1/32
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Bias
Systematic error or preference in data or algorithms that leads to unfair or skewed results
Classifying Data
Organizing data into categories or groups based on shared characteristics
Cleaning Data
Fixing or removing incorrect, incomplete, or duplicate data to improve accuracy
Filtering data
Selecting only the data that meets certain criteria while removing the rest
Patterns in Data
Trends, repetitions, or relationships found within data
Scalability
Ability of a system to handle increased work by adding resources
Internet
A global network that connects millions of computes and devices worldwide
Computer System
Combination of hardware and software that processes data
Computer Network
Group of connected computers that share data and resources
computing device
Any device that can process data such as a computer phone or tablet
Bandwidth
Maximum amount of data that can be transmitted over a network in a given time
Distributed computing system
System where multiple computers work together to solve a problem
Fault tolerance
Ability of a system to continue working even when parts fail
IP address
A unique numerical label that identifies a device on a network
TCP (transmission control protocol)
Protocol that ensures data is sent accurately and in order across networks
Packets
Small pieces of data sent over a network
Parallel computing system
System that performs many calculations at the same time
Protocol
Rules that determine how data is transmitted over a network
Redundancy
Having extra components or copies to prevent system failure
Router
A device that directs data between networks
Sequential computing system
System that processes tasks one step at a time
World Wide Web
Collection of web pages accessed through the internet
Encryption
The process of converting data into a secure format to prevent unauthorized access
Decryption
The process of converting encrypted data back into readable form
Certificate authority
Trusted organization that verifies website identities and issues security certificates
Public key encryption
Method of encryption using two keys: one public and one private
Multifactor authentication
A security method requiring more than one form of verification
Authentication
The process of verifying a user’s identity
Asymmetric ciphers
Encryption systems that use two different keys (public and private)
Symmetric key encryption
Encryption that uses the same key for both encryption and decryption
Crowdsourcing
Collections data or solutions from a large group of people, often online