AP CSP Midterm

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Consider the following incomplete code segment, with the goal of moving the robot in the grid around the obstacle. _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ ---------- _ _ | ======= |_ _ | ======= |_ _ ^ ====== | _ REPEAT 3 TIMES { REPEAT UNTIL (/ *missing code* /) { MOVE FORWARD () } ROTATE RIGHT () } Which of the following will correctly replace /"missing code "/? (A) CAN_MOVE (right) (B) NOT CAN_MOVE (right) (C) NOT CAN MOVE (forward) (D) CAN_MOVE (right) AND NOT CAN HOVE(forward)

(A) CAN_MOVE (right)

The DARPA Robotics Challenge (DRC) is a prize competition funded by the US Defense Advanced Research Projects Agency. It aims to develop semi-autonomous ground robots that can perform a variety of tasks. Some of the tasks the robots must complete are driving a vehicle through a course, opening a door, turning a valve, independent movement, and navigating debris. What scientific fields would need to be represented on a team that is trying to win the DRC? (A) Computer science, mechanical engineering, biology, electronics, and remote systems (B) Mechanical engineering, biology, and computer science (C) Computer science, electronics, remote systems, and biology (D) Remote systems, computer science, and mechanical engineering

(A) Computer science, mechanical engineering, biology, electronics, and remote systems

A color can be represented with 3 bytes of information. A BMP image stores image information by storing the individual color at each pixel. On the other hand, a GIF image stores a table of colors, and replaces runs of consecutive occurrences of the same color with (#ofOccurances, color) pairs. Both BMP and GIF are lossless formats. Which format is more efficient for storing and representing most images and why? (A) GIF. Storing the data in pairs allow us only to use the 3 bytes once for each set of consecutive colors. (B) GIF. Storing information in a table format ensures losslessness. (C) BMP. The algorithm for storing a BMP file has fewer steps. (D)BMP. Having access to the data at every pixel ensures losslessness.

(A) GIF. Storing the data in pairs allow us only to use the 3 bytes once for each set of consecutive colors.

When the DNS system was first created there was no reason to consider security being built into it as all it did was convert plain text host names into IP addresses. However, as technology has evolved and cyber threats have increased, the DNS has come under attack because of its poor security. One of the biggest concerns with DNS security is cache poisoning. DNS servers sometimes don't have an answer to a request in their cache and they pass the query off to another DNS server. If that server has incorrect information, a poisoning of the DNS can occur. Which of the following correctly identify methods of DNS cache poisoning? Select two answers. (A) Masquerading (B) DNS Key Distribution (C)DNS BINDing (D) Rogue Servers

(A) Masquerading (D) Rogue Servers

Amelia is doing a research paper on wild animals of the Americas.DO She wants to include some research on the wild mustangs of the west. Which of the search terms below would give her the most specific information on the topic she is searching for? Select two answers. (A) Mustang -car (B) "Mustang, not the car" (C) Mustang NOT car (D) Site: Mustang

(A) Mustang -car (C) Mustang NOT car

A game designer is creating a new online card game where the player's hand becomes larger over time. The game is played with multiple decks of cards. Once all cards have been distributed to all players, the software will sort through each player's cards and put them in order by suit and face value. What strategies can the designer use to find an efficient sorting algorithm? Select two answers. (A) The designer can find an efficient algorithm for sorting the cards in one player's hand, early in the game, and build on that algorithm as the game becomes larger and involves more players. (B) The designer can use pre-existing sorting methods and modify them to suit his own work. (C) The designer can try to reduce his code to as few lines as possible. (D) The designer can host the game on a large server.

(A) The designer can find an efficient algorithm for sorting the cards in one player's hand, early in the game, and build on that algorithm as the game becomes larger and involves more players. (B) The designer can use pre-existing sorting methods and modify them to suit his own work.

