IB SL Digital Society Unit 3 Terms

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/201

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:17 PM on 5/15/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

202 Terms

1
New cards

Data

raw unorganized facts and figures in the form of numbers, letters, or characteristics. Do not confuse with information

2
New cards

Metadata

set of data describing and giving information about other data, broad characteristics such as author, date of publication, date accessed, size of file

3
New cards

Data Mining

process of finding patterns and correlations within data, including anomalies, especially in large sizes of data often widely used in employment and hiring

4
New cards

Data Matching

comparing two different sets of data to find data about the same entity; comparison of the same entity on different platforms or environments. For example, comparing an item for sale on different regions across Amazon websites

5
New cards

Primary Data

data collected first-hand, for the first time, for a specific purpose

6
New cards

Secondary Data

collections of previously collected data; collected by another entity for a different purpose. For example, databases used to train AIs are often collected with collections of images taken for different purposes

7
New cards

Relational Database

database with more than one table. Links data with a primary key containing a unique identifier and corresponding foreign key.

8
New cards

Validation

ensures suitable data; only valid data is to be entered. Examples: setting field length and assigning data types

9
New cards

Verification

ensures correct and intended data; the data is the data you actually want. Includes double entry, having a second person check, two factor authentication

10
New cards

Data Visualization

converting large sets of data into graphic elements such as charts or graphs, such as infographics

11
New cards

Encryption

converting data to be unreadable to prevent unauthorized access. Based on cryptography, original form called plaintext. Two forms; symmetric key, public key

12
New cards

Secure Socket Layer (SSL)

protocol developed to send info securely through the internet with an encrypted link between web server and browser

13
New cards

Transport Layer Security (TLS)

improved version of SSL providing security between client and server applications communication over the internet

14
New cards

Data masking

replacing confidential data with fictitious data to anonymize sensitive info. Used to protect privacy.

15
New cards

Data Erasure

destruction of data at the end of the data life cycle. Can be either physical or software-based. Permanent removal

16
New cards

Data Deletion

to differentiate from data erasure, sending of data to a recycle bin, which removes its file icon and pathway of location. Can be recovered.

17
New cards

Blockchain

digital ledger of transactions. Examples include Authenticator app, patient data, voting information

18
New cards

Big Data

large volumes of data, either structured or unstructured. Can also include a variety of data types and formats popularized by John. R. Mashley. Often used to identify trends or patterns to improve efficiency. Can be Real-Time happening now or live; real time TV

19
New cards

Data Privacy

ability for an entity to control visibility of data, often regulated

20
New cards

Data Reliability

completeness and accuracy of data such as biased data, outdated data, human error

21
New cards

Data Integrity

trustworthiness; whether data has been compromised. Includes topics such as vulnerability due to viruses, malware

22
New cards

Cyberbullying

bullying carried out online, such as social media. Relates to the use of data and the alignment of values and ethics

23
New cards

algorithm

procedure or formula for solving a problem based off a sequence of steps. Must be unambiguous, finite, feasible, and well-defined. Also relies on inputs and outputs using instructions, variables, conditional, loops

24
New cards

flowchart

visual representation of an algorithm showing an overview from start to end. Often uses arrows to connect decisions shown in boxes, leading to multiple different outputs

25
New cards

prioritization algorithm

sorting algorithm used to prioritize tasks, such as customer orders, requests, or region to prioritize sales. Uses statistics to rank/classify priority

26
New cards

association rule

uncovers how items are associated with each other revealing relationships between items in databases. Similar to relational databases, data mining in that it attempts to find patterns, relationships, or correlations

27
New cards

black box algorithm

algorithm providing insight without clarity on how conclusions were reached; you can’t see/understand its inner workings or know how it works. Applies to lots of issues about AI and algorithmic dilemmas. It is often difficult to explain an algorithm and how it reaches outputs. Sometimes, training data is selected for unknown reasons. Transparency holds entities accountable for problematic systems

28
New cards

transparency in algorithms

ability to comprehend and explain inner workings of an algorithm; the opposite of what occurs in black box algorithms. Especially helpful in health and finance industries

29
New cards

computer

machine or device processing data and can perform calculations and operations based on algorithms by software and hardware programs. Includes embedded and personal computers. Inputs, processes, and stores data and can produce an output. Remember that they can look like a lot of things; embedded into appliances or interacting with a PC

