Internet
Computer network that uses open protocols to standardize communication
Computer Network
Interconnected system that is capable of sending or receiving data
Computing System
Group of devices and programs working together for a common purpose
WWW (World Wide Web)
A system of linked pages, programs, and files that uses that internet
Router
A computer that passes information from one network to another
ISP (Internet Service Providers)
Companies who sell internet access to homes and institutions
Bandwidth
Maximum amount of data that can be sent in a fixed amount of time
The Cloud
Storing it somewhere on the internet but unknown location
Path
Connecting computer devices with a sender and receiver
Routing
The process of finding a path from sender to receiver
Protocol
Set of rules that specify the behavior of a system
IP Address
Unique number assigned to each device on a computer network
Malware
Software designed to harm or take partial control over a computer
Virus
Type of malware that spreads and infects other computers
Firewall
Security systems that controls the kinds of connections that can be made between a computer or network and the outside world
Phishing
Very common attack where the victim is tricked into giving up personal information
Crowdsourcing
General term for using the internet to get a lot of people to help solve a problem
Bit
Single unit of data that can only have one of two values
Byte
8 bits
Analog Data
Values that change smoothly
Width
Number of bits that a CPU processes at a time
Scientific Notation
Uses powers of 10 to represent very large or small values
Floating Point
Same idea but with powers of 2
Binary Sequence
String of 1s and 0s
Sampling
Measuring values, called samples, of an analog signal at regular intervals
Sampling Rate
Number of samples measured per second
Citizen Science
Scientific research conducted in whole or part by distributed individuals who contribute relevant data
Word
Sequence of bits
Antivirus
Software designed to scan files
Certificate Authorities
Organizations that issue digital forms to verify who owns the keys used for communications