1/47
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What is the Internet Protocol (IP)?
Rules for addressing and sending data across the internet by assigning unique numbers to each connected device.
What does Transmission Control Protocol (TCP) do?
Takes inventory of all packets in the datastream to ensure they are successfully sent and received.
What is a packet?
Chunk of data and its metadata, used to route and reassemble information on the Internet.
How does data travel on the Internet?
The way in which information travels on the Internet is not as a single piece but in chunks.
What is User Datagram Protocol (UDP)?
Sends all packets without checking whether they were received or ordered properly.
What is the Domain Name System (DNS)?
The system responsible for translating domain names like example.com into IP addresses.
What is HyperText Transfer Protocol (HTTP)?
The protocol used for transmitting web pages over the Internet.
What is the World Wide Web?
A system of linked pages, programs, and files.
What is a datastream?
A continuous flow of data packets across a network.
What is redundancy in networking?
Redundant routing creates backup paths for network traffic, ensuring uninterrupted service if the primary path fails.
What is lossy compression?
A method for reducing file sizes by permanently removing data, sacrificing quality, e.g., JPEG or MP3.
What is lossless compression?
A method of compressing data without losing any information, allowing perfect reconstruction, e.g., ZIP or PNG.
What is public key encryption?
A security method using a pair of keys—a public key for encryption and a private key for decryption—to enable secure communication.
What is a rogue access point?
An unauthorized, often malicious, wireless access point connected to a secure network without administrative approval.
What is Personally Identifiable Information (PII)?
Data that can identify an individual and may include context-specific data.
What are some key features of memory in computing?
RAM (Volatile memory) and ROM (Non-volatile memory) are essential in understanding how data is stored and accessed.
What is crowdsourcing?
The practice of gaining input from a large number of people, typically via the internet, to support various projects.
What is parallel computing?
A computational model which splits a program into multiple tasks, some of which can be executed simultaneously.
What is distributed computing?
A computational model which uses multiple devices to run different parts of a program.
What is multifactor authentication (MFA)?
A method of user authentication which requires the user to present multiple pieces of evidence in multiple categories (such as knowledge and possession).
What is a cookie?
A small amount of text that tracks information about a user visiting a website.
What is a virus?
A type of computer malware that can make copies of itself.
What is phishing?
An attack where a user is tricked into revealing private information, often via a deceptive email.
What is a rogue access point?
A wireless access point that provides an attacker with unauthorized access to the traffic going over the network.
What is encryption?
The process of scrambling data to prevent unauthorized access.
What is public key encryption?
An asymmetric encryption technique that uses different keys for encrypting versus decrypting data.
What is symmetric encryption?
A technique for encrypting data where the same key is used to both encrypt and decrypt data.
What is lossy vs. lossless compression?
Lossy compression removes some data permanently to reduce file size, while lossless compression compresses data without removing any information.
What is digital divide?
The idea that some communities or populations have less access to computing than others, typically due to limitations of Internet speed or computer hardware access.
What is a datastream?
A continuous flow of data packets across a network.
What is redundancy in networking?
Redundant routing creates backup paths for network traffic, ensuring uninterrupted service if the primary path fails.
What is the difference between lossy and lossless compression?
Lossy compression removes some data permanently to reduce file size, while lossless compression compresses data without removing any information.
What is the purpose of bandwidth?
The maximum amount of data that can be sent in a fixed period of time over a network connection, typically measured in bits per second.
What is the difference between a modem and a router?
A modem connects to the internet and translates signals, while a router connects multiple devices to the internet and directs data traffic between them.
What is a firewall?
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
What is netiquette?
The etiquette and rules for appropriate behavior when communicating online.
What is a digital footprint?
The record of a person's online activities and the trail of data left behind when using the internet.
What is cloud storage?
A service that allows users to store data online, accessible from various devices, typically managed by cloud service providers.
What is digital citizenship?
Digital citizenship refers to the norms of appropriate, responsible behavior with regard to technology use.
What is digital identity?
Digital identity is the online presence of a person, encompassing their activities, communications, and shared data.
What is the role of an operating system (OS)?
An OS manages computer hardware and software resources and provides services for computer programs.
What is malware?
Malware is malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
What is scaling in computing?
Scaling refers to the capability of a system to handle a growing amount of work by adding resources.
What is open-source software?
Software with source code that anyone can inspect, modify, and enhance.
What is a database?
A structured collection of data that can be easily accessed, managed, and updated.
What is cloud computing?
The delivery of different services through the Internet, including storage, servers, databases, networking, software, and analytics.
What is a network protocol?
A set of rules or standards that define how data is transmitted and received across a network.
What is a URL?
A Uniform Resource Locator, which provides the address of a resource on the Internet.