vde

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/120

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

121 Terms

1
New cards

Abstraction – reducing information and detail to facilitate focus on relevant concepts

2
New cards

AND – basic logic gate where every part of a statement must be true for the entire statement to be true

3
New cards

Application – almost everything on the computer except saved files and the operating system, including word processors, photo editing software, web browsers, games, and music programs

4
New cards

ARPANET – the Advanced Research Projects Agency Network, first agency to use TCP/IP

5
New cards

ASCII – American Standard Code for Information Interchange

6
New cards

Asymmetric Key Encryption – a system different key is used to encrypt and decrypt a message

7
New cards

Bandwidth – the amount of resources available to transmit the data

8
New cards

Big Data – sets of data that are larger than a consumer software application can handle

9
New cards

Binary – base 2, number system that uses 0, 1

10
New cards

Binary Search – a searching algorithm, used on sorted lists, that divides the number of elements to search in half until it is down to one element

11
New cards

Bit – each number in the binary system, 0 or 1

12
New cards

Boolean Logic – a branch of algebra where variables can only have two values: true or false

13
New cards

Byte – 8 bits

14
New cards

Caesar Cipher – a shift cipher where each letter is shifted the same amount

15
New cards

Central Processing Unit (CPU) –carries out every command or process on the computer and can be thought of as the brain of the computer

16
New cards

Certificate Authority (CA) – the entity that stores, signs, and issues digital certificates

17
New cards

Cipher – is a pair of algorithms that give details on how to encrypt and decrypt the data

18
New cards

Citizen Science – a type of scientific research that is conducted, in whole or in part, by distributed individuals who contribute relevant data to research using their own computing devices

19
New cards

Client –any computer that requests a service

20
New cards

Cloud Computing – a type of distributed computing that involves using a network of remote servers to store, manage, and process data

21
New cards

Computationally hard – a problem that takes too long even for a computer to find the exact solution

22
New cards

Computer – an electronic device that processes data according to a set of instructions or commands, known as a program

23
New cards

Constant – used in coding to store a value that cannot be changed

24
New cards

Copyright – a form of intellectual property, which protects original forms of expression

25
New cards

Crowdsourcing – tapping into the collective intelligence of a large group of people to achieve a specific goal or solve a problem

26
New cards

Data abstraction – the process of managing complexity by using a list or array to store related data without focusing on the individual elements’ implementation

27
New cards

Datagrams – Similar to packets, used in unreliable protocols such as UDP

28
New cards

DDoS – distributed denial-of-service attack, hackers flood a site with fake request making all the site’s recourses unavailable for legitimate users

29
New cards

Debugging – finding errors in code

30
New cards

Decimal – base 10, number system that used 0-9

31
New cards

Decryption – the reverse process of encryption

32
New cards

Design – Implement – Test – the three steps of the iterative development process

33
New cards

Digit – each number in the decimal system, 0-9

34
New cards

Digital Certificate – a trusted third-party file that verifies a site as legitimate

35
New cards

Digital Divide – the gap between those who have access to technology and those who do not

36
New cards

Digital signature – an electronic signature that, by using public key, can be verified authentic

37
New cards

Distributed Computing – a model that involves using multiple devices to run a program

38
New cards

DNS – Domain Name System, one of the smaller networks that make up the Internet. It contains many servers that act like phone books

39
New cards

Domain Name – a name given or linked to an IP address

40
New cards

Encryption – taking text and converting it so it is illegible

41
New cards

Ethical computing – demands that users and developers hold themselves to a higher standard. Refers to the principles, values, standards, and practices that guide individuals and groups in doing what is right

42
New cards

EULA – end-user license agreement

43
New cards

Fault-Tolerant – a property of IP. If there is an error, it still works properly

44
New cards

Graphical User Interface (GUI) – an interface that uses images to represent a system’s folders and files

45
New cards

Hacker – anyone who uses their technological skills to solve problems. A malicious security hacker exploits weaknesses on a computer or network and can steal or disrupt data

46
New cards

Hardware – the physical parts of the computer, including devices such as the monitor, keyboard, speakers, wires, chips, cables, plugs, disks, printers, and mice

47
New cards

Heuristic approach – an approach that gives results that are “good enough” when an exact answer is not necessary

