1/201
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Data
raw unorganized facts and figures in the form of numbers, letters, or characteristics. Do not confuse with information
Metadata
set of data describing and giving information about other data, broad characteristics such as author, date of publication, date accessed, size of file
Data Mining
process of finding patterns and correlations within data, including anomalies, especially in large sizes of data often widely used in employment and hiring
Data Matching
comparing two different sets of data to find data about the same entity; comparison of the same entity on different platforms or environments. For example, comparing an item for sale on different regions across Amazon websites
Primary Data
data collected first-hand, for the first time, for a specific purpose
Secondary Data
collections of previously collected data; collected by another entity for a different purpose. For example, databases used to train AIs are often collected with collections of images taken for different purposes
Relational Database
database with more than one table. Links data with a primary key containing a unique identifier and corresponding foreign key.
Validation
ensures suitable data; only valid data is to be entered. Examples: setting field length and assigning data types
Verification
ensures correct and intended data; the data is the data you actually want. Includes double entry, having a second person check, two factor authentication
Data Visualization
converting large sets of data into graphic elements such as charts or graphs, such as infographics
Encryption
converting data to be unreadable to prevent unauthorized access. Based on cryptography, original form called plaintext. Two forms; symmetric key, public key
Secure Socket Layer (SSL)
protocol developed to send info securely through the internet with an encrypted link between web server and browser
Transport Layer Security (TLS)
improved version of SSL providing security between client and server applications communication over the internet
Data masking
replacing confidential data with fictitious data to anonymize sensitive info. Used to protect privacy.
Data Erasure
destruction of data at the end of the data life cycle. Can be either physical or software-based. Permanent removal
Data Deletion
to differentiate from data erasure, sending of data to a recycle bin, which removes its file icon and pathway of location. Can be recovered.
Blockchain
digital ledger of transactions. Examples include Authenticator app, patient data, voting information
Big Data
large volumes of data, either structured or unstructured. Can also include a variety of data types and formats popularized by John. R. Mashley. Often used to identify trends or patterns to improve efficiency. Can be Real-Time happening now or live; real time TV
Data Privacy
ability for an entity to control visibility of data, often regulated
Data Reliability
completeness and accuracy of data such as biased data, outdated data, human error
Data Integrity
trustworthiness; whether data has been compromised. Includes topics such as vulnerability due to viruses, malware
Cyberbullying
bullying carried out online, such as social media. Relates to the use of data and the alignment of values and ethics
algorithm
procedure or formula for solving a problem based off a sequence of steps. Must be unambiguous, finite, feasible, and well-defined. Also relies on inputs and outputs using instructions, variables, conditional, loops
flowchart
visual representation of an algorithm showing an overview from start to end. Often uses arrows to connect decisions shown in boxes, leading to multiple different outputs
prioritization algorithm
sorting algorithm used to prioritize tasks, such as customer orders, requests, or region to prioritize sales. Uses statistics to rank/classify priority
association rule
uncovers how items are associated with each other revealing relationships between items in databases. Similar to relational databases, data mining in that it attempts to find patterns, relationships, or correlations
black box algorithm
algorithm providing insight without clarity on how conclusions were reached; you can’t see/understand its inner workings or know how it works. Applies to lots of issues about AI and algorithmic dilemmas. It is often difficult to explain an algorithm and how it reaches outputs. Sometimes, training data is selected for unknown reasons. Transparency holds entities accountable for problematic systems
transparency in algorithms
ability to comprehend and explain inner workings of an algorithm; the opposite of what occurs in black box algorithms. Especially helpful in health and finance industries
computer
machine or device processing data and can perform calculations and operations based on algorithms by software and hardware programs. Includes embedded and personal computers. Inputs, processes, and stores data and can produce an output. Remember that they can look like a lot of things; embedded into appliances or interacting with a PC
embedded computer
software and hardware designed for a specific task incorporated into a system (ex. computers in washing machines, cars, fridges)
personal computer (PC)
General purpose computer designed for individual use. Usually consists of system unit, monitor, keyboard, and a mouse system EX: Tablets, wearable computers, laptops
Moore's Law
describes how the number of transistors in a dense integrated circuit doubles every two years; the electrical outputs continuously get better
mainframe
large computer used by businesses to host databases and servers often used for transactions and business applications; commercial servers serving many people simultaneously
server
large computer specifically dedicated to managing a network’s resources. Can use specialized server hardware but can also be a regular computer with an OS capable of running these network resources. EX: print server, database server, web server, file server. Related to server farms, data centers
Central Processing Unit (CPU)
also often called microprocessor, the part of a computer controlling/executing a computer's instructions.
motherboard
circuit board allowing data to travel to different components in a computer; carries out/control’s the instructions of the computer. controlled/affected by clock speed, cache, and number of cores in the CPU; usually most have four, or “quad” processors.
cache
small amount of memory within the CPU storing data as it is processed
Random-Access Memory (RAM)
also called PC memory or memory. short-term memory where data is being processed or used on screen. Allows for the processor to run applications. Usually comes with memory chips. computers usually have two ram modules to work with the CPU. Central area for primary storage.
secondary storage
non-volatile long term memory to store programs and data until required; persistent and ongoing storage, can safeguard long term data with a lasting record. Good for data backups, essential files
operating system (OS)
software managing hardware, software, memory, security, and UI. Mostly, people will say it manages hardware and software. Possibly on an HDD or SSD.
User Interface (UI)
Means by which a human interacts with a digital technology, aimed to be straightforward with minimum effort.
