100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
PLTW AP CSP Unit 2 Every Bit of the Internet Questions With 100%Verified AnswersA+GRADED $10.99   Add to cart

Exam (elaborations)

PLTW AP CSP Unit 2 Every Bit of the Internet Questions With 100%Verified AnswersA+GRADED

 3 views  0 purchase
  • Course
  • Pltw
  • Institution
  • Pltw

PLTW AP CSP Unit 2 Every Bit of the Internet Questions With 100%Verified AnswersA+GRADED cybersecurity - correct answer...Measures taken to protect a computer or computer system against unauthorized access or attack phishing - correct answer...An attack that sends an email or displays a Web a...

[Show more]

Preview 2 out of 7  pages

  • August 16, 2024
  • 7
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Pltw
  • Pltw
avatar-seller
agradesolutions
PLTW AP CSP Unit 2 Every Bit of the
Internet Questions With 100%Verified
AnswersA+GRADED
cybersecurity - correct answer...✔✔Measures taken to protect a computer or computer
system against unauthorized access or attack

phishing - correct answer...✔✔An attack that sends an email or displays a Web
announcement that falsely claims to be from a legitimate enterprise in an attempt to trick
the user into surrendering private information

Personally Identifiable Information (PII) - correct answer...✔✔any data that can be
used to identify, locate, or contact an individual

malware - correct answer...✔✔malicious software intended to damage a computing
system or to take partial control over its operation

keystroke logger - correct answer...✔✔A type of spyware program that monitors
keystrokes with the intent of stealing passwords, login IDs, or credit card information.

rogue access point - correct answer...✔✔A wireless access point that gives
unauthorized access to secure networks.

cryptography - correct answer...✔✔The science and art of delivering a message
securely and confidentially.

encryption - correct answer...✔✔The process of encoding data to prevent unauthorized
access, such as converting plaintext to ciphertext.

decrypt - correct answer...✔✔The process of decoding the data; making the data
human-readable again.

substitution cipher - correct answer...✔✔A method of encryption and decryption in
which each letter in the alphabet is replaced by another letter or symbol.

brute force - correct answer...✔✔A method for determining a solution to a problem by
sequentially testing all possible solutions.

private key encryption - correct answer...✔✔A type of encryption where only the two
parties involved in sending the message have the code.



AGRADESOLUTIONS

, public key encryption - correct answer...✔✔A method of paired key encryption in which
the key used to encrypt data is made available to anybody and its corresponding
decryption key is kept secret.

SSL certificate - correct answer...✔✔A digital document used to verify the authenticity
of a server or public key.

authenticate - correct answer...✔✔Confirm your identity using knowledge known only
to you or information interpreted by you.

GUI - correct answer...✔✔Currently the dominant method for designing human-
computer interaction.

API - correct answer...✔✔A way programmers share their code with other
programmers.

argument - correct answer...✔✔An input value to a command that specifies the values
of the parameters when a procedure is called.

event listener - correct answer...✔✔a command that can be set up to trigger a function
when a particular type of event occurs on a particular UI element.

event handler - correct answer...✔✔A chunk of code that responds to actions
performed by users or by other parts of the program.

logic error - correct answer...✔✔A mistake in the algorithm or program that causes it to
behave incorrectly, unexpectedly, or with undesirable results.

syntax - correct answer...✔✔Precise rules defining how the letters, words, and
punctuation of a programming language are required to be used together.

runtime error - correct answer...✔✔A mistake in the program that occurs during the
execution of a program

debug - correct answer...✔✔The process of detecting and eliminating a device's
malfunctions.

paired keys - correct answer...✔✔Two keys that are related in such a way that one can
be used to encrypt data, which can then only be decrypted by the other key.

asymmetric encryption - correct answer...✔✔a type of cryptographic based on
algorithms that require two keys -- one of which is secret (or private) and one of which is
public (freely known to others).




AGRADESOLUTIONS

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller agradesolutions. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78140 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.99
  • (0)
  Add to cart