COMPSCI

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 40

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

41 Terms

1

Phishing

Scammers impersonate legitimate institutions to trick users into providing personal data

New cards
2

Malware

Malicious software that damages or controls systems

New cards
3

keylogger

records keystrokes to access confidential information

New cards
4

Rogue Access Points

Fake wireless networks designed to intercept data

New cards
5

Caesar Cipher

Substitution cipher shifting letters by a set number.

New cards
6

Letter Frequency Analysis

Muslim scholars identified patters in letter usage to decrypt ciphers

New cards
7

Symmetric Encryption (Private Key)

Use the same key for encryption and decryption. Vulnerable to brute force and frequency analysis

New cards
8

Asymmetric Encryption (public key)

Use a public key for encryption and a private key for decryption

New cards
9

SSL

Secure website communications

New cards
10

Brute Force Attack

Malicious user guess passwords through trial and error

New cards
11

Logic Errors

Caused by incorrectly written conditional statements

New cards
12

Runtime error

Incorrect user input

New cards
13

Design Laws

Incomplete testing or failure to anticipate user interactions

New cards
14

Bit

(binary digit) represents a single 1 or 0

New cards
15

Byte

8 bits allowing 2^8=256 combinations

New cards
16

ASCII

Early standard for character representation, using 7 or 8 bits. converts characters to binary or decimal and vice versa

New cards
17

Ladder of Abstraction

A conceptual framework that represents how different levels of abstraction are used in computing systems

New cards
18

Machine Code/ Binary Code

low-level instructions that the computer’s hardware understands. consists of binary digits

New cards
19

Assembly Language

low-level programming language that provides symbolic names.

New cards
20

High Level Programming Languages

Python, Java, C++, JavaScript

New cards
21

Internet

Computer network consisting of interconnected networks using standardizing communication protocols

New cards
22

Network

involves interconnected devices able to send and receive data

New cards
23

Servers

Provide resources and services to clients

New cards
24

DNS Servers

Translate domain names to IP addresses

New cards
25

ISPs

Provide access to the internet

New cards
26

Routers

Direct packs across networks

New cards
27

Packs

Data is broken into smaller chunks called packets to ensure efficient and reliable transmission

New cards
28

Transport Layer

Responsible for ensuring end-to-end data transmission

New cards
29

TCP (Transmission Control Protocol)

Reliable, connection-oriented protocol

New cards
30

UDP (User Datagram Protocol)

Faster connections protocol

New cards
31
New cards
32

Lossless

Reconstructs the original file perfectly

New cards
33

Lossy

Reduces file size more but sacrifices some data quality

New cards
34

Sequential Processing

tasks one after the other

New cards
35

Parallel Processing

tasks are divided into smaller chucks and executed simultaneously

New cards
36

Scalability

More machines can be added to handle increasing data or requests

New cards
37

Reliability

Fault tolerance ensures that failure of more machine does not affect the overall system

New cards
38

Home Distributed Comparing Projects

Volunteers contribute their idle computer processing power to large computing projects

New cards
39

Crowdsourcing

relies on humans, and then computers take over to combine and analyzing data.

New cards
40

IPOS chart

the flow of data in a computing system: how data is input, processed, output, and stored

New cards
41
New cards
robot