48
New cards

Hexadecimal – base 16, number system that uses 0-9 and a-f

49
New cards

HTML – Hyper Text Markup Language, the standard for creating web pages

50
New cards

HTTP – Hyper Text Transfer Protocol, used for websites

51
New cards

HTTPS – a secure version of HTTP that uses SSL/TLS

52
New cards

Incremental – done in small chunks

53
New cards

Input and output (I/O) devices – how the user interacts with the computer

54
New cards

Internet – a network of smaller networks connected using a specific set of rules that computers use to communicate with each other

55
New cards

IP –Internet protocol, a unique address for every device connected to the Internet

56
New cards

IP Address – a unique identifier for every device on the Internet

57
New cards

IPv4 – the version of IP that uses 32-bit addresses

58
New cards

IPv6 – the version of IP that uses 128-bit addresses

59
New cards

ISP – Internet Service Provider

60
New cards

Iterative – continuously repeating steps, achieved in programming by using loops

61
New cards

Key – in cryptography, a shared secret to make encryption harder to crack

62
New cards

Linear Search – a searching algorithm that starts at the first index and checks each element of the list one by one until it finds the item it is searching for

63
New cards

Lossless – data compression that does not lose data during compression

64
New cards

Lossy – data compression that loses data during compression

65
New cards

Main memory – memory that temporarily stores information while it is being sent to the CPU, also called RAM

66
New cards

Malware – malicious software intended to cause damage to a computer or network

67
New cards

Metadata –additional data about the main data, usually at the beginning of a file

68
New cards

Modular arithmetic – using the remainder when dividing, also known as clock arithmetic

69
New cards

Moore’s Law – the trend of exponentially increasing transistor density, doubling approximately every two years

70
New cards

Multi-factor authentication (MFA) – using two or more methods for verifying a user

71
New cards

Name Server – a server that contains many IP addresses and their matching domain names

72
New cards

Network – a group of computers that are connected so they can share resources using a data link

73
New cards

One-way Function – a problem that is easy in one direction and difficult in the other

74
New cards

Operating System – software that serves as an intermediate between the hardware and the applications and is in charge of keeping the entire system running smoothly

75
New cards

OR – basic logic gate where any part of a statement can be true for the entire statement to be true

76
New cards

Overflow Error – a specific type of run-time error that occurs when a computer attempts to handle a number that is outside of the defined range of values

77
New cards

Packets – small chunks of data used in TCP/IP

78
New cards

Parallel Computing – breaks a program into multiple smaller sequential computing operations, some of which are performed simultaneously

79
New cards

Peripherals – the input and output (I/O) devices and the secondary memory

80
New cards

Phishing – using “bait” to trick the user into entering sensitive information like usernames, passwords, or credit card numbers

81
New cards

Pixel – short for picture element. The basic unit of color on a computer display

82
New cards

Privacy – deals with your personal information, how it is stored, and how it is shared

83
New cards

Private Key – a shared secret needed to decrypt a message

84
New cards

Procedural abstraction – the process of using a function or method to hide the details of a specific task

85
New cards

Protocol – a specific set of rules

86
New cards

Public Key – a system that allows a key to be publicly published

87
New cards

Random Access Memory (RAM) –memory that can be retrieved or written to anywhere without having to go through all the previous memory

88
New cards

Redundancy – finding frequencies or patterns in code

89
New cards

Reliable – a protocol that lets the client know if the server received all sent packets

90
New cards

RGB – color model used for most monitors or screens. Stands for red, green, and blue, referring to the color of light

91
New cards

Root Name Server – one of thirteen servers that contain every IP address and its matching domain name

92
New cards

Round-off Error – a type of error that can occur when working with real that are represented as approximations in computer storage

93
New cards

Router – a networking device that routes Internet traffic to the destination

94
New cards

Run-Length Encoding – looking for redundancy or patterns as runs in the code

95
New cards

Run-time Error – a programming error that occurs during the execution of the program, like dividing by zero

96
New cards

Secondary Memory – used for long term storage and is physically changed when files are saved or deleted

97
New cards

Second-Level Domain – the second highest level in the DNS hierarchy, found directly to the left of the top-level domain in a domain name

98
New cards

Security – refers to the steps companies take to protect your data

99
New cards

Selection – the logic structure in programming that uses if statements to select certain values

100
New cards

Sequence – the structure that runs one line after another in order