Digital Media and Online Communication Concepts
Digital Media
Storage of Information: Images and sounds are stored as sequences of 0s and 1s in computers.
Knowledge Society
Definition: Refers to how new information systems can transform human society.
Automated Teller Machines (ATMs)
Function: Allow users to check bank balances and withdraw cash from anywhere in the world.
Digital Rights Management (DRM)
Purpose: Involves methods that prevent copying and explain to users the advantages of the original content.
Moderators
Role: Individuals or systems responsible for maintaining order in forums.
Plagiarism
Definition: The act of using someone else’s work as if it were one's own.
Computer Viruses
Virus: A program designed to damage the software on a computer. Viruses often replicate themselves and require a host file to spread.
Worms
Definition: A type of malicious software that operates in the background and can harm your computer programs without needing a host file.
Trojan Horses
Definition: Malicious software masquerading as legitimate programs (e.g., screensavers) that cause harm secretly.
Ransomware
Function: Locks users out of their computer or files until a ransom is paid to regain access.
Spam
Definition: Unwanted emails or messages sent en masse to many recipients.
Hoaxes
Definition: Fake messages intended to trick or mislead users.
Phishing
Definition: A specific type of hoax aimed at acquiring sensitive information (e.g., credit card numbers or PINs).
The Golden Rule
Principle: Treat others as one wishes to be treated in communications.
Programming Concepts
Strings: Defined as sequences of characters.
Prototype: A simplified version of a larger program designed to test concepts.
Comments: Notes in code that help clarify intentions to human readers.
Maintenance
Definition: The process of keeping software running correctly and effectively over time.
Algorithms
Definition: A set of step-by-step instructions for solving problems.
Ubiquitous Computing
Meaning: Technology that is present everywhere around us.
Precedence in Operations
Definition: The order in which operations are performed in calculations, adhering to specific rules.
Data Structures
Lists: A data structure that can store multiple items at once.
Self-Documenting Code: Code that explains itself through meaningful names for variables, reducing the need for additional documentation.
Data Types: Includes numbers or strings assigned to variables.
Control Structures
Selection (Branching): Program control flow that depends on conditions.
Boolean Blocks: Logical constructs that yield true or false outcomes.
Unary Operator: An operator that acts on a single operand.
Netiquette
Definition: The rules of polite online behavior.
FAQs: Frequently Asked Questions section in many platforms that addresses common inquiries.
Firewalls
Function: Software that prevents unauthorized access while allowing genuine online activity.
Spammer: An individual or automated system that sends spam messages.
Text Processing
Definition: The act of manipulating and altering text via computer functions.
Looping and Execution
Repeated Execution: The method of running code multiple times, known as looping.
Refactoring
Definition: The process of restructuring a program to improve its efficiency without changing its functionality.
Sorting Algorithms
Definition: Techniques to arrange items in order, such as selection sort, bubble sort, and merge sort.
Representations of Data
Analogue Representation: Equivalent to real-world aspects, representing continuous data.
Digital Representation: Converting analogue data into electrical signals.
Pixels: Individual units of a display.
Bitmap: Binary encoding for each pixel, defining color and brightness in digital images.
File Formats
JPEG: A format that utilizes human perception to decrease file size while maintaining acceptable quality.
Vector Graphics: Represents images using mathematical formulations of shapes rather than pixels.
Sound Processing
Definition: Systems and programs capable of recording and editing sound, e.g., using programs like Audacity.
Cycle: The time between two peaks of a wave.
Frequency: The number of cycles per second, measured in Hertz (Hz).
Amplitude: Determines the loudness of the sound.
Sampling: The act of measuring the amplitude of sound waves at regular intervals, directly influencing quality and size.
Data Transmission
Attenuation: The reduction in signal strength as it travels from the source.
Transmission Methods: Includes various forms of data transmission such as packet-switched networks and circuit-switched networks.
# Networking TerminologyNodes: Connection points for multiple devices or links.
Routing and Forwarding: Mechanisms for directing data to its destination in networks.
IP Address: A numerical label assigned to devices for identification and communication over the network.
Gateway: A device that ensures compatibility between local and external networks.
Protocols
Definition: Various rules and formats for data exchange between computers, including TCP and IP.
TCP: A transmission control protocol that manages sending and receiving data reliably.
Virtual Circuit: A logical connection that enables direct communication between end devices.
Wi-Fi and Networking Modes
Ad-Hoc Mode: Direct communication between devices without a central controller.
Infrastructure Mode: Communication facilitated through an access point linking wired and wireless networks.
Cybersecurity Concepts
Encryption: The process of converting plaintext into a coded format to maintain confidentiality.
Decryption: The reverse process to restore original information from its encrypted state.
Confidentiality: Maintaining privacy in communications through encryption methods.
Brute-Force Attack: A method involving trying every possible key to decode encrypted data.
Man-in-the-Middle Attack: Interception or alteration of communication between two parties by an unauthorized entity.
Integrity: Ensuring that messages remain unchanged during communication.
Authentication: Validating the identities of communicating parties.
Biometric Data
Definition: Unique physical features used for identification purposes, such as fingerprints or iris patterns.
Positive Identification: Confirming a person’s membership in a specific group.
Negative Identification: Checking if someone is excluded from a specific group.
False Positive: Incorrect identification of a person as matching another individual.
False Negative: Incorrect failure to identify a person correctly.
Programming Processes
Common Errors: Includes incorrect data storage, wrong variable usage, and initialization issues.
Problem-Solving Steps: Incorporate implementation, testing, and debugging processes during software development.
Repetition Errors in Loops: Issues such as improperly set loop conditions can lead to deadlocks and inefficient code execution.
Miscellaneous Concepts
Custom Blocks: Advantages include time savings and reducing code complexity.
Modular Programming: Benefits consist of easier code creation, minimizing errors, and improved readability.
Granularity of Data: In discussions about data transmission and reception, precision of data aspects promotes effective communication.