Java Games: Flashcards, matching, concentration, and word search.

Unit 4 AP Vocabulary

AB
encryptionThe process of encoding data to prevent unauthorized access
decryptionThe process of decoding data that has been encrypted
symmetric encryptionEncryption scheme that uses the same key for both encryption and decryption
public key encryptionA type of encryption that uses a pair of keys, only one of which is published
SSL/TLSA standard for encrypted information transfer on the Internet
malwareSoftware that was designed to harm or take partial control over your compute
keylogging softwareA kind of malware that records every key pressed by a user
computer virusA type of malware that spreads and infects other computers
antivirusSoftware designed to scan your files and Internet transmissions looking for malware
firewallA security system that controls the kinds of connections that can be made between a computer or network and the outside world
DDoS attackUse of a virus to flood a server with many requests from many computers at once so that users of that server are denied service
rogue access pointWireless access point that gives access to a secure network without the authorization of the network administrator
digital divideUnequal access to computers and the Internet based on poverty, racism, sexism, isolation in the countryside, age, and other factors
crowdsourcingThe general term for using the Internet to get a lot of people to help solve a problem
computing innovationSoftware or concepts that include a program as an integral part of their function
bitA single unit of data that can only have one of two values
byteEight bits
wordThe number of wires that connect the processor to the memory
binary sequenceA string of ones and zeros, also called a bitstream
analog dataData that have values that change smoothly which change in discrete intervals
sampling rateThe number of samples measured per second
floating pointThe representation of numbers in scientific notation, but with powers of two instead of ten
losslessData compression algorithms that are reversible; so that you can reconstruct the original data with no loss in quality
lossyData compression algorithms that are not fully reversible; you can reconstruct only an approximation of the original data
computing systemA group of computing devices and programs working together for a common purpose
routerA computer that passes information from one network to another
computing deviceA physical object that can run a program, such as computers, tablets, cell phones, and smart sensors
ISPsThe companies who sell Internet access to homes and institutions
fault toleranceThe ability of a system to work around problems
packet switchingHow the Internet sends information in short bursts of information, not long continuous strings
TCP/IPA pair of protocols that lets your computer pretend it has a direct, reliable connection to the other computer
certificate authoritiesOrganizations that issue digital certificates to verify who owns the encryption keys used for secured communications
phishingA common security attack in which the victim is tricked into giving up personal information or downloading malware
citizen scienceScientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices
samplingMeasuring values, called samples, of an analog signal at regular intervals
widthThe number of bits that a CPU processes at a time


CTE Business Teacher
South Mecklenburg High School
Charlotte, NC

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities