Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

AP CSP Vocab

Some flashcards to help study for the AP CSP exam

DefinitionTerm
In a network, the end nodes (server and client) provide the functionalities. The routers, etc. (intermediaries) only move the bits. End-to-End Architecture
A thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment Devices
Set of rules governing format of data sent over the Internet. Internet Protocol (IP)
The protocol for translating between domain names and IP addresses (converts web addresses into IP addresses) Domain Name System (DNS)
A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network. Hierarchial IP address(es)
New IP address system, will provide 2^128 (about an undecillion) addresses. 128 bits for each address IPv6
Old IP address system, 2^32 addresses (about 4 billion) IPv4
Hypertext Transfer Protocol. A conventional set of communication rules for controlling how Web browsers and servers pass information back and forth over the Internet. HTTP/HTTPS
Simple Mail Transfer Protocol, protocol for email transmission SMTP
Internet Engineering Task Force, group of volunteers, defines standard Internet operating protocols such as TCP/IP. IETF
Arranged in an order. Examples: IPv4-Domain, sub-domain, host; DNS-root domain, domain, subdomain; the Internet is hierarcial Hierarchy
Duplication of critical components in case some part goes down. Example: the Internet has many paths between networks Redundancy
Routers send packets (~1500 bytes) as they see fit. Routing
A well known set of rules or procedures Protocols (include TCP/IP)
shared boundary over which information is shared Interfaces
standards made available to the general public, non-proprietary protocols or specifications Open Standards
group data into packets for transmission Packet Switching
Basic communication protocol of the Internet TCP/IP
Cryptographic protocols for communications security SSL/TLS
The amount of data that can be transmitted in a fixed amount of time Bandwidth
How much time it takes for a packet to get from one point to another point Latency
used to determine security strength of your data in the cloud for example Trust model
protecting networks, computers, etc. from attack Cybersecurity
the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes. Cyber warfare
criminal activities carried out by means of computers or the Internet. cybercrime
Distributed Denial of Service, multiple systems flood the bandwidth causing it to run extremely slow or completely shut down DDoS
software that blocks unauthorized access Firewall
a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Examples: Caesar's, Vigenere's, One Time pads Cryptography
private key, uses a singular encryption key (Caesar's, Vigenere's, One Time pads) Symmetric Encryption
Modern public key encryption, makes online secure transactions possible Asymmetric Encryption
Who you purchase digital certificates from Certificate Authorities
Verifies that a user sending a message is who he or she claims to be Digital Certificates
Technology the adds to previously existing technology in order to improve it Computing Innovations
messages distributed by electronic means from one computer user to one or more recipients via a network. Email
use of remote servers to store, manage, and process data Cloud computing
spreading information Dissemination
Data available to anyone Public data
Global positioning system, a radio navigation system that allows land, sea, and airborne users to determine their exact location, velocity, and time 24 hours a day, in all weather conditions, anywhere in the world GPS
networks of sensors to monitor physical or environmental conditions Sensor Networks
performs many of the functions of a computer, typically having a touchscreen interface, Internet access, and an operating system capable of running downloaded applications "smart"
Assistive, adaptive, rehabilitative devices for people with disabilites Assistive technology
Internet is a collection of networks, WWW is a collection of HTML documents Internet vs WWW
commercial transactions conducted electronically on the Internet e-commerce
involving the public in scientific research Citizen science
A distributed approach to computing systems Distributed Solutions
a computer science technique in which a machine performs its function by outsourcing certain steps to humans, usually as microwork Human-Based Computation
Transmission of data without needing a physical link Mobile computing
obtaining information by enlisting the service of a large group of people Crowdsourcing
computers with the ability to learn Machine learning
examining large databases in order to generate new information Data mining
advanced computing capabilities to solve complex problems Scientific computing
availability to all Open access; creative commons
processing power seems to double every two years Moore's law
credentials are checked authenticated
copy (data) from one computer system to another, typically over the Internet download
a method of transmitting or receiving data (especially video and audio material) over a computer network as a steady, continuous flow, allowing playback to proceed while subsequent data is being received streaming
a network of computers configured to allow file sharing peer-to-peer networks
the control or suppression of what can be accessed, published, or viewed on the Internet enacted by regulators, or on their own initiative Internet censorship
copyright holder provides the rights to study, change, and distribute software open source software
any process in which information is gathered and expressed in a summary form, for purposes such as statistical analysis. A common aggregation purpose is to get more information about particular groups based on specific variables. Data aggregation
software that acts as an intermediary between a computer and another server Proxy servers
Advertisement based on data from other websites and such. Target advertising
the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same copyright
a 1998 US law intended to update copyright law for electronic commerce and electronic content providers. It criminalizes the circumvention of electronic and digital copyright protection systems Digital Millennium Copyright Act
the gulf between those who have ready access to Internet and those who don't Digital divide
social and economic factors that affect a person's abilities to "get ahead" socioeconomic
the basic physical and organizational structures and facilities (e.g., buildings, roads, and power supplies) needed for the operation of a society or enterprise infrastructure
The process of developing creative abilities through exploration, decision making, and expression creative development
anything created by a human using a computer. An artifact can be, but is not limited to, a program, image, audio, video, presentation, or web page file computational artifact
A program used for software development or system maintenance. Virtually any program or utility that helps programmers or users develop applications or maintain their computers can be called a tool Computing tools/techniques
suppressing the more complex details below the current level abstraction
data stored fundamentally as bits digital data
basic unit of information, 1 & 0, on & off bit
binary, decimal, hexadecimal, etc. number bases
0s and 1s, example: 1101=13 binary sequences
a formal computer language designed to communicate instructions to a machine, particularly a computer; high and low levels programming languages
representation of decimals real numbers (floating-point)
Created by: Ziploc
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards