Unit 1 - Digital Information
Unit Vocabulary
● Binary: A way of representing information using only two options.
● Decimal: A way of representing information using ten options.
● Bit: A contraction of "Binary Digit"; the single unit of information in a computer, typically represented as a 0 or
1
● Byte: 8 bits
● Overflow Error: Error from attempting to represent a number that is too large.
● Round-off Error: Error from attempting to represent a number that is too precise. The value is rounded.
● Analog Data: Data with values that change continuously, or smoothly, over time. Some examples of analog
data include music, colors of a painting, or position of a sprinter during a race.
● Digital Data: Data that changes discretely through a finite set of possible values
● Sampling: A process for creating a digital representation of analog data by measuring the analog data at
regular intervals called samples.
● Lossless Compression: A process for reducing the number of bits needed to represent something without
losing any information. This process is reversible.
● Lossy Compression: A process for reducing the number of bits needed to represent something in which
some information is lost or thrown away. This process is not reversible.
● Intellectual Property: A work or invention that is the result of creativity, such as a piece of writing or a design,
to which one has rights and for which one may apply for a patent, copyright, trademark, etc.
● Creative Commons: A collection of public copyright licenses that enable the free distribution of an otherwise
copyrighted work, used when an author wants to give people the right to share, use, and build upon a work that
they have created
Unit 2 - The Internet
Unit Vocabulary
● Computing Device: a machine that can run a program, including computers, tablets, servers, routers, and
smart sensors
● Computing System: a group of computing devices and programs working together for a common purpose
● Computing Network: a group of interconnected computing devices capable of sending or receiving data.
● Path: the series of connections between computing devices on a network starting with a sender and ending
with a receiver.
● Bandwidth: the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits
per second.
● Protocol: An agreed-upon set of rules that specify the behavior of some system
● IP Address: The unique number assigned to each device on the Internet.
● Internet Protocol (IP): a protocol for sending data across the Internet that assigns unique numbers (IP
addresses) to each connected device
● Router: A type of computer that forwards data across a network
● Packet: A chunk of data sent over a network. Larger messages are divided into packets that may arrive at the
destination in order, out-of-order, or not at all.
● Redundancy: the inclusion of extra components so that a system can continue to work even if individual
components fail, for example by having more than one path between any two connected devices in a network.
● Fault Tolerant: Can continue to function even in the event of individual component failures. This is important
because elements of complex systems like a computer network fail at unexpected times, often in groups.
● HTTP: HyperText Transfer Protocol - the protocol used for transmitting web pages over the Internet
● Domain Name System (DNS): the system responsible for translating domain names like example.com into IP
addresses
● Internet: a computer network consisting of interconnected networks that use standardized, open
(nonproprietary) communication protocols.
● World Wide Web: a system of linked pages, programs, and files.
● Digital Divide: differing access to computing devices and the Internet, based on socioeconomic, geographic,
or demographic characteristics
Scalability: Scalability is the ability of a system to handle increased load or expand its capacity without compromising performance, such as adding more servers to accommodate more users.
SSL and TLS: SSL stands for Secure Sockets Layer, and TLS stands for Transport Layer Security; both are protocols used to secure communications over a computer network.