Terms in this set (49)
a question to which there are only two possible answers.
a message that can only be one of two possible values.
A binary digit, a 0 or a 1.
the number of bits that are conveyed or processed per unit of time. e.g. 8 bits/sec.
Time it takes for a bit to travel from its sender to its receiver.
A set of rules governing the exchange or transmission of data between devices.
a code for representing English characters as numbers, with each letter assigned a number from 0 to 127
develops and promotes voluntary Internet standards and protocols, in particular the standards that comprise the Internet protocol suite (TCP/IP).
Request for Comments (RFC)
A document published by the IETF that details information about standardized Internet protocols and those in various development stages.
A number assigned to any item that is connected to the Internet.
The service that translates URLs to IP addresses. (Domain Name System)
hypertext transfer protocol; the protocol used to transfer data over the World Wide Web
Small chunks of information that have been carefully formed from larger chunks of information.
A device that transfers data from one network to another in an intelligent way
Transmission Control Protocol - provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.
Reducing information and detail to focus on essential characteristics.
(computer science) a computer that provides client stations with access to files and printers as shared resources to a computer network
how is text sent on the internet?
Most messaging services require both the sender and the recepient to be 1- connected to the internet, and 2- use the same service which is typically an app.
a simple thinking strategy that often allows us to make judgments and solve problems efficiently; usually speedier but also more error-prone than algorithms
data that describes other data
a data compression algorithm that allows the original data to be perfectly reconstructed from the compressed data.
data compression techniques in which some amount of data is lost. This technique attempts to eliminate redundant information.
The hexadecimal number system is base 16, using only digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F.
1. A relationship from one set (called the domain) to another set (called the range) that assigns to each element of the domain exactly one element of the range. 2. The action or actions that an item is designed to perform.
A characteristic or constant factor, limit
Top Down Design
a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.
generate a larger elimination response than that of the thiazides
a broad term for datasets so large or complex that traditional data processing applications are inadequate.
the observation that computing power roughly doubles every two years.
the generic term for a technique (or algorithm) that performs encryption
When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption.
a process that reverses encryption, taking a secret message and reproducing the original plain text
Process of converting readable data into unreadable characters to prevent unauthorized access.
a "hard' problem for a computer is one in which it cannot arrive at a solution in a reasonable amount of time.
Public Key Encryption
Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.
Secure Sockets layer / Transport Layer Security - An encryption layer of HTTP that uses public key cryptography to establish a secure connection.
A distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
19 mod 4