You are trying to explain to group of middle school students how IP addressing works and how the Internet knows where to send things and how to connect. You also want to describe how the addressing system allows for new computers to be added from locations already on the Internet. You have tried to explain the IPV4 addressing system and your only feedback has been blank stares. Which of the following examples accurately describe how the IP addressing and DNS systems direct Internet traffic? Select two answers. (A) You explain to the students that US mail uses a system very similar to IPv4 when distributing the mail. You tell them that five digit US zip code is structured like so: the first digit indicates the section of the country, the second digit identifies a specific area within that region, the third number identifies more precise information like a city, the last 2 digits are at the bottom level and are used to represent the most precise information like an area within the city. As cities grow, new locator numbers can be added to define those areas. (B) You explain that a school interoffice mail delivery system is similar to the IP addressing system. A person uses an interoffice envelope and puts the recipient's name and location within the district on the front. That envelope is then placed in an outgoing box where it is picked up and taken to a central processing area. From that area, an employee picks up the envelope, reads the address and then delivers it to the person it is addressed to. As new employees are added or removed, the central processing area, simply adds or deletes names from its directory. (C)You explain to the students that phone numbers are a form of addressing similar to IP addresses. The area code is the top level and identifies a large area with a group of phone numbers (e.g., a city or region), this is further specified by the three digit prefix which identifies a smaller section (e.g., a community within the city), which is even further specified by the last four digits of the phone number which is assigned to a specific location (e.g., a residence or person). As new people need phone numbers for specific areas, they are assigned a unique four digit code that when added to the other six digits becomes their phone number. (D) You explain that the IP and DNS systems are similar to an automotive assembly line. At the top level is the start of the line where the assembly begins on the chassis. As the chassis moves down the line it goes through the various levels of getting more information (parts) added to it. Each part that is added to the chassis represents a lower, more specific level of use (e.g., door, arm rest on door, button on arm rest, etc.). If changes needs to be made or parts added, new steps are added into the assembly process.

(A) You explain to the students that US mail uses a system very similar to IPv4 when distributing the mail. You tell them that five digit US zip code is structured like so: the first digit indicates the section of the country, the second digit identifies a specific area within that region, the third number identifies more precise information like a city, the last 2 digits are at the bottom level and are used to represent the most precise information like an area within the city. As cities grow, new locator numbers can be added to define those areas. (C)You explain to the students that phone numbers are a form of addressing similar to IP addresses. The area code is the top level and identifies a large area with a group of phone numbers (e.g., a city or region), this is further specified by the three digit prefix which identifies a smaller section (e.g., a community within the city), which is even further specified by the last four digits of the phone number which is assigned to a specific location (e.g., a residence or person). As new people need phone numbers for specific areas, they are assigned a unique four digit code that when added to the other six digits becomes their phone number.

Consider the goal of flipping two fair coins simultaneously times and displaying the number of times both coins land on the same values (heads or tails). Which of the following code segments can be used to accomplish that goal? Select two answers. (A) count ← 0 REPEAT 3 TIMES { IF (RANDOM(0,1) = RANDOM(0,1)) { count ← count + 1 } } DISPLAY count (B) count ← 0 REPEAT 3 TIMES { IF (RANDOM(1,2) = RANDOM(1,2)) { count ← count + 1 } } DISPLAY count (C) REPEAT 3 TIMES { count ← 0 IF (RANDOM(0,1) = RANDOM(0,1)) { count ← count + 1 } } DISPLAY count (D) count ← 0 REPEAT 3 TIMES { IF (RANDOM(0,2) = RANDOM(0,2)) { count ← count + 1 } } DISPLAY count

(A) count ← 0 REPEAT 3 TIMES { IF (RANDOM(0,1) = RANDOM(0,1)) { count ← count + 1 } } DISPLAY count (B) count ← 0 REPEAT 3 TIMES { IF (RANDOM(1,2) = RANDOM(1,2)) { count ← count + 1 } } DISPLAY count

Managing digital data involves many considerations. Among these are security and privacy. Review the scenarios below, Which pose valid security concerns? Select two answers. (A) government contractor is on a business trip and attempts to transfer files. His files are too large for his email account, so he creates an account in the cloud to store his file until he gets back to work, where he can retrieve it. (B) A bank customer is using an online banking site to pay bills and transfer funds across accounts. The customer is using his wireless system at home that hides the SSID from the public. (C)An employee receives a call from a person stating that they are with the company's IT department. The caller states that they are in the process of updating the server and needs the employee's username and password. (D) A company wants to get rid of old, extraneous customer data. Rather than physically destroying its old hard drives, it follows government and industry standard protocols for permanent data erasure.

