<– 9 – Impact of Computing | 1 – Hardware, Software, Number Systems, and Boolean Expressions –>
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
A
Abstraction – reducing information and detail to facilitate focus on relevant concepts
Additive Color – a color model where no light is black and the combination of all light is white, like RGB
AND – basic logic gate where every part of a statement must be true for the entire statement to be true
Application – almost everything on the computer except saved files and the operating system, including word processors, photo editing software, web browsers, games, and music programs
ARPANET – the Advanced Research Projects Agency Network, first agency to use TCP/IP
ASCII – American Standard Code for Information Interchange
Asymmetric Key Encryption – a different key is used to encrypt and decrypt a message
Atomic transaction – transaction where all components must be carried out before the transaction is considered complete such that all occur or none occur
B
Backdoor – a secret way to bypass traditional access to a device or network
Bandwidth – the amount of resources available to transmit the data
Big Data – sets of data that are larger than a consumer software application can handle
Binary – base 2, number system that uses 0, 1
Binary Search – a searching algorithm, used on sorted lists, that divides the number of elements to search in half until it is down to one element
Binary Tree – a data structure that can, at the most, have two nodes or “branches”
BIOS – Basic input/output system
Bit – each number in the binary system, 0 or 1
Bit Depth –refers to the amplitude of the analog wave and specifically to the number of bits used for each sample
Bit Rate – the number of bits that can be processed per second
Boolean Logic – a branch of algebra where variables can only have two values: true or false
Botnet – a large network of internet-robots called bots controlled by a command-and-control server, often used for DDoS attacks
Byte – 8 bits
C
Caesar Cipher – a shift cipher where each letter is shifted the same amount
Central Processing Unit (CPU) –carries out every command or process on the computer and can be thought of as the brain of the computer
Cipher – is a pair of algorithms that give details on how to encrypt and decrypt the data
Client –any computer that requests a service
Cloud Computing – using a remote server to store files
CMYK – color model used for printing. Stands for cyan, magenta, yellow, and black (key), where the number associated with each letter is the percentage of each color used
Codec– a computer program that encodes or decodes
Computationally hard – a problem that takes too long even for a computer to find the exact solution
Computer – an electronic device that processes data according to a set of instructions or commands, known as a program
Consistency – in databases, refers to the fact that information from one table does not contradict itself in any other table throughout a database
Constant – used in coding to store a value that cannot be changed
Copyright – a form of intellectual property, which protects original forms of expression
Core – the central processing unit (CPU), the main memory, the motherboard, and the power supply
CSS – Cascading Style Sheets, redefines mark-up in HTML
D
Datagrams – Similar to packets, used in unreliable protocols such as UDP
DDoS – distributed denial-of-service attack, hackers flood a site with fake request making all the site’s recourses unavailable for legitimate users
Deadlock – when, in a database, two transactions are trying to lock the same row and neither can continue until the other is complete
Debugging – finding errors in code
Decimal – base 10, number system that used 0-9
Decryption – the reverse process of encryption
Design – Implement – Test – thethree steps of the iterative development process
Dictionary– a key in metadataexplaining the instructions to encode or decode compressed data
Digit – each number in the decimal system, 0-9
Digital Certificate – a trusted third-party file that verifies a site as legitimate
Digital Divide – the gap between those who have access to technology and those who do not
Digital signature – an electronic signature that, by using public key, can be verified authentic
Discarding Data – a type of lossy compression that removes unneeded data with no way to get that data back
DNS – Domain Name System, one of the smaller networks that make up the Internet. It contains many servers that act like phone books
Domain Name – a name given or linked to an IP address
E
Encryption – taking text and converting it so it is illegible
Ethical computing – demands that users and developers hold themselves to a higher standard. Refers to the principles, values, standards, and practices that guide individuals and groups in doing what is right
EULA – end-user license agreement
F
Fault-tolerance – the ability for a system to continue to run properly even if one piece fails
Fault-Tolerant – a property of IP. If there is an error, it still works properly
Fixed-length Code – blocks of code that are always the same size
FTP – File Transfer Protocol, used for transferring files between a client and a server
G
Graphical User Interface (GUI) – an interface that uses images to represent a system’s folders and files
H
