1/59
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Internet
A global network of interconnected computers that communicate using standardized protocols.
IP Address
A unique identifier for a device on the Internet.
IPv4/IPv6
Versions of IP addressing; IPv4 is 32-bit and IPv6 is 128-bit.
DNS (Domain Name System)
Translates domain names into IP addresses.
TCP (Transmission Control Protocol)
Ensures reliable, ordered, and error-checked delivery of data.
UDP (User Datagram Protocol)
Sends data faster without error checking, used in live streaming and gaming.
HTTP/HTTPS
Protocols used for accessing websites; HTTPS is the secure version.
Packets
Small chunks of data sent across networks.
Redundancy
Having multiple pathways to increase reliability.
Fault Tolerance
Ability of a system to continue working even if parts fail.
Bandwidth
Maximum amount of data that can be transmitted over a network.
Latency
Delay in transmitting data over a network.
Algorithm
A finite set of steps for solving a problem.
Sequencing
The specific order in which instructions are executed.
Selection
Using if statements to make decisions.
Iteration
Repeating steps using loops such as for and while.
Boolean
A data type with only two values: true or false.
Variable
A name used to store data.
List (or Array)
An ordered collection of elements.
Procedure (Function)
A named set of instructions that performs a specific task.
Parameter
Input to a procedure or function.
Return Value
The result produced by a function.
Modularity
Designing a system divided into separate components.
Abstraction
Hiding complexity by using simple representations.
Binary
Base-2 number system used in computers (0s and 1s).
Bit
Smallest unit of data in computing.
Byte
8 bits.
Overflow Error
When a calculation exceeds the maximum value a system can represent.
Round-off Error
Error caused by imprecise representation of real numbers.
Lossless Compression
Reduces file size without losing data.
Lossy Compression
Reduces file size by removing some data.
Metadata
Data about data.
Encryption
Scrambling data to protect it.
Decryption
Unscrambling encrypted data.
Public Key Encryption
Uses one public key to encrypt and a private key to decrypt.
Phishing
Fraudulent attempts to obtain sensitive information.
Malware
Malicious software such as viruses, worms, and spyware.
Firewall
Security system that monitors and controls network traffic.
Authentication
Verifying identity.
Symmetric Encryption
Uses the same key to encrypt and decrypt.
Asymmetric Encryption
Uses a public and private key pair.
Debugging
Finding and fixing errors in code.
Syntax Error
Mistake in the structure of code.
Logic Error
Code runs, but the result is incorrect.
Simulations
Programs that mimic real-world processes.
Events
Actions that trigger code.
Event-driven programming
Code that runs in response to events.
Digital Divide
The gap between those with and without access to computing.
Crowdsourcing
Using contributions from a large group of people online.
Citizen Science
Public participation in scientific research using technology.
Open Source
Software with publicly available source code.
Intellectual Property
Creations of the mind that are legally protected.
Creative Commons
Licensing that allows creators to share their work under specific conditions.
Input
Data entered into a program.
Output
Data sent from a program to the user.
Program Purpose
The intended goal or function of the program.
Data Abstraction
Using data structures to manage complexity.
Procedural Abstraction
Using functions to reduce complexity.
Algorithm Implementation
Writing code that uses sequencing, selection, and iteration.
Testing
Checking the program for expected behavior and errors.