1/84
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Internet
A worldwide collection of millions of computers and networks of all sizes; a network of networks.
Hypertext / Hypermedia
Documents that include links to text, images, audio, or video.
Internet Backbone
The main high-speed fiber-optic network connecting major routers and data centers.
HTML Tags
Define the structure and appearance of a webpage.
HTML Attribute
Specifies a value like font color for a page component.
Podcast
An audio file posted online for download or streaming.
Internet Telephony (VoIP)
Using the Internet instead of phone lines for voice calls.
Intranet
A private internal network that uses Internet technologies.
A system for sending electronic messages over the Internet; one of the most widely used services.
Blog
An online journal or newsletter that is updated frequently.
Phishing
Sending fake emails pretending to be legitimate sources to steal information.
Pharming
Redirecting users to fake websites to steal their information.
Spoofing
Pretending to be an authorized user to gain access or steal data.
Spyware
Software that secretly gathers information about users.
Adware
Spyware that collects data to display targeted ads.
Worm
Self-replicating malware that spreads through networks without user action.
Virus
A self-propagating program that attaches to files and spreads when opened.
Backdoor
A hidden access point built into a system by its creator.
Denial-of-Service (DoS) Attack
Flooding a system with requests to make it crash or shut down.
Social Engineering
Using people skills to trick users into revealing private information.
Logic Bomb
Code hidden in a system that activates under specific conditions.
Firewall
Hardware or software that protects a network by blocking unauthorized access.
Intrusion Detection System (IDS)
Software that monitors network traffic and alerts administrators of attacks.
Data Encryption
A method that turns readable data into scrambled ciphertext.
Biometric Security
Verification based on physical traits like fingerprints or facial recognition.
UPS (Uninterruptible Power Supply)
A backup power unit that prevents data loss during outages.
Keystroke Logger
A program that records keyboard input.
RAID / Mirror Disks
Storage systems that keep data secure and prevent data loss.
Nonrepudiation
Ensures all parties in a contract or communication cannot deny their involvement.
Intellectual Property
Legal protections for creative or original works such as inventions or art.
Accountability
Responsibility for actions and data use.
Acceptable Use Policy
Rules that define ethical and legal use of systems and data.
Virtual Organization
A network of companies that share resources online.
Digital Divide
The gap between people who have access to technology and those who do not.
Spam
Unsolicited advertising emails.
Log Files
Records of user actions and system activity on a server.
Corner Bolts
Physical network security measures that prevent tampering with equipment.
Data Communication
The electronic transfer of data between locations.
Bandwidth
The amount of data that can be transferred per second.
Throughput
The actual rate of data transfer achieved.
Protocols
Rules that govern how data is transmitted across networks.
OSI Model
A seven-layer framework describing how data is transmitted between devices.
LAN (Local Area Network)
A network that connects nearby computers and devices.
WAN (Wide Area Network)
A network that covers a large geographic area.
Bus Topology
A network setup where all devices share one central cable.
Ring Topology
A network where each device is connected in a closed loop.
Star Topology
A network where all devices connect to a central hub or computer.
Router
A device that directs data between different networks.
Attenuation
Signal power loss over distance.
Broadband
A high-speed connection that sends multiple data streams at once.
DSL (Digital Subscriber Line)
A broadband connection using telephone lines.
Alice Object
A 3D model or character that can be programmed to perform actions.
Alice Method
A command that makes an object perform an action.
Parameter
An extra piece of information passed to a method to control how it runs.
Class (in Alice)
A blueprint or category that defines objects with similar properties and methods.
Instance (in Alice)
A specific version of a class object in the Alice world.
Procedure
A method that performs an action but doesn’t return a value.
Function
A method that performs a calculation and returns a value.
Alice Gallery
Provides 3D models that can be added to the scene.
Code Editor
Allows you to build and edit programs using drag-and-drop blocks.
Scene Editor
Used to set up and arrange objects in the world visually.
Storyboard
A visual plan that outlines what happens in an animation or program.
Built-in Method
A method that comes with an object by default.
Custom Method
A method created by the user to define new behavior.
Control Structure
A block that controls the order in which instructions are executed.
Do Together
Runs multiple actions at the same time.
Do In Order
Runs actions one after another in sequence.
Loop
Repeats a section of code a specific number of times.
Event
A trigger that starts an action when something happens, like a key press or mouse click.
Nesting
Placing one control structure inside another.
Variable
A named container used to store data that can change while the program runs.
Global Variable
A variable that can be used anywhere in a program.
Local Variable
A variable that can only be used inside a specific method.
Comment
A note left in code to explain what it does.
World (in Alice)
The environment that contains all objects and the camera.
Camera (in Alice)
Defines the viewpoint for the scene or animation.
Pose (in Alice)
The saved position and orientation of an object.
Billboard Object
A flat image that always faces the camera.
Inheritance
When an object inherits properties and methods from its class or parent.
3D Object
An object that has depth, width, and height.
2D Object
A flat object like a picture with only width and height.
Function (Alice Use)
Calculates and returns information like distance or position.
Parameter (Alice Use)
Makes methods reusable and flexible by allowing user input.
Event Listener
A block that waits for an event and triggers code when it occurs.
Debugging
Finding and fixing errors in code or animation.