1/87
vocab from chapters 1-8
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Bit
This represents a binary digit and contains a value of either 0 or 1. Which makes all our cell phone conversations, and bank records.
Blacklist
A list of entities explicitly denied access to a system, network, or resource.
character
Multiple symbols created by bits used in programming and data processing to represent textual data.
Cyberspace
A land without frontiers where all the worlds’ people can be interconnected as though they were residents of the same small town.
Data center
A place where large amounts of data are stored
Data
Information that is made up of multiple bits
Data network
Electronic communications that allow data to be sent around
Disk drive
A device that can analyze read and allow to edit any information that is contained in that drive.
Intellectual property
Where an original gets coped into the exact same thing, with the same number of little details.
Moore’s law
Density of integrated circuits doubles every couple of years
Network
this passes bit from one place to another, while checking on any if they have been damaged
processor
A part of a computer that does most of the data processing at specific speeds.
Whitelist
A list of parties whose services are available for
Ad hoc
Something that is not regular or planned, but it only happens when necessary. This can also be seen as a quick solution.
Database
An organized collection of data that is stored in a computer system
Data aggregation
This includes any process that summarizes data that was gathered and ready for analysis.
Data mining
when someone or something is extracting important information and patterns from large datasets using various techniques
Data repository
this is when a data set is waiting to be minded or analyzed, also known as a data archive.
Data sources
a name used to describe the connection established between a database and a server.
Digital detritus
digital debris that builds up from everyday online activities.
Dossier
collection of documents about someone, an event, or a subject.
EDR
Event data recorder
Encode
Describes the method of preparing data to store or transmit
Encryption
Translating from int a secret code
Ip address
This identifies devices that are on a TCP or IP network
Meta data
Information about data that explains when, how, and who it was collected from
Query
Data or information that was requested from a database
RFID
Radio frequency identification
Algorithm
A formula or a set of steps that solve a problem
Analog
Signals or information represented by physical quantity such as voltages from a telephone signal
ASCII
American Stand Code for Information Interchange is used for character coding, assigning many combinations of 8-bit code to a random letter or symbol. It uses one byte per character (8 bits).
Cloud computing
Relies on sharing resources rather than having local servers handle applications
Cryptography
"Secret writing", it's a way of transforming information or texts into unreadable message called a cipher text.
Digital
Systems that based on discontinuous data or events, computers are digital devices because they use and can identify two values, 0's and 1's.
Digital signal processing
Also known as DSP, which refers to changing or manipulation analog information
Download
When you copy data (can be from a file or some other piece of info) from a main source to peripheral device.
lossless compression
A data compression technique where no data is lost and can be rebuilt or found again.
Lossy compression
A data compression technique where some of the data is lost, usually used to eliminate useless information, or the same thing that pops up.
megabyte
Made up of about a million bytes, megapixels - Made up of one million or millions of pixels, a standard figure of merit for digital cameras, used to refer the resolution of a graphic device.
modeling
Process of representing real world thing into a digitized version made up of binary into a digital representation of that object.
OCR
Optical character recognition is used when the original document is printed on a piece of paper, then its algorithm converts images into a sequence of codes. It's mostly found on machines that print, photocopy, or fax.
pixels
Short for picture element
Raster
rectangular area display screen that is used to display images: made up of pixels
Render
Process of adding realism to computer graphic by adding 3-D like components, like shadows and different color shading to look like real life.
Spam
Electronic junk mail or any other junk information
Steganography
The art of sending secret messages in imperceptible ways, which are messages embedded into non-harmful and normal text.
Upload
To transmit data from a computer to a bulletin board standard figure of merit for digital cameras, used to refer the resolution of a graphic device.
Modeling
Process of representing real world thing into a digitized version made up of binary into a digital representation of that object.
OCR
Optical character recognition is used when the original document is printed on a piece of paper, then its algorithm converts images into a sequence of codes. It's mostly found on machines that print, photocopy, or fax.
Background
In computing, the background refers to processes or tasks that run out of the user's direct view or interaction, typically supporting foreground activities without requiring attention.
Binary
A binary system is a base-2 numeral system that represents data using two symbols, typically 0 and 1. In computing, it is used to encode data in a format that computers can process.
Bot
A bot (short for "robot") is a software application that runs automated tasks over the Internet. Bots can perform repetitive tasks like web crawling, data scraping, or automating interactions on social media.
Cache
A cache is a storage component that temporarily holds frequently accessed data to speed up retrieval. In web browsing, it stores copies of web pages, images, and other resources to reduce loading times.
Firewall
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks.
Foreground
In computing, the foreground refers to the processes or tasks currently in focus and actively being interacted with by the usr, as opposed to those that are running in the background.
HTML
(Hypertext Markup Language): HTML is the standard markup language used to create web pages. It structures the content on the web using elements like tags for headings, paragraphs, links, images, and more.
URL
(Uniform Resource Locator): A URL is the address used to access resources on the Internet. It specifies the location of a resource, and the protocol used to retrieve it (e.g., http, https, ftp).
AES
Advanced Encryption Standard; a symmetric 128-bit block data encryption technique.
Certification authrity
(CA) a trusted organization or company that issues digital certificates used to create digital signatures and public-private pairs.
Cipher text
Data that was encrypted
DES
Data Encryption Standard; this is a popular symmetric, key encryption method that uses a 56-bit key and a block cipher method that breaks text into 64-bit blocks to encrypt them.
Decryption
decoding data that was encrypted into a secret code.
Encryption
translating data into a secret code.
Packet
Bits that move through the Internet not in a continuous stream, but in discrete blocks.
Plain text
textual data in ASCII (American Standard Code for Information Interchange) format. This is the most portable format because it is supported by nearly every application on every machine.
Router
A device that forwards data packets along networks and is connect to at least 2 networks are located at gateways.
Centralized systems
Collect files at a central computer for people to download.
Commons
A system of sharing that minimizes the need for fine grained property restrictions.
DRAM
Dynamic random access memory
DRM
Digital rights management
Flooding
Each computer in a file sharing network maintains a list of other computers in the network.
Gigabyte
A gigabyte is either 1,024 megabytes or 1,073,741,824 bytes.
peer to peer architecture
A type of network in which each workstation has equivalent capabilities and responsibilities.
piracy
The unauthorized use or reproduction of another’s work.
sealed storage
an application that lets you encrypt files in such a way that they can be decrypted only on particular computers that you specify.
TPM
Trusted platform module
DOPA
stands for Deleting Online Predators Act.
Miller test
The miller test is a series of tests that the court must consider to determine whether information is obscene.
CDA
stands for Communications Decency Act.
COPA
means Child Online Protection Act.
Short wave
Correspond to high frequencies because all radio waves travel at the same speed, which is the speed of light.
Spectrum Allocation
Assigning radio frequencies to different uses.
Spread Spectrum
To transmit radio signals over a wide range of frequencies.
Censorship
Suppressing or removing content/media from public view because it is offensive.
FCC
Federal Communications Commission.
VHF
very High Frequency.
UHF
Ultra High Frequency.