1/52
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Bot/Robot
Automated programs designed to perform specific tasks.
Predictive Text
Technology that predicts and suggests text while typing.
Cybersecurity
Measures and practices to protect systems and networks from cyber threats.
Graphic User Interface (GUI)
Visual way users interact with computers using graphical icons.
Artificial Intelligence (AI)
Machines simulating human intelligence, like decision-making and learning.
Encryption
Process of converting data into a code to prevent unauthorized access.
Decryption
Converting encrypted data back into its original form.
SPAM
Unsolicited bulk emails, typically advertisements.
Web Browser
A tool used to access the World Wide Web (e.g., Chrome, Safari).
IP Address
Unique identifier assigned to devices on the internet.
HTML
Coding language used to structure and display content on the web.
Binary
A numbering system using only two digits, 0 and 1.
Digital Footprint
Collected information about a person across the internet.
Domain Name System (DNS)
Translates domain names to IP addresses.
Lossless Compression
Data compression that preserves all original data.
Lossy Compression
Data compression that removes some data to reduce file size.
Machine Learning
Field of AI where computers learn from data inputs to make predictions.
HTTP
HyperText Transfer Protocol used for transmitting web pages.
Digital Citizenship
Responsible use of technology and digital literacy.
Protocol
Set of rules for communication over the internet.
SSL
Secure Socket Layer, providing encryption for internet security.
Netiquette
Proper behavior and manners used in online communication.
Data Packet
Small units of data transmitted over a network.
Router
A device that directs data packets along networks.
Scalability
Ability of a system to handle growth or increased demand.
Compression
Reducing the size of a file or data for easier transmission or storage.
IPv4 and IPv6
Internet Protocol versions that provide unique addresses for devices.
Digital Divide
Gap between those with access to technology and those without.
Bandwidth
Maximum amount of data that can be transmitted over a network in a given time.
Phishing
Fraudulent attempts to obtain sensitive information by pretending to be a trustworthy entity.
Algorithm
A step-by-step procedure for solving a problem or performing a task.
Firewall
A security system that monitors and controls incoming and outgoing network traffic.
Artificial Neural Network
A computing system inspired by the human brain, used in machine learning.
Big Data
Large and complex datasets that require advanced tools to analyze and interpret.
Cloud Computing
Using remote servers hosted on the internet to store, manage, and process data.
Cookies
Small data files stored on a user's computer by websites to remember preferences or track behavior.
Latency
Delay before data transfer begins following a request.
Modem
A device that connects a network to the internet.
Operating System
Software that manages hardware and software resources on a computer (e.g., Windows, macOS).
Peer-to-Peer Network (P2P)
A decentralized network where devices communicate directly without a central server.
Spam Filter
Software designed to detect and block unsolicited emails.
Teachable Machine
A machine learning model that can be trained to recognize patterns, objects, or actions.
Virtual Private Network (VPN)
Technology that creates a secure connection over the internet.
Pixel
The smallest unit of a digital image or display.
Cache
Temporary storage that speeds up access to frequently used data.
Hashing
Converting data into a fixed-length code, often used for data integrity checks.
Code Editor
A tool used to write and edit programming code.
Unicode
A standard encoding for representing text in computers, supporting most written languages.
Cloud Storage
Online space to save and access files from any device with an internet connection.
Two-Factor Authentication (2FA)
An extra layer of security requiring two forms of identification to access an account.
binary uses
Computers use binary to represent and process all types of data (e.g., text, images, sound
byte
8 bits
0-255 with 3 colors
RGB