30
New cards

embedded computer

software and hardware designed for a specific task incorporated into a system (ex. computers in washing machines, cars, fridges)

31
New cards

personal computer (PC)

General purpose computer designed for individual use. Usually consists of system unit, monitor, keyboard, and a mouse system EX: Tablets, wearable computers, laptops

32
New cards

Moore's Law

describes how the number of transistors in a dense integrated circuit doubles every two years; the electrical outputs continuously get better

33
New cards

mainframe

large computer used by businesses to host databases and servers often used for transactions and business applications; commercial servers serving many people simultaneously

34
New cards

server

large computer specifically dedicated to managing a network’s resources. Can use specialized server hardware but can also be a regular computer with an OS capable of running these network resources. EX: print server, database server, web server, file server. Related to server farms, data centers

35
New cards

Central Processing Unit (CPU)

also often called microprocessor, the part of a computer controlling/executing a computer's instructions.

36
New cards

motherboard

circuit board allowing data to travel to different components in a computer; carries out/control’s the instructions of the computer. controlled/affected by clock speed, cache, and number of cores in the CPU; usually most have four, or “quad” processors.

37
New cards

cache

small amount of memory within the CPU storing data as it is processed

38
New cards

Random-Access Memory (RAM)

also called PC memory or memory. short-term memory where data is being processed or used on screen. Allows for the processor to run applications. Usually comes with memory chips. computers usually have two ram modules to work with the CPU. Central area for primary storage.

39
New cards

secondary storage

non-volatile long term memory to store programs and data until required; persistent and ongoing storage, can safeguard long term data with a lasting record. Good for data backups, essential files

40
New cards

operating system (OS)

software managing hardware, software, memory, security, and UI. Mostly, people will say it manages hardware and software. Possibly on an HDD or SSD.

41
New cards

User Interface (UI)

Means by which a human interacts with a digital technology, aimed to be straightforward with minimum effort.

42
New cards

Graphic User Interface (GUI)

allows the user to interact with graphic icons or visual elements like links. Can also be voice controlled and also use a haptic interface, or interaction using touch

43
New cards

utility software

software designed to perform specific useful tasks to analyze, configure, or maintain computers.

44
New cards

application software

software for a specific purpose (ex. video editor)

45
New cards

malware

Short for malicious software. Software specifically designed to steal or damage data of computers or IT systems. Often designed to be indistinguishable from normal files or links in order to be downloaded. EX: worms, spyware, adware, ransomware

46
New cards

open source software

software free of charge and copyright, allowing modification from the public. Maintains access to source code. similar to public domain, no guarantee to be bug free.

47
New cards

proprietary software

copyrighted software downloaded after license or subscription in return for updates and help from the commercial company.

48
New cards

machine code

also called object code. Binary or hexadecimal instructions designed for direct responses from the computer. Each computer has its own. Understood by computer hardware

49
New cards

assembly language

code language used to write code for specialized hardware for efficient tasks. Understood by computer hardware

50
New cards

quantum computing

technology using quantum mechanics to create powerful quantum hardware which can solve complex problems quicker. Allows for different types of uncertainties to analyze multiple issues at the same time. Defined as faster than using supercomputers

51
New cards

superposition

something being either on, off, and/or somewhere in between.

52
New cards

network

series of interconnected nodes. Connect, transmit, receive, and exchange data with these nodes. Node connection point such as a computer or router

53
New cards

Personal Area Network (PAN)

smallest type of network. Consisting of the connected devices that are in close proximity to an individual, like watches syncing data to phones, a printer connected to a PC

54
New cards

Local Area Network (LAN)

group of computers or devices connected on a single site. Varies from home connection to school/corporations. usually used to share resources

55
New cards

Metropolitan Area Network (MAN)

network that covers a larger geographical area, such as a city. Anywhere between 5-50 kilometers. EX: computers connected across different campuses, Wi-Fi connection across a city

56
New cards

Wide Area Network (WAN)

national or international network, especially the internet. Could include multiple LANS like corporations

57
New cards

wireless network

as opposed a wired network, using wireless technology to connect different nodes in forming a network, using radio signals. Easier to set up, more flexible, wider range. Often still needs cable to access points, but allows different devices to connect wirelessly

