| A | B |
| encryption | The process of encoding data to prevent unauthorized access |
| decryption | The process of decoding data that has been encrypted |
| symmetric encryption | Encryption scheme that uses the same key for both encryption and decryption |
| public key encryption | A type of encryption that uses a pair of keys, only one of which is published |
| SSL/TLS | A standard for encrypted information transfer on the Internet |
| malware | Software that was designed to harm or take partial control over your compute |
| keylogging software | A kind of malware that records every key pressed by a user |
| computer virus | A type of malware that spreads and infects other computers |
| antivirus | Software designed to scan your files and Internet transmissions looking for malware |
| firewall | A security system that controls the kinds of connections that can be made between a computer or network and the outside world |
| DDoS attack | Use of a virus to flood a server with many requests from many computers at once so that users of that server are denied service |
| rogue access point | Wireless access point that gives access to a secure network without the authorization of the network administrator |
| digital divide | Unequal access to computers and the Internet based on poverty, racism, sexism, isolation in the countryside, age, and other factors |
| crowdsourcing | The general term for using the Internet to get a lot of people to help solve a problem |
| computing innovation | Software or concepts that include a program as an integral part of their function |
| bit | A single unit of data that can only have one of two values |
| byte | Eight bits |
| word | The number of wires that connect the processor to the memory |
| binary sequence | A string of ones and zeros, also called a bitstream |
| analog data | Data that have values that change smoothly which change in discrete intervals |
| sampling rate | The number of samples measured per second |
| floating point | The representation of numbers in scientific notation, but with powers of two instead of ten |
| lossless | Data compression algorithms that are reversible; so that you can reconstruct the original data with no loss in quality |
| lossy | Data compression algorithms that are not fully reversible; you can reconstruct only an approximation of the original data |
| computing system | A group of computing devices and programs working together for a common purpose |
| router | A computer that passes information from one network to another |
| computing device | A physical object that can run a program, such as computers, tablets, cell phones, and smart sensors |
| ISPs | The companies who sell Internet access to homes and institutions |
| fault tolerance | The ability of a system to work around problems |
| packet switching | How the Internet sends information in short bursts of information, not long continuous strings |
| TCP/IP | A pair of protocols that lets your computer pretend it has a direct, reliable connection to the other computer |
| certificate authorities | Organizations that issue digital certificates to verify who owns the encryption keys used for secured communications |
| phishing | A common security attack in which the victim is tricked into giving up personal information or downloading malware |
| citizen science | Scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices |
| sampling | Measuring values, called samples, of an analog signal at regular intervals |
| width | The number of bits that a CPU processes at a time |