Chopped Chins - Unit 2 Vocabulary CSP

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

What is computing innovation?

New ideas or improvements in technology that make tasks easier or solve problems through the use of digital systems.

2
New cards

What does personally identifiable information (PII) refer to?

Data that can identify a specific person, such as names, addresses, or social security numbers.

3
New cards

What is metadata?

Data about data.

4
New cards

What is the digital divide?

Refers to differing access to computing devices and the Internet.

5
New cards

What is a computing device?

An electronic tool that processes information and runs applications, like a phone, tablet, or computer.

6
New cards

What is a computing system?

A combination of hardware and software that work together to perform tasks or process information.

7
New cards

What is a computer network?

A connection of multiple devices that communicate to share resources or information.

8
New cards

What does redundancy mean in computing?

Adding extra components or systems to ensure a task continues even if one part fails.

9
New cards

What is a fault-tolerant system?

A system designed to keep working even if one or more of its parts break down.

10
New cards

What is a protocol in networking?

An agreed-upon set of rules that specify the behavior of a system.

11
New cards

What is bandwidth?

The maximum amount of data that can be transferred over a network or internet connection in a given time, usually measured in bits per second (bps).

12
New cards

What is routing in terms of computer networks?

The process of finding a path from sender to receiver.

13
New cards

What is a path in a computer network?

A sequence of directly connected paths between two computing devices on a computer network.

14
New cards

What are data streams?

Chunks of data, which are encapsulated in packets.

15
New cards

What are packets?

Contain a chunk of data and metadata used for routing the packet between the origin and the destination on the internet.

16
New cards

What is the World Wide Web?

A collection of websites and online pages that are accessible through the internet using a browser.

17
New cards

What does HTTP stand for and what is its purpose?

Hypertext Transfer Protocol; it is a protocol for requesting and receiving linked resources from across the Web.

18
New cards

What is sequential computing?

Performing tasks one at a time in a specific order.

19
New cards

What is distributed computing?

A system where multiple devices share the workload to perform tasks together over a network.

20
New cards

What is parallel computing?

Running several tasks at the same time by using multiple processors or devices.

21
New cards

What does speedup of a parallel solution refer to?

The increase in performance when tasks are completed faster with multiple devices compared to just one.

22
New cards

What is public key encryption?

A method of securing messages by using two keys, one public and one private, to keep information safe.

23
New cards

What is multi-factor authentication?

A security process that requires more than one method of verification to access an account.

24
New cards

What is malware?

Software designed to damage or disrupt a computer system or steal information.

25
New cards

What is a computer virus?

A harmful program that attaches to other software and spreads to infect files or systems.

26
New cards

What is phishing?

A type of scam where fake communications trick people into sharing personal or financial information.

27
New cards

What is keylogging?

A tool that secretly records every keystroke made on a computer to steal sensitive information.

28
New cards

What is a rogue access point?

An unauthorized Wi-Fi hotspot set up to intercept or steal data from connected devices.