1/48
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Application Programming Interface (API) (2.1.4)
A way programmers share their code with other programmers; specifies the methods of each class.
Arguments (2.1.4)
An input value to a command that specifies the values of the parameters when a procedure is called.
Asymmetric Encryption (2.1.2)
An encryption method that uses two keys, a public key and a private key, belonging to one owner.
Authenticate (2.1.2, 2.1.3)
Confirm your identity using knowledge known only to you or information interpreted by you
Authorize (2.1.3)
To give permission, for example, to access information.
Boolean Expression (2.1.5)
An expression that evaluates to either true or false; used in the conditional of an if structure.\
Breakpoint (2.1.5)
A designated stopping place in your code.
Brute Force (2.1.2)
A method for determining a solution to a problem by sequentially testing all possible solutions.
Brute Force Attack (2.1.3)
An attempt to discover information, especially passwords, through trial and error. Attackers try as many passwords or phrases as possible, hoping one of the guesses is correct.
Certificate Authority (2.1.2)
A business or organization that issues a digital certificate verifying that a given public key is owned by the entity named on the certificate.
config method (2.1.4)
A method that can change the widget after it has been created
Cookie (2.1.1)
Small text-based bits of information about your browser that a web server saves.
Cryptogram (2.1.2)
A type of puzzle that consists of a short piece of encrypted text
Cryptography (2.1.2)
The science and art of delivering a message securely and confidentially.
Data Breach (2.1.1)
The unauthorized access or retrieval of confidential or otherwise protected data.
Debugging (2.1.5)
The process of figuring out why code doesn't behave as expected and eliminating bugs to make it work as desired.
Decrypt (2.1.1)
The process of decoding the data, the reverse of the encryption process, making the data human-readable again.
Encryption (2.1.2)
The process of encoding data to prevent unauthorized access, such as converting plaintext to ciphertext.
Frame (2.1.4)
A rectangular portion of the screen in a web browser.
Graphical User Interface (GUI) (2.1.3, 2.1.4)
Currently the dominant method for designing human-computer interaction.
Hacking (2.1.1)
Figuring out ways to use hardware and software that were unintended by the engineers who created it, usually used in the context of cybersecurity.
Internet (2.1.1)
A global computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols. It relies on TCP/IP for communication between devices.
Key (2.1.2)
Part of a key-value data structure often referred to as key-value pairs. Each one maps to a value.
Keystroke Logger (2.1.1)
The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
Library (2.1.4)
A collection of modules; a reusable chunk of code that you may want to include in your programs/ projects;
Logic Error (2.1.5)
A mistake in the algorithm or program that causes it to behave incorrectly, unexpectedly, or with undesirable results; the code compiles and runs but causes problems elsewhere
Magic Number (2.1.5)
A literal value (such as 5 or "hello") that is hard coded into a program instead of being assigned to a well-named variable.
Malicious URL (2.1.1)
A link created with the purpose of promoting scams, attacks and frauds.
Malware (2.1.1)
Software intended to damage a computing system or to take partial control over its operation.
Module (2.1.4)
An encapsulated collection of one or more related classes, each with its own methods and attributes.
Multifactor Authentication (2.1.3)
A method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism, typically in at least two of the following categories: knowledge (something they know); possession (something they have), and inherence (something they are).
Paired Keys (2.1.2)
Two keys that are related in such a way that one can be used to encrypt data, which can then only be decrypted by the other key.
Personally Identifiable Information (PII) (2.1.1)
Information about an individual, such as social security number, age, race, phone number(s), medical information, financial information, and biometric data such as fingerprint records and retina scans.
Phishing (2.1.1)
Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.
Private Key encryption (2.1.2)
An encryption method where the sender and receiver share a private key (such as a number, word, or phrase) to use in the encryption algorithm.
Public Key Encryption (2.1.2)
A method of paired key encryption in which the key used to encrypt data is made available to anybody and its corresponding decryption key is kept secret.
Python Framework (2.1.4)
A collection of modules and packages which allow developers to build applications quickly, without the need to take care of involved details
Python Package (2.1.4)
A way of structuring Python's module namespace by using "dotted module names". namespaces which contain multiple packages and modules themselves. They are simply directories
Rogue Access Point (2.1.1)
A wireless access point that gives unauthorized access to secure networks.
RSA Algorithm (2.1.2)
An example of public key encryption developed by Rivest, Shamir, and Adelman, the founders of RSA, an American computer and network security company.
Runtime Error (2.1.5)
A mistake in the program that occurs during the execution of a program.
Search Engine (2.1.1)
A program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web.
SSL Certificate (2.1.2)
A digital document used to verify the authenticity of a server or public key.
Substitution Cipher (2.1.2)
A cipher in which each letter in an alphabet is replaced with a different character or symbol.
Symmetric Key Encryption (2.1.2)
A process in which a single key is used in both the encryption and decryption algorithm to encode/decode data.
Syntax (2.1.5)
Precise rules defining how the letters, words, and punctuation of a programming language are required to be used together.
System Administrator (2.1.3)
A person who is responsible for managing computers, networks, servers, and other computing resources for an organization or group.
ValueError Runtime Error (2.1.5)
An error that occurs because the program is only prepared to handle input values that are integers
Website (2.1.1)
a location connected to the Internet that maintains one or more pages on the World Wide Web.