100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

AP Computer Science Principles Unit 1 UTeach Questions & Answers

Puntuación
-
Vendido
-
Páginas
2
Grado
A+
Subido en
21-10-2024
Escrito en
2024/2025

Algorithm - ANSWERSA set of steps that completes a task Flowchart - ANSWERSVisual representation of the structure and organization of an algorithm Sequence - ANSWERSEach step of an algorithm follows the previous step Selection - ANSWERSConditional situation where an algorithm decides which sequence of instructions to execute Iteration - ANSWERSCompletion and repetition of a sequence Encryption/Encode and Decryption/Decode - ANSWERSprotect and secure information by rendering the information unreadable and then readable again using a strategy Caesar cipher - ANSWERSOffsetting the alphabet by a certain number to scramble the letters of a communication Symmetric (single key) encryption - ANSWERSUse of the same key for encryption and decryption Asymmetric (public key) encryption - ANSWERSUse of pairs of keys, public to many users and private to the owner, for encryption and decryption Cybersecurity - ANSWERSMeasures taken to protect a computer or computer system against unauthorized access or attack Vigenere cipher - ANSWERSRotates the Caesar cipher offset used to encrypt each new letter in a text Confidentiality - ANSWERSAbility to limit access to information to a certain set of users Secure Sockets Layer(SSL) - ANSWERSProcess where secure information is sent with a lock; the lock is then used by the receiver of the information and sent back to the sender; the lock is then opened by the original sender Integrity - ANSWERSCertainty that information is correct Availability - ANSWERSReliability of access to information Distributed Denial of Service Attack (DDoS) - ANSWERSMultiple computers infected with malware coordinated to send requests to a web server at the same time Social Engineering - ANSWERSPsychological manipulation of people into performing actions or divulging confidential information Phishing - ANSWERSMasquerade as an official representative of an organization to ask or demand for confidential information Malware - ANSWERSMalicious software Ambiguity - ANSWERSA statement's meaning is open to interpretation High Level Language - ANSWERSWell suited for human communication; complex and contain a high degree of abstraction Low level Language - ANSWERSOptimized for machines; characterized by their discrete logic and highly structured circuitry Moore's Law - ANSWERSThe number of transistors that can fit on a chip roughly doubles every 1-2 years

Mostrar más Leer menos
Institución
AP Computer Science Principles
Grado
AP Computer Science Principles








Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
AP Computer Science Principles
Grado
AP Computer Science Principles

Información del documento

Subido en
21 de octubre de 2024
Número de páginas
2
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

AP Computer Science Principles Unit 1
UTeach Questions & Answers
Algorithm - ANSWERSA set of steps that completes a task

Flowchart - ANSWERSVisual representation of the structure and organization of an
algorithm

Sequence - ANSWERSEach step of an algorithm follows the previous step

Selection - ANSWERSConditional situation where an algorithm decides which
sequence of instructions to execute

Iteration - ANSWERSCompletion and repetition of a sequence

Encryption/Encode and Decryption/Decode - ANSWERSprotect and secure information
by rendering the information unreadable and then readable again using a strategy

Caesar cipher - ANSWERSOffsetting the alphabet by a certain number to scramble the
letters of a communication

Symmetric (single key) encryption - ANSWERSUse of the same key for encryption and
decryption

Asymmetric (public key) encryption - ANSWERSUse of pairs of keys, public to many
users and private to the owner, for encryption and decryption

Cybersecurity - ANSWERSMeasures taken to protect a computer or computer system
against unauthorized access or attack

Vigenere cipher - ANSWERSRotates the Caesar cipher offset used to encrypt each new
letter in a text

Confidentiality - ANSWERSAbility to limit access to information to a certain set of users

Secure Sockets Layer(SSL) - ANSWERSProcess where secure information is sent with
a lock; the lock is then used by the receiver of the information and sent back to the
sender; the lock is then opened by the original sender

Integrity - ANSWERSCertainty that information is correct

Availability - ANSWERSReliability of access to information
$11.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Bestgrades2 West Virginia University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
23
Miembro desde
1 año
Número de seguidores
0
Documentos
3985
Última venta
2 meses hace

4.0

3 reseñas

5
1
4
1
3
1
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes