AP blown to bits vocabulary

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/87

flashcard set

Earn XP

Description and Tags

vocab from chapters 1-8

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

88 Terms

1
New cards

Bit

This represents a binary digit and contains a value of either 0 or 1. Which makes all our cell phone conversations, and bank records.

2
New cards

Blacklist

A list of entities explicitly denied access to a system, network, or resource.

3
New cards

character

Multiple symbols created by bits used in programming and data processing to represent textual data.

4
New cards

Cyberspace

A land without frontiers where all the worlds’ people can be interconnected as though they were residents of the same small town.

5
New cards

Data center

A place where large amounts of data are stored

6
New cards

Data

Information that is made up of multiple bits

7
New cards

Data network

Electronic communications that allow data to be sent around

8
New cards

Disk drive

A device that can analyze read and allow to edit any information that is contained in that drive.

9
New cards

Intellectual property

Where an original gets coped into the exact same thing, with the same number of little details.

10
New cards

Moore’s law

Density of integrated circuits doubles every couple of years

11
New cards

Network

this passes bit from one place to another, while checking on any if they have been damaged

12
New cards

processor

A part of a computer that does most of the data processing at specific speeds.

13
New cards

Whitelist

A list of parties whose services are available for

14
New cards
15
New cards

Ad hoc

Something that is not regular or planned, but it only happens when necessary. This can also be seen as a quick solution.

16
New cards

Database

An organized collection of data that is stored in a computer system

17
New cards

Data aggregation

This includes any process that summarizes data that was gathered and ready for analysis.

18
New cards

Data mining

when someone or something is extracting important information and patterns from large datasets using various techniques

19
New cards

Data repository

this is when a data set is waiting to be minded or analyzed, also known as a data archive.

20
New cards

Data sources

a name used to describe the connection established between a database and a server.

21
New cards

Digital detritus

digital debris that builds up from everyday online activities.

22
New cards

Dossier

collection of documents about someone, an event, or a subject.

 

23
New cards

EDR

Event data recorder

24
New cards

Encode

Describes the method of preparing data to store or transmit

25
New cards

Encryption

Translating from int a secret code

26
New cards

Ip address

This identifies devices that are on a TCP or IP network

27
New cards

Meta data

Information about data that explains when, how, and who it was collected from

28
New cards

Query

Data or information that was requested from a database

29
New cards

RFID

Radio frequency identification

30
New cards

Algorithm

A formula or a set of steps that solve a problem

31
New cards

Analog

Signals or information represented by physical quantity such as voltages from a telephone signal

32
New cards

ASCII

American Stand Code for Information Interchange is used for character coding, assigning many combinations of 8-bit code to a random letter or symbol. It uses one byte per character (8 bits).

33
New cards

Cloud computing

Relies on sharing resources rather than having local servers handle applications

34
New cards

Cryptography

"Secret writing", it's a way of transforming information or texts into unreadable message called a cipher text.

35
New cards

Digital

Systems that based on discontinuous data or events, computers are digital devices because they use and can identify two values, 0's and 1's.

36
New cards

Digital signal processing

Also known as DSP, which refers to changing or manipulation analog information

37
New cards

Download

When you copy data (can be from a file or some other piece of info) from a main source to peripheral device.

38
New cards

lossless compression

A data compression technique where no data is lost and can be rebuilt or found again.

39
New cards

Lossy compression

A data compression technique where some of the data is lost, usually used to eliminate useless information, or the same thing that pops up.

40
New cards

megabyte

Made up of about a million bytes, megapixels - Made up of one million or millions of pixels, a standard figure of merit for digital cameras, used to refer the resolution of a graphic device.

41
New cards

modeling

Process of representing real world thing into a digitized version made up of binary into a digital representation of that object.

42
New cards

OCR

Optical character recognition is used when the original document is printed on a piece of paper, then its algorithm converts images into a sequence of codes. It's mostly found on machines that print, photocopy, or fax.

43
New cards

pixels

Short for picture element

44
New cards

Raster

rectangular area display screen that is used to display images: made up of pixels

45
New cards

Render

Process of adding realism to computer graphic by adding 3-D like components, like shadows and different color shading to look like real life.

46
New cards

Spam

Electronic junk mail or any other junk information

47
New cards

Steganography

The art of sending secret messages in imperceptible ways, which are messages embedded into non-harmful and normal text.