Hacker – anyone who uses their technological skills to solve problems. A malicious security hacker exploits weaknesses on a computer or network and can steal or disrupt data
Hardware – the physical parts of the computer, including devices such as the monitor, keyboard, speakers, wires, chips, cables, plugs, disks, printers, and mice
Hashing – the process of running data through a one-way function that takes data of varying sizes and returns a unique fixed length value
Heuristic approach – an approach that gives results that are “good enough” when an exact answer is not necessary
Hexadecimal – base 16, number system that uses 0-9 and a-f
HTML – Hyper Text Markup Language, the standard for creating web pages
HTTP – Hyper Text Transfer Protocol, used for websites
HTTPS – a secure version of HTTP that uses SSL/TLS
Huffman Tree – a prefix free binary tree that is the most efficient way to compress individual characters
I
Idempotency – when an operation results in the same end result no matter how many times it is performed
IMAP – Internet Message Access Protocol, used for e-mail
Incremental – done in small chunks
Input and output (I/O) devices – how the user interacts with the computer
Interframe Compression – a video compression that re-uses redundant pixels from one frame to the next, also known as temporal compression
Internet – a network of smaller networks connected using a specific set of rules that computers use to communicate with each other
Internet Protocol Suite –Often referred to as TCP/IP, the four abstract layers in the DoD Model of the Internet
Intraframe Compression – a technique used by compressing each frame of a video, also known as spatial compression
IP –Internet protocol, a unique address for every device connected to the Internet
IP Address – a unique identifier for every device on the Internet
IPv4 – the version of IP that uses 32-bit addresses
IPv6 – the version of IP that uses 128-bit addresses
ISP – Internet Service Provider
Iterative – continuously repeating steps, achieved in programming by using loops
K
Key – in cryptography, a shared secret to make encryption harder to crack
Keys – a database column that holds a unique value that distinguishes each record from others
L
Latency – the amount of delay when sending digital data over the Internet or the round-trip time information takes to get from the client to the server and back
Linear Search – a searching algorithm that starts at the first index and checks each element of the list one by one until it finds the item it is searching for
Logic bomb – code that has been placed into software that waits to run until specific conditions are met
Lossless – data compression that does not lose data during compression
Lossy – data compression that loses data during compression
M
MAC (media access control) Address – a unique, physical address that is stored in the computer’s ROM
Main memory – memory that temporarily stores information while it is being sent to the CPU, also called RAM
Malware – malicious software intended to cause damage to a computer or network
Metadata –additional data about the main data, usually at the beginning of a file
Modem – a device that handles both the modulation and the demodulation of signals
Modular arithmetic – using the remainder when dividing, also known as clock arithmetic
Motherboard (logic board) – the standardized printed circuit board that connects the CPU, main memory, and peripherals
Multi-factor authentication (MFA) – using two or more methods for verifying a user
N
Name Server – a server that contains many IP addresses and their matching domain names
Network – a group of computers that are connected so they can share resources using a data link
Nonvolatile – does not need a power supply. Information is physically written to the device
NP problem – nondeterministic polynomial time, a problem that can be verified, but not solved, in polynomial time
Nybble (or Nibble) – half of a byte, 4 bits
O
One-way Function – a problem that is easy in one direction and difficult in the other
Operating System – software that serves as an intermediate between the hardware and the applications and is in charge of keeping the entire system running smoothly
OR – basic logic gate where any part of a statement can be true for the entire statement to be true
P
P problem – polynomial time, a problem that can both be solved and verified in polynomial time
Packets – small chunks of data used in TCP/IP
Patents – allow inventors to exclude others from using their inventions without permission, can last up to twenty years
Peripherals – the input and output (I/O) devices and the secondary memory
Phishing – using “bait” to trick the user into entering sensitive information like usernames, passwords, or credit card numbers
Pixel – short for picture element. The basic unit of color on a computer display
Pixelation – when individual pixels are too large and the image begins to look blocky
POP – Post Office Protocol, used for e-mail
POST – Power-on self-test
Power Supply – converts AC electricity to the lower voltage DC electricity that is needed to power the computer
Prefix-Free Code – a specific type of variable-length code that does not use pauses
Privacy – deals with your personal information, how it is stored, and how it is shared
Private Key – a shared secret needed to decrypt a message
