AP Computer Science Principles Final
Exam Review| comprehensive Q&A
Malware attacks - correct-answer -short for malicious software, is any software
used to disrupt computer or mobile operations, gather sensitive information, gain
access to private computer systems, or display unwanted advertising
Phishing - correct-answer -is the attempt to obtain sensitive information such as
usernames, passwords, and credit card details (and, indirectly, money), often for
malicious reasons, by disguising as a trustworthy entity in an electronic
communication.
DDos Attack - correct-answer -denial-of-service attack (DoS attack) is a cyber-
attack where the perpetrator seeks to make a machine or network resource
unavailable to its intended users by temporarily or indefinitely disrupting services
of a host connected to the Internet.
DNS Server - correct-answer -is a hierarchical decentralized naming system for
computers, services, or other resources connected to the Internet or a private
network.
, 2|Page
Citizen Science - correct-answer -Lots of people to help with a scientific project,
like asking everyone around the world to count the butterflies they see one day
Cloud Computing - correct-answer -Using distributed calculations and/or storage
for big data or a web applicatio)
Overflow - correct-answer -error that results when the number of bits is not
enough to hold the number, like a car's odometer "rolling over"
Round-off - correct-answer -error that results when the number of bits is not
enough to represent the actual number, like 3 digits to represent π as 3.14
Lossy - correct-answer -Compressing data in a way that throws some data away
and makes it almost impossible to recover the original, great compression, like
JPEG images
Lossless - correct-answer -Compressing data in a way that preserves all data away
and allows full recovery of the original, good compression -- usually not as good as
lossy, like PNG images