1/27
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Computing Innovation
A new or improved creation that uses computing to solve problems or improve efficiency, communication, or access.
Personally Identifiable Information (PII)
Data that can be used to identify, locate, or contact an individual, such as name, address, or Social Security number.
Metadata
Data that provides information about other data, such as time created, author, file size, or location.
Digital Divide
The gap between individuals or communities with access to modern computing technology and those without.
Computing Device
Any electronic device that can run programs and perform calculations, such as a smartphone, tablet, or computer.
Computing System
A group of computing devices and programs that work together to complete tasks or process data.
Computer Network
A group of interconnected computing devices that can share data and resources.
Redundancy
The duplication of critical components or functions in a system to increase reliability and prevent failure.
Fault-Tolerant
A system designed to continue operating properly even if some of its components fail.
Protocol
A set of rules that determine how data is transmitted and received over a network.
Bandwidth
The maximum rate at which data can be transferred over a network in a given amount of time, usually measured in bits per second.
Routing
The process of selecting a path for traffic in a network to send data from source to destination.
Path
The specific route or sequence of connections data follows through a network.
Data Streams
Continuous flows of data sent over a network or between systems.
Packets
Small units of data transmitted over a network; each packet contains part of the overall message and routing information.
World Wide Web
A system of interlinked hypertext documents and resources accessible via the internet.
HTTP (Hypertext Transfer Protocol)
A protocol used for transferring web pages and other resources on the World Wide Web.
Sequential Computing
A computing model where operations are performed one after another in a single sequence.
Distributed Computing
A computing model where tasks are divided across multiple computers that work together.
Parallel Computing
A computing model in which many calculations or processes are carried out simultaneously.
Speedup of a Parallel Solution
A measure of how much faster a task runs using parallel computing compared to sequential computing.
Public Key Encryption
A type of encryption that uses a pair of keys: one public (to encrypt data) and one private (to decrypt it).
Multifactor Authentication
A security system that requires more than one method of authentication, such as a password and a fingerprint.
Malware
Any software designed to harm, exploit, or otherwise compromise a computer or network.
Computer Virus
A type of malware that replicates by inserting copies of itself into other programs or files.
Phishing
A type of cyberattack where an attacker pretends to be a trustworthy source to trick someone into revealing personal information.
Keylogging
The practice of recording the keys struck on a keyboard, often secretly, to capture sensitive information.
Rogue Access Point
An unauthorized wireless access point installed in a network, often used to capture data or bypass security.