Computer Science Unit 11 Terminology and Definitions

Flashcard Icon

Flashcard

Learn Mode Icon

Learn Mode

Match Icon

Match

Coming Soon!
Library Icon

Library

View Library
Match Icon

Create

Create More Decks
Flashcard Icon Flashcards
Flashcard Icon Flashcards
Library Icon Library
Match Icon Match (Coming Soon)

Computer Science - Computer Security and Reliability

View Results
Full Screen Icon

user_kambeorv Created by 9 mon ago

Cards in this deck(40)
What is the term for the measure of transmission capacity by bit rate?
Blur Image
What is the term for the number of bits conveyed or processed per unit of time, such as 8 bits/sec?
Blur Image
What is the term for the time it takes for a bit to travel from its sender to its receiver?
Blur Image
What is the term for a set of rules governing the exchange or transmission of data between devices?
Blur Image
What organization develops and promotes voluntary Internet standards and protocols, particularly the Internet protocol suite (TCP/IP)?
Blur Image
What is the term for a group of computers and servers that are connected to each other?
Blur Image
What principle states that all Internet traffic should be treated equally by Internet Service Providers?
Blur Image
What is the term for a number assigned to any item that is connected to the Internet?
Blur Image
What are small chunks of information that have been carefully formed from larger chunks of information?
Blur Image
What protocol provides reliable, ordered, and error-checked delivery of a stream of packets on the internet?
Blur Image
What is the Internet's system for converting URLs to IP addresses?
Blur Image
What protocol is used for transmitting web pages over the Internet?
Blur Image
What is HTTP with SSL (security) known as?
Blur Image
What is the Secure Socket Layer that secures access to a website by adding Certificate Authentication and Encryption?
Blur Image
What is an easy-to-remember address for calling a web page, like www.code.org?
Blur Image
What is a technique for encryption that shifts the alphabet by some number of characters?
Blur Image
What is the generic term for a technique (or algorithm) that performs encryption?
Blur Image
What is the process called when you attempt to decode a secret message without knowing all the specifics of the cipher?
Blur Image
What is the process that reverses encryption, taking a secret message and reproducing the original plain text?
Blur Image
What is the process of encoding messages to keep them secret, so only 'authorized' parties can read it?
Blur Image
What is an encryption technique that maps each letter of the alphabet to a randomly chosen other letter of the alphabet?
Blur Image
What is the encryption technique where the same key is used to encode and decode?
Blur Image
What is the encryption scheme where the key to encrypt data is different from the key to decrypt?
Blur Image
In an asymmetric encryption scheme, what is the key called that is kept private and never shared?
Blur Image
What encryption method allows for secure messages to be sent without having to agree on or share a secret key?
Blur Image
What software keeps big lists of known viruses and scans your computer to get rid of them?
Blur Image
What is a Distributed Denial of Service Attack that floods a target with traffic to overwhelm the server?
Blur Image
What software runs on servers to only allow traffic through according to some set of security rules?
Blur Image
What is the method of computer access control where a user is granted access after presenting multiple pieces of evidence?
Blur Image
What is a scam where a thief tries to trick you into sending them sensitive information?
Blur Image
What is the practice of using a program to record every keystroke made by a computer user?
Blur Image
What is information about an individual that identifies, links, relates, or describes them?
Blur Image
What is a program that runs on a computer to do something the owner does not intend?
Blur Image
What is the worldwide gap giving advantage to those with access to technology?
Blur Image
What is the practice of obtaining information or input into a task by enlisting a large number of people via the Internet?
Blur Image
What is the US law intended to update copyright law for electronic commerce and content providers?
Blur Image
What are commercial transactions conducted electronically on the Internet known as?
Blur Image
What type of computer software has source code that is freely available to users?
Blur Image
What is the collection and analysis of data relating to the natural world by the general public called?
Blur Image
What is an alternate protocol to TCP that speeds up transmissions across the internet, used for time-sensitive applications?
Blur Image

Ask Our AI Tutor

Get Instant Help with Your Questions

Need help understanding a concept or solving a problem? Type your question below, and our AI tutor will provide a personalized answer in real-time!

How it works

  • Ask any academic question, and our AI tutor will respond instantly with explanations, solutions, or examples.
Flashcard Icon
  • Browse questions and discover topic-based flashcards
  • Practice with engaging flashcards designed for each subject
  • Strengthen memory with concise, effective learning tools