Upgrade to remove ads
Terms in this set (64)
Commonly occurring patterns in design that are repeatable and generalist enough to be written down and named as software design constructs that all can commonly identify and apply
Online collaborative tools
Features on the Internet that allows people to work together to produce something
Data vs. Information
Data is raw and unorganized facts that need to be processed, information isorganized datanin context to be made useful
Dealing with the repetition of a sequence of computer instructions a specified number of times or until a condition is met
A program that reads data in and manipulates the data to fit another output pattern or removes data that may not be needed
The linking of computers so that they can share the work as one
Process of sorting and categorizing data into various types, forms or any other distinct class
Filter systems (filter tools)
A system that removes redundant or unwanted information from an information stream using (semi)automated or computerized methods prior to presentation to a human user
The capability of a system, network, or process to handle a growing amount of work, or its potential to be enlarged in order to accommodate that growth.
The act or process of retrieving data out of (usually unstructured or poorly structured) data sources for further data processing or data storage (data migration).
Large data set(s)
Data sets that are so large or complex that traditional data processing applications are inadequate to deal with them
A general direction in which something is developing or changing
Computing tools (fusion tables
queries), A computer program that software developers use to create, debug, maintain, or otherwise support other programs and applications
An online search engine used to relocate users to different websites ex. Google, Bing, Yahoo etc
A computer application program that simulates a physical spreadsheet by capturing, displaying, and manipulating data arranged in rows and columns
A set of data that describes and gives information about other data. Metadata summarizes basic information about data, which can make finding and working with particular instances of data easier.
Problems that arise from incorrect data
Digital data representation
Internal method used to represent various types of data stored on a computer
Secure transmission concerns
refers to the concern that the transfer of data, such as confidential or proprietary information, over a secure channel will be shared with the wrong servers without being detected
Lossy data compression
Reduces a file by permanently eliminating certain information, especially redundant information
Lossless data compression
All original data is perfectly reconstructed in compresison
Data file formats
Defines structure and type of data stored in file
Electronic worries relating to how easily certain individuals or organizations can look at the information a user has given to a website
Electronic worries relating to how well guarded a users information is on a website. This can include personal, financial, or medical information.
Devices that store application, user, and software information
Process of representing abstract business or scientific data as images that can aid in understanding the meaning of the data
Application-specific features reside in the communicating end nodes of the network, rather than in intermediary nodes, such as gateways and routers, that exist to establish the network
Connects to a computer system to add functionality (examples of this is a mouse or keyboard)
A collection of computers and devices connected together for the purpose of sharing resources
Domain Name System (DNS)
The text version of an IP address
Identifies the network and the computer;consists of four decimal numbers, each ranging from 0 to 255
An Internet Protocol (IP) used for carrying data in packets from a source to a destination over various networks. IPv6 is the enhanced version of IPv4 and can support very large numbers of nodes as compared to IPv4
HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web. HTTPS is a more secure version, often used when financial information is being exchanged on a website.
Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission.
(Internet Engineering Task Force) The body that defines standard Internet operating protocols such as TCP/IP.
A structure that has a predetermined ordering from high to low, ie organization files and folders (ex. pay minimum for internet-services put on high traffic wires--pay more, you recieve faster service)
Repetition of information or inclusion of additional information to reduce errors in telecommunication transmissions and computer processing. The use of words or data that could be omitted without loss of meaning or function; repetition or superfluity of information.
Domain name syntax
An identification string that defines a realm of administrative autonomy, authority, or control within the Internet
Perform "traffic directing" functions of the internet; fowards data packets between computer networks
AV is computer software used to prevent, detect, and remove malicious software/computer viruses.
The capability of a computer or system to handle a growing amount of work, or its potential to be enlarged in order to accommodate that growth.
Redundancy of routing
A computer networking protocol that provides for the automatic assignment of available routers to participating hosts
Protocols (include TCP/IP)
A set of rules or procedures for transmitting data between electronic devices, such as computers. In order for computers to exchange information, there must be a preexisting agreement as to how the information will be structured and how each side will send and receive it.(Transmisssion Control Protocols/Internet Protocols)
Either a hardware connection or a user interface. Can be used to describe how two devices connect to eachother
Method of slicing digital messages into parcels then sending individual parecels across different routes to be reconstructed at the end site. Increases sending speed.
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet).
An application used to access and view websites
A web server is a program that uses HTTP, or Hyper Text Transfer Protocol, to serve the files that form web pages to users, in response to their requests, which are forwarded by their computers' HTTP clients
Cryptographic protocols that provide communication security over a computer network
The transmission capacity, measured by bit rate
This is the amount of time it takes a packet of data to move across a network connection; when the computer that sent the packet waits for confirmation that the packet has been received
Standards made avaliable to the public and are developed and maintained via a collaborative process, facilitates data exchange
A type of DOS attack where multiple compromised systems are used to target a single system causing a denial of service (DOS)
Identifies mechanisms necessary to respond to a specific threat profile
The body of technologies or pracrices designed to protect networks, computers, or programs from unauthorized access
Cyber warfare; cybercrime
Cyber warfare is internet based conflict involving politically motivated attacks on information and information system. Attacks can disable official websites or networks, disable or disrupt essential services, steal or alter classified data, etc. CyberCrime is crime committed via the internet or another computer network.
Technique used to gain personal information for purpose of identity theft by using fraudulent emails that appear to come from legitimate businesses
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. Blocked out by firewalls.
Program or hardware that filters out most unwanted information coming through the Internet to a network or computer system
The practice of writing or solving codes meant to hide information
The same key can be used to encrypt and decrypt a message. Using a singular encryption key to guise and electronic message.
Public key encryption
Asymmetric systems use a public key to encrypt and a private key to decrypt, enhances security. Uses a paired public and private key algorithm for secure data encryption. To decrypt a sender's message, only the recipient's private key may be used.
An electronic document used to prove the ownership of a public key.
An attachment to an electronic message used for security purposes.
THIS SET IS OFTEN IN FOLDERS WITH...
WHAP VOCAB: chapters 23 & 24
SP3 U2E3 Vocab
AP World Unit 3 Vocabulary (Ch 7 & 8)
Maneja con Cuidado Vocabulario
YOU MIGHT ALSO LIKE...
Final For Technology in Action
AP CompSci Finals
OTHER SETS BY THIS CREATOR
Book of Bad Arguements Def
Book of Bad Arguements
Christy's Bible Verses to Memorize
OTHER QUIZLET SETS
L.E.A.D Questions 11JAN21
CSDS 109-Exam 3
US History Chapter 10 Study Guide