1/75
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Server computers
Big computers made to talk and send information from other computers.
HTTP
Hyper Text Transfer Protocol; the language that computers use to speak to each other.
IP address
A unique address assigned by your Internet service provider that identifies a device on the network.
Cloud computing
A method of delivering computing services—like storage, processing power, and software—through the internet instead of local machines.
IaaS
Infrastructure as a Service; provides virtualized computing resources.
PaaS
Platform as a Service; offers hardware and software tools over the internet.
SaaS
Software as a Service; allows users to use software applications online, usually by subscription.
Benefits of cloud computing
Reduces expenses, improves scalability, and renders sophisticated technologies more accessible.
Physical computing
Using electronic components to build a device that interacts with the real world and the environment.
Actuators
Devices that convert electrical directions to real actions that affect the environment.
Sensors
Devices that convert some phenomenon into an electrical impulse that determines the reading.
Controllers
Devices that read input from sensors and send commands to actuators.
Microcontroller
A small computer on a single integrated circuit, programmed to perform a specific task.
HTML
HyperText Markup Language; the language used to build web pages.
Browser
An application that reads HTML files and displays them as formatted web pages.
Markup Language
A system that uses special syntax (called tags) to define how content should be displayed.
Tags
The basic building blocks of HTML, written inside angle brackets (< >).
Opening tag
Closing tag
HTML page layout
A specific structure that includes elements like to indicate the version of HTML.
Tells the browser we're using HTML5 (not technically a tag).
Wraps everything in the HTML page.
Contains metadata, such as the page title, stylesheets, or scripts.
Contains the visible content of the page—headings, paragraphs, links, images, etc.
Paragraph. Separates large blocks of text.
Cybersecurity
The practice of protecting systems, networks, and programs from digital attacks.
Encryption
Converting data into code to prevent it from being accessed.
Cyberattack
A malicious and deliberate attempt to breach the information system of another individual or organization.
Ransomware
A type of cyberattack that encrypts private files and demands a ransom for their freedom.
Malware
Software designed to get unauthorized access to your computer systems.
Firewalls
Gateway that monitors network traffic based on predetermined rules set in place.
DNS
Domain name system acts as a filter for fake websites.
Malware protection
When it detects malicious code, it quarantines and/or deletes that code to protect computer.
Zero trust protectal
The zero trust security model uses identity and context information to continually verify trust before granting least-privilege access.
Multi factor authentication
Requires user to go through multiple authentication processes to access the information they want.
Phishing
The practice of sending fraudulent emails that resemble emails from reputable sources.
Viruses
Code that attaches to files and spreads across other files encrypting or destroying them.
Adware
Most commonly called spam. Advertisements are shown on websites and when you click them it downloads malicious code into your computer.
Spyware
Monitoring your searches and sending them to other people without your permission.
Trojan
Malicious software designed to appear legitimate.
Social engineering
A tactic that adversaries use to trick you into revealing sensitive information.
Cryptography
The act of turning messages into secret codes so only the people with the right access can read them.
Encryption (in cryptography)
When you turn a regular message into a scrambled message.
Decryption
Turning the scrambled message back into something you can understand.
Digital certificates
Verify the identity of a person, device, or website.
Certificate authorities
Trusted organizations that issue the digital certificates.
Symmetric encryption
When one key is used for encryption and decryption and the sender and receiver have the same key.
Public key encryption
Asymmetric encryption using a public key for encryption and a private key for decryption.
Authentication
Proving your identity to a computer system.
Strong password characteristics
12 characters (the more the better); a mix of uppercase, lowercase, numbers, and symbols; doesn't use common words or personal information.
AI (Artificial Intelligence)
When machines and computer systems work to simulate human intelligence, mimicking abilities like communication and decision-making.
Machine Learning
A subset of AI where computers learn patterns from data and improve without being told to.
Supervised learning
A type of machine learning where the model is trained on labeled data that includes inputs and outputs.
Unsupervised learning
A type of machine learning where the model finds patterns in data without labeled answers.
Model
A trained program that can make decisions based on data.
Email Spam Filtering
Supervised learning example where the model is trained using labeled emails marked as 'spam' or 'not spam.'
Loan Approval
Supervised learning example where AI reviews applicant data to predict risk based on past approval decisions.
Facial Recognition
Example of supervised and unsupervised learning trained on thousands of labeled facial images.
Social Media Feeds
Reinforcement and unsupervised learning that learns user behavior to adjust content shown.
Data Analysis
Process of collecting, cleaning, organizing, and interpreting data to find patterns, trends, and relationships.
Excel
Tool for data analysis that includes functions like SUM(), IF(), AVERAGE(), and charts.
Google Sheets
Tool for data analysis that includes features like filter, sort, and grading.
Python
Open source programming language used for data analysis, AI, with libraries, conditionals, and loops.
R
Programming language used for graphs, statistics, and visualizations.
Data
Information processed by computers.
Variables
Named storage for values.
Statistics
Tools to make sense of data.
Algorithm
Step-by-step solution method.
Importance of Data Analysis
Identifies market trends, shows customer behavior, helps with risk management, tracks performance, ensures compliance.
Step by Step Processes in Data Analysis
Includes collecting, cleaning, organizing, analyzing, interpreting, and sharing data.
Real Life Example: Weather Forecasting
Uses historical weather data and satellite imagery to model atmospheric pressure, humidity, and wind speed.
Real Life Example: Sales Forecasting
Analyzes past trends to predict sales and optimize inventory and advertising timing.
Real Life Example: Healthcare
Detects patterns in patient symptoms for early diagnosis and optimizes treatments.
Real Life Example: Finance
Involves risk prediction for loans, analyzing stock trends, and detecting fraud.