click below
click below
Normal Size Small Size show me how
AP CompSci Review
Around The World Vocab Game
| Definition | Term |
|---|---|
| Distributed Denial-of-Service (DDoS) Attack | an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. |
| Abstraction | The process of removing or suppressing details to create a manageable level of complexity. |
| Parameters | A variable that defines a procedure or sets the conditions of an operation (example: REPEAT n times). |
| Bits | The foundational to digital computing (1's and 0's) - short for binary digits |
| Bit string | A sequence of bits that can be used to represent sets or to manipulate binary data. |
| Debugging | Locating and correcting errors in a program. |
| Lossless data compression | Compression that has occurred with no loss of information so when decompression occurs, no data is ever lost if reverting back. |
| Lossy compression | Irreversible compression that uses a more aggressive compression ratio through approximations resulting in partial data loss. |
| Innovation | The process of imagining something that does not yet exist, but that has potential value, and making it real through the application of design, implementation, and production. |
| Cloud computing | Storing, accessing and processing data using remote servers over a network rather than a local server or computer. |
| Metadata | Descriptive data about an image, a web page, or other complex objects (data about data). |
| Data abstraction | Focusing on important details and characteristics and filtering out the unwanted details or explanations. A means of separating behavior from implementation. |
| Bandwidth | A measure of bit rate of a system or data measured in bits) that can be sent in a fixed amount of time over a system. |
| Streaming | The transmission and receiving of data (such as a video or music) over a network using a continuous, steady flow where a user can access before the entire file is downloaded. |
| ReCAPTCHA | A digital tool used to deter automated form-filling and exploitation of web-based registration systems. |
| Crowdsourcing | Obtaining information from a large number of people, either paid or unpaid, voluntary or involuntary. |
| Algorithm | A process or set of rules to be followed in calculations or other problems solving operations |
| Security breach | Unauthorized access of data, applications, services, networks and/or devices by bypassing underlying security mechanisms. |
| Caesar cipher | Also called substitution cipher. Substitutes each letter of the original, unencrypted message (plaintext)with a corresponding letter in the encrypted message |
| Condition (Boolean) | A statement that has a particular outcome or result that is either true or false |