Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

AP CSP Unit 1

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Term
Definition
innovation(s)   show
🗑
security breach   show
🗑
show A process or set of rules to be followed in calculations or other problems solving operations  
🗑
flow patterns   show
🗑
sequencing   show
🗑
iteration   show
🗑
selection   show
🗑
condition (Boolean)   show
🗑
loop   show
🗑
show When it is unknown how many times a loop will iterate, usually we are waiting for an event to occur such as "repeat until...."  
🗑
definite loops   show
🗑
show A simple diagram with symbols showing the "flow" of a process  
🗑
imperative statement   show
🗑
descriptive qualifier   show
🗑
cryptography   show
🗑
show Text that is not written in code such as an unencrypted message.  
🗑
ciphertext   show
🗑
Caesar cipher   show
🗑
show More sophisticated algorithms used to improve encryption from Caesar Cipher by adding a key phrase  
🗑
show Measures taken to protect a computer or computer system against unauthorized access or attack  
🗑
show Confidentiality, Integrity, Availability  
🗑
confidentiality   show
🗑
show The certainty that information is accurate  
🗑
show The reliability of access to information  
🗑
authentication   show
🗑
show The standard security technology for establishing an encrypted link between a web server and a browser, typically indicated with padlock icon in the address bar.  
🗑
digital certificate   show
🗑
Distributed Denial-of-Service (DDoS) Attack   show
🗑
firewall   show
🗑
show A non-symmetric encryption method that uses a paired public and private (asymmetric) key algorithm.  
🗑
show Code that is capable of copying itself and corrupting a system or destroying data.  
🗑
show A method of encryption involving one key for encryption and decryption.  
🗑
social engineering   show
🗑
show Obtaining confidential information by masquerading as an "official" person, site, or entity. A form of social engineering  
🗑
malware   show
🗑
show Uncertainty or being open to more than one interpretation.  
🗑
show A complex, but structured language, both written and spoken, that has evolved naturally in humans through use, repetition and adaptation.  
🗑
artificial language   show
🗑
show A programming language that lets users drag and drop icons into organized blocks of code to create programs rather than typing text.  
🗑
high-level language   show
🗑
show A programming language that has little or no abstraction and communicates closely to the hardware using assembly or machine language. Less natural for humans.  
🗑
show Programs that programmers write in high-level languages  
🗑
machine code   show
🗑
show Source code that has been translated into machine code.  
🗑
show A program that translates high-level, human-readable languages into a corresponding string of 1's and 0's for computer processing.  
🗑
hardware   show
🗑
show Random-access memory consists of tiny electrical circuits that dynamically store frequently used program instruction to increase speed of the system (volatile).  
🗑
secondary storage   show
🗑
primary storage   show
🗑
Central Processing Unit   show
🗑
show An informal method or writing algorithmic instructions that do not necessarily follow grammatical rules and syntax of a particular language.  
🗑
show Program instructions are executed one at a time, in order.  
🗑
unsolvable problem   show
🗑
Halting Problem   show
🗑
show Where no algorithm can be made that always leads to a correct yes or no answer.  
🗑
show How well do algorithms perform at increasingly larger scales.  
🗑
Big-O Notation   show
🗑
show A linear search method of finding a targeted value within a list, looking one at a time until a match is found.  
🗑
show A method of searching by dividing the search interval in half each time.  
🗑
logarithmic behavior   show
🗑
brute forcing   show
🗑
show Gordon Moore accurately predicted that the number of transistors that could fit on a chip would roughly double every one to two years.  
🗑
show A method for deriving an approximate solution - Rules of Thumb but not guaranteed an accurately correct answer.  
🗑
show Computers that interact with each other in order to achieve a common goal.  
🗑
botnets   show
🗑
bitcoin mining   show
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: smiller_stvm
Popular Computers sets