48
New cards

Upload

To transmit data from a computer to a bulletin board standard figure of merit for digital cameras, used to refer the resolution of a graphic device.

49
New cards

Modeling

Process of representing real world thing into a digitized version made up of binary into a digital representation of that object.

50
New cards

OCR

Optical character recognition is used when the original document is printed on a piece of paper, then its algorithm converts images into a sequence of codes. It's mostly found on machines that print, photocopy, or fax.

51
New cards

Background

In computing, the background refers to processes or tasks that run out of the user's direct view or interaction, typically supporting foreground activities without requiring attention.

52
New cards

Binary

A binary system is a base-2 numeral system that represents data using two symbols, typically 0 and 1. In computing, it is used to encode data in a format that computers can process.

53
New cards

Bot

A bot (short for "robot") is a software application that runs automated tasks over the Internet. Bots can perform repetitive tasks like web crawling, data scraping, or automating interactions on social media.

54
New cards

Cache

A cache is a storage component that temporarily holds frequently accessed data to speed up retrieval. In web browsing, it stores copies of web pages, images, and other resources to reduce loading times.

55
New cards

Firewall

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks.

56
New cards

Foreground

In computing, the foreground refers to the processes or tasks currently in focus and actively being interacted with by the usr, as opposed to those that are running in the background.

57
New cards

HTML

(Hypertext Markup Language): HTML is the standard markup language used to create web pages. It structures the content on the web using elements like tags for headings, paragraphs, links, images, and more.

58
New cards

URL

(Uniform Resource Locator): A URL is the address used to access resources on the Internet. It specifies the location of a resource, and the protocol used to retrieve it (e.g., http, https, ftp).

59
New cards

AES

Advanced Encryption Standard; a symmetric 128-bit block data encryption technique.

60
New cards

Certification authrity

(CA) a trusted organization or company that issues digital certificates used to create digital signatures and public-private pairs.

61
New cards

Cipher text

Data that was encrypted

62
New cards

DES

Data Encryption Standard; this is a popular symmetric, key encryption method that uses a 56-bit key and a block cipher method that breaks text into 64-bit blocks to encrypt them.

63
New cards

Decryption

decoding data that was encrypted into a secret code.

64
New cards

Encryption

translating data into a secret code.

65
New cards

Packet

Bits that move through the Internet not in a continuous stream, but in discrete blocks.

66
New cards

Plain text

textual data in ASCII (American Standard Code for Information Interchange) format. This is the most portable format because it is supported by nearly every application on every machine.

67
New cards

Router

A device that forwards data packets along networks and is connect to at least 2 networks are located at gateways.

68
New cards

Centralized systems

Collect files at a central computer for people to download.

69
New cards

Commons

A system of sharing that minimizes the need for fine grained property restrictions.

70
New cards

DRAM

Dynamic random access memory

71
New cards

DRM

Digital rights management

72
New cards

Flooding

Each computer in a file sharing network maintains a list of other computers in the network.

73
New cards

Gigabyte

A gigabyte is either 1,024 megabytes or 1,073,741,824 bytes.

74
New cards

peer to peer architecture

A type of network in which each workstation has equivalent capabilities and responsibilities.

75
New cards

piracy

The unauthorized use or reproduction of another’s work.

76
New cards

sealed storage

an application that lets you encrypt files in such a way that they can be decrypted only on particular computers that you specify.

77
New cards

TPM

Trusted platform module

78
New cards

DOPA

stands for Deleting Online Predators Act.

79
New cards

Miller test

The miller test is a series of tests that the court must consider to determine whether information is obscene.

80
New cards

CDA

stands for Communications Decency Act.

81
New cards

COPA

means Child Online Protection Act.

82
New cards

Short wave

Correspond to high frequencies because all radio waves travel at the same speed, which is the speed of light.

83
New cards

Spectrum Allocation

Assigning radio frequencies to different uses.

84
New cards

Spread Spectrum

To transmit radio signals over a wide range of frequencies.

85
New cards

  Censorship

Suppressing or removing content/media from public view because it is offensive.

86
New cards

FCC

Federal Communications Commission.

87
New cards

VHF

very High Frequency.

88
New cards

UHF

Ultra High Frequency.