58
New cards

cloud network

Incorporates some or all of the network capabilities on a public or private cloud platform. Configurations can be made by accessing IP addresses controlling the wireless network

59
New cards

client-server network

type of network where data is stored centrally on a server and access is given to each device, or client on the network. used often by organizations that can secure and backup data. Often requires an expert staff and bandwidth; expensive

60
New cards

peer-to-peer network (P2P)

as opposed to a client-server network, a decentralized network in which each computer is equally responsible for storing and sharing data. No dependence on one server but more difficult to manage security. Can share large files more easily, such as downloading media or cryptocurrency

61
New cards

network interface card

device responsible for converting data into a signal and communicating it to networks. Can be both wired, wireless, using a router

62
New cards

medium access control (MAC)

address identifier assigned to every piece of hardware. Made up of 48 bits in hexadecimal. Fixed by a manufacturer.

63
New cards

router

technology transferring data from one network to the other with the most efficient route. Used together with a modem

64
New cards

modem

device that converts digital data into analogue data, so that it can be transmitted over a telephone line. Used together with a router

65
New cards

Wireless Access Point (WAP)

device creating a wireless local area network to improve physical coverage

66
New cards

hub

device that broadcasts data to all other devices on the network

67
New cards

“least intelligent of the devices;” often uses up a bunch of bandwidth

68
New cards

switch

device broadcasting data more efficiently than a hub. used by most LANs; much more efficient and controllable

69
New cards

interoperability

allowing different technologies to travel and connect and exchange without restriction

70
New cards

network protocol

set of agreed rules that state how to format, send and receive data. Both sides of a transmission of data must accept protocol to communicate. There are four layers

71
New cards

application layer

72
New cards

transport layer

73
New cards

internet layer

74
New cards

physical network layer

75
New cards

Transmission Control Protocol/Internet Protocol (TCP/IP)

of the transport layer, protocol defining where data is to be sent to and from, using an IP, and how the data is to be broken down into smaller sections, or packets, before sending through a TCP.

76
New cards

Internet Protocol (IP) Address

of the internet layer, logical numeric address that is assigned to every node, if it is to be connected to a network. Assigned by dynamic host configuration protocol (DHCP).

77
New cards

Domain Name Server (DNS)

server that translates domain names into IP addresses

78
New cards

bandwidth

maximum rate of data transfer at any one time, often in seconds, measured in Hz

79
New cards

speed

length of time it takes for data to transfer

80
New cards

data compression

process that reduces the size of a file. Used to increase efficiency, reduce space, and increase speed

81
New cards
  • lossy compression reduces the file size permanently
82
New cards
  • lossless compression reduces the fire without losing data; data can be returned back to original size
83
New cards

net neutrality

the concept that all data should be treated equally by ISPs, as opposed to the preferential treatment to corporations or emergency services

84
New cards

multi-factor authentication

use of two or more methods of authentication to verify a user’s identity

85
New cards
  • use of physical tokens, cards, or text messages
86
New cards
  • biometric measurements like faceprints
87
New cards
  • PIN or phrases
88
New cards

firewall

hardware or software designed to inspect and block unauthorized access into a network using inspection; blocks unauthorized access

89
New cards

proxy server

also called proxy, a system that acts as an intermediary between client and the internet, often as a security measure. Can filer requests or limit users

90
New cards

Mobile Service Provider (MSP)

also known as mobile carrier, mobile phone operator, company that offers cellular connection to subscribers

91
New cards

VoIP (Voice over Internet Protocol)

software and applications allowing voice calls over a broadband internet connection; audio data is sent over by digital packets via the internet between nodes

92
New cards

examples

Discord, Skype, WhatsApp

93
New cards

Internet Service Provider (ISP)

company providing internet access and related services, like domain registration, email, and web hosting

94
New cards

Internet

global connection of networks linking users worldwide

95
New cards

World Wide Web (WWW)

websites and web services hosting on web servers and identified by their URL

96
New cards

Internet of Things (IoT)

internet-connected devices that collect and share data. Includes smart appliances, autonomous vehicles, jet engines

97
New cards

spamming

sending unsolicited or excessive messages or actions

98
New cards

often for advertising

99
New cards

hacking

gaining unauthorized access to a computer or network. Includes social engineering

100
New cards

social engineering

in the context of internet security, tricking a user into sharing their username, password, or secure information by using fraud