zuai-logo
zuai-logo
  1. AP Computer Science A
FlashcardFlashcardStudy GuideStudy GuideQuestion BankQuestion BankGlossaryGlossary

Glossary

A

ArrayLists

Criticality: 3

A dynamic array in Java that can grow or shrink in size, allowing elements to be added or removed after initialization.

Example:

When building a game, an ArrayLists of Enemy objects can easily manage a varying number of foes on screen.

Authentication

Criticality: 2

The process of verifying the identity of a user or system, ensuring they are who they claim to be.

Example:

Entering your password to log into an app is a form of authentication to prove your identity.

B

Brute forcing

Criticality: 1

A trial-and-error method used to obtain information, such as a password or decryption key, by systematically trying every possible combination until the correct one is found.

Example:

A hacker attempting to guess a password by trying every single word in the dictionary is an example of brute forcing.

C

Ciphers

Criticality: 2

Algorithms used for encrypting or decrypting data, allowing information to be scrambled and then unscrambled using a specific key.

Example:

The Caesar cipher shifts each letter by a fixed number of positions, making a message unreadable without knowing the shift amount.

Cryptography

Criticality: 3

The practice and study of techniques for secure communication in the presence of third parties, primarily focused on securing data.

Example:

The entire field of cryptography is dedicated to making sure your online transactions are private and secure.

Cybercriminals

Criticality: 1

Individuals or groups who use computers and networks to commit illegal activities, often involving the misuse of personal data.

Example:

A cybercriminal might attempt to phish login credentials to gain unauthorized access to online accounts.

D

Databases

Criticality: 2

Organized collections of data, typically stored and accessed electronically from a computer system.

Example:

A school might use a database to store student names, grades, and attendance records.

E

Encapsulation

Criticality: 3

An object-oriented programming principle that bundles data and the methods that operate on the data within a single unit, restricting direct access to some of the object's components.

Example:

A Car class might use encapsulation to keep its speed variable private, only allowing changes through accelerate() or brake() methods.

Encryption

Criticality: 2

The process of converting information or data into a code to prevent unauthorized access, making it unreadable without the correct key.

Example:

When you send a secure message, encryption scrambles the text so only the intended recipient can read it.

F

Financial fraud

Criticality: 1

Deceptive practices used to gain an unfair financial advantage, often involving the manipulation of financial data or transactions.

Example:

Using stolen credit card numbers to make unauthorized purchases online is a common form of financial fraud.

H

Hash functions

Criticality: 2

Mathematical algorithms that transform data into a fixed-size string of characters, used for data integrity and non-reversible encryption.

Example:

When you create an account, your password isn't stored directly; instead, a hash function creates a unique, one-way code from it for security.

I

Identity theft

Criticality: 1

The fraudulent appropriation and use of another person's identifying information, typically for financial gain.

Example:

If a hacker steals your social security number and opens credit cards in your name, that's a clear case of identity theft.

K

Key

Criticality: 2

A piece of information, typically a string of characters or numbers, used in cryptography to encrypt or decrypt data.

Example:

To unlock a secret message encrypted with a key, you need the exact same sequence of characters used to lock it.