1/115
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
UDP
User Datagram Protocol; fast, unreliable transmission without guaranteed delivery.
TCP
Transmission Control Protocol; reliable, ordered, error-checked data delivery.
TLS
Transport Layer Security; the modern protocol for encrypting Internet traffic.
SSL
Secure Sockets Layer; an older protocol for encrypting Internet traffic.
HTTP
HyperText Transfer Protocol; the protocol for transmitting web pages.
HTTPS
HTTP Secure; encrypted version of HTTP using TLS/SSL.
IP
Internet Protocol; rules for addressing and routing packets.
IPv4
Internet Protocol version 4; 32-bit addresses (approximately 4.3 billion possible).
IPv6
Internet Protocol version 6; 128-bit addresses (virtually unlimited).
IP Address
A unique number assigned to each device on the Internet.
ISP
Internet Service Provider; a company that provides Internet access.
Packets
Small, numbered chunks of data used in TCP.
Protocol
A set of rules governing how data is transmitted over a network.
Router
A device that directs network traffic between different networks.
Server
A computer that provides services to other computers.
Network
A group of computers connected to share resources.
Internet
A global network of interconnected networks using TCP/IP.
Web (World Wide Web)
The system of interlinked hypertext documents accessed via HTTP/HTTPS.
URL
Uniform Resource Locator; the complete web address for a resource.
Top-Level Domain
The rightmost part of a domain name (.com, .org, .edu, etc.).
Second-Level Domain
The part of a domain name directly left of the TLD.
Subdomain
A section of a domain name to the left of the second-level domain.
Root Name Server
One of 13 servers at the top of the DNS hierarchy.
Name Server
A server that stores domain names and their IP addresses.
Security
Steps taken to protect data from unauthorized access.
Privacy
How personal information is collected, stored, and shared.
VPN
Virtual Private Network; encrypts Internet traffic and hides IP address.
Two-factor Authentication (2FA)
Security requiring two forms of verification.
Multi-factor Authentication (MFA)
Security requiring two or more forms of verification.
Phishing
A social engineering attack that tricks users into revealing sensitive information.
Spear Phishing
A targeted phishing attack directed at a specific individual.
Malware
Malicious software designed to harm or compromise a computer system.
Hacker
A person who uses technical skills to gain unauthorized access to systems.
Key
A value used in encryption and decryption to transform data.
Public Key
A key shared openly in asymmetric encryption, used to encrypt data.
Private Key
A secret key used in asymmetric encryption to decrypt data.
Symmetric Key Encryption
Encryption using the same key for both encryption and decryption.
One-way Function
A function that is easy to compute but extremely difficult to reverse.
Variable
A named container for a value that can change during program execution.
Sequence
A programming structure where code runs line by line in order.
Selection
A programming structure using conditions to choose code paths (if/else).
Iterative
A process of continuously repeating steps to refine and improve.
Incremental
Building software in small steps or chunks.
Procedural Abstraction
Creating procedures/functions to simplify and organize code.
OR
A Boolean operator where ANY condition being true makes the result true.
Syntax Error
Code violates the rules of the language and will not run.
Run-time Error
An error that occurs during program execution.
Logical Error
A programming error where the program runs but produces incorrect results.
Hardware
The physical components of a computer.
Software
Programs and instructions that run on computer hardware.
Operating System
System software that manages hardware and provides a platform for applications.
Main Memory / RAM
Random Access Memory; fast, volatile memory for data currently being processed/in use.
Secondary Memory
Non-volatile storage (hard drive, SSD) for permanent data.
Input and Output (I/O) Devices
Hardware used to send or receive data from a computer.
Peripherals
External devices connected to a computer.
Sequential Computing
Processing tasks one after another (not in parallel).
Parallel Computing
Using multiple processors simultaneously to solve a problem.
Unicode
A universal character encoding standard supporting all writing systems.
HTML
HyperText Markup Language; the standard markup language for web pages.
Metadata
Data about data (e.g., date a photo was taken, author of a document).
Hexadecimal
A base-16 number system using digits 0-9 and letters A-F.
RGB
Red, Green, Blue; a color model used to represent colors digitally.
Pixel
The smallest unit of a digital image.
Uncompressed
Data stored in its original form without any compression applied.
Lossless
Compression that reduces file size without losing any data.
Lossy
Compression that reduces file size by permanently removing some data.
Run-Length Encoding
A lossless compression technique using counts of repeated values.
Linear Search
A search algorithm that checks each element one by one.
Heuristic Approach
A practical shortcut to find a good-enough solution when optimal is impractical.
Traveling Salesman Problem
A computationally hard problem: finding the shortest route visiting all cities once.
Modular Arithmetic
Arithmetic where numbers wrap around after reaching a modulus.
Overflow Error
An error when a number exceeds the defined range for its data type.
Round-off Error
An error caused by the approximation of real numbers.
Redundancy
Extra components or pathways to ensure continued operation if one fails.
Abstraction
Simplifying complex systems by focusing on essential details and hiding unnecessary complexity.
Data Abstraction
Managing complexity by using collections (like lists) to represent related data.
ASCII
American Standard Code for Information Interchange; a 7-bit character encoding standard.
Binary
A base-2 number system using only the digits 0 and 1.
Bit
The smallest unit of data in computing, representing a 0 or 1.
Byte
A unit of data equal to 8 bits.
Decimal
A base-10 number system using digits 0-9.
Central Processing Unit (CPU)
The brain of the computer that processes instructions.
Computer
An electronic device that processes data according to a set of instructions.
Distributed Computing
A system where multiple computers work together to solve a problem.
Fault-Tolerant
A system that can continue operating when some components fail.
AND
A Boolean operator where ALL conditions must be true for the result to be true.
Boolean Logic
A system of logic using true/false values and operators like AND, OR, and NOT.
Binary Search
A search algorithm that repeatedly divides a sorted list in half.
Computationally Hard
A problem for which no efficient algorithm is known.
Constant
A named value that cannot be changed during program execution.
ARPANET
Advanced Research Projects Agency Network; the first network to use TCP/IP.
Bandwidth
The maximum amount of data that can be transmitted over a network in a given time.
Client
A computer or program that requests services from a server.
Cloud Computing
Storing and accessing data and programs over the Internet.
Datagrams
Data units used by UDP; sent without guaranteed delivery or order.
DNS
Domain Name System; translates domain names into IP addresses.
Domain Name
A human-readable address for a website.
Encryption
Converting data into a coded form to prevent unauthorized access.
Decryption
Converting encrypted data back to its original form using a key.
Asymmetric Key Encryption
Encryption using two different keys: a public key and a private key.