APCSP Internet

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/33

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

Internet

A global network connecting millions of computers for communication and data sharing.

2
New cards

World Wide Web

A system of linked web pages accessed via the Internet using browsers.

3
New cards

Uniform Resource Locator

The web address used to find a specific webpage or file online.

4
New cards

HTTP

Hypertext Transfer Protocol; the communication protocol for transferring web pages.

5
New cards

HTTPS

Secure version of HTTP that encrypts data between browser and server.

6
New cards

HTML

Hypertext Markup Language; the code used to create and structure web pages.

7
New cards

Web Browser

Software used to access and view web pages on the internet.

8
New cards

Server

A powerful computer that stores websites and sends them to clients on request.

9
New cards

Client

A device or program that requests and receives information from a server.

10
New cards

Router

A device that directs data traffic between networks.

11
New cards

IP Address

A unique number assigned to each device on a network.

12
New cards

Domain Name

A human-readable web address representing an IP address.

13
New cards

Domain Name System

The system that translates domain names into IP addresses.

14
New cards

DNS Spoofing

A cyberattack where fake DNS data redirects users to malicious sites.

15
New cards

DNS Attack

Any attack targeting the DNS infrastructure to disrupt or redirect traffic.

16
New cards

Firewall

A security system that controls incoming and outgoing network traffic.

17
New cards

Cookie

Small data file stored on a user’s device by websites to remember information.

18
New cards

Phishing

A scam where attackers pretend to be trustworthy to steal personal info.

19
New cards

Cybersecurity

Practices and technologies used to protect computers and data from attacks.

20
New cards

Public Key Encryption

A method of securing data using two keys: public and private.

21
New cards

Certificate

A digital document that verifies the identity of a website or organization.

22
New cards

Packet

A small piece of data sent over a network.

23
New cards

Bandwidth

The maximum data transfer capacity of a network connection.

24
New cards

Protocol

A set of rules for how data is sent and received on a network.

25
New cards

Internet Protocol (IP)

Protocol that defines addressing and routing of packets on the internet.

26
New cards

Transmission Control Protocol

A protocol that ensures reliable and ordered delivery of data.

27
New cards

Fault Tolerant

A system's ability to continue working properly even if parts fail.

28
New cards

Redundancy

Having backup components or systems to prevent failure.

29
New cards

Computing Device

Any electronic device capable of processing data.

30
New cards

Computing System

Combined hardware and software that work together to perform tasks.

31
New cards

Computing Network

A group of connected computing devices that share resources.

32
New cards

Sequential Programming

Programming where instructions run one after another in order.

33
New cards

Parallel and Distributed Programming

Programming that runs instructions simultaneously across multiple processors.

34
New cards

Digital Divide

The gap between those who have access to digital technology and those who do not.