Vocab Quiz 1/12/24 Flashcards
Bias
Prejudice in favor of or against one thing, person, or group compared with another, usually in a way considered to be unfair
Ex: when you search people on google the images are mainly light-skinned persons rather than dark-skinned people
Classifying Data
The process of categorizing or organizing information into distinct groups or classes based on specific criteria or attributes
Cleaning Data
The process of identifying and correcting errors, inconsistencies, and inaccuracies in datasets
Filtering Data
The purpose of data filtering is to focus on and extract only the relevant portions of the data that meet certain requirements, allowing for a more targeted analysis or presentation of information
Patterns in Data
Patterns in data refer to regularities, trends, or structures that can be identified within a dataset
Scalability
Scalability refers to the ability of a system, network, or process to handle an increasing amount of work, growth, or demand efficiently
Internet
A global network of interconnected computers and computer networks that communicate with each other using the Internet Protocol (IP)
Computer System
A combination of hardware and software components that work together to perform various computing functions
Computer Network
A set of interconnected computers and other devices that are capable of sharing resources and information
Computing Device
An electronic device designed to process, store, and manipulate data according to predefined instructions
Bandwidth
Bandwidth refers to the maximum rate of data transfer across a network or communication channel
Distributed Computing System
A system in which components or processes of a software application are distributed across multiple computers or nodes that operate in parallel and coordinate with each other to achieve a common goal
Fault Tolerance
A system’s ability to continue operating properly in the presence of faults, errors, or failures in one or more of its components
IP Address
A numerical label is assigned to each device connected to a computer network that uses the Internet Protocol for communication
TCP (Transmission Control Protocol)
It is one of the main protocols in the Internet Protocol suite and is used for reliable, connection-oriented communication between devices on a network. TCP provides a set of rules and procedures for exchanging data between applications running on different devices in a network
Packets
A unit of data that is transmitted over a network
Parallel Computing System
The simultaneous execution of multiple tasks or processes to solve a problem more quickly. A parallel computing system is designed to perform parallel processing, utilizing multiple processors or computing cores to divide a task into subtasks and execute them concurrently
Protocols
A set of rules, conventions, or guidelines that define how data is transmitted and received between devices in a network or communication system
Redundancy
Having multiple systems working together in case one fails
Router
A router connects you to the internet
A networking device that connects multiple computer networks and directs data traffic between them
Sequential Computing System
A traditional computing paradigm where instructions are executed one after another in a sequential, linear fashion
World Wide Web
A system of interconnected documents and resources that are accessed via the Internet
Encryption
The process of converting information or data into a code or cipher to secure it from unauthorized access or tampering
Decryption
The process of converting encrypted or ciphertext data back into its original, readable form, known as plaintext
Certificate Authority
A trusted entity that issues digital certificates, which are electronic documents used to verify the identity of individuals, organizations, or devices in electronic communication
Public Key Encryption
A cryptographic system that uses a pair of keys for secure communication—namely, a public key and a private key
Multifactor
A security authentication method that requires the user to provide two or more different factors to verify their identity
Authentication
The process of verifying the identity of an entity, such as a user, device, or system, to ensure that they are who they claim to be
Asymmetric Ciphers
Public-key cryptography uses a pair of keys (public key and private key) for encryption and decryption
Symmetric Key Encryption
Secret key encryption or private key encryption, is a type of encryption where the same key is used for both the encryption and decryption of the data
Crowdsourcing
A practice of obtaining input, services, or content by soliciting contributions from a large group of people, typically through an open call