to computing systems
Human-Based Computation
a computer science technique in which a machine performs its function by outsourcing certain steps to humans, usually as microwork
Crowdsourcing
obtaining information by enlisting the service of a large group of people
Mobile computing
Transmission of data without needing a physical link
Machine learning
computers with the ability to learn
Data mining
examining large databases in order to generate new information
Scientific computing
advanced computing capabilities to solve complex problems
Open access; creative commons
availability to all
Moore's law
processing power seems to double every two years
authenticated
credentials are checked
download
copy (data) from one computer system to another, typically over the Internet
streaming
a method of transmitting or receiving data (especially video and audio material) over a computer network as a steady, continuous flow, allowing playback to proceed while subsequent data is being received
peer-to-peer networks
a network of computers configured to allow file sharing
Internet censorship
the control or suppression of what can be accessed, published, or viewed on the Internet enacted by regulators, or on their own initiative
open source software
copyright holder provides the rights to study, change, and distribute software
Data aggregation
any process in which information is gathered and expressed in a summary form, for purposes such as statistical analysis. A common aggregation purpose is to get more information about particular groups based on specific variables such as age, profession, or income.
Proxy servers
software that acts as an intermediary between a computer and another server
Target advertising
Like what we experience when we surf the web
copyright
the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same
Digital Millennium Copyright Act
a 1998 US law intended to update copyright law for electronic commerce and electronic content providers. It criminalizes the circumvention of electronic and digital copyright protection systems
Digital divide
the gulf between those who have ready access to Internet and those who don't
socioeconomic
social and economic factors that affect a person's abilities to "get ahead"
infrastructure
the basic physical and organizational structures and facilities (e.g., buildings, roads, and power supplies) needed for the operation of a society or enterprise
commercial
activities of business, industry, and trade
creative development
The process of developing creative abilities through exploration, decision making, and expression
computational artifact
anything created by a human using a computer. An artifact can be, but is not limited to, a program, image, audio, video, presentation, or web page file
Computing tools/techniques
A program used for software development or system maintenance. Virtually any program or utility that helps programmers or users develop applications or maintain their computers can be called a tool
abstraction
suppressing the more complex details below the current level
digital data
data stored fundamentally as bits
bit
basic unit of information, 1 & 0, on & off
number bases
binary, decimal, hexadecimal, etc.
binary sequences
0s and 1s, example: 1101=13
programming languages
a formal computer language designed to communicate instructions to a machine, particularly a computer; high and low levels
real numbers (floating-point)
representation of decimals
software
the programs and other operating information used by a computer
Levels of abstractions
Internet languages, blocks that call blocks, high level programming languages vs low level programming languages
low level programming languages
machine language, assembly language
high level programming languages
Java, JavaScript, Snap, Python
Binary data
two possible states: 0, 1
Boolean function
functions that report true or false
logic gate
an "or" or "and" gate
chip (as an abstraction)
small piece of semi-conducting material
hardware
physical components of computers
Data vs Information
Information provides context for data
iterative
involving repetition; looping
Filter
remove redundant or unwanted information
clustering
grouping similar information
data classification
organizing data into categories
patterns
finding links between variables
visualization(s)
data in a graphical format examples: Baby Name Voyager, Gap Minder
Extract(ing)
retrieving data from data sources
trend
a pattern; trend analysis is attempting to spot a pattern
search tools
search engines like Google, subject directions
Filter systems (filter tools)
used to extract a subset of data
metadata
data about data; example: memory size of an image
data file formats
how the bits are encoded; .jpg, . xml, .png
lossless data compression
original data can be perfectly reconstructred like zip files
storage media
USBs, solid state hard drives, dvds, etc.
privacy concerns
the concern that your information is being seen even when you don't want it to be
security concerns
the concern that your devices aren't safe and secure and your information could be compromised
Algorithm
sequence of actions to be performed
sequencing
creating the order of actions
boolean condition
compare two values and report true or false
selection
a decision; if, if-else
iteration
repetition/looping
run time
time required to execute
pseudo code
informal description of algorithm
domain
in www.bhbl.org bhbl is the domain
natural language
English, French, German, etc.