Graphic User Interface (GUI)
allows the user to interact with graphic icons or visual elements like links. Can also be voice controlled and also use a haptic interface, or interaction using touch
utility software
software designed to perform specific useful tasks to analyze, configure, or maintain computers.
application software
software for a specific purpose (ex. video editor)
malware
Short for malicious software. Software specifically designed to steal or damage data of computers or IT systems. Often designed to be indistinguishable from normal files or links in order to be downloaded. EX: worms, spyware, adware, ransomware
open source software
software free of charge and copyright, allowing modification from the public. Maintains access to source code. similar to public domain, no guarantee to be bug free.
proprietary software
copyrighted software downloaded after license or subscription in return for updates and help from the commercial company.
machine code
also called object code. Binary or hexadecimal instructions designed for direct responses from the computer. Each computer has its own. Understood by computer hardware
assembly language
code language used to write code for specialized hardware for efficient tasks. Understood by computer hardware
quantum computing
technology using quantum mechanics to create powerful quantum hardware which can solve complex problems quicker. Allows for different types of uncertainties to analyze multiple issues at the same time. Defined as faster than using supercomputers
superposition
something being either on, off, and/or somewhere in between.
network
series of interconnected nodes. Connect, transmit, receive, and exchange data with these nodes. Node connection point such as a computer or router
Personal Area Network (PAN)
smallest type of network. Consisting of the connected devices that are in close proximity to an individual, like watches syncing data to phones, a printer connected to a PC
Local Area Network (LAN)
group of computers or devices connected on a single site. Varies from home connection to school/corporations. usually used to share resources
Metropolitan Area Network (MAN)
network that covers a larger geographical area, such as a city. Anywhere between 5-50 kilometers. EX: computers connected across different campuses, Wi-Fi connection across a city
Wide Area Network (WAN)
national or international network, especially the internet. Could include multiple LANS like corporations
wireless network
as opposed a wired network, using wireless technology to connect different nodes in forming a network, using radio signals. Easier to set up, more flexible, wider range. Often still needs cable to access points, but allows different devices to connect wirelessly
cloud network
Incorporates some or all of the network capabilities on a public or private cloud platform. Configurations can be made by accessing IP addresses controlling the wireless network
client-server network
type of network where data is stored centrally on a server and access is given to each device, or client on the network. used often by organizations that can secure and backup data. Often requires an expert staff and bandwidth; expensive
peer-to-peer network (P2P)
as opposed to a client-server network, a decentralized network in which each computer is equally responsible for storing and sharing data. No dependence on one server but more difficult to manage security. Can share large files more easily, such as downloading media or cryptocurrency
network interface card
device responsible for converting data into a signal and communicating it to networks. Can be both wired, wireless, using a router
medium access control (MAC)
address identifier assigned to every piece of hardware. Made up of 48 bits in hexadecimal. Fixed by a manufacturer.
router
technology transferring data from one network to the other with the most efficient route. Used together with a modem
modem
device that converts digital data into analogue data, so that it can be transmitted over a telephone line. Used together with a router
Wireless Access Point (WAP)
device creating a wireless local area network to improve physical coverage
hub
device that broadcasts data to all other devices on the network
“least intelligent of the devices;” often uses up a bunch of bandwidth
switch
device broadcasting data more efficiently than a hub. used by most LANs; much more efficient and controllable
interoperability
allowing different technologies to travel and connect and exchange without restriction
network protocol
set of agreed rules that state how to format, send and receive data. Both sides of a transmission of data must accept protocol to communicate. There are four layers
application layer
transport layer
internet layer
physical network layer
Transmission Control Protocol/Internet Protocol (TCP/IP)
of the transport layer, protocol defining where data is to be sent to and from, using an IP, and how the data is to be broken down into smaller sections, or packets, before sending through a TCP.
Internet Protocol (IP) Address
of the internet layer, logical numeric address that is assigned to every node, if it is to be connected to a network. Assigned by dynamic host configuration protocol (DHCP).
Domain Name Server (DNS)
server that translates domain names into IP addresses
bandwidth
maximum rate of data transfer at any one time, often in seconds, measured in Hz
speed
length of time it takes for data to transfer
data compression
process that reduces the size of a file. Used to increase efficiency, reduce space, and increase speed
net neutrality
the concept that all data should be treated equally by ISPs, as opposed to the preferential treatment to corporations or emergency services
multi-factor authentication
use of two or more methods of authentication to verify a user’s identity
firewall
hardware or software designed to inspect and block unauthorized access into a network using inspection; blocks unauthorized access
proxy server
also called proxy, a system that acts as an intermediary between client and the internet, often as a security measure. Can filer requests or limit users
Mobile Service Provider (MSP)
also known as mobile carrier, mobile phone operator, company that offers cellular connection to subscribers
VoIP (Voice over Internet Protocol)
software and applications allowing voice calls over a broadband internet connection; audio data is sent over by digital packets via the internet between nodes
examples
Discord, Skype, WhatsApp
Internet Service Provider (ISP)
company providing internet access and related services, like domain registration, email, and web hosting
Internet
global connection of networks linking users worldwide
World Wide Web (WWW)
websites and web services hosting on web servers and identified by their URL
Internet of Things (IoT)
internet-connected devices that collect and share data. Includes smart appliances, autonomous vehicles, jet engines
spamming
sending unsolicited or excessive messages or actions
often for advertising
hacking
gaining unauthorized access to a computer or network. Includes social engineering
social engineering
in the context of internet security, tricking a user into sharing their username, password, or secure information by using fraud