APCSP - Unit 6 Flashcards
What is made possible by the Internet and the WWW, employing client-server computing?
Cloud computing
Give an example of a clinet
Phone
Give an example of a server
Google search engine
Define bandwidth
The amount of data that can be sent in a fixed amount of time.
Define latency
The amount of time it takes to send a message over the Internet.
What school policy would most likely have a positive impact on the digital divide?
A school provides a laptop or tablet computer to all students enrolled at the school.
What does the Gmail server do when you send an email message using Gmail in your browser.
The Gmail server divides the message into packets that are routed individually over the Internet to the recipient’s email.
What are benefits of redundancy in routing on the Internet where there is more than one route for packets to travel through the Internet.
Increasing the ease with which the Internet can scale or grow where extra routes can be easily added.
Increasing the fault-tolerance of the INternet so that packets will reach their destination even if some connections have failed.
What is an IPv4 address?
A string of bits that provide a computer’s Internet address.
Is used to route data through the Internet
Consists of 32 bits.
What does the DNS do?
Domain Name System; Translated easy-to-remember domain names into IP addresses.
What is the Network Service Provider responsible for?
Creating and assigning IP addresses as new users join a network
What is the subdomain of the domain example.com
about.example.com
Define cipher
An algorithm that is used to scramble text so that it can be passed in secret.
Give an example of a substitution cipher.
Caesar cipher
What technique can be used to break the Caesar cipher?
Frequency analysis.
What are Caesar cipher, simple substitution cipher, and Vigenere cipher examples of?
Symmetric cipher
Substitution cipher
What does a polyalphabetic cipher use?
Multiple alphabets
Give an example of a key exchange problem?
The problem of securely sharing a symmetric key between Alice and Bob.
What is a one-way function
A function that is easy to compute one way and hard in another.
What is an asymmetric cipher?
Exemplified by RSA and Diffie-Hellman
Uses different keys for encryption and decryption
Can be used to solve the key exchange problem.
What is the HTTP’s protocol?
An example of an open standard
Uses public key encryption to exchange a symmetric key between a user’s browser and a server
Uses a symmetric cipher to encrypt data between a user’s browser and a server
Uses a Certificate Authority to authenticate the identity of the server during the transaction
What is true about digital certificates in Web browsers?
Digital certificates are used to verify the ownership of encrypted keys used in secure communication
In computer programming, what is the set of rules that determines whether statements are correctly formulated.
Syntax
I’m computer programming, what is a bug?
An error or defect that prevents the app from working the way it is supposed to.
List examples of semantic errors in App inventor.
The Paint pot ButtonMinus.Click event adding 1 to the dot size
The Paint pot ButtonRed.Click
Define router
A device that transmits data between two different networks.
Define ethernet
A network that uses wires to connect computers
Define modem
A device that connects a computer to an Internet Service Provider
Define protocol
A system of rules that govern the behavior of some system
Define network
A group of two or more computers that are linked together.
Define World Wide Web
An Internet application that is based on the HTTP protocol.
Define client
A computer or software application that requests services from a server located on the Internet
Define cryptography
The art and science of writing secret messages
Define server
A host that provides some sort of service
What is the digital divide? What are some ways to reduce the effects of the digital divide?
The gap between those who have access to computers and the Internet and those who do not
Government and cities should strive to offer places like libraries and schools where anyone can access computers and the Internet.
They should work to create infrastructures necessary to provide places access to the Internet.
Describe the benefits of multi-factor authentication
Requires additional authentication in addition to the password, just in case the password gets compromised.