Important Vocab. A-I Flashcards

1
Q

AND

A

basic logic gate where every part of a statement must be true for the entire statement to be true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

APPLICATIONS

A

includes word processors, photo editing software, we browsers, games, music programs, and almost everything else on the computer excluding saved files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ARPANET

A

the Advanced Research Projects Agency Network. First agency to use TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ASCⅡ

A

American Standard Code for Information Interchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ASYMMETRIC KEY ENCRYPTION

A

a different key is used to encrypt and decrypt a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ASYNCHRONOUS COMMUNICATION

A

enabled by the “cloud” or servers located remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AGGREGATION

A

the formation of items of content so that they can be displayed or linked to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BIG DATA

A

sets of data that are larger than a consumer software application can handle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BINARY

A

number system that uses 0,1; base 2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BIOS

A

basic input/output system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BIT

A

each number in the binary system, 0 or 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BIT RATE

A

the number of bits that can be processed per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

BYTE

A

8 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BRUTE FORCE TECHNIQUES

A

trying every solution to break through the protection around encrypted data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BANDWIDTH

A

the amount of resources available to transmit the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CAESAR CIPHER

A

a shift cipher where each letter is shifted the same amount.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CENTRAL PROCESSING UNIT (CPU)

A

carries out every command or process on the computer and can be thought of as the brain of the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CIPHER

A

is a pair of algorithms that give details on how to encrypt and decrypt the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CLIENT

A

any computer that requests a service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CLOUD COMPUTING

A

using a remoter server to store files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CMYK

A

color model used for printing. Stands for cyan, magenta, yellow, and black(key), where the number associated with each letter is the percentage of each color used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

COMPUTATIONALLY HARD

A

a problem that takes too long even for a computer to find the exact solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

COMPUTER

A

an electronic device that processes data according to a set of instructions or commands, known as a program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CONSTANT

A

used in coding to store a value that cannot be changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

CORE

A

the central processing unit (CPU) and the main memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

CSS

A

Cascading Style Sheets, redefines mark-up in HTML.

27
Q

COOKIES

A

text files containing personal information of a user.

28
Q

CLOUD-BASED STORAGE

A

can be accessed from any location with an Internet connection and is good for storage for different people

29
Q

DDoS

A

distributed denial-of-service attack, hackers flood a site with fake requests making all the site’s recourses unavailable for legitimate users.

30
Q

DEBUGGING

A

finding errors in code.

31
Q

DECIMAL

A

number system that used 0-9; base 10.

32
Q

DECRYPTION

A

the reverse process of encryption.

33
Q

DESIGN - IMPLEMENT - TEST

A

the three steps of the iterative development process.

34
Q

DIGIT

A

each number in the decimal system 0-9.

35
Q

DIGITAL CERTIFICATE

A

a trusted third-party file that verifies a site as legitmate.

36
Q

DIGITAL SIGNATURE

A

an electronic signature that , by using public key, can be verified authentic.

37
Q

DNS

A

Domain Name System, one of the smaller networks that make up the Internet. It contains many servers that act like phone books.

38
Q

DOMAIN NAME

A

a name given or linked to an IP address.

39
Q

DIGITAL MILLENNIUM COPYRIGHT ACT

A

works to prevent illegal file sharing, illegal downloads, and other licensing violations.

40
Q

DATA-MINING

A

process of discovering patterns in large data sets.

41
Q

ENCRYPTION

A

taking text and converting it so it is illegible.

42
Q

FAULT TOLERANT

A

a property of IP. If there is an error, it still works properly.

43
Q

FTP

A

File Transfer Protocol, used for transferring files between a client and a server.

44
Q

HACKER

A

anyone who uses their technological skills to solve problems. A malicious security hacker exploits weaknesses on a computer or network and can steal or disrupt data.

45
Q

HARDWARE

A

the physical parts of the computer, including devices such as the monitor, keyboard, speakers, wires, chips, cables, plugs, disks, printers, and mice.

46
Q

HEURISTIC APPROACH

A

an approach that gives results that are “good enough” when an exact answer is not necessary.

47
Q

HEXADECIMAL

A

number system that uses 0-9 & a-f; base 16.

48
Q

HTML

A

Hyper Text Markup Language, the standard for creating web pages.

49
Q

HTTP

A

Hyper Text Transfer Protocol, used for websites.

50
Q

HTTPS

A

a secure version of HTTP that uses SSL/TLS.

51
Q

IMAP

A

Internet Message Access Protocol, used for e-mail.

52
Q

INCREMENTAL

A

done in small chuncks.

53
Q

INPUT & OUTPUT (I/O) DEVICES

A

how the user interacts with the computer.

54
Q

INTERNET

A

a network of smaller networks connected using a specific set of rules that computers use to communicate with each other.

55
Q

IP

A

Internet Protocol, a unique address for every device connected to the Internet.

56
Q

IP ADDRESS

A

a unique identifier for every device on the Internet.

57
Q

IPv4

A

the version of IP that uses 32-bit addresses.

58
Q

IPv6

A

the version of IP that uses 128-bit addresses.

59
Q

ISP

A

Internet Service Provider.

60
Q

ITERATIVE

A

continuously repeating steps, achieved in programming by using loops.

61
Q

ITERATIVE SOFTWARE DEVELOPMENT PROCESS

A

breaks the development process into smaller parts.

62
Q

INTRACTABLE ALGORTIHM

A

no solution/way to solve the problem.

63
Q

INSERT COMMAND

A

shifts values in a list to the right.