AP CSP Unit 1
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
innovation(s) | show 🗑
|
||||
security breach | show 🗑
|
||||
show | A process or set of rules to be followed in calculations or other problems solving operations
🗑
|
||||
flow patterns | show 🗑
|
||||
show | To do things in order, one after another. Executing the statement one at a time, often called linear
🗑
|
||||
show | Repetition. One complete step of a loop, repeated until a certain condition is met
🗑
|
||||
selection | show 🗑
|
||||
show | A statement that has a particular outcome or result that is either true or false
🗑
|
||||
loop | show 🗑
|
||||
indefinite loops | show 🗑
|
||||
show | Executes a predetermined set of times for a loop to be repeated
🗑
|
||||
show | A simple diagram with symbols showing the "flow" of a process
🗑
|
||||
imperative statement | show 🗑
|
||||
show | A specific adverb or adjective that further qualifies or limits the meaning of a word (example: left shoe)
🗑
|
||||
cryptography | show 🗑
|
||||
plaintext | show 🗑
|
||||
ciphertext | show 🗑
|
||||
Caesar cipher | show 🗑
|
||||
Vigenère cipher | show 🗑
|
||||
cybersecurity | show 🗑
|
||||
CIA Triad | show 🗑
|
||||
show | The ability to limit access to information to a certain set of users
🗑
|
||||
integrity | show 🗑
|
||||
show | The reliability of access to information
🗑
|
||||
authentication | show 🗑
|
||||
show | The standard security technology for establishing an encrypted link between a web server and a browser, typically indicated with padlock icon in the address bar.
🗑
|
||||
show | Validates the ownership of encrypted keys used in secured communications and are based on a trust model.
🗑
|
||||
show | an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.
🗑
|
||||
firewall | show 🗑
|
||||
public key encryption | show 🗑
|
||||
show | Code that is capable of copying itself and corrupting a system or destroying data.
🗑
|
||||
show | A method of encryption involving one key for encryption and decryption.
🗑
|
||||
social engineering | show 🗑
|
||||
phishing | show 🗑
|
||||
show | Software that is intended to damage or disable computers and computer systems.
🗑
|
||||
show | Uncertainty or being open to more than one interpretation.
🗑
|
||||
natural language | show 🗑
|
||||
show | A limited size language, usually developed by a small group for specific purposes, usually much simpler and structured.
🗑
|
||||
show | A programming language that lets users drag and drop icons into organized blocks of code to create programs rather than typing text.
🗑
|
||||
show | A programming language that is is easier for humans to read, write and parse. Guaranteed to be unambiguous.
🗑
|
||||
show | A programming language that has little or no abstraction and communicates closely to the hardware using assembly or machine language. Less natural for humans.
🗑
|
||||
show | Programs that programmers write in high-level languages
🗑
|
||||
machine code | show 🗑
|
||||
show | Source code that has been translated into machine code.
🗑
|
||||
show | A program that translates high-level, human-readable languages into a corresponding string of 1's and 0's for computer processing.
🗑
|
||||
hardware | show 🗑
|
||||
show | Random-access memory consists of tiny electrical circuits that dynamically store frequently used program instruction to increase speed of the system (volatile).
🗑
|
||||
secondary storage | show 🗑
|
||||
primary storage | show 🗑
|
||||
Central Processing Unit | show 🗑
|
||||
pseudocode | show 🗑
|
||||
sequential execution | show 🗑
|
||||
unsolvable problem | show 🗑
|
||||
Halting Problem | show 🗑
|
||||
undecidable problem | show 🗑
|
||||
show | How well do algorithms perform at increasingly larger scales.
🗑
|
||||
Big-O Notation | show 🗑
|
||||
show | A linear search method of finding a targeted value within a list, looking one at a time until a match is found.
🗑
|
||||
binary search | show 🗑
|
||||
show | Doubling the size of a problem only requires one extra unit of work.
🗑
|
||||
show | Trial and error method used to decode encrypted data such as passwords.
🗑
|
||||
Moore's Law | show 🗑
|
||||
heuristics | show 🗑
|
||||
distributed computing | show 🗑
|
||||
botnets | show 🗑
|
||||
bitcoin mining | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
smiller_stvm
Popular Computers sets