COMP SCI unit 5

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 29

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

30 Terms

1

Packets

is a small chunk of any kind of data and metadata

New cards
2

TCP- Transmission Control Protocol

lets your computer pretend it has a reliable connection to the other computer

New cards
3

Filtering Data

the process of examining a dataset to exclude, rearrange, or share data according to certain criteria

New cards
4

computing device

a physical object that can run a program, such as computers, tablets, cell phones, and smart sensors

New cards
5

Distributed Computing System

is a form of parallel computing that uses multiple computers

New cards
6

Router

a computer that passes information from one network to another

New cards
7

Classifying Data

means distributing data into groups based on common characteristics

New cards
8

Redundancy

the inclusion of backup elements in case of part fails

New cards
9

Encryption

is the process of encoding data to prevent unauthorized access

New cards
10

Decryption

is the process of converting decoding the data

New cards
11

Asymmetric Ciphers

The use two keys, one for encryption of messages and the other one during decryption

New cards
12

World Wide Web

is a system of linked pages, programs, and files that uses the Internet

New cards
13

Scalability

is the ability of the internet to keep working as it grows

New cards
14

Symmetric Key Encryption

use the same key for both encryption and decryption

New cards
15

Sequential Computing System

operations are performed in order one at a time

New cards
16

Certificate Authority

are organizations that issue digital certificates to verify who owns the encryption keys used for secured communications

New cards
17

Bias

a systematic distortion of a statistical result due to a factor not allowed for in its derivation

New cards
18

Fault Tolerance

is the ability of a system to work around problems

New cards
19

Internet

a computer network that uses open protocols to standardize communication

New cards
20

Multifactor Authentication

an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism

New cards
21

IP address

is a unique number assigned to each device on a computer network

New cards
22

Cleaning Data

is process of making the data uniform without changing its meaning

New cards
23

Router

a computer that passes information from one network to another

New cards
24

Bandwith

is the maximum amount of data that can be sent in a fixed amount of time

New cards
25

Protocol

a set of rules that specify the behavior of a system

New cards
26

Crowdsourcing

the general from for using the Internet to get a lot of people to help to solve a problem

New cards
27

Parallel Computing System

the program is broken into smaller steps, some of which are performed at the same time

New cards
28

Public Key Encryption

uses a pair of keys, the sender uses the public key to encrypt the message, and the receiver uses their private key to decrypt it

New cards
29

computer network

is an interconnected computing system that is capable of sending or receiving data

New cards
30

data pattern

how the data collected can be structured, indexed, and made available for searching

New cards
robot