Computer Science

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/47

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:43 PM on 5/14/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

48 Terms

1
New cards

What is the Internet Protocol (IP)?

Rules for addressing and sending data across the internet by assigning unique numbers to each connected device.

2
New cards

What does Transmission Control Protocol (TCP) do?

Takes inventory of all packets in the datastream to ensure they are successfully sent and received.

3
New cards

What is a packet?

Chunk of data and its metadata, used to route and reassemble information on the Internet.

4
New cards

How does data travel on the Internet?

The way in which information travels on the Internet is not as a single piece but in chunks.

5
New cards

What is User Datagram Protocol (UDP)?

Sends all packets without checking whether they were received or ordered properly.

6
New cards

What is the Domain Name System (DNS)?

The system responsible for translating domain names like example.com into IP addresses.

7
New cards

What is HyperText Transfer Protocol (HTTP)?

The protocol used for transmitting web pages over the Internet.

8
New cards

What is the World Wide Web?

A system of linked pages, programs, and files.

9
New cards

What is a datastream?

A continuous flow of data packets across a network.

10
New cards

What is redundancy in networking?

Redundant routing creates backup paths for network traffic, ensuring uninterrupted service if the primary path fails.

11
New cards

What is lossy compression?

A method for reducing file sizes by permanently removing data, sacrificing quality, e.g., JPEG or MP3.

12
New cards

What is lossless compression?

A method of compressing data without losing any information, allowing perfect reconstruction, e.g., ZIP or PNG.

13
New cards

What is public key encryption?

A security method using a pair of keys—a public key for encryption and a private key for decryption—to enable secure communication.

14
New cards

What is a rogue access point?

An unauthorized, often malicious, wireless access point connected to a secure network without administrative approval.

15
New cards

What is Personally Identifiable Information (PII)?

Data that can identify an individual and may include context-specific data.

16
New cards

What are some key features of memory in computing?

RAM (Volatile memory) and ROM (Non-volatile memory) are essential in understanding how data is stored and accessed.

17
New cards

What is crowdsourcing?

The practice of gaining input from a large number of people, typically via the internet, to support various projects.

18
New cards

What is parallel computing?

A computational model which splits a program into multiple tasks, some of which can be executed simultaneously.

19
New cards

What is distributed computing?

A computational model which uses multiple devices to run different parts of a program.

20
New cards

What is multifactor authentication (MFA)?

A method of user authentication which requires the user to present multiple pieces of evidence in multiple categories (such as knowledge and possession).

21
New cards

What is a cookie?

A small amount of text that tracks information about a user visiting a website.

22
New cards

What is a virus?

A type of computer malware that can make copies of itself.

23
New cards

What is phishing?

An attack where a user is tricked into revealing private information, often via a deceptive email.

24
New cards

What is a rogue access point?

A wireless access point that provides an attacker with unauthorized access to the traffic going over the network.

25
New cards

What is encryption?

The process of scrambling data to prevent unauthorized access.

26
New cards

What is public key encryption?

An asymmetric encryption technique that uses different keys for encrypting versus decrypting data.

27
New cards

What is symmetric encryption?

A technique for encrypting data where the same key is used to both encrypt and decrypt data.

28
New cards

What is lossy vs. lossless compression?

Lossy compression removes some data permanently to reduce file size, while lossless compression compresses data without removing any information.

29
New cards

What is digital divide?

The idea that some communities or populations have less access to computing than others, typically due to limitations of Internet speed or computer hardware access.

30
New cards

What is a datastream?

A continuous flow of data packets across a network.

31
New cards

What is redundancy in networking?

Redundant routing creates backup paths for network traffic, ensuring uninterrupted service if the primary path fails.

32
New cards

What is the difference between lossy and lossless compression?

Lossy compression removes some data permanently to reduce file size, while lossless compression compresses data without removing any information.

33
New cards

What is the purpose of bandwidth?

The maximum amount of data that can be sent in a fixed period of time over a network connection, typically measured in bits per second.

34
New cards

What is the difference between a modem and a router?

A modem connects to the internet and translates signals, while a router connects multiple devices to the internet and directs data traffic between them.

35
New cards

What is a firewall?

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

36
New cards

What is netiquette?

The etiquette and rules for appropriate behavior when communicating online.

37
New cards

What is a digital footprint?

The record of a person's online activities and the trail of data left behind when using the internet.

38
New cards

What is cloud storage?

A service that allows users to store data online, accessible from various devices, typically managed by cloud service providers.

39
New cards

What is digital citizenship?

Digital citizenship refers to the norms of appropriate, responsible behavior with regard to technology use.

40
New cards

What is digital identity?

Digital identity is the online presence of a person, encompassing their activities, communications, and shared data.

41
New cards

What is the role of an operating system (OS)?

An OS manages computer hardware and software resources and provides services for computer programs.

42
New cards

What is malware?

Malware is malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.

43
New cards

What is scaling in computing?

Scaling refers to the capability of a system to handle a growing amount of work by adding resources.

44
New cards

What is open-source software?

Software with source code that anyone can inspect, modify, and enhance.

45
New cards

What is a database?

A structured collection of data that can be easily accessed, managed, and updated.

46
New cards

What is cloud computing?

The delivery of different services through the Internet, including storage, servers, databases, networking, software, and analytics.

47
New cards

What is a network protocol?

A set of rules or standards that define how data is transmitted and received across a network.

48
New cards

What is a URL?

A Uniform Resource Locator, which provides the address of a resource on the Internet.