Internet Unit 4 Flashcards
Internet
A computer network that uses open protocols to standardize communication. It requires a computing device connected to an Internet-connected device for access.
Computer Network
An interconnected computing system capable of sending or receiving data.
Computing System
A group of computing devices and programs working together for a common purpose.
Computing Device
A physical object capable of running a program
World Wide Web
A system of linked pages
Router
A computer that passes information from one network to another
ISP (Internet Service Provider)
Companies that sell Internet access to homes and institutions.
Bandwidth
The maximum amount of data that can be sent in a fixed amount of time
Cloud Storage
Storing data on the Internet without knowing the exact location
Path
A sequence of directly connected computing devices connecting a sender to a receiver.
Routing
The process of finding a path from sender to receiver.
Scalability
The ability of the Internet to continue functioning as it grows.
Redundancy
The inclusion of backup elements in a system to prevent failure.
Fault Tolerance
The ability of a system to continue operating despite the occurrence of faults.
Protocol
A set of rules specifying the behavior of a system.
IP Address
A unique number assigned to each device on a computer network.
Packet
A small chunk of data and metadata passed through the Internet as a part of a data stream.
Packet Switching
The process of sending information in short bursts over the Internet
TCP/IP
A pair of protocols providing abstraction layers for Internet communication
Encryption
The process of encoding data to prevent unauthorized access.
Decryption
The process of decoding encrypted data.
Symmetric Encryption
Encryption using the same key for both encrypting and decrypting data
Public Key Encryption
Uses a pair of keys (public for encryption
SSL/TLS
Standards for cryptographically secured information transfer on the Internet.
Certificate Authorities
Organizations issuing digital certificates to verify ownership of encryption keys for secure communications.
Malware
Software designed to harm or take control over a computer.
Keylogging Software
Malware that records every key pressed by the user.
Computer Virus
Malware that spreads and infects other computers by attaching to legitimate programs.
Antivirus Software
Software designed to scan for and eliminate malware.
Firewall
A security system controlling connections between a computer/network and the outside world.
Phishing
A security attack tricking victims into surrendering personal information or downloading malware.
DDoS Attack
A distributed denial of service attack that floods a server with requests to deny service to legitimate users.
Rogue Access Point
An unauthorized wireless access point providing access to a secure network.
Digital Divide
Unequal access to computers and the Internet based on various socio-economic factors.
Citizen Science
Scientific research conducted partly by non-scientists contributing data via computing devices.
Crowdsourcing
Using the Internet to gather a large group of people to solve problems
Computing Innovation
Can be physical
Bit
The smallest unit of data
Byte
Eight bits.
Word
The number of bits processed by a CPU at a time
Binary Sequence (Bitstream)
A string of ones and zeros representing digital data.
Analog Data
Data with values that change smoothly
Sampling
Measuring analog signal values at regular intervals.
Sampling Rate
The number of samples of an analog signal measured per second.
Width
The number of bits a CPU processes at a time.
Scientific Notation and Floating Point
Methods for representing very large or small values using powers of ten (scientific notation) or two (floating point).
Lossless Compression
Data compression algorithms that allow for the original data to be perfectly reconstructed.
Lossy Compression
Data compression algorithms that result in an approximation of the original data