csp

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/321

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

322 Terms

1
New cards

W3C Technical Report

A final document on a standard or protocol from the World Wide Web Consortium.

2
New cards

Quantitative Variable

Has values that have a meaningful order.

3
New cards

Query

A request for information

4
New cards

Random Access Memory (RAM)

Memory that stores data that is in use

5
New cards

Range

Maximum value minus minimum value

6
New cards

Read-eval-print loop (REPL)

A loop that repeats the process of obtaining one instruction, executing it, and printing the output.

7
New cards

Reasonable Time

Algorithms with efficiencies that grow at a polynomial rate or slower (constant, linear, square, cube, etc.) are said to run in a reasonable amount of time.

8
New cards

Reconnaissance

The first phase of ethical hacking, which involves probing of the network to understand its structure and to see what services are open and running.

9
New cards

Recursion

When a function calls itself.

10
New cards

recursive Domain Name System (DNS)

A system that queries authoritative name servers until it can provide an answer to a request for domain information.

11
New cards

Redundancy

the inclusion of extra components that can be used to mitigate failure of a system if other components fail

12
New cards

register

A very tiny part of the processor microchip that stores bits of data, typically 32 or 64 bits in modern computers.

13
New cards

reidentification

Reattaching personal identities to deidentified data, often because Big Data make anonymity unlikely.

14
New cards

relational database

A database in which data is organized into collections of similar data, called tables. It uses relationships to define how data in one table can relate to data in another table. For example, a table called "students" can contain data about all the students in a school, while another table called "grades" can contain data about student grades. The two tables are "related," or connected, by a student identification number.

15
New cards

relational operators

Used to test the relationship between two variables, expressions, or values. A comparison using a relational operator evaluates to a Boolean value. For example, a == b evaluates to true if a and b are equal; otherwise, it evaluates to false. Operators include: ==, !=, >,

16
New cards

relative filename

A filename and a path for getting to the file's directory, starting from the current working directory

17
New cards

Relative Frequencies

A measure of the rate at which characters are used in a document or language with respect to each other.

18
New cards

relative path

An expression of the path to a resource on a computer with respect to the current working directory.

19
New cards

relative reference

Used in a formula in a spreadsheet cell, this reference is a direction from the formula's spreadsheet cell to the spreadsheet cell with the data.

20
New cards

Remediation

The fourth and last phase of ethical hacking in which the security professionals fix the system vulnerabilities uncovered in the previous phases.

21
New cards

Remote Shell

A tool for accessing a computer over a network via the command line.

22
New cards

Repetitive strain injuries

Inflammation in joints and musculature resulting from frequently recurring motions.

23
New cards

Request for Comments (RFC)

A misnomer, these are official, finalized documents about internet standards and protocols from the Internet Engineering Task Force.

24
New cards

Requirements

Describes how a program should function and may include a description of user interactions that a program must provide.

25
New cards

Retina

Light-sensitive tissue at the back of the eyeball.

26
New cards

Return Value

Any value that a method or function gives back to the statement command from which the function or method is called.

27
New cards

Rods

Light-sensitive neurons in the retina responsible for black-and-white vision under low lighting conditions.

28
New cards

Rogue access point

A wireless access point that gives unauthorized access to secure networks.

29
New cards

Rogue software security

Software that claims to detect or remove malware, adware, or spyware but actually installs it.

30
New cards

Root

n. A file system has a root directory with no parent. n. An operating system has a root user with no limits on privileges. v. To root a system is to obtain root access (i.e. the unlimited privileges of the root user).

31
New cards

Root directory

In UNIX, the topmost directory denoted as /.

32
New cards

Rootkit

A tool that obtains the highest level of privilege on a device, sometimes used intentionally by a mobile device owner to override the protections installed by the service provider.

33
New cards

Root node

The top level of a file structure. The folder that contains all other folders.

34
New cards

Router

A network device that controls and filters data between networks, either wired or wireless. It is a specific type of "gateway," a device that acts as a gate between two networks.

35
New cards

Routing Table

Data that is stored in a router in table format. It contains addresses of known networks (other routers), ones that have already been discovered and used. When a new, unknown network destination is discovered, the router will update its routing table.

36
New cards

RSA Algorithm

An example of public key encryption developed by Rivest, Shamir, and Adelman, the founders of RSA, an American computer and network security company.

37
New cards

Runtime

The duration of time a program is executing, from start to finish.

38
New cards

Runtime error

A mistake in the program that occurs during the execution of a program. Programming languages define their own run-time errors.

39
New cards

W3C Working Group

An organization within the World Wide Web Consortium focused on one W3C Activity intended to develop or evolve a web technology.

40
New cards

Walker Variable

A variable that stores one item from a list at a time during iteration.

41
New cards

Waterfall Design

A method of software development that emphasized completing each state of the design process before beginning the next stage.

42
New cards

Web Address

The unique address of a website or a computer connected to a network. Also known as a URL.

43
New cards

Web Crawler

A softbot responsible for following hyperlinks throughout the Internet to provide information for the creation of a web index.

44
New cards

Web Index

A database that stores information about web content.

45
New cards

Web Server

A computer that delivers files forming web pages across a network to requesting clients.

46
New cards

Website Information

Web pages and other non-product information such as shipping method and return policy.

47
New cards

Widget

A standard component of a GUI.

48
New cards

Wildcard

A special character that can represent one or more characters. The asterisk wildcard can stand from many letters, numbers, or symbols.

49
New cards

Wired Equivalent Privacy

A security algorithm used in wireless networks.

