A | B |
encryption | The process of encoding data to prevent unauthorized access |
decryption | The process of decoding data that has been encrypted |
symmetric encryption | Encryption scheme that uses the same key for both encryption and decryption |
public key encryption | A type of encryption that uses a pair of keys, only one of which is published |
SSL/TLS | A standard for encrypted information transfer on the Internet |
malware | Software that was designed to harm or take partial control over your compute |
keylogging software | A kind of malware that records every key pressed by a user |
computer virus | A type of malware that spreads and infects other computers |
antivirus | Software designed to scan your files and Internet transmissions looking for malware |
firewall | A security system that controls the kinds of connections that can be made between a computer or network and the outside world |
DDoS attack | Use of a virus to flood a server with many requests from many computers at once so that users of that server are denied service |
rogue access point | Wireless access point that gives access to a secure network without the authorization of the network administrator |
digital divide | Unequal access to computers and the Internet based on poverty, racism, sexism, isolation in the countryside, age, and other factors |
crowdsourcing | The general term for using the Internet to get a lot of people to help solve a problem |
computing innovation | Software or concepts that include a program as an integral part of their function |
bit | A single unit of data that can only have one of two values |
byte | Eight bits |
word | The number of wires that connect the processor to the memory |
binary sequence | A string of ones and zeros, also called a bitstream |
analog data | Data that have values that change smoothly which change in discrete intervals |
sampling rate | The number of samples measured per second |
floating point | The representation of numbers in scientific notation, but with powers of two instead of ten |
lossless | Data compression algorithms that are reversible; so that you can reconstruct the original data with no loss in quality |
lossy | Data compression algorithms that are not fully reversible; you can reconstruct only an approximation of the original data |
computing system | A group of computing devices and programs working together for a common purpose |
router | A computer that passes information from one network to another |
computing device | A physical object that can run a program, such as computers, tablets, cell phones, and smart sensors |
ISPs | The companies who sell Internet access to homes and institutions |
fault tolerance | The ability of a system to work around problems |
packet switching | How the Internet sends information in short bursts of information, not long continuous strings |
TCP/IP | A pair of protocols that lets your computer pretend it has a direct, reliable connection to the other computer |
certificate authorities | Organizations that issue digital certificates to verify who owns the encryption keys used for secured communications |
phishing | A common security attack in which the victim is tricked into giving up personal information or downloading malware |
citizen science | Scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices |
sampling | Measuring values, called samples, of an analog signal at regular intervals |
width | The number of bits that a CPU processes at a time |