1/143
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Artificial Intelligence
Branch of computer science that focuses on creating computer systems or computer-controlled machines that have an ability to perform tasks associated with human intelligence
Knowledge Representation
Encoding information about the world into formats that the AI system can understand
Unsupervised Learning
When a system can look at data on its own and build rules for deciding what its seeing
Digital Divide
The gap in access to technology and the internet access across different regions
Machine Learning
AI systems are allowed to learn from data patterns without explicit programming
Embodied Agents
Robots that mimic human appearance and actions
Personal Ethics
The set of formal or informal ethical principles you use to make decisions
Predictive Policing
The use of advanced technologies and data analysis to forecast where crimes are likely to happen or who might be involved in criminal activity
Hard Drive
The computer’s primary device for permanent storage of software and documents(nonvolatile)
External Hard Drive
A hard drive made portable, mostly used to back up data on your internal hard drive
Micro SD Flash Cards
Tiny removable memory cards that let you expand storage capacity on certain phones
High-definition Multimedia Interface Port
A compact audio-video interface that carries both high-definition video and uncompressed digital audio on one cable
B2B
Refers to transactions that take place between businesses
C2C
Transactions that take place between consumers
B2C
Business to consumer
E-commerce
The process of conducting business online through advertising and selling products
Social Commerce
Using social networks to assist in marketing and purchasing products
Internet Protocol
A universal translator between devices. Data is broken into packets for transmission and reassembled at their destination into the original message
The Web
A subset of the Internet. It’s designed to host and access HTML pages. Users can navigate through websites, accessing information stored on servers worldwide
Deepfake
A highly realistic digital video or image generated using artificial intelligence
IP Address
A unique set of numbers assigned to each device connected to a network. It helps identify and locate devices so they can communicate with each other online
Beta Version
An application that is still under development
Open Source Software
Free software that is available with few licensing and copyright restrictions. A community of users continues to make changes to the software, keeping it current
Freeware
Copyrighted software that you can use for free
Software
Manages processes, runs applications, and enables user interaction with the system. It provides instructions that tell the computer’s hardware what tasks to perform and how to execute them
Proprietary Software
Created for profit and sold to users with specific terms of use. Restricted access to its source code
System Requirements
Minimum standards for the operating system, processor, RAM, and storage
Software License
Upon purchase, the license grants the user permission to use the software under specific conditions outline in the End User License Agreement
Binary Language
The simplest form of data representation utilizing only two states. 0 and 1. Inside a computer’s electrical switches flip between these two states
File Management
Providing an organizational structure to the computer’s components
Extension
Identifies what kind of family the file belongs to or which application should be used to read the file
Folder
A collection of files stored on a computer
Root Directory
The C drive, which is at the top of the filing structure of the computer system
Paging
Swapping data and instructions between RAM and the hard drive’s swap file
Arithmetic Logic Unit
Performs all calculations and makes logic and comparison decisions for the computer
Random Access Storage(RAM)
Your computer’s temporary storage space. Data stored in RAM is volatile
The operating system
Coordinates the flow of data and information within a computer system. It manages hardware resources, facilitates user interaction, and provides a platform for running applications
Graphical User Interface
Provides graphics, icons, and menus to allow users to interact with the system
Preemptive Multi-tasking
The OS manages multiple tasks by prioritizing them based on interrupts. The OS can interrupt a currently running task to allocate CPU time to a higher-priority task
Virtual Memory
When the physical RAM is full, the OS temporarily moves data to a reserved space on the hard drive, using a portion of the hard drive as additional memory
Boot Process
When you turn on your computer the BP loads the operating system into the RAM. The CPU wakes up the BIOS which performs a POST to ensure all hardware is running correctly
File Extension
Indicates the file’s format and type. This helps the operating system determine which application should be used to open or execute the file
Cloud Storage
Your files are accessible from any internet-connected device
Utility Programs
Software designed to help manage, maintain, and protect your computer
Mesh Network
A system of composed multiple mesh nodes that work together as one large Wi-Fi system. They communicate with each other to share a wireless connection
Service Set Identifier(SSID)
A network name that wireless routers use to identify themselves
Network
Enables communication between different devices, allowing them to exchange data and access shared resources
Data Transfer Rate
The maximum speed at which data can be transmitted over a network or communication channel
Throughput
The actual speed achieved during data transmission
Personal Area Network(PAN)
A network for devices close to one person
Local Area Network(LAN)
A network within a small geographical area
Home Area Network(HAN)
A specific type of LAN located in a home
Metropolitan Area Network(MAN)
A large network providing access to a specific geographical area(city)
Wide Area Network(WAN)
A network spanning a large physical distance
Peer to Peer(P2P)
Each node functions as both a client and a server, allowing direct sharing of resources without the need for a centralized server
Client/Server Network
A server provides resources and administration to client computers
Switch
A network component that directs data packets to their intended destinations within a local network
Router
Transfers packets of data between networks
Network Attached Storage(NAS)
Device offers centralized data storage and access. They store data in a single location
Electronic Ink
Composed of millions of micro capsules with white and black particles in a clear fluid representing text
Identity Theft
When a thief steals your personal information and poses as you in financial or legal transactions
Black-hat Hackers
Breaks into system to destroy information or for illegal gain
White-hat Hackers
Breaks into systems for non malicious reasons, often trying to embarrass a company into fixing a problem
Packet Sniffer
A program that examines each packet and can read its contents
Scripts
Small programs that are executed without your knowledge when you enter a site
Stealth Virus
Temporarily erases its code from the files where they reside and hide in the active memory of the computer
Polymorphic Virus
Changes its own code and periodically rewrites itself to avoid detection
Multipartide
Designed to infect multiple files in an effort to fool the anti-virus software
Worms
Travel between systems through network connections to spread their infection. Worms can run independently of host file execution
Adware
Software that displays sponsored advertisements in a section of your browser window or as a pop-up box
Spyware
An unwanted piggyback program that runs in the background of your system and transmits information about you to the owner of the program so it can be used for marketing purposes
Pharming
Malicious code alters your browser’s ability to find web addresses. Users are directed to bogus websites who are set up with the purpose of gathering information
Programming
The process of translating a task into a series of commands a computer will use to perform that task
Testing Plan
Lists specific input numbers the program would typically expect the user to enter and the output values that a perfect program will return for those input values
Algorithm
A set of specific sequential steps that describe in natural language exactly what the computer program must do to complete its task
Decision Point
The program must choose from different actions based on the value of its current inputs
Binary Decision
They can only be answered in one of only two ways
Pseudocode
A text based approach to documenting an algorithm, describing the actions that the algorithm will take
Coding
Translating an algorithm into a programming language
Programming Language
A kind of code for the set of instruction the CPU knows how to perform
Compilation
The process by which code is converted into machine language
Interpreter
Translates the source code line by line and executes each line as it is translated
Integrated Development Environment(IDE)
A developmental tool that helps programmers write, compile, and test their programs
Code Editing
The step in which programmers type the code into the computer
Debugging
Running the program over and over to find errors
Information System
Data, people, and procedures, and softwares that help in planning and decision making
System Development Life Cycle
Problem Opportunity / Identification | Analysis, Design, Development | Testing and Installation | Maintenance and Evolution
Program Development Life Cycle
Problem statement | algorithm development | coding and debugging | testing and documentation
Control Structures
Keywords in programming language that allow the programmer to direct the flow of the program based on a decision
Compiler
A program that understands both the syntax of the programming language and the exact structure of the CPU and its machine language, it can read source code
Application Programming Interface
The set of specific commands that a given server will respond to
Architecture-Neutral
JAVA code only needs to be compiled once, after which it can be run on many CPUs
Scripting Language
A simple programming language that’s limited to performing a set of specialized tasks
eXtensible Markup Language
Enables designers to define their own data-based tags, making it much easier for a program running on server computers to transfer the key information on its page to another site
Clickstream Data
Software used on company websites to capture information about each click that users make as they navigate through the site
Transaction-Processing System(TPS)
An operational level system that keeps track of everyday business transactions or order tracking/processing, payroll, and cash management
Enterprise Resource Planning
Accumulates information from multiple departments that are relevant to running a business
Data mart
Small slices of a data warehouse grouped together and separated from the main body of data in the warehouse so that related sets of data can be analyzed
Data Warehouse
A large scale collection of data that contains and organizes in one place all the data from an organization’s databases
Database
A collection of related data that can be stored, sorted, organized, and queried