(A) government contractor is on a business trip and attempts to transfer files. His files are too large for his email account, so he creates an account in the cloud to store his file until he gets back to work, where he can retrieve it. (C)An employee receives a call from a person stating that they are with the company's IT department. The caller states that they are in the process of updating the server and needs the employee's username and password.

Which of the following statements are true about high-level programming languages? Select two answers. (A)A high-level programming language often uses natural language elements. (B) A high-level programming language does not ensure program reliability. (C) A high-level programming language must be used to execute commands such adding and multiplying. (D) A high-level program language allows for code re-use

(A)A high-level programming language often uses natural language elements. (D) A high-level program language allows for code re-use

A customer is shopping online, and purchases product advertised at $10.99. She has a 40% discount, bringing the price to $6.594 each. She decided to purchase 3. Her final total should be $19.78, but the total instead is $19.77. Choose the most likely possible explanation for the discrepancy: (A)The program calculating the total rounded the price for one of the products, then multiplied by 3. (B) While multiplying the floating point numbers, there was a round-off error. (C) The fixed number of bits used to store the values resulted in an overflow error. (D) The program does not handle signed integers.

(A)The program calculating the total rounded the price for one of the products, then multiplied by 3.

Consider the following code segment: IF (x > 5) { x ← x + 1 } x ← x - 1 What will be the value of x after this code segment executes? (A) For all values of x, x will remain unchanged. (B) For values greater than 5, x will remain unchanged, and for all other values, x will decrease by 1. (C) For values greater than 5, x will increase by 1, and for all other values, x will decrease by 1. (D) For all values of x, x will decrease by 1.

(B) For values greater than 5, x will remain unchanged, and for all other values, x will decrease by 1.

Consider the following complicated program, which is intended to move the robot from the top left hand corner of the empty grid, facing east, to the lower right hand corner of the grid, facing east: Before > _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > _ _ _ _ _ _ _ _ _ _ _ After: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > _ _ _ _ _ _ _ _ _ _ _ > REPEAT UNTIL (NOT CAN_MOVE (forward)) { MOVE_FORWARD () ROTATE_RIGHT () IF (CAN_MOVE (forward)) { MOVE_FORWARD () } ROTATE_LEFT () } ROTATE_RIGHT () REPEAT UNTIL (NOT CAN_MOVE (forward)) { MOVE FORWARD () } ROTATE_LEFT () Which of the following less complicated code segments could replace the above code and will result in the correct final position of the robot? I. REPEAT UNTIL (NOT CAN_MOVE (forward)) { MOVE_FORWARD () ROTATE_RIGHT () MOVE_FORWARD () ROTATE_LEFT () } II. REPEAT UNTIL (NOT CAN_MOVE (forward)) { MOVE_FORWARD () } ROTATE_RIGHT () REPEAT UNTIL (NOT CAN_MOVE (forward)) { MOVE_FORWARD () } ROTATE_LEFT () (A) I only (B) II only (C) I and II (D) Neither I nor II

(B) II only

Use the diagram below to answer the following question. Server Alfa / \ ISP X ---------------ISP Y | / | Host 1---Host 3----Host 5 | | \ / | Host 7---Host 9---Host 11 | / ISP Z | Client If the client requests data from Server Alpha, which of the statements below BEST describes what will happen if ISP X, Host 3, and Host 11 are not working? (A) The Client will not receive any data due to the outage (B) ISP Y will receive packets indicating a failure to Host 3 and re- route the data to a working host (C) Host 1 will compensate for the outage and route the data accordingly (D) Host 7 will notify both the client and Server Alpha which nodes are not functioning.

(B) ISP Y will receive packets indicating a failure to Host 3 and re- route the data to a working host

Lossless and lossy compression are present in many different file formats (image, music, video, etc.). The graphic below illustrates how the two compression formats work. LOSSLESS original compressed restored [ ] → [ ] → [ ] LOSSY original compressed restored [ ] → [ ] → [ ] Which of the following statements below is NOT true? (A) All lossless compression is based on the idea of breaking a file into a smaller form for transmission or storage and then being put back together in its entirety. (B) Lossy formats are excellent to use when a file must be compressed and rebuilt to its exact pre-compressed specifications. (C) Scanning in a picture creates a lossy format result. ThenihopiA program gives you its interpretation of the original. (D) Moving music onto your digital music player is done is a lossless format to reduce the size of the file.