solvable problem
can be solved with an algorithm
unsolvable problem
one that can't be solved
undecidable problem
a decision problem that an algorithm can't solve
empirical analysis
analyzing data from experiments or observation
linear search
check every element, slow, works on any list
programming
the action or process of writing computer programs
iterative process
repeating a process in order to reach a goal
sequential execution
executed in order
executable
a program that performs tasks
procedure
a method or, in Snap, a block
parameters
input variables
data abstraction
creating a data type that hides the details of the data representation
strings
sequence of characters
substring
part of a sequence of characters
concatenation
putting strings together (join block)
floating-point numbers
decimals (with precision issues)
lists
ordered collections
Application Program Interfaces (API's); libraries
Example: Google Maps API lets developers embed maps on web pages
Debugging
identify and remove errors from computer hardware or software
Functionality
the range of functions of an electronic system
program documentation
comments
variables
a value that can change
Simulation benefits
nothing physical must be built, other factors can be incorporated, new alternatives may be considered based on results, usable results are produced
logical concepts
and, or, not
Boolean algebra
the values of the variables are true, false
execution
performing the instructions of a program
process(es)
an instance of a program that is getting executed
syntax
spelling and grammar of a computer language
logic
if, if-else, and, or, not
Heuristic solution
solutions close to to the real solution (approximate)
Analog data
A continuous representation of data
Bit Rate
the number of bits that are conveyed or processed per unit of time. e.g. 8 bits/sec.
Compression ratio
A ratio such as 5:1 that indicates the ratio of compression that has been applied to a file. High compression ratios such as 35:1 indicate more compression so data can be contained in smaller files.Summarizes the reduction in size of a file. Can be expressed two different ways, as follows. If more than 1, the compression ratio tells how many times bigger the original file is. If less than 1, the compression ratio tells the percentage by which the original file size has been reduced. A compressed data divided by original data
Cookies
Small text files that are sent to your computer from certain websites. They track your behaviour and transactions.A small text file placed on your computer when you visit a Web page. Used to remember you or your preferences when you revisit that page or to track your browsing activities, cookies facilitate virtual shopping carts, page customization, and targeted advertising. They are not programs and cannot read your hard drive or cause damage to your computer.
Creative Commons License
is used when an author wants to give people the right to share, use, and build upon a work that he has created.
Data encryption
What process secures a wireless network by protecting data packets being transmitted?scrambling the data in a message in a systematic way in order to prevent competitors from electronically monitoring confidential data transmission
Domain internet vs Sub domain (second, third, fourth,, level domains)
For instance, http:// sub.example.comhttp is the protocolsub.example is second level domaincom is top level domain
Encryption
Process of converting readable data into unreadable characters to prevent unauthorized access.
Heuristic
a problem solving approach (algorithm) to find a satisfactory solution where finding an optimal or exact solution is impractical or impossible.
For loop
An iteration structure that repeats one or more statements a specified number of times
High level programming
Provides strong abstraction from the hardware and allows a program to be written in a language that can run on multiple types of computers.Visual by humans.Visual Basics, Python, Java.English type language for programming.Differentiates the language from assembly language and binary which are technically also programming languages
HTTP
Hypertext Transfer Protocolis the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web. As soon as a Web user opens their Web browser, the user is indirectly making use of HTTP. HTTP is an application protocol that runs on top of the TCP/IP suite of protocols (the foundation protocols for the Internet).
ISP
Internet Service Provider
Iterative
A process that repeats a series of steps over and over until the desired outcome is obtained.
JPEG
(Joint Photographic Experts Group) The type of image file used most commonly by photographers.
Lossless Compression
a data compression algorithm that allows the original data to be perfectly reconstructed from the compressed data.
lossy compression
a process of reducing a file's size by altering and/or eliminating some pixels
Malware
Malicious software created specifically for the purpose of infiltrating or damaging a computer system without the user's knowledge or consent includes a variety of technologies, including viruses, Trojan horses, worms, spyware, and adware
Net Neutrality
The principle that Internet service providers should enable access to all content and applications regardless of the source, and without favoring or blocking particular products or websites.
Network Redundancy
having multiple backups to ensure reliability during cases of high usage or failure. Router - A type of computer that forwards data across a network. Redundant routing is impossible if there is only one possible path from one device to another.
Packets
Small chunks of information that have been carefully formed from larger chunks of information.
PNG
Portable Network GraphicsThis supports advanced transparency, has a relatively average file size, and can be interlaced, optimizing for internet use.A raster file that supports transparency and is best used for line art, logos, photographs and web but is not suitable for print.
Public Key Encryption
technique that uses a paired public and private key (or asymmetric key) algorithm for secure data communication.
RGB
and blue light are added together in various ways to reproduce a broad array of colors. The name of the model comes from the initials of the three additive primary colors, red(0-255), green(0-255), and blue(0-255).
Scalabilty
Google's track record of maintaining excellent performance while dramatically increasing the number of simultaneous users accessing its systems best exemplifies what network/system attribute?
Server
A computer that awaits and responds to requests for data.
Spoofing
When someone pretends to be someone else with the intent of obtaining unauthorized data.
SSL
____ is a method of encrypting TCP/IP transmissions above the network layer.
TCP
Transmission Control Protocol
Trojan horse
What is the program that appears to be a legitimate application, utility, game, or screensaver and that performs malicious activities surreptitiously?masquerades as beneficial program while quietly destroying/damaging your system