Untitled Flashcard Set

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/115

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:13 AM on 5/2/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

116 Terms

1
New cards

UDP

User Datagram Protocol; fast, unreliable transmission without guaranteed delivery.

2
New cards

TCP

Transmission Control Protocol; reliable, ordered, error-checked data delivery.

3
New cards

TLS

Transport Layer Security; the modern protocol for encrypting Internet traffic.

4
New cards

SSL

Secure Sockets Layer; an older protocol for encrypting Internet traffic.

5
New cards

HTTP

HyperText Transfer Protocol; the protocol for transmitting web pages.

6
New cards

HTTPS

HTTP Secure; encrypted version of HTTP using TLS/SSL.

7
New cards

IP

Internet Protocol; rules for addressing and routing packets.

8
New cards

IPv4

Internet Protocol version 4; 32-bit addresses (approximately 4.3 billion possible).

9
New cards

IPv6

Internet Protocol version 6; 128-bit addresses (virtually unlimited).

10
New cards

IP Address

A unique number assigned to each device on the Internet.

11
New cards

ISP

Internet Service Provider; a company that provides Internet access.

12
New cards

Packets

Small, numbered chunks of data used in TCP.

13
New cards

Protocol

A set of rules governing how data is transmitted over a network.

14
New cards

Router

A device that directs network traffic between different networks.

15
New cards

Server

A computer that provides services to other computers.

16
New cards

Network

A group of computers connected to share resources.

17
New cards

Internet

A global network of interconnected networks using TCP/IP.

18
New cards

Web (World Wide Web)

The system of interlinked hypertext documents accessed via HTTP/HTTPS.

19
New cards

URL

Uniform Resource Locator; the complete web address for a resource.

20
New cards

Top-Level Domain

The rightmost part of a domain name (.com, .org, .edu, etc.).

21
New cards

Second-Level Domain

The part of a domain name directly left of the TLD.

22
New cards

Subdomain

A section of a domain name to the left of the second-level domain.

23
New cards

Root Name Server

One of 13 servers at the top of the DNS hierarchy.

24
New cards

Name Server

A server that stores domain names and their IP addresses.

25
New cards

Security

Steps taken to protect data from unauthorized access.

26
New cards

Privacy

How personal information is collected, stored, and shared.

27
New cards

VPN

Virtual Private Network; encrypts Internet traffic and hides IP address.

28
New cards

Two-factor Authentication (2FA)

Security requiring two forms of verification.

29
New cards

Multi-factor Authentication (MFA)

Security requiring two or more forms of verification.

30
New cards

Phishing

A social engineering attack that tricks users into revealing sensitive information.

31
New cards

Spear Phishing

A targeted phishing attack directed at a specific individual.

32
New cards

Malware

Malicious software designed to harm or compromise a computer system.

33
New cards

Hacker

A person who uses technical skills to gain unauthorized access to systems.

34
New cards

Key

A value used in encryption and decryption to transform data.

35
New cards

Public Key

A key shared openly in asymmetric encryption, used to encrypt data.

36
New cards

Private Key

A secret key used in asymmetric encryption to decrypt data.

37
New cards

Symmetric Key Encryption

Encryption using the same key for both encryption and decryption.

38
New cards

One-way Function

A function that is easy to compute but extremely difficult to reverse.

39
New cards

Variable

A named container for a value that can change during program execution.

40
New cards

Sequence

A programming structure where code runs line by line in order.

41
New cards

Selection

A programming structure using conditions to choose code paths (if/else).

42
New cards

Iterative

A process of continuously repeating steps to refine and improve.

43
New cards

Incremental

Building software in small steps or chunks.

44
New cards

Procedural Abstraction

Creating procedures/functions to simplify and organize code.

45
New cards

OR

A Boolean operator where ANY condition being true makes the result true.

46
New cards

Syntax Error

Code violates the rules of the language and will not run.

47
New cards

Run-time Error

An error that occurs during program execution.

48
New cards

Logical Error

A programming error where the program runs but produces incorrect results.

49
New cards

Hardware

The physical components of a computer.

50
New cards

Software

Programs and instructions that run on computer hardware.

