1/20
EXAM PREPERATION
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Abstraction
Filtering out unnecessary characteristics to focus on essential ones.
Symmetric encryption
Encryption technique using a single key for decryption and encryption, requiring privacy.
Distributed computing
Computational model utilizing multiple devices to execute different parts of a program.
Parallel computing
Utilizing multiple processors on a single computer to process tasks simultaneously.
Fault tolerance
System's ability to operate without interruption despite component failures.
Sequencing
Sequential execution of steps in an algorithm or program.
Selection
Boolean condition determining the path taken in an algorithm or program.
Iteration
Repeating steps in an algorithm for a specific number of times or until a condition is met.
Heuristic
Technique aiding algorithms in finding solutions for complex problems.
Bandwidth
Maximum data transfer capacity over a network connection in a fixed time period.
IP (Internet Protocol)
Protocol for addressing nodes on a network and routing data between nodes.
World Wide Web
System of interconnected pages, media, and files accessible via HTTP.
HTTP (Hypertext Transfer Protocol)
Protocol for requesting webpages and submitting form data.
Crowdsourcing
Collaborative model where online users contribute to projects, ideas, or services.
Citizen science
Involving public volunteers in scientific research projects.
Creative Commons
Alternative to copyright allowing creators to specify sharing terms for their work.
Encryption
Process of scrambling data to prevent unauthorized access.
Public key encryption
Asymmetric encryption using different keys for encryption and decryption.
Cookie
Small text piece tracking user information on websites.
Phishing
Deceptive attack to trick users into revealing private information.
Rogue access point
Unauthorized wireless access point capturing network traffic.