1/36
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
internet
a philosophy of making information and knowledge open and accessible to all people. A network of networks built an open agreed upon protocols.
protocol
a widely agreed upon set of rules that standardizes communication between machines
network
a group of two or more computer systems linked together
Birate
the amount of data in bits that can be sent in a fixed amount of time
bandwidth
the capacity of data transfer in a system. Measured by bitrate
latency
the latency of a system is the time it takes for a bit to travel from a sender to a receiver. Fiber optic cables have low latency
network devices
an electronic device which is required for communication between devices
computing devices
a computing device is a physical artifact that can run a program
input devices
are commuting devices that are used to take in information from a user or another device
output devices
computing devices that are used to send computer data to the user
storage devices
devices that remember information
computing systems
a computing system is a group of computing devices and programs working together for a common purpose
computer network
a computing network is a group of interconnected computing devices capable of sending and receiving data
internet protocol
the protocol that defines the structure of an internet address and assigns a unique address to every device on the internet
IPv6
a new 128 bit version of the internet protocol
URL
stands for uniform resource locator. You are locating a resource that exists somewhere on the internet
HTTP Request
an HTTP is made by a client, to a named host, which is located on a server. The aim of the request is to access a resource on the server
HTTP Response
An HTTP response is made by a server to a client. The aim of the response is to provide the client with the resource it request.
Domain Name System
used to translate domain names into IP address
IP (Internet Protocol)
Digital information generally comprises data that is created by or prepared for, electronic systems and devices such as computers , screens, calculators, communication devices,and so on, and can be stored on those devices or in the cloud
Routing
the process of sending data between two computers on the internet . The data is sent through routers that determine the route
redundancy
when multiple paths exist between two points. This improved reliability and makes the internet fault tolerable. Makes the routing system scalable
packets
packets are the units of data that are sent over the network
HTTP
hypertext transfer protocol that standardizes the language for taking to the web servers to send and receive web pages or hypertext information
Transmission Control Protocol (TCP)
allows sending MULTIPLE packets between two computers. TCP checks that all packets arrived and can be put back in the proper order. The metadata must include a destination IP address , a from iP address the message and the packet order number
Sequential Programming
sequential programming refers to programs
That are executed sequentially one thought , from start to finish, without other processing executing
Parallel and Distributed Programming
completes multiple tasks simultaneously
DNS spoofing
pretending to be a DNS name resolver. Feed your computer the wrong Ip address for a given website, and your browser now goes to a false website
DDoS attack (Distributed Denial of Service attack)
Distributed Denial Of Service attack. Spam a web server with so many requests so close together that it crashes. Sometimes spitting out valuable information as it crashes
Cybersecurity
Protocols for encrypting/decrypting information. Most cybersecurity breaches happen due to human error, not software bugs.
Cybercrime
Identity theft, stealing money, stealing private information, controlling private computers
Public Key Encryption
Public key encryption is a type of asymmetric key encryption, There's one key that encrypts the information and there is a different key that decrypts the information
Certificate
Confirms the identity and authenticity of a website
Anonymity
anonymity describes situations where the acting persons identity is unknown.
Censorship
Censorship is the suppression of words, images, or ideas that are "offensive"
Digital Divide
The digital divide is a gap between those who have access to digital technology and those who don't
Copyright
a law that grants the creator of an original work exclusive rights to its use, distribution, and sale