COMPSCI

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/40

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

41 Terms

1
New cards

Phishing

Scammers impersonate legitimate institutions to trick users into providing personal data

2
New cards

Malware

Malicious software that damages or controls systems

3
New cards

keylogger

records keystrokes to access confidential information

4
New cards

Rogue Access Points

Fake wireless networks designed to intercept data

5
New cards

Caesar Cipher

Substitution cipher shifting letters by a set number.

6
New cards

Letter Frequency Analysis

Muslim scholars identified patters in letter usage to decrypt ciphers

7
New cards

Symmetric Encryption (Private Key)

Use the same key for encryption and decryption. Vulnerable to brute force and frequency analysis

8
New cards

Asymmetric Encryption (public key)

Use a public key for encryption and a private key for decryption

9
New cards

SSL

Secure website communications

10
New cards

Brute Force Attack

Malicious user guess passwords through trial and error

11
New cards

Logic Errors

Caused by incorrectly written conditional statements

12
New cards

Runtime error

Incorrect user input

13
New cards

Design Laws

Incomplete testing or failure to anticipate user interactions

14
New cards

Bit

(binary digit) represents a single 1 or 0

15
New cards

Byte

8 bits allowing 2^8=256 combinations

16
New cards

ASCII

Early standard for character representation, using 7 or 8 bits. converts characters to binary or decimal and vice versa

17
New cards

Ladder of Abstraction

A conceptual framework that represents how different levels of abstraction are used in computing systems

18
New cards

Machine Code/ Binary Code

low-level instructions that the computer’s hardware understands. consists of binary digits

19
New cards

Assembly Language

low-level programming language that provides symbolic names.

20
New cards

High Level Programming Languages

Python, Java, C++, JavaScript

21
New cards

Internet

Computer network consisting of interconnected networks using standardizing communication protocols

22
New cards

Network

involves interconnected devices able to send and receive data

23
New cards

Servers

Provide resources and services to clients

24
New cards

DNS Servers

Translate domain names to IP addresses

25
New cards

ISPs

Provide access to the internet

26
New cards

Routers

Direct packs across networks

27
New cards

Packs

Data is broken into smaller chunks called packets to ensure efficient and reliable transmission

28
New cards

Transport Layer

Responsible for ensuring end-to-end data transmission

29
New cards

TCP (Transmission Control Protocol)

Reliable, connection-oriented protocol

30
New cards

UDP (User Datagram Protocol)

Faster connections protocol

31
New cards
32
New cards

Lossless

Reconstructs the original file perfectly

33
New cards

Lossy

Reduces file size more but sacrifices some data quality

34
New cards

Sequential Processing

tasks one after the other

35
New cards

Parallel Processing

tasks are divided into smaller chucks and executed simultaneously

36
New cards

Scalability

More machines can be added to handle increasing data or requests

37
New cards

Reliability

Fault tolerance ensures that failure of more machine does not affect the overall system

38
New cards

Home Distributed Comparing Projects

Volunteers contribute their idle computer processing power to large computing projects

39
New cards

Crowdsourcing

relies on humans, and then computers take over to combine and analyzing data.

40
New cards

IPOS chart

the flow of data in a computing system: how data is input, processed, output, and stored

41
New cards