51
New cards

Operating System

System software that manages hardware and provides a platform for applications.

52
New cards

Main Memory / RAM

Random Access Memory; fast, volatile memory for data currently being processed/in use.

53
New cards

Secondary Memory

Non-volatile storage (hard drive, SSD) for permanent data.

54
New cards

Input and Output (I/O) Devices

Hardware used to send or receive data from a computer.

55
New cards

Peripherals

External devices connected to a computer.

56
New cards

Sequential Computing

Processing tasks one after another (not in parallel).

57
New cards

Parallel Computing

Using multiple processors simultaneously to solve a problem.

58
New cards

Unicode

A universal character encoding standard supporting all writing systems.

59
New cards

HTML

HyperText Markup Language; the standard markup language for web pages.

60
New cards

Metadata

Data about data (e.g., date a photo was taken, author of a document).

61
New cards

Hexadecimal

A base-16 number system using digits 0-9 and letters A-F.

62
New cards

RGB

Red, Green, Blue; a color model used to represent colors digitally.

63
New cards

Pixel

The smallest unit of a digital image.

64
New cards

Uncompressed

Data stored in its original form without any compression applied.

65
New cards

Lossless

Compression that reduces file size without losing any data.

66
New cards

Lossy

Compression that reduces file size by permanently removing some data.

67
New cards

Run-Length Encoding

A lossless compression technique using counts of repeated values.

68
New cards

Linear Search

A search algorithm that checks each element one by one.

69
New cards

Heuristic Approach

A practical shortcut to find a good-enough solution when optimal is impractical.

70
New cards

Traveling Salesman Problem

A computationally hard problem: finding the shortest route visiting all cities once.

71
New cards

Modular Arithmetic

Arithmetic where numbers wrap around after reaching a modulus.

72
New cards

Overflow Error

An error when a number exceeds the defined range for its data type.

73
New cards

Round-off Error

An error caused by the approximation of real numbers.

74
New cards

Redundancy

Extra components or pathways to ensure continued operation if one fails.

75
New cards

Abstraction

Simplifying complex systems by focusing on essential details and hiding unnecessary complexity.

76
New cards

Data Abstraction

Managing complexity by using collections (like lists) to represent related data.

77
New cards

ASCII

American Standard Code for Information Interchange; a 7-bit character encoding standard.

78
New cards

Binary

A base-2 number system using only the digits 0 and 1.

79
New cards

Bit

The smallest unit of data in computing, representing a 0 or 1.

80
New cards

Byte

A unit of data equal to 8 bits.

81
New cards

Decimal

A base-10 number system using digits 0-9.

82
New cards

Central Processing Unit (CPU)

The brain of the computer that processes instructions.

83
New cards

Computer

An electronic device that processes data according to a set of instructions.

84
New cards

Distributed Computing

A system where multiple computers work together to solve a problem.

85
New cards

Fault-Tolerant

A system that can continue operating when some components fail.

86
New cards

AND

A Boolean operator where ALL conditions must be true for the result to be true.

87
New cards

Boolean Logic

A system of logic using true/false values and operators like AND, OR, and NOT.

88
New cards

Binary Search

A search algorithm that repeatedly divides a sorted list in half.

89
New cards

Computationally Hard

A problem for which no efficient algorithm is known.

90
New cards

Constant

A named value that cannot be changed during program execution.

91
New cards

ARPANET

Advanced Research Projects Agency Network; the first network to use TCP/IP.

92
New cards

Bandwidth

The maximum amount of data that can be transmitted over a network in a given time.

93
New cards

Client

A computer or program that requests services from a server.

94
New cards

Cloud Computing

Storing and accessing data and programs over the Internet.

95
New cards

Datagrams

Data units used by UDP; sent without guaranteed delivery or order.

96
New cards

DNS

Domain Name System; translates domain names into IP addresses.

97
New cards

Domain Name

A human-readable address for a website.

98
New cards

Encryption

Converting data into a coded form to prevent unauthorized access.

99
New cards

Decryption

Converting encrypted data back to its original form using a key.

100
New cards

Asymmetric Key Encryption

Encryption using two different keys: a public key and a private key.