Important Vocab. A-I Flashcards
AND
basic logic gate where every part of a statement must be true for the entire statement to be true.
APPLICATIONS
includes word processors, photo editing software, we browsers, games, music programs, and almost everything else on the computer excluding saved files.
ARPANET
the Advanced Research Projects Agency Network. First agency to use TCP/IP
ASCⅡ
American Standard Code for Information Interchange.
ASYMMETRIC KEY ENCRYPTION
a different key is used to encrypt and decrypt a message.
ASYNCHRONOUS COMMUNICATION
enabled by the “cloud” or servers located remotely.
AGGREGATION
the formation of items of content so that they can be displayed or linked to.
BIG DATA
sets of data that are larger than a consumer software application can handle.
BINARY
number system that uses 0,1; base 2.
BIOS
basic input/output system.
BIT
each number in the binary system, 0 or 1.
BIT RATE
the number of bits that can be processed per second.
BYTE
8 bits.
BRUTE FORCE TECHNIQUES
trying every solution to break through the protection around encrypted data.
BANDWIDTH
the amount of resources available to transmit the data.
CAESAR CIPHER
a shift cipher where each letter is shifted the same amount.
CENTRAL PROCESSING UNIT (CPU)
carries out every command or process on the computer and can be thought of as the brain of the computer.
CIPHER
is a pair of algorithms that give details on how to encrypt and decrypt the data.
CLIENT
any computer that requests a service.
CLOUD COMPUTING
using a remoter server to store files.
CMYK
color model used for printing. Stands for cyan, magenta, yellow, and black(key), where the number associated with each letter is the percentage of each color used.
COMPUTATIONALLY HARD
a problem that takes too long even for a computer to find the exact solution.
COMPUTER
an electronic device that processes data according to a set of instructions or commands, known as a program.
CONSTANT
used in coding to store a value that cannot be changed.
CORE
the central processing unit (CPU) and the main memory.
CSS
Cascading Style Sheets, redefines mark-up in HTML.
COOKIES
text files containing personal information of a user.
CLOUD-BASED STORAGE
can be accessed from any location with an Internet connection and is good for storage for different people
DDoS
distributed denial-of-service attack, hackers flood a site with fake requests making all the site’s recourses unavailable for legitimate users.
DEBUGGING
finding errors in code.
DECIMAL
number system that used 0-9; base 10.
DECRYPTION
the reverse process of encryption.
DESIGN - IMPLEMENT - TEST
the three steps of the iterative development process.
DIGIT
each number in the decimal system 0-9.
DIGITAL CERTIFICATE
a trusted third-party file that verifies a site as legitmate.
DIGITAL SIGNATURE
an electronic signature that , by using public key, can be verified authentic.
DNS
Domain Name System, one of the smaller networks that make up the Internet. It contains many servers that act like phone books.
DOMAIN NAME
a name given or linked to an IP address.
DIGITAL MILLENNIUM COPYRIGHT ACT
works to prevent illegal file sharing, illegal downloads, and other licensing violations.
DATA-MINING
process of discovering patterns in large data sets.
ENCRYPTION
taking text and converting it so it is illegible.
FAULT TOLERANT
a property of IP. If there is an error, it still works properly.
FTP
File Transfer Protocol, used for transferring files between a client and a server.
HACKER
anyone who uses their technological skills to solve problems. A malicious security hacker exploits weaknesses on a computer or network and can steal or disrupt data.
HARDWARE
the physical parts of the computer, including devices such as the monitor, keyboard, speakers, wires, chips, cables, plugs, disks, printers, and mice.
HEURISTIC APPROACH
an approach that gives results that are “good enough” when an exact answer is not necessary.
HEXADECIMAL
number system that uses 0-9 & a-f; base 16.
HTML
Hyper Text Markup Language, the standard for creating web pages.
HTTP
Hyper Text Transfer Protocol, used for websites.
HTTPS
a secure version of HTTP that uses SSL/TLS.
IMAP
Internet Message Access Protocol, used for e-mail.
INCREMENTAL
done in small chuncks.
INPUT & OUTPUT (I/O) DEVICES
how the user interacts with the computer.
INTERNET
a network of smaller networks connected using a specific set of rules that computers use to communicate with each other.
IP
Internet Protocol, a unique address for every device connected to the Internet.
IP ADDRESS
a unique identifier for every device on the Internet.
IPv4
the version of IP that uses 32-bit addresses.
IPv6
the version of IP that uses 128-bit addresses.
ISP
Internet Service Provider.
ITERATIVE
continuously repeating steps, achieved in programming by using loops.
ITERATIVE SOFTWARE DEVELOPMENT PROCESS
breaks the development process into smaller parts.
INTRACTABLE ALGORTIHM
no solution/way to solve the problem.
INSERT COMMAND
shifts values in a list to the right.