Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
77 Cards in this Set
- Front
- Back
computer network
|
computers connected together for the purpose of exchanging data
|
|
nodes
|
the individual computers on a network
|
|
broadband
|
any network that can exceed 256k
|
|
DSL
|
uses the same wires that transmit phone data into your house
|
|
WLAN
|
wifi
|
|
WWAN
|
LTE and cellular service
|
|
authentication
|
verifying that you really are the person who has access to the computer
|
|
hash function
|
encryption that chops a pasword up and then stirs it around
|
|
authorization
|
governs what an authenticated user is allowed to do
|
|
malware
|
malicious software
|
|
virus
|
computer program that infects a computer and then spreads
|
|
worm
|
sends copies of itself to other computers on a network without having to send its file
|
|
trojan horse
|
program that seems harmless and does a job, but then secretly attacks your computer
|
|
denial of service attack
|
automatically directs brosers on many machines to the same URL at the same time to shut down the site
|
|
cryptography
|
science of secret writing
|
|
encryption
|
process of using an algorithm to convert information into a representation that cannot be understood without the decryption algorithm
|
|
symmetric encryption algorithm
|
requires the use of a system key known to both the user and the sender
|
|
public encryption algorithm
|
the encryption key is made public, but the decryption is not
|
|
caesar cipher
|
involves shifting every symbol a set distance along the alphabet
|
|
block cipher
|
a block of data gets encoded into a block of ciphertext
|
|
DES
|
algorithm developed by IBM, and there were concerns that it would eventually break down (64 bits)
|
|
AES
|
new encryption standard (128, 192, or 256 bits long)
|
|
SSL
|
set of web protocols developed by Netscape
|
|
TLS
|
based on SSL, nonproprietary and adopted by Internet Engineering Task Force
|
|
what are the properties of a computing agent?
|
accept input
store information and receive it from memory take actions according to instructions produce output |
|
Turing Machine
|
conceptual tape that extends to infinity
divided into cells, each of which contains a 1, 0, or b |
|
generations of languages
|
first - machine
second - assembly third - high-level |
|
procedural language
|
consists of sequences of statements that manipulate data items
|
|
embedded computer
|
chips, processors, or computers that are embedded into another system like credit cards
|
|
Church Turing Thesis
|
if there exists an algorithm to do a symbol manipulation task, then a Turing machine must be able to do that task
|
|
computability
|
that which can be done by symbol manipulation algorithms
|
|
model
|
a representation of the system being studied which behaves much like the original
|
|
physical models
|
small scale replicas
|
|
computational models
|
something that captures the fundamental characteristics and behaviors of a system
|
|
computational steering
|
we initialize the system and then if our model is not perfect we build it again
|
|
continuous model
|
we write out a system as a continuous function of time t
|
|
stochastic components
|
there are parts of the system that display random behavior
|
|
discrete event simulation
|
time is not continuous, the only moments modeled are those when an event takes place
|
|
garbage in garbage out
|
the results you get out of a model are only as good as what you put in
|
|
scientific visualization
|
how to display a large set of data to maximize comprehension
|
|
e-commerce
|
when financial transactions are conducted by electronics over the web
|
|
ASP (Application Service Provider)
|
someone who designs and hosts your website for a fee
|
|
legacy code
|
something that has been around for years
|
|
middleware
|
software that allows separate and existing programs to communicate and work together seamlessly
|
|
field
|
a group of bytes
|
|
record
|
a collection of related fields
|
|
data file
|
related records
|
|
database
|
related data files
|
|
database management system
|
manages the files in a database
|
|
tuple
|
a row of a database
|
|
attribute
|
each category of information in a database
|
|
primary key
|
a combination of attributes that uniquely identifies a tuple
|
|
database projection
|
picking out certain attributes that form a set of tuples
|
|
database restriction
|
picking out certain tuples that meet certain conditions
|
|
database joining
|
matching tuples from different relational tables using common attributes
|
|
entity integrity
|
no primary key value, no component of a composite primary key value can be missing
|
|
data integrity
|
values for a particular attribute must come from the appropriate category of information in that attribute
|
|
referential integrity
|
any value of a foreign key attribute in a given table must match a value in the corresponding primary keys of the related table
|
|
portal
|
an entry point webpage that links to others web pages on the same topic
|
|
cookie
|
a small text file that the web servers send to the user's browser and gets stored on the user's hard drive
|
|
I/O systems
|
allows you to use the input and output devices connected to your computer
|
|
scheduler
|
keeps a list of programs ready to run on the processor and selects the one to go next
|
|
Assembly Language
|
low level programming language
better than machine language allows the use of symbolic addresses |
|
Higher Level Languages
|
Python, OAMPLE
|
|
HTTP request message
|
sent from the client to the server, specifying the name of the website
|
|
HTTP response message
|
returned from the server to the client along the same connection
|
|
frequency test
|
with uniformity you expect roughly the same number of digits
|
|
serial test
|
frequency test applied to 2 digits at a time
|
|
poker test
|
analyze sequences of 5 numbers at a time, based on hands in poker
|
|
gap test
|
analyze distances between zeros
|
|
deterministic model
|
no randomness is used in developing the model
|
|
static model
|
provide a snapshot at a single point in time
|
|
dynamic models
|
model changes in response to input signals
|
|
spoofing
|
you fake that you are a legitimate site to gain information
|
|
SQL
|
a way to search a database using relational algebra
|
|
deliberative strategy for robots
|
says robots must have an internal representation of its environment
|
|
reactive strategy for robots
|
uses heuristic algorithms to allow the robot to respond directly to stimuli from its environment
|