social media
applications and websites that allow users to share content and participate in social networking that may have otherwise had socioeconomic barriers.
socioeconomic
the differences among groups based on geographical, social and economic factors.
search tools
directories and search engines on the Internet that are essential for finding information efficiently on the Web.
cloud computing
storing, accessing and processing data using remote servers over a network rather than a local server or computer.
client-server model
the client(s) are the end-user(s) and communicates with the server (a centralized computer) that services the clients.
digital divide
the gap between those who have ready access to computers and the Internet, and those who do not.
routing
the process of moving information (or packets) over a network via a device called a router.
SMTP protocol
Email communication standard developed and overseen by the Internet Engineering Task Force (Simple Mail Transfer Protocol)
HTTP
Hypertext Transfer Protocol developed by the Engineering Task Force, this protocol determines how data and messages are formatted, transmitted, and responded to via the Internet.
HTTPS
HTTP with a Secured Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer that encrypts and decrypts user data and requests for added security (Hypertext Transfer Protocol Secure)
Internet protocol
the protocol by which data is sent from one computer to another on the Internet.
TCP/IP
standard for packets and routing (Transmission Control Protocol/Internet Protocol)
SMS
Short Message Services. Text messaging that allows the user to send up to 160 characters to another device. If message is longer it may truncate, concatenate and/or split up into several individual messages.
interface
a user-friendly picture-oriented way to interact with technology, contributing to the widespread use of the Internet
protocols
a common set of rules that computers must abide by in order to connect with each other.
IP address
a unique numeric identification for each device that is connected to a computer network and uses Internet Protocol.
IPv6
Internet Protocol, Version 6 - 128-bit Internet address consisting of eight 4-character hexadecimal numbers to handle routing of many more devices.
IPv4
Internet Protocol, Version 4 - A 32-bit Internet address consisting of four numbers each between 0 through 255, separated by periods (represents 8 bits).
domain
a group of devices connected on a network using the same protocol to access and administer web pages.
domain name system (DNS)
the way that domain names are located and translated into Internet Protocol (IP) addresses.
packet switching
digital data is sent by breaking the data into blocks of bits called packets, which contain both the data being transmitted and control information for routing the data.
net neutrality
the Internet is built around the notion of free and open access to information with no blocking, no throttling or paid prioritization.
encryption
the process of converting information or data into a code, especially to prevent unauthorized access.
public-key encryption
an asymmetric encryption method that uses a public key (made available publicly) and a private key (available to owner only).
certificate authorities
CA's issue digital certificates that validate ownership of encrypted keys used in secured communications and are based on a trust model.
trust model
validation of one's identity necessary for an event or transaction to occur.
open platforms
software based on open standards where there is no single ownership and is freely available through open license.
closed platforms
proprietary software where the provider has control over the application and content and can restrict access
cybersecurity
measures taken to protect a computer or computer system against unauthorized access or attack
confidentiality
the ability to limit access to information to a certain set of users.
integrity
the certainty that information is accurate
availability
the reliability of access to information
firewall
part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
Secure Sockets Layer (SSL)
the standard security technology for establishing an encrypted link between a web server and a browser, typically indicated with padlock icon in the address bar.
DDoS Attack
Distributed Denial of Service - an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.
viruses
code that is capable of copying itself and corrupting a system or destroying data.
social engineering
the psychological manipulation of people into performing actions or divulging confidential information
malware
software that is intended to damage or disable computers and computer systems.
phishing
obtaining confidential information by masquerading as an "official" person, site, or entity. A form of social engineering
Internet
the network infrastructure composed of devices (or nodes) that communicate via protocols
World Wide Web
a network of online content formatted in html and accessed via HTTP (WWW)
Tim Berners-Lee
created the set of fundamental tools and technologies that make up the World Wide Web.
hyperlinks
clickable bits of text, images or other screen elements within an HTML document that a user can select to request another document or web location.
distributed computing
computers that interact with each other in order to achieve a common goal.
botnets
a network of private computers infected with a malicious software and controlled as a group without the owners knowing.
bitcoin mining
the processing of transactions in the digital currency system, in which the records of current Bitcoin transactions, known as a blocks, are added to the record of past transactions, known as the blockchain.
Internet of Things
the network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these objects to connect and exchange data.
autonomous technology
technology that can function without being told what to do - i.e. Robots.
computing innovation
a new method or idea utilizing computing that has meaningful impact on society, economy, culture or environment.
crowdfunding
entrepreneurs using online access to customers as a means of funding their project.
network
connection of devices and networks to communicate using addresses and protocols.
sensor networks
autonomous sensors that measure environmental conditions such as light, temperature and sound which facilitate new ways of interacting with the environment and with physical systems.
Application Program Interfaces (APIs)/Libraries
a set of routines, protocols, and tools for building software applications which simplify complex programming tasks
hierarchy
an arrangement of elements in a ranking of superiority. the Internet and systems are built from the top (root) down.
metadata
descriptive data about an image, a web page, or other complex objects (data about data)
bandwidth
a measure of bit rate of a system or data (measured in bits) that can be sent in a fixed amount of time over a system.
latency
the time elapsed between the transmission and the receipt of a request in a system.
open standard
a standard where documentation and specifications are open to the public.
closed standard
a standard where documentation and specifications are not available to the public.
open source
publicly available information that is free to use, distribute, modify, and study.
closed source
privately owned information that is proprietary.
symmetric key system
an encryption method where each pair of users share a secret key
asymmetric key system
an encryption method that uses different keys to encrypt and decrypt
User Datagram Protocol (UDP)
a communication protocol used to send messages to other hosts of an IP network; sends packets quickly with minimal error-checking and no resending of dropped packets