1/66
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
social media
applications and websites that allow users to share content and participate in social networking that may have otherwise had socioeconomic barriers
socioeconomic
the differences among groups based on geographical, social and economic factors
search tools
directories and search engines on the Internet that are essential for finding information efficiently on the Web
crowdfunding
entrepreneurs using online access to customers as a means of funding their project
metadata
data about data
cloud computing
storing, accessing and processing data using remote servers over a network rather than a local server or computer
client-server model
the client(s) are the end-user(s) and communicates with the server (a centralized computer) that services the clients
Internet
the network infrastructure composed of devices (or nodes) that communicate via protocols
network
connection of devices and networks to communicate using addresses and protocols
routing
the process of moving information (or packets) over a network via a device called a router
bandwidth
a measure of bit rate of a system or data (measured in bits) that can be sent in a fixed amount of time over a system
latency
the time elapsed between the transmission and the receipt of a request in a system
routing redundancy
having multiple options between two points increases the reliability of the Internet and helps it scale to more devices and more people
WWW (World Wide Web)
a system of linked pages, programs, and files that uses the internet in order to transmit content
SMTP protocol
Email communication standard developed and overseen by the Internet Engineering Task Force (Simple Mail Transfer Protocol)
HTTP
Hypertext Transfer Protocol developed by the Internet Engineering Task Force, this protocol determines how data and messages are formatted, transmitted, and responded to via the Internet
HTTPS
HTTP with a Secured Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer that encrypts and decrypts user data and requests for added security (Hypertext Transfer Protocol Secure)
Internet protocol
the protocol by which data is sent from one computer to another on the Internet
TCP/IP
standard for packets and routing (Transmission Control Protocol/Internet Protocol)
SMS
Short Message Services. Text messaging allows the user to send up to 160 characters to another device. If the message is longer it may truncate, concatenate and/or split up into several individual messages
interface
a user-friendly picture-oriented way to interact with technology, contributing to the widespread use of the Internet
protocols
a common set of rules that computers must abide by in order to connect with each other. The protocols used in the Internet are open, which allows users to easily connect additional computing devices to the Internet
Application Program Interfaces (APIs)/Libraries
a set of routines, protocols, and tools for building software applications which simplify complex programming tasks
IP address
a unique numeric identification for each device that is connected to a computer network and uses Internet Protocol
IPv6
Internet Protocol, Version 6 - 128-bit Internet address consisting of eight 4-character hexadecimal numbers to handle routing of many more devices.
IPv4
Internet Protocol, Version 4 - A 32-bit Internet address consisting of four numbers each between 0 through 255, separated by periods (represents 8 bits).
domain
a group of devices connected on a network using the same protocol to access and administer web pages.
domain name system [DNS]
the way that domain names are located and translated into Internet Protocol (IP) addresses.
hierarchy
an arrangement of elements in a ranking of superiority. The Internet and systems are built from the top (root) down.
packet switching
digital data is sent by breaking the data into blocks of bits called packets, which contain both the data being transmitted and control information for routing the data.
data stream
Information is passed through the Internet as a data stream. Data streams contain chunks of data, which are encapsulated in packets.
encryption
the process of converting information or data into a code, especially to prevent unauthorized access.
decryption
the process of decoding the data that was encrypted
symmetric key system
an encryption method where each pair of users share a secret key
asymmetric key system
an encryption method that uses different keys to encrypt and decrypt
public-key encryption
an asymmetric encryption method that uses a public key (made available publicly) and a private key (available to owner only).
certificate authorities
CA's issue digital certificates that validate ownership of encrypted keys used in secured communications and are based on a trust model.
trust model
validation of one's identity necessary for an event or transaction to occur.
open platforms: software based on open standards where there is no single ownership and is freely available through open license.
closed platforms
proprietary software where the provider has control over the application and content and can restrict access
open standard
a standard where documentation and specifications are open to the public.
closed standard
a standard where documentation and specifications are not available to the public.
open source
publicly available information that is free to use, distribute, modify, and study.
closed source
privately owned information that is proprietary.
Secure Sockets Layer (SSL)
The standard security technology for establishing an encrypted link between a web server and a browser, typically indicated with padlock icon in the address bar.
net neutrality
the Internet is built around the notion of free and open access to information with no blocking, no throttling or paid prioritization.
cybersecurity
measures taken to protect a computer or computer system against unauthorized access or attack
confidentiality
the ability to limit access to information to a certain set of users.
integrity
the certainty that information is accurate
availability
the reliability of access to information
firewall
part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
DDoS Attack
Distributed Denial of Service - an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.
viruses
code that is capable of copying itself and corrupting a system or destroying data
social engineering
the psychological manipulation of people into performing actions or divulging confidential information
malware
software that is intended to damage or disable computers and computer systems.
phishing
obtaining confidential information by masquerading as an "official" person, site, or entity. A form of social engineering
Tim Berners-Lee
created the set of fundamental tools and technologies that make up the World Wide Web
hyperlinks
clickable bits of text, images or other screen elements within an HTML document that a user can select to request another document or web location.
sequential computing
is a computational model in which operations are performed in order one at a time.
parallel computing
is a computational model where the program is broken into multiple smaller sequential computing operations, some of which are performed simultaneously.
distributed computing
is a computational model in which multiple devices are used to run a program
botnets
a network of private computers infected with a malicious software and controlled as a group without the owners knowing.
bitcoin mining
the processing of transactions in the digital currency system, in which the records of current Bitcoin transactions, known as blocks, are added to the record of past transactions, known as the blockchain.
Internet of Things
the network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these objects to connect and exchange data.
sensor networks
autonomous sensors that measure environmental conditions such as light, temperature and sound which facilitate new ways of interacting with the environment and with physical systems.
autonomous technology
technology that can function without being told what to do - i.e. Robots.
open platforms
software based on open standards where there is no single ownership and is freely available through open license.