AP CSP Unit 1
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
innovation(s) | show 🗑
|
||||
security breach | show 🗑
|
||||
show | A process or set of rules to be followed in calculations or other problems solving operations
🗑
|
||||
flow patterns | show 🗑
|
||||
sequencing | show 🗑
|
||||
iteration | show 🗑
|
||||
selection | show 🗑
|
||||
condition (Boolean) | show 🗑
|
||||
loop | show 🗑
|
||||
show | When it is unknown how many times a loop will iterate, usually we are waiting for an event to occur such as "repeat until...."
🗑
|
||||
definite loops | show 🗑
|
||||
show | A simple diagram with symbols showing the "flow" of a process
🗑
|
||||
imperative statement | show 🗑
|
||||
descriptive qualifier | show 🗑
|
||||
cryptography | show 🗑
|
||||
show | Text that is not written in code such as an unencrypted message.
🗑
|
||||
ciphertext | show 🗑
|
||||
Caesar cipher | show 🗑
|
||||
show | More sophisticated algorithms used to improve encryption from Caesar Cipher by adding a key phrase
🗑
|
||||
show | Measures taken to protect a computer or computer system against unauthorized access or attack
🗑
|
||||
show | Confidentiality, Integrity, Availability
🗑
|
||||
confidentiality | show 🗑
|
||||
show | The certainty that information is accurate
🗑
|
||||
show | The reliability of access to information
🗑
|
||||
authentication | show 🗑
|
||||
show | The standard security technology for establishing an encrypted link between a web server and a browser, typically indicated with padlock icon in the address bar.
🗑
|
||||
digital certificate | show 🗑
|
||||
Distributed Denial-of-Service (DDoS) Attack | show 🗑
|
||||
firewall | show 🗑
|
||||
show | A non-symmetric encryption method that uses a paired public and private (asymmetric) key algorithm.
🗑
|
||||
show | Code that is capable of copying itself and corrupting a system or destroying data.
🗑
|
||||
show | A method of encryption involving one key for encryption and decryption.
🗑
|
||||
social engineering | show 🗑
|
||||
show | Obtaining confidential information by masquerading as an "official" person, site, or entity. A form of social engineering
🗑
|
||||
malware | show 🗑
|
||||
show | Uncertainty or being open to more than one interpretation.
🗑
|
||||
show | A complex, but structured language, both written and spoken, that has evolved naturally in humans through use, repetition and adaptation.
🗑
|
||||
artificial language | show 🗑
|
||||
show | A programming language that lets users drag and drop icons into organized blocks of code to create programs rather than typing text.
🗑
|
||||
high-level language | show 🗑
|
||||
show | A programming language that has little or no abstraction and communicates closely to the hardware using assembly or machine language. Less natural for humans.
🗑
|
||||
show | Programs that programmers write in high-level languages
🗑
|
||||
machine code | show 🗑
|
||||
show | Source code that has been translated into machine code.
🗑
|
||||
show | A program that translates high-level, human-readable languages into a corresponding string of 1's and 0's for computer processing.
🗑
|
||||
hardware | show 🗑
|
||||
show | Random-access memory consists of tiny electrical circuits that dynamically store frequently used program instruction to increase speed of the system (volatile).
🗑
|
||||
secondary storage | show 🗑
|
||||
primary storage | show 🗑
|
||||
Central Processing Unit | show 🗑
|
||||
show | An informal method or writing algorithmic instructions that do not necessarily follow grammatical rules and syntax of a particular language.
🗑
|
||||
show | Program instructions are executed one at a time, in order.
🗑
|
||||
unsolvable problem | show 🗑
|
||||
Halting Problem | show 🗑
|
||||
show | Where no algorithm can be made that always leads to a correct yes or no answer.
🗑
|
||||
show | How well do algorithms perform at increasingly larger scales.
🗑
|
||||
Big-O Notation | show 🗑
|
||||
show | A linear search method of finding a targeted value within a list, looking one at a time until a match is found.
🗑
|
||||
show | A method of searching by dividing the search interval in half each time.
🗑
|
||||
logarithmic behavior | show 🗑
|
||||
brute forcing | show 🗑
|
||||
show | Gordon Moore accurately predicted that the number of transistors that could fit on a chip would roughly double every one to two years.
🗑
|
||||
show | A method for deriving an approximate solution - Rules of Thumb but not guaranteed an accurately correct answer.
🗑
|
||||
show | Computers that interact with each other in order to achieve a common goal.
🗑
|
||||
botnets | show 🗑
|
||||
bitcoin mining | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
smiller_stvm
Popular Computers sets