PII - ANSWER Personally Identifiable Information
Information about an individual that identifies, links, relates, or describes them.
Examples:
- Social Security number
- Age
- Race
- Phone number(s)
- Medical information
- Financial information
- Biometric data
Phishing - ANSWER Ph...
AP CSP Exam Review (2024) Accurate
100%
PII - ANSWER Personally Identifiable Information
Information about an individual that identifies, links, relates, or describes them.
Examples:
- Social Security number
- Age
- Race
- Phone number(s)
- Medical information
- Financial information
- Biometric data
Phishing - ANSWER Phishing is a technique that attempts to trick a user into providing
personal information.
Example: Fraudulent emails.
Internet vs. the World Wide Web - ANSWER The Internet is a network of interconnected
networks, but the World Wide Web is an information system that is accessed via the
Internet and is a system of linked pages, programs and files.
Multifactor Authentication - ANSWER Multifactor authentication is a method of computer
access control in which a user is only granted access after successfully presenting
several separate pieces of evidence to an authentication mechanism.
Example: A user provides a password and shows evidence of having the phone
associated with the user account.
Redundancy and how it benefits the reliability of data transmission - ANSWER A system
design in which a component is duplicated so if it fails there will be a backup.
Redundancy has a negative connotation when the duplication is unnecessary or is
simply the result of poor planning.
Benefit of redundancy: It often allows messages to be sent on the network even if some
network devices or connections have failed. If a particular device or connection on the
Internet fails, subsequent data will be sent via a different route, if possible.
How analog audio signals are represented by a computer - ANSWER Analog signals
are sampled digitally at discrete intervals over time. These samples, like all digital data,
are represented at the lowest level as a sequence of bits.
,Creative Commons License - ANSWER A no-rights-reserved Creative Commons
license is used when the creator of a published work wants the work to be made freely
available to everyone.
Data Mining - ANSWER A computer-assisted technique used in analytics to process
and explore large data sets. With data mining tools and methods, organizations can
discover hidden patterns and relationships in their data.
Data compression algorithms - ANSWER Data Compression algorithms works by
identifying and eliminating redundant or unnecessary information from the data.
There are two main types of data compression algorithms: lossless compression and
lossy compression.
Lossless compression - ANSWER An algorithm that reduces the number of bits stored
or transmitted while guaranteeing complete reconstruction of the original data.
In situations where quality or ability to reconstruct the original is maximally important,
lossless compression algorithms are typically chosen.
Lossy compression - ANSWER Lossy compression reduces a file by permanently
eliminating certain information, especially redundant information. When the file is
uncompressed, some of the original information is not there, although the user may not
notice it.
It significantly reduces the number of bits stored or transmitted but only allow
reconstruction of an approximation of the original data.
In situations where minimizing data size or transmission time is maximally important,
lossy compression algorithms are typically chosen.
Bandwidth - ANSWER The bandwidth of a computer network is the maximum amount of
data that can be sent in a fixed amount of time (measured in bits per second). With
limited bandwidth, guest users will be restricted in the amount of data transmitted per
second.
Overflow error - ANSWER An error that occurs when a computer attempts to handle a
number that is outside of the defined range of values.
Example: When the value of the count exceeded the maximum value that can be
represented by a fixed number of bits, the count overflowed and wrapped around to a
negative number.
Run-time error - ANSWER A runtime error occurs while the program is running. It is
typically caused by something the program tries to do that the programming language or
, environment does not allow. Runtime errors can include things like division by zero,
trying to access a memory location that is not allowed, or attempting to perform an
operation on incompatible data types. When a runtime error occurs, the program may
crash or behave unexpectedly.
Example: The use of lists allows multiple related items to be treated as a single value.
Algorithm - ANSWER A finite set of instructions that accomplish a specific task.
The combination of items that can construct any algorithm. - ANSWER Sequencing,
selection, and iteration.
Sequencing - ANSWER Ordering commands in order for a computer to correctly
execute them and achieve the goal of an algorithm.
Sequential statements execute in the order they appear in the code segment.
Code statement - ANSWER A part of program code that expresses an action to be
carried out.
Expression - ANSWER A value, variable, operator, or procedure call that returns a
single value.
Arithmetic operators - ANSWER +, -, *, /, MOD
MOD functionality - ANSWER The modulus operator (MOD) returns the remainder of
a/b when a MOD b.
Example:
5 MOD 2 == 1
Order of operations when evaluating expressions in programming languages -
ANSWER The order of operations used in mathematics applies when evaluating
expressions. The MOD operator has the same precedence as the * and / operators.
String concatenation - ANSWER Joins together two or more strings end-to-end to make
a new string.
Substring - ANSWER A part of an existing string.
Boolean values - ANSWER True or false, 1 or 0, respectively.
Relational operators - ANSWER =, !=, >, <, >=, <=
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller shantelleG. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £14.21. You're not tied to anything after your purchase.