Encryption and Decryption

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/33

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

Internet

An interconnected computing system capable of sending or receiving data

2
New cards

Computer network

A sequence of directly connected computing devices that connect a sender to a receiver

3
New cards

World Wide Web

A system of linked pages, programs, and files that uses the Internet

4
New cards

Bandwidth

The maximum amount of data that can be sent in a fixed amount of time

5
New cards

Cloud

A term used to describe places to store data on the Internet

6
New cards

Path

The process of finding a path from sender to receiver

7
New cards

Routing

The process of finding a path from sender to receiver

8
New cards

Scalability

The ability of the Internet to keep working as it grows

9
New cards

Redundancy

The inclusion of back-up elements in case one part fails

10
New cards

Protocol

A set of rules that specify the behavior of a system

11
New cards

IP address

A unique number assigned to each device on a computer network

12
New cards

Packet

A small chunk of any kind of data and metadata that is passed through the Internet as a unit

13
New cards

Encryption

The process of encoding data to prevent unauthorized access

14
New cards

Decryption

The process of decoding data that has been encrypted

15
New cards

Public key encryption

A type of encryption that uses a pair of keys, only one of which is published

16
New cards

Symmetric encryption

The encryption scheme that uses the same key for both encryption and decryption

17
New cards

Firewall

A security system that controls the kinds of connections that can be made between a computer or network and the outside world

18
New cards

Keylogging

A kind of malware that records every key pressed by a user

19
New cards

Rogue access point

A wireless access point that gives access to a secure network without the authorization of the network administrator

20
New cards

Antivirus

Software designed to scan files and Internet transmissions looking for malware

21
New cards

DDoS attack

Uses a virus to flood a server with many requests from many computers at once so that users of that server are denied service

22
New cards

Computer virus

Software designed to harm or take partial control over a computer

23
New cards

SSL/TLS

A standard for encrypted information transfer on the Internet

24
New cards

Sampling rate

The number of samples measured per second

25
New cards

Crowdsourcing

Using the Internet to get a lot of people to help solve a problem

26
New cards

Analog data

Data with values that change smoothly in discrete intervals

27
New cards

Lossless compression

Data compression algorithms that are reversible, allowing reconstruction of the original data with no loss in quality

28
New cards

Lossy compression

Data compression algorithms that are not fully reversible, allowing reconstruction only an approximation of the original data

29
New cards

Computing innovation

A concept that can be physical, non-physical software, or conceptual, but must include a program as an integral part of its function

30
New cards

Binary sequence

A string of ones and zeros, also called a bitstream

31
New cards

Byte

Eight bits

32
New cards

Floating point

Used to represent very large or very small numbers using powers of two

33
New cards

Digital divide

Unequal access to computers and the Internet based on various factors

34
New cards

Word

A single unit of data that can only have one of two values