



Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A comprehensive overview of key concepts and terminology related to computer science principles, including high-level and low-level programming languages, machine learning, cryptography, network protocols, and more. It covers a wide range of topics that are commonly tested in the ap computer science principles exam, making it a valuable resource for students preparing for the 2023/2024 academic year. The document delves into the differences between various programming languages, the fundamentals of machine learning, the principles of cryptography, and the inner workings of network protocols like tcp/ip and http. By studying this document, students can gain a deeper understanding of the core concepts and principles that underpin modern computer science, which will not only help them succeed on the ap exam but also provide a solid foundation for further study in the field.
Typology: Exercises
1 / 6
This page cannot be seen from the preview
Don't miss anything!
Heuristic - ans-a technique designed for solving a problem more quickly when classic methods are too slow, or for finding an approximate solution when classic methods fail to find any exact solution
High-Level Programming Language - ans-A high-level language (HLL) is a programming language such as C, FORTRAN, or Pascal that enables a programmer to write programs that are more independent of a type of computer. Languages are considered high-level since they are closer to human languages and further from machine languages.
Low level programming language - ans-Low-level languages those languages which are extremely close to machine language. aka Assembly languages. The closest languages after Assembly to Machine language are C and C++. Machine code is known as low level because unlike high level programming languages it doesn't need anything else like compilers or something. It runs directly on the processor and they are extremely architecture specific.(not like english)
natural language - ans-Natural-language processing (NLP) is an area of computer science and artificial intelligence concerned with the interactions between computers and human (natural) languages, in particular how to program computers to fruitfully process large amounts of natural language data.
machine code - ans-the elemental language of computers. It is read by the computer's central processing unit (CPU), is composed of digital binary numbers and looks like a very long sequence of zeros and ones. Ultimately, the source code of every human-readable programming language must be translated to machine language by a compiler or an interpreter, because binary code is the only language that computer hardware can understand.
machine learning - ans-Machine learning is a field of computer science that uses statistical techniques to give computer systems the ability to "learn" (e.g., progressively improve performance on a specific task) with data, without being explicitly programmed.
lossy - ans-permanently eliminating certain information, especially redundant information. When the file is uncompressed, only a part of the original information is still there
lossless - ans-every single bit of data that was originally in the file remains after the file is uncompressed
latency - ans-Latency is the amount of time a message takes to traverse a system. In a computer network, it is an expression of how much time it takes for a packet of data to get from one designated point to another.
public key - ans-A public key is created in public key encryption cryptography that uses asymmetric-key encryption algorithms. Public keys are used to convert a message into an unreadable format. Decryption is carried out using a different, but matching, private key. A public key may be placed in an open access directory for decryption of the digital signature of the sender.
private key - ans-A private key is a tiny bit of code that is paired with a public key to set off algorithms for text encryption and decryption. It is created as part of public key cryptography during asymmetric- key encryption and used to decrypt and transform a message to a readable format. Public and private keys are paired for secure communication, such as email.
undecideable - ans-a decision problem that no algorithm can decide, formalized as an undecidable language or undecidable set.
decidable - ans-capable of being decided. (computer science) describing a set for which there exists an algorithm that will determine whether any element is or is not within the set in a finite amount of time.
reasonable - ans-
unreasonable - ans-
solvable - ans-a problem that can be solved
unsolvable - ans-a problem that cannot be solved
Distributive Denial of Service(DDoS) - ans-Traffic attacks: Traffic flooding attacks send a huge volume of TCP, UDP and ICPM packets to the target. Legitimate requests get lost and these attacks may be accompanied by malware exploitation.
Bandwidth attacks: This DDos attack overloads the target with massive amounts of junk data. This results in a loss of network bandwidth and equipment resources and can lead to a complete denial of service.
Application attacks: Application-layer data messages can deplete resources in the application layer, leaving the target's system services unavailable.
Phishing - ans-a technique used to gain personal information for purposes of identity theft, using fraudulent e-mail messages that appear to come from legitimate businesses
Cache Posioning - ans-the corruption of an Internet server's domain name system table by replacing an Internet address with that of another, rogue address.
String - ans-an arbitrary-length sequence of ASCII characters
Substring - ans-A subset of an alphanumeric field or variable. The substring function in a programming language is used to extract the subset; for example, the programming expression substr(prodcode,4,3) extracts characters 4, 5 and 6 out of a product code field or variable.
crowdsourcing - ans-a process that involves outsourcing tasks to a distributed group of people. These tasks could be online or offline, paid or for free, and they are outsourced to an undefined public, in opposition to traditional outsourcing.
cloud computing - ans-a type of Internet-based computing, where different services —including servers, storage and applications — are delivered to an organization's computers and devices through the Internet.
citizen science - ans-research collaborations between scientists and volunteers, particularly (but not exclusively) to expand opportunities for scientific data collection and to provide access to scientific information for community members.
internet engineering task force - ans-the body that defines standard Internet operating protocols such as TCP/IP.
iterative process - ans-a mathematical procedure that uses an initial guess to generate a sequence of improving approximate solutions for a class of problems, in which the n-th approximation is derived from the previous ones.
incremental process - ans-a method of software development where the product is designed, implemented and tested incrementally (a little more is added each time) until the product is finished
high/low level abstractions - ans-The amount of complexity by which a system is viewed or programmed. The higher the level, the less detail. The lower the level, the more detail. The highest level of abstraction is the entire system. The next level would be a handful of components, and so on, while the lowest level could be millions of objects
Digital Millennium Copy Right - ans-a United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works (commonly known as digital rights management or DRM). It also criminalizes the act of circumventing an access control, whether or not there is actual infringement of copyright itself. In addition, the DMCA heightens the penalties for copyright infringement on the Internet.
Digital Divide - ans-the gap between demographics and regions that have access to modern information and communications technology, and those that don't or have restricted access.
Meta Data - ans-data that describes other data