Lecture Notes on Digital Technology, Networking, and Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/52

flashcard set

Earn XP

Description and Tags

Flashcards covering key vocabulary and concepts from lecture notes on digital technology, networking, and security.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

53 Terms

1
New cards

Digital Divide

Unequal access to computers and the Internet based on poverty, racism, sexism, isolation in the countryside, age, and other factors, affecting individuals and countries.

2
New cards

Citizen Science

Scientific research conducted by distributed individuals, many not scientists, who contribute data to research using their own computing devices.

3
New cards

Crowdsourcing

Using the Internet to get a lot of people to help solve a problem. Citizen science is a type of this.

4
New cards

Computing Innovation

Can be physical, non-physical software, or conceptual, but must include a program as an integral part of its function.

5
New cards

Binary Sequence

A string of ones and zeros.

6
New cards

Analog

Data with values that change smoothly, unlike digital data which change in discrete intervals.

7
New cards

Sampling

Measuring values, called samples, of an analog signal at regular intervals.

8
New cards

Sampling Rate

The number of samples measured per second.

9
New cards

Width

The number of bits that a CPU processes at a time.

10
New cards

Word

A binary sequence of the number of bits processed by a CPU at one time; typically 32 bits or 64 bits.

11
New cards

Floating Point

Uses powers of two to represent very large or very small values.

12
New cards

Bit

A single unit of data that can only have one of two values, typically represented as 0 (off) and 1 (on). Abbreviation for binary digit.

13
New cards

Byte

Eight bits.

14
New cards

Lossless Compression

Data compression algorithms that are reversible; you can reconstruct the original data.

15
New cards

Lossy Compression

Data compression algorithms that are not fully reversible; you can reconstruct only an approximation of the original data.

16
New cards

Encryption

The process of encoding data to prevent unauthorized access.

17
New cards

Decryption

The process of decoding data.

18
New cards

Symmetric Encryption

Encryption using the same key for both encryption and decryption.

19
New cards

Public Key Encryption

Encryption using a pair of keys: a public key for encryption and a private key for decryption.

20
New cards

SSL/TLS

The standard used for cryptographically secured information transfer on the Internet.

21
New cards

Certificate Authorities

Organizations that issue digital certificates to verify who owns the encryption keys used for secured communications.

22
New cards

Malware

Software that was designed to harm or take partial control over your computer.

23
New cards

Keylogging Software

A kind of malware that records every key pressed by a user.

24
New cards

Computer Virus

A type of malware that spreads and infects other computers. Can attach themselves to legitimate programs.

25
New cards

Antivirus Software

Software designed to scan your files and Internet transmissions looking for malware.

26
New cards

Firewall

A security system that controls the kinds of connections that can be made between a computer or network and the outside world.

27
New cards

Phishing

A security attack in which the victim is tricked into giving up personal information or downloading malware.

28
New cards

DDoS Attack

An attack that uses a virus to flood a server with many requests from many computers at once so that users of that server are denied service.

29
New cards

Rogue Access Point

A wireless access point that gives access to a secure network without the authorization of the network administrator.

30
New cards

Personally Identifiable Information (PII)

Information that can let others figure out who you are and possibly get more information, such as Social Security number, age, race, phone number(s), etc.

31
New cards

Creative Commons

A specific family of copyright licenses that allow others to use, share, maybe sell, and maybe revise your work.

32
New cards

Free Software

Software that anyone can copy, use, modify, and redistribute, including commercially, provided that any modifications must be under the same license.

33
New cards

Open Source

A more general term that means that you make the program's source (human-readable) code available to anyone. You may still restrict how people can use the program.

34
New cards

Open Access

Scholarly research reports are available for free download, rather than requiring the permission of a journal publisher.

35
New cards

Internet

A computer network that uses open protocols to standardize communication. Requires a computing device connected to an Internet-connected device to access.

36
New cards

Computer Network

An interconnected computing system that is capable of sending or receiving data.

37
New cards

Computing System

A group of computing devices and programs working together for a common purpose.

38
New cards

Computing Device

A physical object that can run a program, such as computers, tablets, cell phones, and smart sensors.

39
New cards

World Wide Web

A system of linked pages, programs, and files that uses the Internet.

40
New cards

Router

A computer that passes information from one network to another.

41
New cards

ISPs

The companies who sell Internet access to homes and institutions.

42
New cards

Bandwidth

The maximum amount of data that can be sent in a fixed amount of time (measured in bits per second).

43
New cards

The Cloud

Storing data somewhere on the Internet, but you don't know where. The cloud service provider manages the actual storage location.

44
New cards

Path

A sequence of directly connected computing devices that connect a sender to a receiver.

45
New cards

Routing

The process of finding a path from sender to receiver.

46
New cards

Scalability

The ability of the Internet to keep working as it grows.

47
New cards

Redundancy

The inclusion of back-up elements in case one part fails.

48
New cards

Fault Tolerance

The ability of a system to work around problems.

49
New cards

Protocol

A set of rules that specify the behavior of a system.

50
New cards

IP Address

A unique number assigned to each device on a computer network.

51
New cards

Packet

A small chunk of any kind of data and metadata that is passed through the Internet as a data stream.

52
New cards

Packet Switching

Means that the Internet sends short bursts of information, not long continuous strings.

53
New cards

TCP/IP

A pair of protocols that provide two levels of abstraction; IP and TCP.