Protocol – a specific set of rules
Psychoacoustics – a sub-branch of psychophysics that deals specifically with sound
Psychophysics – a branch of psychology that focuses on the fact that the human eye or ear cannot perceive the loss of certain data
Public Key – a system that allows a key to be publicly published
R
Random Access Memory (RAM) –memory that can be retrieved or written to anywhere without having to go through all the previous memory
Raster – an image format that represent data in a grid of dots or pixels
Recursion – a function that references itself and consists of two parts: a recursive call and a base call
Redundancy – finding frequencies or patterns in code
Relational database – a database that has multiple tables that are connected by the use of unique keys
Reliable – a protocol that lets the client know if the server received all sent packets
RGB – color model used for most monitors or screens. Stands for red, green, and blue, referring to the color of light
Rollback – returning back to the state of a database before the write-ahead log began
Root Name Server – one of thirteen servers that contain every IP address and its matching domain name
Router – a networking device that routes Internet traffic to the destination
Run-Length Encoding – looking for redundancy or patterns as runs in the code
S
Salting – adding a random set of characters to a password before it is hashed to protect against rainbow table attacks
Sample Rate – how often an analog signal is used when converting to digital, usually measured in kHz
Secondary Memory – used for long term storage and is physically changed when files are saved or deleted
Second-Level Domain – the second highest level in the DNS hierarchy, found directly to the left of the top-level domain in a domain name
Security – refers to the steps companies take to protect your data
Selection – the logic structure in programming that uses if statements to select certain values
Sequence – the structure that runs one line after anotherin order
Sequential Memory – memory used to store back-up data on a tape
Server – any computer that provides a service
SMTP – Simple Mail Transfer Protocol
Software – includes the operating system and the applications. It is usually stored on a computer’s hard drive and cannot physically be touched. At the lowest level, it is a series of ones and zeros
Spear phishing – a type of phishing attack that targets a specific person or group using pre-existing knowledge
SSL – Secure Sockets Layer, issues digital certificates for websites
Subdomain – precedes the domain name, owned by the domain https://subdomain.domain.com
Substitution Cipher – a cipher where a letter is mapped or swapped with another letter in the alphabet
Subtractive Color – a color model where no light is white and the combination of all light is black, like CMYK.
Symmetric Key Encryption – the same key is used to encrypt and decrypt a message
T
TCP – Transmission Control Protocol, a set of rules for breaking down requests into smaller, more manageable, numbered packets
Text-Based Interface – an interface made up of purely text input from the user
TLS – Transport Layer Security, issues digital certificates for websites
Top-Level Domain – the highest level in the DNS hierarchy, found to the right of the final period in a domain name
Trademarks – protect brand names and logos in order to distinguish one company’s product from other products on the market
Traveling Salesman Problem (TSP) – an NP-hard problem that, when given distances between pairs of cities, seeks to map out the shortest route between many cities and return back to the original city
Trojan Horse – malware disguised to hide its true intent
Truth Table – a table made up of rows and columns of Boolean variables and resulting Boolean expressions
Two-factor Authentication (2FA) – a subset of MFA where exactly two methods for verifying a user are implemented
Two-phase Commit Protocol – a standardized way for databases to make sure all transactions are able to write without any inconsistencies before committing
U
UDP – User Datagram Protocol, like TCP and usually used for streaming audio/video
Uncompressed– all the information from an original file in the same format
URL – Uniform Resource Locator, specifies where to find a file on a domain
V
Variable – used in coding to store a value that can change
Variable-length Code – each data block can be a different length
Vector – an image format that represents data through a combination of points connected by lines and curves
Virtual tables – temporary tables that are made up of parts of other tables that help in reducing redundant data
Virus – a program that infects other programs and usually spreads to other programs or computers by copying itself repeatedly
VoIP – Voice over Internet Protocol, used for telephony
Volatile – needs a power supply. Turning off the power deletes information
VPN – virtual private network
W
Web (World Wide Web) – the part of the Internet that uses HTTP and HTTPS
Worm –a standalone piece of malware that can disrupt a network by copying itself repeatedly without human interaction
Write-ahead Logging – a method for avoiding inconsistencies in which all transactions are written and saved to a log before they are applied to a database
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z