APCSP UNIT 10 QUESTIONS AND
ANSWERS
Computing Innovation - ANSWER includes a program as an integral part
of its function. Can be physical (e.g. self-driving car), non-physical
computing software (e.g. picture editing software), or non-physical
computing concepts (e.g., e-commerce).
Personally Identifiable Information (PII) - ANSWER information about an
individual that identifies, links, relates, or describes them.
Phishing - ANSWER a technique that attempts to trick a user into
providing personal information. That personal information can then be
used to access sensitive online resources, such as bank accounts and
emails
Keylogging - ANSWER the use of a program to record every keystroke
made by a computer user in order to gain fraudulent access to
passwords and other confidential information
Malware - ANSWER software intended to damage a computing system
or to take partial control over its operation
Rogue Access Point - ANSWER a wireless access point that gives
unauthorized access to secure networks.
Encryption - ANSWER a process of encoding messages to keep them
secret, so only "authorized" parties can read it.
Decryption - ANSWER a process that reverses encryption, taking a
secret message and reproducing the original plain text.
Symmetric Key Encryption - ANSWER involves one key for both
encryption and decryption.
Public Key Encryption - ANSWER pairs a public key for encryption and a
private key for decryption. The sender does not need the receiver's
ANSWERS
Computing Innovation - ANSWER includes a program as an integral part
of its function. Can be physical (e.g. self-driving car), non-physical
computing software (e.g. picture editing software), or non-physical
computing concepts (e.g., e-commerce).
Personally Identifiable Information (PII) - ANSWER information about an
individual that identifies, links, relates, or describes them.
Phishing - ANSWER a technique that attempts to trick a user into
providing personal information. That personal information can then be
used to access sensitive online resources, such as bank accounts and
emails
Keylogging - ANSWER the use of a program to record every keystroke
made by a computer user in order to gain fraudulent access to
passwords and other confidential information
Malware - ANSWER software intended to damage a computing system
or to take partial control over its operation
Rogue Access Point - ANSWER a wireless access point that gives
unauthorized access to secure networks.
Encryption - ANSWER a process of encoding messages to keep them
secret, so only "authorized" parties can read it.
Decryption - ANSWER a process that reverses encryption, taking a
secret message and reproducing the original plain text.
Symmetric Key Encryption - ANSWER involves one key for both
encryption and decryption.
Public Key Encryption - ANSWER pairs a public key for encryption and a
private key for decryption. The sender does not need the receiver's