(B) Lossy formats are excellent to use when a file must be compressed and rebuilt to its exact pre-compressed specifications.

An online museum is creating a site hosting hundreds of thousands of digital representations of art from around the world. They want to use a lossless compression, so that members of the museum can download and decompress the image and have an identical copy of the original file. Which of the following are true? Select two answers. (A) The museum should not compress digital representations of art, as there is always a danger that the compression is actually lossy. (B) The museum can choose a heuristic approach which will achieve a lossless compression, but they cannot be sure that it is the most efficient compression for each image. (C) The museum can choose a heuristic approach which will achieve a lossless compression for most digital representations. (D)Algorithms for lossless compression exist, so the museum can use those to compress the images.

(B) The museum can choose a heuristic approach which will achieve a lossless compression, but they cannot be sure that it is the most efficient compression for each image. (D)Algorithms for lossless compression exist, so the museum can use those to compress the images.

Bytes, which are represented by 8 bits, are the units used by computers to represent a character such as a letter or number. The following characters are shown with their decimal representations: C - 67 K - 75 . - 96 p - 112 Which of the above, represented in binary as a byte, contains the most zeros? (A) C (B) K (C) . (D) p

(C) .

We can convert a number from decimal to octal (base 8) by repeatedly subtracting the largest possible powers of what number? (A) 2 (B) 7 (C) 8 (D) 9

(C) 8

In researching a local deer population, a scientist has gathered much information about the deer and is going to write a program ow A to model population growth over time. She wants to analyze how ia no illness and population size are related to available food sources. Which of the following factors most likely does not need to be included in her program: (A) Population size (B) Food supply (C) Antler size (D) Prevalence of illness in herd

(C) Antler size

A digital art teacher has her students analyze a digital image to get the RGB values of each pixel that is present in the image. The teacher provides them with a program that gathers the RGB values in a triplet for each pixel-for example (255, 124, 36)-and loads them into a data set. The data set is then imported into a spreadsheet program so that the pixel number is in column A, the R value is in column B, G value in column C, and B value in column D. The students will do an analysis of the RGB values to determine which series of values is used most often. Which of the algorithms below would allow the student to create an analysis that accomplishes the task? I. Sort the RGB triplets by R value (ascending or descending). Once that js done find the R value that occurs the most and remove any triplets that do not include that value. Re-sort the list by G values. Count the G value that occurs the most and remove any triplets that do not include that value. Re-sort the remaining list by the B values. Count the B value that occurs the most and remove any triplets that do not include that value. The remaining RBG triplet is the one that occurs most often. II. Sort the RGB triplets in descending order by the R value first, followed by the G value and then the B value. Once that has been done, iterate across the list to find the triplets that have the highest count of R values. Create a new list of the triplets that have the highest R value count. Iterate across that list to find the highest count ofG values and create a new list of triplets, remove the remaining triplets. Do the same for the B values. That will leave the RGB triplet that occurs most often. (A) I only (B) II only (C) Both I & II (D) Neither I & II

(C) Both I & II

When scientists, engineers, businesses, etc. are working with large data sets, they consider many factors in choosing a storage method for their data. Some of these include cost, accessibility, and mobility. Which of the following storage methods below makes accessibility of data easiest for people in multiple locations wanting to utilize the data? (A) USB Flash Drive, as it can be copied and handed or mailed to multiple users. (B) Mainframe Computer, as it can be accessed from many computers. (C) Cloud Drive, as it allows for multiple users and version control. (D) Magnetic Drive System, as it can handle all data types.

(C) Cloud Drive, as it allows for multiple users and version control.

Protecting personal privacy in large data sets is an ever-growing concern. Which of the following methods below can be used to mitigate the risk of possibly releasing personally identifiable information in large data sets? I. Aggregation changing atypical records into typical records (e.g., making all last names the same) II. Suppression deleting identifying values from the data (e.g., no addresses) III. Data Swapping change the values for pieces of data (e.g. swap age values for ethnic values, etc.) IV. Adding Random Noise - including meaningless values in the data (e.g., adding extra digits to phone numbers) V. Key Master - ensuring that no more than one person in an organization has complete access to a database (A) I, II, and IV only (B) II, IV, and V only (C) I, II, III, and IV only (D) All of the above

(C) I, II, III, and IV only

Metadata is defined as data about data. Review the following statements about metadata types. Which of the statements below are true. I. Descriptive metadata is used for discovery and identification (e.g., a title, subject, or keyword) II. Administrative metadata gives information to help identify the source (e.g., file type, or when file was created). III. Metadata automatically generated tends to be more accurate than manually created metadata. IV. Structural metadata describes how the components are organized (e.g., the chapters of a book). (A) I only (B) II III, and IV only (C) I, II, and IV only (D) All of the above

(C) I, II, and IV only

Bill receives an unsolicited e-mail from an address that appears to be his bank. The e-mail is asking Bill to verify his account information in a reply. The e-mail looks legitimate and even has his bank's logo and address. Bill replies to the email with his account number and security information. The next day, Bill receives a call from his bank that his account has been closed and all of the funds have been withdrawn. Bill has been defrauded and is a victim of which e-mail scam? (A) Spearing (B) Social Engineering (C) Phishing (D) Denial of Service

(C) Phishing

In the past, the lack of data was a hindrance to scientific discovery. Today, the opposite is true. It is not the lack of data that is the problem; the issue is how to work with the vast amounts of data that are available. Scientists must know how to manage, share, and analyze very large data sets. Which of the following statements are NOT true of scientists using large datasets? Select two answers. (A) The costs associated with medical advancements are reduced due to large scale collaboration on the data. (B) Effectively analyzing the large, complex datasets requires abilities beyond the skill sets possessed by a single scientist. (C) Scientists using large data sets are more effective in their research when they limit the amount of data they analyze in a collaborative group. (D)A team of people from various disciplines increases the complexity of the analysis that is being done.

(C) Scientists using large data sets are more effective in their research when they limit the amount of data they analyze in a collaborative group. (D)A team of people from various disciplines increases the complexity of the analysis that is being done.

Monica is surfing the web one day after class. She types the following web address, widgets.cs.fbhs.org into the URL bar in her browser. Which of the following events is most likely to take place among the DNS servers? (A) The .org name server will send the IP address of widgets.cs.fbhs.org (B) The widgets name server will send the IP address of the widgets.cs name server. (C) The widgets.cs.fbhs.org name server will send the IP address of widgets.cs.fbhs.org (D) The .org name server will send the IP address of the fbhs.org name server.

(C) The widgets.cs.fbhs.org name server will send the IP address of widgets.cs.fbhs.org

Consider the following procedure, cube (n), which is meant to multiply a number by itself three times PROCEDURE cube (n) { cubeValue ← n*n*n RETURN (cubeValue) } What is returned by cube (cube(2))? (A) 8 (B) 64 (C) 128 (D) 512

(D) 512

Which of the following lines of code would cause an error with the robot? (A) CAN_MOVE(right) (B) CAN_MOVE (forward) (C) CAN MOVE (left) (D) CAN_MOVE (north)

(D) CAN_MOVE (north)

Without protocols the information sent and received through the Internet would never reach its intended target and even if it did, the message would be a jumbled mess. Review the lists below and select the one that correctly lists each protocol with its function. (A) TCP/IP identifies the resource requested; DNS uses a "handshake" to relay packet information; HTTP translates the name of a web server to a valid IP address (B) DNS identifies the resource requested; HTTP uses a "handshake" to relay packet information; TCP/IP translates the name of a web server to a valid IP address (C) TCP/IP identifies the resource requested; HTTP uses a "handshake" to relay packet information; DNS translates the name of a web server to a valid IP address (D) HTTP identifies the resource requested; TCP/IP uses a "handshake" to relay packet information; DNS translates the name of a web server to a valid IP address

(D) HTTP identifies the resource requested; TCP/IP uses a "handshake" to relay packet information; DNS translates the name of a web server to a valid IP address

A word cloud is an image made of words which vary in size based on their frequency or importance. A literature teacher is exploring the overuse of the word "that" in her students' writing. The Students disagree with the teacher, so the teacher creates a word cloud for each student from their essays to visually demonstrate the frequency of the word "that." What are some possible outcomes of this exploration? I. The teacher may realize there are, in fact, other words overused by her students. II. The teacher may find other words the students use frequently with the word "that", and can help the students find new appropriate expressions. III. The teacher may decide to study the issue further, and test individual paragraphs in the students' works, or may decide to test all of their essays in one word cloud. (A) I and II (B) I and III (C) II and III (D) I, II, and III

(D) I, II, and III

A mother is attempting to determine which cell phone plan best fits her family's needs. She plans on using a shared pool of data for everyone in her family (defined as the people living in her home). Identify the best sequence of steps she should take to select a plan. I. Determine each family member's data usage. II. If the cost for data overages is lower than the added cost of the next tiered plan, select the plan with about the same amount of data that the family uses. Otherwise, select the plan with slightly more data than the family uses. III. Find the sum of the total data usage for each member of the family. IV. Compare the cost of paying for data overages to the cost of paying for slightly more data. (A) I, II, III, IV (B) III, I, II, IV (C) I, IV, II, III (D) I, III, IV, II

(D) I, III, IV, II

Sort the following by levels of abstraction, from lowest to highest: I. logic gates II. operating systems III. programming language IV. machine language (A) I, II, III, IV (B) I, III, IV, II (C) I, IV, II, III (D) I, IV, III, II

(D) I, IV, III, II

Consider the following scenario and code segment for a robot in a maze of squares: _ _ _ _ _ _ _ _ _ _ _ _ _ _ > _ _ REPEAT UNTIL (NOT (CAN_MOVE (right) OR CAN_MOVE (left) OR CAN_MOVE (forward) OR CAN_MOVE (backward))) { IF (CAN_MOVE (forward)) { MOVE_FORWARD () } ELSE { ROTATE_RIGHT () } } Debug the above code segment. Which of the following statements is true? (A) The code runs as intended. The robot will reach the end of the maze. (B) The code does not run as intended. The robot will never reach the end of the maze. (C) The code runs as intended. The code runs without error. (D) The code may or may not run as intended. The code's purpose is not stated.

(D) The code may or may not run as intended. The code's purpose is not stated.

The question below uses a simple programming language, with the following instructions. product <-- 100 REPEAT 1000 TIMES { product <-- product * product + 1 } In some coding languages, the above code will result in an error. Why? (A) The fixed number of bits used to represent real numbers (as term-69floating-point numbers) limits the range of floating-point values and mathematical operations. (B) The multiple levels of abstraction used oversimplified the code. (C) The value of product will always be 0. (D) The fixed number of bits used to represent characters or integers limits the range of integer values and mathematical operations.

(D) The fixed number of bits used to represent characters or integers limits the range of integer values and mathematical operations.

a collection of commands made available to a programmer

API

American Standard Code for Information Interchange; the universally recognized raw text format that any computer can understand

ASCII

a simplified representation of something more complex. Abstractions allow you to hide details to help you manage complexity, focus on relevant concepts, and reason about problems at a higher level.

Abstraction

A list of steps to finish a task; A precise sequence of instructions for processes that can be executed by a computer

Algorithm

usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them.

Antivirus Software

Transmission capacity measure by bit rate

Bandwidth

a broad term for datasets so large or complex that traditional data processing applications are inadequate.

Big Data

A way of representing information using only two options.

Binary

- A contraction of "Binary Digit"; the single unit of information in a computer, typically represented as a 0 or 1

Bit

(sometimes written bitrate) the number of bits that are conveyed or processed per unit of time. e.g. 8 bits/sec.

Bit rate

a technique for encryption that shifts the alphabet by some number of characters

Caesar Cipher

the generic term for a technique (or algorithm) that performs encryption

Cipher

a "hard' problem for a computer is one in which it cannot arrive at a solution in a reasonable amount of time.

Computationally Hard

When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption.

Cracking encryption

Distributed Denial of Service Attack. Typically a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed.

DDoS Attack

short for Domain Name System, this system translates domain names (like example.com) to IP addresses (like 93.184.216.34)

DNS

a process that reverses encryption, taking a secret message and reproducing the original plain text

Decryption

a description of the behavior of a command, function, library, API, etc.

Documentation

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

Encryption

software that runs on servers (often routers) that only allows traffic through according to some set of security rules.

Firewall

Loops that have a predetermined beginning, end, and increment (step interval).

For Loop

A named group of programming instructions. Functions are reusable abstractions that reduce the complexity of writing and maintaining programs.

Function

HyperText Transfer Protocol - the protocol used for transmitting web pages over the Internet

HTTP

a problem solving approach (algorithm) to find a satisfactory solution where finding an optimal or exact solution is impractical or impossible.

