semi ifnal apcsp

  1. The Internet: A network that uses open protocols to enable standardized communication between connected devices.

  2. Computer Network: An interconnected system of computing devices capable of sending or receiving data.

  3. Computing System: A group of computing devices and programs working together for a shared purpose.

  4. Computing Device: A physical object capable of running programs, such as computers, tablets, or smartphones.

  5. World Wide Web: A system of linked pages, programs, and files that operate using the Internet.

  6. Router: A device that forwards data packets between computer networks.

  7. Internet Service Provider (ISP): A company that provides Internet access to homes, businesses, and other institutions.

  8. Bandwidth: The maximum amount of data that can be transmitted in a fixed period of time, often measured in bits per second.

  9. Cloud Storage: The practice of storing data on servers accessible via the Internet rather than on a local device.

  10. Path: A sequence of directly connected computing devices that connect a sender to a receiver.

  11. Routing: The process of determining and maintaining a path for data to travel between a sender and a receiver.

  12. Scalability: The ability of a system, such as the Internet, to continue functioning effectively as it expands.

  13. Redundancy: The inclusion of backup components to maintain system functionality in case of failure.

  14. Fault Tolerance: The capability of a system to continue operating even when some parts encounter issues.

  15. Protocol: A set of rules that specify how data should be formatted, transmitted, and processed in a system.

  16. IP Address: A unique numerical identifier assigned to each device on a computer network.

  17. Packet: A small, manageable unit of data transmitted across a network, often accompanied by metadata.

  18. Packet Switching: A method of transmitting data in discrete chunks rather than a continuous stream.

  19. TCP/IP: A pair of protocols that ensure reliable communication and routing of data across networks.

  20. Encryption: The process of encoding information to prevent unauthorized access.

  21. Decryption: The process of decoding encoded information to make it readable again.

  22. Symmetric Encryption: A type of encryption where the same key is used for both encoding and decoding information.

  23. Public Key Encryption: An encryption system that uses two keys, one public and one private, to secure communication.

  24. SSL/TLS: The standard technology used to encrypt and secure data transferred over the Internet.

  25. Certificate Authority: An entity responsible for verifying and issuing digital certificates for encryption.

  26. Malware: Malicious software designed to harm, disrupt, or gain unauthorized control over a computer system.

  27. DDoS Attack: An attack in which a server is overwhelmed by excessive traffic from multiple sources, disrupting service.

  28. Rogue Access Point: An unauthorized wireless access point that allows unauthorized access to a secure network.

  29. Digital Divide: A gap in access to technology and the Internet due to socioeconomic, geographic, or demographic factors.

  30. Citizen Science: Research conducted by individuals outside traditional scientific institutions who contribute data to studies.

  31. Crowdsourcing: A method of solving problems by enlisting the help of many people over the Internet.

  32. Computing Innovation: An innovation involving a physical or conceptual design that incorporates computer programming as a key element.

  33. Bit: The smallest unit of digital data, representing either a 0 or a 1.

  34. Byte: A sequence of eight bits, often used to store one character of text.

  35. Binary Sequence: A series of 0s and 1s representing data in a digital format.

  36. Analog Data: A type of data that changes continuously and smoothly over time, unlike its digital counterpart.

  37. Sampling: The process of taking measurements of an analog signal at consistent intervals to convert it to digital form.

  38. Lossless Compression: A method of data compression that allows exact reconstruction of the original information.

  39. Lossy Compression: A method of data compression that reduces file size by discarding some information, making it irreversible.