APCSP Internet Vocab

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/32

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

33 Terms

1
New cards

Computer Virus

Malicious program that can copy itself and gain access to a computer in an unauthorized way

2
New cards

Malware

Intended to damage a computing system or to take partial control over it’s operation

3
New cards

DDoS Attack

(Denial of service attack) Overwhelming amount of traffic for a website to handle

4
New cards

Phishing

Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.

5
New cards

Keylogging

Program to record every keystroke made by a computer user in order to gain access to passwords and confidential information

6
New cards

Rogue Access Point

Wireless access point that gives unauthorized access to secure networks

7
New cards

Cookies

Tracks what you click on to target advertisements towards you

8
New cards

Asymmetric Encryption

A form of encryption that uses a pair of keys, one public and one private, to secure data transmitted over a network. The public key encrypts the data, while the private key is used for decryption.

9
New cards

Symmetric Encryption

A type of encryption that uses the same key for both encryption and decryption of data, requiring both parties to share the key securely before communication.

10
New cards

Multi-Factor Authentication

Method of computer access control in which a user is granted access by presenting multiple pieces of of information

11
New cards

VPN

Creates a secure connection between a connection between a computing device and computer network. Disguises your online identity and makes you appear in a different location

12
New cards

Firewall

Network security device that monitors incoming and outgoing network traffic and allows packets based on a set of security rules

13
New cards

Why have strong passwords

With bad passwords, data breeches happen often

14
New cards

Computing device

Any artifact that can run a program

15
New cards

Computing system

Group of devices all working together for a common goal

16
New cards

Computer Network

A collection of interconnected computing devices that can communicate and share resources with each other.

17
New cards

Data Stream

The flow of data over a network, typically in a continuous sequence.

18
New cards

Path

A sequence of connections that data takes to travel from one device to another across a network.

19
New cards

Routing

Selects the path for messages to travel (train conductor)

20
New cards

Bandwidth

How much is transferred, measured in bits per second

21
New cards

Protocol

An agreed upon set of rules that specify that behavior of a system

22
New cards

Packets

Small units of data transmitted over a network.

23
New cards

TCP

(Transition Control Protocol) Reassembles and makes sure everything arrives correctly

24
New cards

IP

(Internet Protocol) Director, makes sure it goes to the same place

25
New cards

IP and TCP

Work together to get packets to their designated location correctly

26
New cards

IP Address

Is an addressing system similar to how you address mail. It is always changing except for well known businesses such as Google

27
New cards

World Wide Web

Is a system of linked pages, programs, and files

28
New cards

HTTP

A protocol used to search and find the designated document

29
New cards

DNS

(Domain Name System) Translates URLs to IP addresses

30
New cards

Latency

Time of data transfer (Lagging)

31
New cards

Subdomain

A subset of a larger domain that can point to specific web content or services.

32
New cards

Second-level domain

A domain name that is directly below a top-level domain in the hierarchy, often representing an organization or entity, like 'example' in 'example.com'.

33
New cards

Top-level domain

The highest level of domain names in the Domain Name System (DNS) hierarchy, such as .com, .org, or .net, used to identify specific types of websites.