1/67
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Social media
applications & websites that allow users to share content & participate in social networking that may have otherwise had socioeconomic barriers
Socioeconomic
Difference among groups based on geography, social , & economic factors
Search tools
Directories & search engines on the internet that are essential for finding information efficiently on the Web.
Crowdfunding
Entrepreneurs using online access to customers as a means of funding their project.
Metadata
data about data
Cloud computing
Storing, accessing & processing data using remote servers over a network rather than a local server or computer.
Client-server model
the clients are the end-users and communicate with the server (a centralized computer) that services the clients.
Internet
network infrastructure composed of devices (or nodes)that communicate via protocols
Network
connection of devices & networks to communicate using addresses & protocols
Routing
The process of moving information over a network via a device called a router.
Bandwidth
Measure of bit rate of a system or data (measured in bits) that can be sent in a fixed amount of time over a system.
Latency
The time elapsed between the transmission & the receipt of a request in a system.
Routing Redundancy
Having multiple options between two points increases the reliability of the internet & helps it scale to more devices & more people
WWW (World Wide Web)
System of linked pages, programs, & files that uses the internet in order to transmit content
SMTP Protocol
Email communication standard developed & overseen by the the internet engineering task force
HTTP
Hypertext Transfer Protocol developed by Internet Engineering Task Force, this protocol determines how data & messages are formatted, transmitted, & responded to via the internet
HTTPS
HTTP with a secured socket layer (SSL) or transport layer security (TLS) as a sublayer that encrypts & decrypts user data & requests for added security
Internet Protocol
The protocol by which data is sent from one computer to another on the internet
TCP/IP
Standard for packets & routing
SMS
Short message services. Text messaging allows users to send up to 160 characters to another device. If the message is longer it may truncate, concatenate and/or split up into several individual messages.
Interface
User friendly picture oriented way to interact with technology, contributing to the widespread use of the internet.
Protocols
Common set of rules that computers must abide by in order to connect with each other. The protocols used in the internet are open, which allows users to easily connect additional computing devices to the internet.
Application Program Interfaces (APIs)/Libraries
set of routines, protocols, & tools for building software applications which simplify complex programming tasks
IP Address
Unique identification for each device that's connected to a computer network & uses internet protocol.
IPv6
Internet protocol, version 6 - 128-bit internet address consisting of eight 4-character hexadecimal numbers to handle routing of many more devices.
IPv4
Internet Protocol, version 4 - A 32-bit internet address consisting of four numbers each between 0 through 255, separated by periods (represents 8 bits)
Domain
group of devices connected on a network using the same protocol to access & administer web pages.
Domain Name System (DNS)
The way that domain names are located & translated into Internet Protocol (IP) addresses.
Hierarchy
Arrangement of elements in a ranking of superiority. The internet & systems are built from the top (root) down.
Packet Switching
Digital datas sent by breaking the data into blocks of bits called packets, which contain both the data being transmitted and control information for routing the data
Data Stream
Information passed through the internet as a data stream. Data streams contain chunks of data, which are encapsulated in packets
Encryption
The process of converting information or data into a code, especially to prevent unauthorized access.
Decryption
Process of decoding the data that was encrypted
Symmetric key system
encryption method where each pair of users share a secret key
Asymmetric key system
encryption method that uses different keys to encrypt & decrypt
Public-key encryption
Asymmetric encryption method that uses a public key (made available publicly) & private key (available to owner only)
Certificate authorities
CA’s issue digital certificates that validate ownership of encrypted keys used in secured communications & are based on a trust model
Trust Model
Validation of one's identity necessary for an event or transaction to occur
Open platforms
Software based on open standards where there's no single ownership & is freely available through open license.
Closed Platforms
Proprietary software where the provider has control over the application & content & can restrict access
Open standard
Standard where documentation & specifications are open to the public
Closed standard
Standard where documentation & specifications are not available to the public
Open source
Publicly available information that is free to use, distribute, modify, & study.
Closed source
Privately owner information that is proprietary
Secure Sockets Layer (SSL)
The standard security technology for establishing an encrypted link between a web server and browser, typically indicated with a padlock icon in the address bar
Net neutrality
The internet is built around the notion of free & open access to information with no blocking, throttling, or paid prioritization
Cybersecurity
Measures taken to protect a computer or computer system against unauthorized access or attack
Confidentiality
Ability to limit access to information to a certain set of users
Integrity
The certainty that information is accurate
Availability
The reliability of access to information
Firewall
Part of a computer system or network that is designed to block unauthorized access while permitting outward communication
DDoS Attack
Distributed Denial of Service- an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources
Viruses
Code that's capable of copying itself & corrupting a system or destroying data
Social engineering
The psychological manipulation of people into performing actions or divulging confidential information
Malware
Software that's intended to damage or disable computers & computer systems
Phishing
Obtaining confidential information by masquerading as an “Official” person, site, or entity. A form of social engineering
Tim Berners-Lee
Created the set of fundamental tools & technologies that make up the World Wide Web
Hyperlinks
Clickable bits of text, images or other screen elements within an HTML document that a user can select to request another document or web location
Sequential computing
A computational model in which operations are performed in order one at a time
Parallel computing
A computational model where the program is broken into multiple smaller sequential computing operations, some of which are performed simultaneously
Distributed computing
A computational model in which multiple devices are used to run a program
Botnets
Network of private computers infected with a malicious software & controlled as a group without the owners knowing
Bitcoin Mining
The processing of transactions in the digital currency system, in which the records of current Bitcoin transactions, known as blocks, are indeed to the record of past transactions, known as the blockchain.
Internet of Things
The network of physical devices, vehicles, home appliances, & other items embedded with electronics, software, sensors, actuators, & connectivity which enables these objects to connect & exchange data
Sensor networks
Autonomous sensors that measure environmental conditions such as light, temperature & sound which facilitate new ways of interacting with the environment & with physical systems.
Autonomous technology
Technology that can function without being told what to do - i.e. Robots.