Data security
Asymmetric Encryption
PII
Abstraction
Lists
100

Converting data into unreadable form to prevent unauthorized access

What is Encryption?
100

Name of the mathematical algorithm that we used generate paired keys to encrypt and decrypt messages.

What is RSA?
100

Personally Identifiable Information

What is PII ?

100

Simplifying complex systems by focusing on essential features while hiding unnecessary details.

What is Abstraction?

100
First index value of a list, on AP CSP exam

What is 1?

200

Converting encrypted data to human-readable form

Decryption

200

The key do you use to encrypt a message so that only the recipient can read it

What is Public Key?
200

Fingerprint, Retinal scan, DNA

What are examples of Biometric PII?


200

Moving related segments of your code into functions (procedures).

What is Procedural Abstraction?

200

A structure containing a group of related data

What is a list?

300

This form of text file stores a packet of data on your device to keep track of your visits and activity on a website

 What is a cookie?

300

Using a pre-shared "key" to restrict message access to only the intended recipient(s)

What is Symmetric Encryption?

300

wifi access point with unauthorized access to secure network

What is a rogue access point?

300

Two advantages that abstraction provides your code?

What  are: 

Reduce complexity

Easy to reuse

Easier to read

Easier to maintain

Easier to collaborate


300

Procedure to add a value at the end of a list

What is APPEND?

400

This form of software is intended to damage or take control over a host computer or operation

What is Malware?

400

Trusted entity that providing a digital document to verify identity (key ownership)

What is a Certificate Authority?

400

Action of seeding fraudulent emails from supposedly good companies to try and extract personal information from the victim.

What is Phishing?
400

Five advantages that abstraction gives your code

What are:
Reduce complexity

Easy to reuse

Easier to read

Easier to maintain

Easier to collaborate

400

name <-- ["T","A","P"]  tap

INSERT(name, 2, "R")

DISPLAY(name)

What is TRAP?

(not TARP!  AP starts with index=1)


500

Restricting message access to specific person without sharing the "key" you used to encrypt it

What is Asymmetric Encryption?

500

The key you use to encrypt your message so your recipient can verify that you sent the message.

Private key
500

Software that records what a user types

What is a Keystroke Logger?

500

Two examples of abstraction

What are:
Importing functions from a separate file
Procedural abstraciton

Data abstraction

A list

A function


500

transportList <-- ["Bus", "Taxi", "Ferry"]

transport <--  transportList[2] 

letter <-- transport[1]


What is the letter  "T" ?