Looks like no one added any tags here yet for you.
Compression
Process of making data smaller for storage or transmission
Data compression
Reducing the size of data for saving disk space or bandwidth
Lossless algorithms
Reconstruct original message exactly from compressed message
Lossy compression
Technique not decompressing digital data back to 100% original
Abstraction
Bundling related program variables for hierarchical data thinking
Parameters
Values sent to a procedure to make it more flexible
API
Application Programming Interface providing functionality documentation
Random numbers
Frequently needed feature in programs with prewritten code
Simulations
Designed to mirror real-world scenarios for testing
Algorithm Efficiency
Resources needed to run an algorithm in terms of time and memory
Heuristic approach
Suboptimal but close enough approach for problem-solving
Decidable problem
Problem with an algorithm resulting in a correct yes or no answer
Undecidable problem
Problem without an algorithm for a correct yes or no answer
Routing
Process of finding a path from sender to receiver in a network
Bandwidth
Measure of maximum data transfer through a network connection
Internet protocol (IP)
Responsible for addressing and routing online requests
Transmission control protocol (TCP)
Defines how computers send data packets to each other
User datagram protocol (UDP)
Protocol allowing applications to send messages without checking for missing packets
Solar Flare
Intense radiation released from the sun that can disrupt hardware
Parallel computing
Solution involving tasks done simultaneously and sequentially
Cloud computing
Offers new ways for communication and collaboration through remote servers
Digital Divide
Impact of technology on access to information, markets, and global society
Bias
Prejudice for or against certain groups, found in computing innovations
Artificial Intelligence Programs
Utilized for screening job applications, credit determination, and crime location
Crowdsourcing
Enables sharing info for problem-solving, finding jobs, or funding
Legal and Ethical Concerns
Includes intellectual property, citation, peer-to-peer networks, and data monitoring
Creative Commons
Facilitates sharing with clear permissions for various creations
Open-Source Software
Freely shared, updated, and supported software accessible to all
Open Access
Public data sharing by organizations for problem-solving and information search
Search Trends and Analytics
Reveals popular searches, browsing habits, and marketing trends
Data Mining
Analyzing large datasets, with machine learning as a subset
Personally Identifiable Information (PII)
Includes data identifying individuals, like addresses or social security numbers
Privacy
Concerns digital footprints, data storage, and web browsing privacy
Protecting Our Data
Involves cybersecurity measures to prevent unauthorized access
Security
Ensures data protection from unauthorized access and alterations
Cybersecurity
Safeguards electronic devices and networks from attacks
Phishing
Creates deceptive emails or websites to trick users into clicking malicious links
Computer Viruses
Malware that attaches to files, causing harm or spreading further
Keylogging Software
Malware capturing keystrokes and transmitting them to unauthorized parties
Cryptography
Involves secret codes, encryption, and decryption for data security
Public Key Encryption
Uses published algorithms to keep information secret until decryption
Securing the Internet
Relies on digital certificates from Certificate Authorities for trust