100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CSP AP EXAM 2 2025/2026 QUESTIONS WITH ANSWERS GRADED A+

Rating
-
Sold
-
Pages
13
Grade
A+
Uploaded on
16-03-2025
Written in
2024/2025

Asymmetric Encryption - Pairs a public key for encryption and a private key for decryption. The sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message. Freeware - Untrustworthy (often free) downloads from freeware or shareware sites can contain malware. Multi-factor Authentication - A system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access Strong password - Something that is easy for a user to remember but would be difficult for someone else to guess based on knowledge of that user.

Show more Read less
Institution
CSP
Course
CSP









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CSP
Course
CSP

Document information

Uploaded on
March 16, 2025
Number of pages
13
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CSP AP EXAM 2 2025/2026 QUESTIONS WITH ANSWERS
GRADED A+
✔✔Asymmetric Encryption - ✔✔Pairs a public key for encryption and a private key for
decryption. The sender does not need the receiver's private key to encrypt a message,
but the receiver's private key is required to decrypt the message.

✔✔Freeware - ✔✔Untrustworthy (often free) downloads from freeware or shareware
sites can contain malware.

✔✔Multi-factor Authentication - ✔✔A system that requires at least two steps to unlock
protected information; each step adds a new layer of security that must be broken to
gain unauthorized access

✔✔Strong password - ✔✔Something that is easy for a user to remember but would be
difficult for someone else to guess based on knowledge of that user.

✔✔Virus - ✔✔A malicious program that can copy itself and gain access to a computer in
an unauthorized way. Computer viruses often attach themselves to legitimate programs
and start running independently on a computer.

✔✔Caesar Cipher - ✔✔A technique for encryption that shifts the alphabet by some
number of characters

✔✔Random Substitution - ✔✔An encoding technique that maps each letter of the
alphabet randomly to different letters or characters.

✔✔Cipher - ✔✔The generic term for a technique (or algorithm) that performs
encryption.

✔✔Cracking Encryption - ✔✔When you attempt to decode a secret message without
knowing all the specifics of the cipher.

✔✔Computer Virus Scanning Software - ✔✔Protects a computer system against
infection.

✔✔DDoS Attack - ✔✔Hacker floods a server with numerous bogus requests so that
legitimate users can no longer access the server.

✔✔Certificate Authority (CA) - ✔✔A trusted third-party agency that is responsible for
issuing digital certificates.

✔✔GDPR (General Data Protection Regulation) - ✔✔A group of regulations
implemented by the European Union (EU) to protect personal data of EU citizens.

, ✔✔Parameter - ✔✔A variable in a function definition. Used as a placeholder for values
that will be passed through the function.

✔✔Argument - ✔✔The value passed to the parameter of a function.

✔✔Return - ✔✔Used to return the flow of control to the point where the procedure (also
known as a function) was called and to return the value of expression.

✔✔Procedural Abstraction - ✔✔Identifying repetitive code statements and placing them
in one procedure that can be referenced by many objects

✔✔Library - ✔✔A group of functions (procedures) that may be used in creating new
programs.

✔✔API: Application Program Interface - ✔✔Specifications for how functions in a library
behave and can be used.

✔✔Modularity - ✔✔The subdivision of a computer program into separate subprograms
that are each responsible for one aspect of hte program's functionality

✔✔Sequencing - ✔✔The application of each step of an algorithm in the order in which
the code statements are given.

✔✔Selection - ✔✔Determines which parts of an algorithm are executed based on a
condition being true or false.

✔✔Iteration - ✔✔A repetitive portion of an algorithm which repeats a specified number
of times or until a given condition is met.

✔✔Algorithm - ✔✔A step-by-step procedure or set of rules for solving a specific
problem or task

✔✔MOD operation - ✔✔The remainder that is left after a number is divided by another
number.

✔✔Function - ✔✔A named group of programming instructions. Also referred to as a
"procedure".

✔✔Function Call - ✔✔A command that executes the code within a function.

✔✔Conditional Statement - ✔✔Affect the sequential flow of control by executing
different statements based on the value of a Boolean expression.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BOARDWALK Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
173
Member since
1 year
Number of followers
6
Documents
18411
Last sold
5 days ago
BOARDWALK ACADEMY

Ace Your Exams With Top Quality study Notes And Paper✅✅ ALL ACADEMIC MATERIALS AVAILABLE WITH US✅✅ LEAVE A REVIEW SO THAT WE CAN LOOK AND IMPROVE OUR MATERIALS.✅✅ WE ARE ALWAYS ONLINE AND AVAILABLE DONT HESITATE TO CONTACT US FOR SYUDY GUIDES!!✅✅ EVERYTHING IS GRADED A+✅✅ COLOUR YOUR GRADES WITH US , WE ARE HERE TO HELP YOU DONT BE RELACTANT TO REACH US

3.6

31 reviews

5
12
4
6
3
7
2
0
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions