Important Vocab. J-Z Flashcards
KEY
in cryptography, a shared secret to make encryption harder to crack.
LATENCY
the amount of delay when sending digital data over the Internet or the round-trip time information takes to get from the client to the server and back.
LOSSLESS
data compression that does not lose data during compression.
LOSSY
data compression that loses data during compression.
MAC (MEDIA ACCESS CONTROL) ADDRESS
a unique, physical address that is stored in the computer’s ROM.
MAIN MEMORY
memory that temporarily stores information while it is being sent to the CPU, also called RAM.
METADATA
additional data about the main data, usually at the beginning of a file.
MODEM
a device that handles both the modulation and the demodulation of signals.
MODULAR ARITHMETIC
using the remainder when dividing, also known as clock arithmetic.
MOTHERBOARD
(logic board); the standardized printed circuit board that connects the CPU, main memory, and peripherals.
NAME SERVER
a server that contains many IP addresses and their matching domain names.
NETWORK
a group of computers that are connected so they can share resources using a data link.
NONVOLATILE
does not need a power supply; information is physically written into the device.
NYBBLE/NIBBLE
half of a byte, 4 bits
ONE-WAY FUNCTIONS
a problem that is easy in one direction and difficult in the other.
OPERATING SYSTEM
the visual representation of the comptuer.
OR
basic logic gate where any part of a statement can be true for the entire statement to be true.
PACKETS
small chunks of data used in TCP/IP.
PERIPHERALS
the input and output devices and the secondary memory.
PHISHING
using “bait” to trick the user into entering sensitive information like user names, passwords, or credit card numbers.
PIXELATION
when individual pixels are too large and the image begins to look blocky.
POP
Post Office Protocol, used for e-mail.
POST
power-on self-test.
POWER SUPPLY
coverts AC electricity to the lower voltage DC electricity that is needed to power the computer.
PRIVATE KEY
a shared secret needed to decrypt a message
PROTOCOL
a specific set of rules.
PUBLIC KEY
a system that allows a key to be publicly published.`
RANDOM ACCESS MEMORY
(RAM); memory that can be retrieved or written to anywhere without having to go through all the previous memory.
RBG
color model used for most monitors or screens. Stands for red, green, and blue, referring to the color of light.
ROOT NAME SERVER
one of the thirteen servers that contain every IP address and its matching domain name.
ROUTER
a networking device that routes Internet traffic to the destination.
SAMPLE RATE
how often an analog signal is used when converting to digital, usually measured in bits per second.
SECONDARY MEMORY
used for long term storage and is physically changed when files are saved or deleted.
SELECTION
the logic structure in programming that uses if statements to select certain values.
SEQUENCE
the structure that runs one line after another in order.
SEQUENTIAL MEMORY
memory used to store back-up data on a tape.
SERVER
any computer that provides a service.
SOFTWARE
includes the operating system and the applications. It is usually stored on a computer’s hard drive and cannot physically be touched. At the lowest level, it is a series of ones and zeros.
SSL
Secure Sockets Layer, issues digital certificates for websites.
SUBDOMAIN
precedes the domain name, owned by the domain. hhtps://subdomain.domain.com
SUBSTITUTION CIPHER
a cipher where a letter is mapped or swapped with another letter in the alphabet.
SYMMETRIC KEY ENCRYPTION
the same key is used to encrypt and decrypt a message.
TCP
Transmission Control Protocol, a set of rules for breaking down requests into smaller, more manageable, numbered packets.
TLS
Transport Layer Security, issues digital certificates for websites.
UDP
User Datagram Protocol, like TCP and usually used for streaming audio/video.
URL
Uniform Resource Locator, specifies where to find a file on a domain.
VARIABLE
used in coding to store a value that can change.
VIRUS
a program that infects other programs and usually spreads to other programs or computers by copying itself repreatedly.
VoIP
Voice over Internet Protocol, used for telephony.
VOLATILE
needs a power supply. Turning off the power deletes information.
WEB (WORLD WIDE WEB)
the part of the Internet that uses HTTP and HTTPS.
SYNCHRONOUS COMMUNICATION
enables by the “cloud” or serves located remotely.
HEURISTIC
finding the best approximate solution when the actual solution is intractable.
REMOVE COMMAND
shifts values in a list to the right.
INSERT COMMAND
shifts values in a list to the left.
SIMULATION
algorithm used to show a real-life event.