50
New cards

Wireless

Shorthand for wireless router, performs the work of a network router using radio frequencies in place of wires.

51
New cards

Wireless Access Point

A device that provides connectivity to a network. This can be a router, a host, a phone, or any device with WAP software configured.

52
New cards

Working Directory

The directory in the file system you are currently "in".

53
New cards

World Wide Web

A system of linked pages, programs, and files.

54
New cards

Worm

Malware that spreads by sending itself to other computers.

55
New cards

Worst-case Running Time

The time that an algorithm will take to execute input of a given length if the input is specially chosen to take a long time. Includes only the time for the processor to complete the algorithm with this worst-case input, and does not include variation from the processor performing unrelated tasks.

56
New cards

WYSIWIG

Any content editor that shows how the final product will look as the user makes modifications.

57
New cards

Object

A specific instance of a class with a specific set of values for its own attributes that is able to execute any methods defined in its class.

58
New cards

Object Oriented

A paradigm for programming in which code describes a class with methods, including a method for creating an object in the class.

59
New cards

Obscurity

Protecting a computer by hiding details like software version number.

60
New cards

Occipital Lobe

The portion of cortex at the back of the brain that processes vision.

61
New cards

Octal

A base 8 number system, which uses only digits 0 through 7.

62
New cards

One-way flag variable

A variable that stores whether a condition has been true yet; resets before iteration and is possibly raised during iteration.

63
New cards

One-way function

A function that takes a small amount of time to compute an output from an input but a large amount of time to recover an input from the output, such as multiplying two large prime numbers.

64
New cards

Opaque

Cannot be seen through; the opposite of transparent.

65
New cards

OP code

The digital representation of an instruction that will be fetched, decoded, retrieved, and executed by the central processing unit (CPU).

66
New cards

open data movement

A movement to make raw data available to users in standardized formats so that third parties can create applications that link to the data for users to consume.

67
New cards

open source

Software that is freely available to anyone who wants to use it. Users can modify it and distribute it however they want.

68
New cards

operating system (OS)

Software that supports a computer's basic functioning. Every general-purpose computer has an operating system.

69
New cards

operator

A symbol meaning the code should do something with one or more variables, values, or expressions.

70
New cards

optimization problem

A problem with the goal of finding the "best" solution among many, especially when there is not a yes-no answer to the problem.

71
New cards

opt-in, opt-out clauses

Clauses that let a user customize an agreement or interface. "Opt-in" clauses do not apply by default. "Opt-out" clauses apply by default.

72
New cards

organizationally unique identifier (OUI)

The first half of the MAC address, designating the manufacturer of the network device. Each manufacturer has their own, individual OUI for each device they produce.

73
New cards

Overflow Error

An error that occurs when a computer attempts to handle a number that is outside of the defined range of values.

74
New cards

Overriding a default

Providing a value for an argument in a function when the function has been defined with a default value for the argument, causing Python to use the value provided instead of the default.

75
New cards

packet

Small units of data transmitted on a network. Collected together, they compose some larger data, such as a document, a website, a movie, etc.

76
New cards

packet filtering

Network security that allows or denies packets based on source and destination addresses, ports, or protocols.

77
New cards

packet sniffer

A computer program that watches and analyzes network traffic at the packet level.

78
New cards

packet switching

A method of transferring and organizing data over a network using packets that contain routing information along with the data.

79
New cards

padding

Blank space placed around elements of a display to make it look the way the designer planned.

80
New cards

paginating

Dividing content into separate pages so that content does not scroll off screen.

81
New cards

paired keys

Two keys that are related in such a way that one can be used to encrypt data, which can then only be decrypted by the other key.

82
New cards

P and NP Problems

P problems can be solved in polynomial time; solutions to NP problems can be verified in polynomial time, but it is unknown if that implies they can be solved in polynomial time.

83
New cards

parallel computing

A field of study focusing on the development of software that uses multiple processor cores to solve problems by compartmentalizing them into smaller subproblems.

84
New cards

parallelizable

A task that can be divided among multiple processors that run in parallel to speed up execution time.

85
New cards

parallel processing

Using two or more central processing units (CPU) simultaneously.

86
New cards

parameters

The input variables of a procedure. A set of information included to help a process or function operate as intended.

87
New cards

parent

An element in a tree data structure that is the immediate ancestor of another element.

88
New cards

passive analysis

Analyzing something without interfering or affecting it.

89
New cards

patch

A small change to software, usually to fix a minor problem or install a minor feature.

90
New cards

path

An expression of the location of a resource on a computer.

91
New cards

payload

The body of a packet (as opposed to its header).

92
New cards

pcap file

A Wireshark data capture file that contains packet information of network traffic.

93
New cards

penetration testing

Performing a computer attack to evaluate the security of a system.

94
New cards

perceptron

A single, simple, artificial neuron.

95
New cards

permission privileges

Rights granted to a user, often specific to a file or a directory, and often categorized as granting permission to read data, modify data, and/or execute data.

96
New cards

personally identifiable information (PII)

Information about an individual, such as social security number, age, race, phone number(s), medical information, financial information, and biometric data such as fingerprint records and retina scans.

97
New cards

phisher

The person sending the phishing attempts.

98
New cards

phishing

Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.

99
New cards

pinout

A diagram describing the function of each lead on an integrated circuit's casing.

100
New cards

pipe

In UNIX, a pipe, indicated by a vertical bar (|), is a technique that passes or redirects output from one command to the input of another.