Home
Subjects
Textbook solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
AP Computer Science Principles Unit 1 UTeach
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (23)
Algorithm
A set of steps that completes a task
Flowchart
Visual representation of the structure and organization of an algorithm
Sequence
Each step of an algorithm follows the previous step
Selection
Conditional situation where an algorithm decides which sequence of instructions to execute
Iteration
Completion and repetition of a sequence
Encryption/Encode and Decryption/Decode
protect and secure information by rendering the information unreadable and then readable again using a strategy
Caesar cipher
Offsetting the alphabet by a certain number to scramble the letters of a communication
Symmetric (single key) encryption
Use of the same key for encryption and decryption
Asymmetric (public key) encryption
Use of pairs of keys, public to many users and private to the owner, for encryption and decryption
Cybersecurity
Measures taken to protect a computer or computer system against unauthorized access or attack
Vigenere cipher
Rotates the Caesar cipher offset used to encrypt each new letter in a text
Confidentiality
Ability to limit access to information to a certain set of users
Secure Sockets Layer(SSL)
Process where secure information is sent with a lock; the lock is then used by the receiver of the information and sent back to the sender; the lock is then opened by the original sender
Integrity
Certainty that information is correct
Availability
Reliability of access to information
Sets with similar terms
AP Comp Science
35 terms
AIS CH 9
72 terms
Info Chapter 4
86 terms
MIS CHAPTER 4
102 terms
Sets found in the same folder
Blown to Bits : Chapter 2
13 terms
UTeach Computer Science Principles Unit 1: Computa…
62 terms
Blown to Bits Chapter 1
14 terms
Computer Science Principles Unit 3
19 terms
Other sets by this creator
Computer Science Principles AP- Unit 1 Terms
38 terms
CS-A Vocabulary Summary from Shawn Kenner
29 terms
AP Computer Science Principles Unit 2 Vocabulary
36 terms
Pre-Calculus Chapter 1.1 to 1.4
10 terms
Verified questions
COMPUTER SCIENCE
For a cnf-formula $\phi$ with m variables and c clauses, show that you can construct in polynomial time an NFA with O(cm) states that accepts all nonsatisfying assignments, represented as Boolean strings of length m. Conclude that $\mathrm{P} \neq \mathrm{NP}$ implies that NFAs cannot be minimized in polynomial time.
COMPUTER SCIENCE
Write a modified Button class that creates circular buttons. Call your class CButton and implement the exact same methods that are in the existing Button class. Your constructor should take the center of the button and its radius as normal parameters. Place your class in a module called cbutton.py. Test your class by modifying roller.py to use your buttons.
COMPUTER SCIENCE
Consider the scheduling algorithm in the Solaris operating system for time-sharing threads. a. What is the time quantum (in milliseconds) for a thread with priority 15? With priority 40? b. Assume that a thread with priority 50 has used its entire time quantum without blocking. What new priority will the scheduler assign this thread? c. Assume that a thread with priority 20 blocks for I/O before its time quantum has expired. What new priority will the scheduler assign this thread?
COMPUTER SCIENCE
T F It is not possible for a function to have some parameters with default arguments and some without.
Other Quizlet sets
gender roles
16 terms
Advanced Trainer Test 1 Part 1
19 terms
human geography
73 terms
An Actor's Nightmare - George
120 terms
Related questions
QUESTION
The software that supports a computer's basic functions, such as controlling computer memory, scheduling tasks, and running applications.
QUESTION
What permissions are typically placed on soft link files?
QUESTION
A virtual machine does not have a disk space.
QUESTION
Write an SQL statement that returns only the single most recent transaction for 'joe1' from the table transactions, using naturally the timestamp column in transactions.