Heuristic

A base-16 number system that uses sixteen distinct symbols 0-9 and A-F to represent numbers from 0 to 15.

Hexadecimal

A programming language with many commands and features designed to make common tasks easier to program. Any high level functionality is encapsulated as combinations of low level commands.

High Level Programming Language

Internet Engineering Task Force - develops and promotes voluntary Internet standards and protocols, in particular the standards that comprise the Internet protocol suite (TCP/IP).

IETF

A number assigned to any item that is connected to the Internet.

IP Address

A type of data used for graphics or pictures.

Image

A new or improved idea, device, product, etc, or the development thereof

Innovation

A group of computers and servers that are connected to each other.

Internet

To repeat in order to achieve, or get closer to, a desired goal.

Iterate

Time it takes for a bit to travel from its sender to its receiver.

Latency

a collection of commands / functions, typically with a shared purpose

Library

The action of doing something over and over again.

Loop

a data compression algorithm that allows the original data to be perfectly reconstructed from the compressed data.

Lossless Compression

(or irreversible compression) a data compression method that uses inexact approximations, discarding some data to represent the content. Most commonly seen in image formats like .jpg.

Lossy Compression

A programming language that captures only the most primitive operations available to a machine. Anything that a computer can do can be represented with combinations of low level commands.

Low Level Programming Language

a predication made by Gordon Moore in 1965 that computing power will double every 1.5-2 years, it has remained more or less true ever since.

Moore's Law

the principle that all Internet traffic should be treated equally by Internet Service Providers.

Net Neutrality

having multiple backups to ensure reliability during cases of high usage or failure

Network Redundancy

A business/corporate term for a one-page document that summarizes a large issue, topic or plan.

One-pager

Small chunks of information that have been carefully formed from larger chunks of information.

Packets

A method of programming in which two programmers write code using a single computer. One programmer in the "driver" role uses the mouse and keyboard to actually write the code while a second acts as a "navigator", keeping track of the big picture, catching errors, and making suggestions. Programmers switch roles frequently and communicate throughout the process.

Pair Programming

An extra piece of information passed to a function to customize it for a specific need

Parameter

a thief trying to trick you into sending them sensitive information. Typically these include emails about system updates asking you send your username and password, social security number or other things.

Phishing Scam

short for "picture element", the fundamental unit of a digital image, typically a tiny square or dot that contains a single point of color of a larger image.

Pixel

In an asymmetric encryption scheme the decryption key is kept private and never shared, so only the intended recipient has the ability to decrypt a message that has been encrypted with a public key.

Private Key

A set of rules governing the exchange or transmission of data between devices.

Protocol

Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.

Public Key Encryption

the RGB color model uses varying intensities of (R)ed, (G)reen, and (B)lue light are added together in to reproduce a broad array of colors.

RGB

an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.

Random Substitution Cipher

A type of computer that forwards data across a network

Router

Secure Sockets layer / Transport Layer Security - An encryption layer of HTTP that uses public key cryptography to establish a secure connection.

SSL/TLS

A generic term for a type of programming statement (usually an if-statement) that uses a Boolean condition to determine, or select, whether or not to run a certain block of statements.

Selection

Putting commands in correct order so computers can read the commands.

Sequencing

Transmission Control Protocol - provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.

TCP

a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.

Top Down Design

a classic method for learning programming with commands to control movement and drawing of an on-screen robot called a "turtle". The turtle hearkens back to early implementations in which children programmed a physical robot whose dome-like shape was reminiscent of a turtle.

Turtle Programming

An easy-to-remember address for calling a web page (like www.code.org).

URL

a program that runs on a computer to do something the owner of the computer does not intend.

Virus

used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt.

asymmetric encryption

is data that describes other data. For example, a digital image may include metadata that describe the size of the image, number of colors, or resolution.

metadata

a mathematical operation that returns the remainder after integer division. Example: 7 MOD 4 = 3

modulo


Set pelajaran terkait

Chapter 1 - Introduction to Criminal Behavior

View Set

Distribution System Passive Devices

View Set

Lewis: Chapter 36 Inflammatory and Structural Heart Disorders

View Set

Human Physiology Ch 11 -16 Final Review

View Set