Digital Media and Online Communication Concepts

Digital Media

  • Storage of Information: Images and sounds are stored as sequences of 0s and 1s in computers.

Knowledge Society

  • Definition: Refers to how new information systems can transform human society.

Automated Teller Machines (ATMs)

  • Function: Allow users to check bank balances and withdraw cash from anywhere in the world.

Digital Rights Management (DRM)

  • Purpose: Involves methods that prevent copying and explain to users the advantages of the original content.

Moderators

  • Role: Individuals or systems responsible for maintaining order in forums.

Plagiarism

  • Definition: The act of using someone else’s work as if it were one's own.

Computer Viruses

  • Virus: A program designed to damage the software on a computer. Viruses often replicate themselves and require a host file to spread.

Worms

  • Definition: A type of malicious software that operates in the background and can harm your computer programs without needing a host file.

Trojan Horses

  • Definition: Malicious software masquerading as legitimate programs (e.g., screensavers) that cause harm secretly.

Ransomware

  • Function: Locks users out of their computer or files until a ransom is paid to regain access.

Spam

  • Definition: Unwanted emails or messages sent en masse to many recipients.

Hoaxes

  • Definition: Fake messages intended to trick or mislead users.

Phishing

  • Definition: A specific type of hoax aimed at acquiring sensitive information (e.g., credit card numbers or PINs).

The Golden Rule

  • Principle: Treat others as one wishes to be treated in communications.

Programming Concepts

  • Strings: Defined as sequences of characters.

  • Prototype: A simplified version of a larger program designed to test concepts.

  • Comments: Notes in code that help clarify intentions to human readers.

Maintenance

  • Definition: The process of keeping software running correctly and effectively over time.

Algorithms

  • Definition: A set of step-by-step instructions for solving problems.

Ubiquitous Computing

  • Meaning: Technology that is present everywhere around us.

Precedence in Operations

  • Definition: The order in which operations are performed in calculations, adhering to specific rules.

Data Structures

  • Lists: A data structure that can store multiple items at once.

  • Self-Documenting Code: Code that explains itself through meaningful names for variables, reducing the need for additional documentation.

  • Data Types: Includes numbers or strings assigned to variables.

Control Structures

  • Selection (Branching): Program control flow that depends on conditions.

  • Boolean Blocks: Logical constructs that yield true or false outcomes.

  • Unary Operator: An operator that acts on a single operand.

Netiquette

  • Definition: The rules of polite online behavior.

  • FAQs: Frequently Asked Questions section in many platforms that addresses common inquiries.

Firewalls

  • Function: Software that prevents unauthorized access while allowing genuine online activity.

  • Spammer: An individual or automated system that sends spam messages.

Text Processing

  • Definition: The act of manipulating and altering text via computer functions.

Looping and Execution

  • Repeated Execution: The method of running code multiple times, known as looping.

Refactoring

  • Definition: The process of restructuring a program to improve its efficiency without changing its functionality.

Sorting Algorithms

  • Definition: Techniques to arrange items in order, such as selection sort, bubble sort, and merge sort.

Representations of Data

  • Analogue Representation: Equivalent to real-world aspects, representing continuous data.

  • Digital Representation: Converting analogue data into electrical signals.

  • Pixels: Individual units of a display.

  • Bitmap: Binary encoding for each pixel, defining color and brightness in digital images.

File Formats

  • JPEG: A format that utilizes human perception to decrease file size while maintaining acceptable quality.

  • Vector Graphics: Represents images using mathematical formulations of shapes rather than pixels.

Sound Processing

  • Definition: Systems and programs capable of recording and editing sound, e.g., using programs like Audacity.

  • Cycle: The time between two peaks of a wave.

  • Frequency: The number of cycles per second, measured in Hertz (Hz).

  • Amplitude: Determines the loudness of the sound.

  • Sampling: The act of measuring the amplitude of sound waves at regular intervals, directly influencing quality and size.

Data Transmission

  • Attenuation: The reduction in signal strength as it travels from the source.

  • Transmission Methods: Includes various forms of data transmission such as packet-switched networks and circuit-switched networks.
    # Networking Terminology

  • Nodes: Connection points for multiple devices or links.

  • Routing and Forwarding: Mechanisms for directing data to its destination in networks.

  • IP Address: A numerical label assigned to devices for identification and communication over the network.

  • Gateway: A device that ensures compatibility between local and external networks.

Protocols

  • Definition: Various rules and formats for data exchange between computers, including TCP and IP.

  • TCP: A transmission control protocol that manages sending and receiving data reliably.

  • Virtual Circuit: A logical connection that enables direct communication between end devices.

Wi-Fi and Networking Modes

  • Ad-Hoc Mode: Direct communication between devices without a central controller.

  • Infrastructure Mode: Communication facilitated through an access point linking wired and wireless networks.

Cybersecurity Concepts

  • Encryption: The process of converting plaintext into a coded format to maintain confidentiality.

  • Decryption: The reverse process to restore original information from its encrypted state.

  • Confidentiality: Maintaining privacy in communications through encryption methods.

  • Brute-Force Attack: A method involving trying every possible key to decode encrypted data.

  • Man-in-the-Middle Attack: Interception or alteration of communication between two parties by an unauthorized entity.

  • Integrity: Ensuring that messages remain unchanged during communication.

  • Authentication: Validating the identities of communicating parties.

Biometric Data

  • Definition: Unique physical features used for identification purposes, such as fingerprints or iris patterns.

  • Positive Identification: Confirming a person’s membership in a specific group.

  • Negative Identification: Checking if someone is excluded from a specific group.

  • False Positive: Incorrect identification of a person as matching another individual.

  • False Negative: Incorrect failure to identify a person correctly.

Programming Processes

  • Common Errors: Includes incorrect data storage, wrong variable usage, and initialization issues.

  • Problem-Solving Steps: Incorporate implementation, testing, and debugging processes during software development.

  • Repetition Errors in Loops: Issues such as improperly set loop conditions can lead to deadlocks and inefficient code execution.

Miscellaneous Concepts

  • Custom Blocks: Advantages include time savings and reducing code complexity.

  • Modular Programming: Benefits consist of easier code creation, minimizing errors, and improved readability.

  • Granularity of Data: In discussions about data transmission and reception, precision of data aspects promotes effective communication.