AP CompSci Review Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
| Definition | Term |
| Distributed Denial-of-Service (DDoS) Attack | an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. |
| Abstraction | The process of removing or suppressing details to create a manageable level of complexity. |
| Parameters | A variable that defines a procedure or sets the conditions of an operation (example: REPEAT n times). |
| Bits | The foundational to digital computing (1's and 0's) - short for binary digits |
| Bit string | A sequence of bits that can be used to represent sets or to manipulate binary data. |
| Debugging | Locating and correcting errors in a program. |
| Lossless data compression | Compression that has occurred with no loss of information so when decompression occurs, no data is ever lost if reverting back. |
| Lossy compression | Irreversible compression that uses a more aggressive compression ratio through approximations resulting in partial data loss. |
| Innovation | The process of imagining something that does not yet exist, but that has potential value, and making it real through the application of design, implementation, and production. |
| Cloud computing | Storing, accessing and processing data using remote servers over a network rather than a local server or computer. |
| Metadata | Descriptive data about an image, a web page, or other complex objects (data about data). |
| Data abstraction | Focusing on important details and characteristics and filtering out the unwanted details or explanations. A means of separating behavior from implementation. |
| Bandwidth | A measure of bit rate of a system or data measured in bits) that can be sent in a fixed amount of time over a system. |
| Streaming | The transmission and receiving of data (such as a video or music) over a network using a continuous, steady flow where a user can access before the entire file is downloaded. |
| ReCAPTCHA | A digital tool used to deter automated form-filling and exploitation of web-based registration systems. |
| Crowdsourcing | Obtaining information from a large number of people, either paid or unpaid, voluntary or involuntary. |
| Algorithm | A process or set of rules to be followed in calculations or other problems solving operations |
| Security breach | Unauthorized access of data, applications, services, networks and/or devices by bypassing underlying security mechanisms. |
| Caesar cipher | Also called substitution cipher. Substitutes each letter of the original, unencrypted message (plaintext)with a corresponding letter in the encrypted message |
| Condition (Boolean) | A statement that has a particular outcome or result that is either true or false |
Created by:
shoegameballer
Popular Computers sets