Googley Words & Terms Flashcards

1
Q

Browser Session Cookies

A

It’s a mechanism for recognizing multiple requests from the same browser. It’s a conversation or a meeting between two or more communicating devices, or between computer and user.

A login session is the period of activity between a user logging in and logging out of a (multi-user) system.

Webpages have no memories. A user going from page to page will be treated as a completely new visitor. Session cookies enable the website you are visiting to keep track of your movement so you don’t get asked for the same information you’ve already given. Cookies allow you to proceed through many pages quickly and easily w/o having to authenticate or reprocess each new area you visit.

A cookie, like a key, enables swift passage from one place to the next. Without a cookie every time you open a new web page the server where that page is stored will treat you like a completely new visitor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication

A

the act of authentication means you are establishing whether something or someone is what it or he claims to be.

In private and public networks, this is typically verified through a login process. Logically, authorization precedes authentication (although they are often combined).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Digital Certificate

A

A digital certificate is an electronic “credit card” or “passport” that establishes your credentials when doing business or other transactions on the Web. It is issued by a certification authority (CA).

It contains your name, a serial number, expiration dates, a copy of the certificate holder’s public key (used for encrypting messages and digital signatures), and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real.

Digital certificates use a cryptographic technology called public-key cryptography to sign software publications and to verify the integrity of the certificate itself. One key encrypts and another key decrypts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Protocol (ex. http://, https://, etc)

A

A protocol is a set of invisible computer rules that govern how an internet document gets transmitted to your screen.

These dozens of programmatic rules work in the background in the same way a bank employs staff procedures to keep your money safe.

List of popular protocols:

http Hypertext Transfer Protocol
https Hypertext Transfer Protocol Secured
TCP/IP Transmission Control Protocol/Internet Protocol
ftp File Transfer Protocol
IMAP Internet Message Access Protocol
POP Post Office Protocol
SMTP Simple Mail Transfer Protocol
telnet Terminal Network protocol
UDP User Datagram Protocol
nntp Network News Transfer Protocol
MAC Media Access Control protocol
DNS Domain Name System protocol
DHCP Dynamic Host Configuration Protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Property (Properties)

A

The part(s) of which something is comprised. Attributes, characteristics, or qualities.

For example, a snow cone has a few properties: a paper cup, ice, and syrup.

In science, this relates to specific rules.

For example, pure water has the property of being transparent. This means you can say that all pure water, no matter where you find it, is transparent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Parameter

A

A value passed to a program by either a user or another program in order to customize the program for a particular purpose.

A parameter could be anything; for example, a file name, coordinate, range of values, a money amount or code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Value

A

(1) The content of a field or variable. It can refer to alphabetic as well as numeric data.

For example, in the expression, state = “PA”, PA is a value.

(2) In spreadsheets, the numeric data within the cell.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Index (all types)

A

A method for keeping track of data so that it can be accessed quickly. Like an index in a book, it is a list in which each entry contains the name of the item and its location. Computer-based indexes may point to a physical location on a disk or to a logical location that points elsewhere to the actual location.

Indexes are used by all types of software, including the operating system, database management system (DBMS) and applications.

For example, the file system index in an operating system contains an entry for each file name and the starting location of the file on disk. A database index has an entry for each key field (account number, name, etc.) and the location of the record. Search engines use a very sophisticated indexing system to keep track of billions of pages on the Web.

(2) In programming, a method for accessing data in a table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Indexing (Search)

A

Once search bots (or “Spiders”) are done crawling a site, the search engine (ex. Google) must store the information in a way that makes it useful.

Indexing has a single purpose: it allows information to be found as quickly as possible. One of the most effective ways of doing this is called “Hashing”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Web “Crawling” and Spiders

A

Before a search engine can tell you where a file or document is, it must be found using special software robots, called spiders.

The “spider” builds lists of the words found on websites. When a spider is building its lists, the process is called Web crawling. When the Google spider looked at an HTML page, it took note of two things: The words within the page and Where the words were found

Note: Spiders are always crawling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hashing (in terms of search)

A

A method for storing and retrieving records from a database (DB).

For example: In English, there are some letters that begin many words, while others begin fewer. You’ll find, for example, that the “M” section of the dictionary is much thicker than the “X” section. This inequity means that finding a word beginning with a very “popular” letter could take much longer than finding a word that begins with a less popular one. Hashing evens out the difference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Boolean Operators

A

To search through an index, a user must first build a query. A query could be a single word. However, for more complex searches, one could use Boolean operators, such as AND, OR, NOT, “”, and so on.

Symbolic logic developed by George Boole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Array

A

An array is an orderly (systematic) arrangement, often in rows, columns or a matrix.

For example, a box of chocolates or a crate of oranges that have an arrangment of 12 across and 8 down (8 across, 5 down, 12 across 12 down etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

API

A

API, which stands for application-programming interface, is a protocol which allows one piece of code to communicate with another piece of code (usually between a developer and a third-party). It’s like a VIP pass to a club with all the people you want to sell your stuff to.

For example, HootSuite and Tweetdeck use Twitter’s API to build powerful applications. Twitter, of course, loves this b/c it gets more people to adopt the service.

This, of course, has its downsides. The API owner (Twitter, in this case) could make changes to its API or go down, which would likely disrupt service for HootSuite customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SaaS

A

SaaS (Software as a service) describes when users “rent” or “borrow” online software instead of actually owning it.

For example, instead of selling you a copy of Microsoft Word for $300, a cloud computing model would “rent” word processing software to you through the Internet for perhaps 5 dollars a month.

Note: Company’s using this model are effectively holding customers’ data “hostage’ and should focus even more on privacy and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Recursion/Recursive/Recursively

A

Recursion is the process a procedure goes through when one of the steps of the procedure involves invoking the procedure itself.

An analogy: a procedure is like a written recipe; running a procedure is like actually preparing the meal.

17
Q

Inverse Proportion

A

Inversely proportional means that one variable (condition) goes up while the other goes down.

Ex: Sale of sweaters: As the temperature goes up the number of sales goes down

i.e. Increasing temperature decreases sales: Sales ~ 1/Temperature

Directly proportional means that both variables (conditions) increase or decrease at the same time.

18
Q

Refactoring

A

Refactoring is a controlled technique for improving the design of an existing code base. A ton of small changes that produce a significant cumulative effect