• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/77

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

77 Cards in this Set

  • Front
  • Back
computer network
computers connected together for the purpose of exchanging data
nodes
the individual computers on a network
broadband
any network that can exceed 256k
DSL
uses the same wires that transmit phone data into your house
WLAN
wifi
WWAN
LTE and cellular service
authentication
verifying that you really are the person who has access to the computer
hash function
encryption that chops a pasword up and then stirs it around
authorization
governs what an authenticated user is allowed to do
malware
malicious software
virus
computer program that infects a computer and then spreads
worm
sends copies of itself to other computers on a network without having to send its file
trojan horse
program that seems harmless and does a job, but then secretly attacks your computer
denial of service attack
automatically directs brosers on many machines to the same URL at the same time to shut down the site
cryptography
science of secret writing
encryption
process of using an algorithm to convert information into a representation that cannot be understood without the decryption algorithm
symmetric encryption algorithm
requires the use of a system key known to both the user and the sender
public encryption algorithm
the encryption key is made public, but the decryption is not
caesar cipher
involves shifting every symbol a set distance along the alphabet
block cipher
a block of data gets encoded into a block of ciphertext
DES
algorithm developed by IBM, and there were concerns that it would eventually break down (64 bits)
AES
new encryption standard (128, 192, or 256 bits long)
SSL
set of web protocols developed by Netscape
TLS
based on SSL, nonproprietary and adopted by Internet Engineering Task Force
what are the properties of a computing agent?
accept input
store information and receive it from memory
take actions according to instructions
produce output
Turing Machine
conceptual tape that extends to infinity
divided into cells, each of which contains a 1, 0, or b
generations of languages
first - machine
second - assembly
third - high-level
procedural language
consists of sequences of statements that manipulate data items
embedded computer
chips, processors, or computers that are embedded into another system like credit cards
Church Turing Thesis
if there exists an algorithm to do a symbol manipulation task, then a Turing machine must be able to do that task
computability
that which can be done by symbol manipulation algorithms
model
a representation of the system being studied which behaves much like the original
physical models
small scale replicas
computational models
something that captures the fundamental characteristics and behaviors of a system
computational steering
we initialize the system and then if our model is not perfect we build it again
continuous model
we write out a system as a continuous function of time t
stochastic components
there are parts of the system that display random behavior
discrete event simulation
time is not continuous, the only moments modeled are those when an event takes place
garbage in garbage out
the results you get out of a model are only as good as what you put in
scientific visualization
how to display a large set of data to maximize comprehension
e-commerce
when financial transactions are conducted by electronics over the web
ASP (Application Service Provider)
someone who designs and hosts your website for a fee
legacy code
something that has been around for years
middleware
software that allows separate and existing programs to communicate and work together seamlessly
field
a group of bytes
record
a collection of related fields
data file
related records
database
related data files
database management system
manages the files in a database
tuple
a row of a database
attribute
each category of information in a database
primary key
a combination of attributes that uniquely identifies a tuple
database projection
picking out certain attributes that form a set of tuples
database restriction
picking out certain tuples that meet certain conditions
database joining
matching tuples from different relational tables using common attributes
entity integrity
no primary key value, no component of a composite primary key value can be missing
data integrity
values for a particular attribute must come from the appropriate category of information in that attribute
referential integrity
any value of a foreign key attribute in a given table must match a value in the corresponding primary keys of the related table
portal
an entry point webpage that links to others web pages on the same topic
cookie
a small text file that the web servers send to the user's browser and gets stored on the user's hard drive
I/O systems
allows you to use the input and output devices connected to your computer
scheduler
keeps a list of programs ready to run on the processor and selects the one to go next
Assembly Language
low level programming language
better than machine language
allows the use of symbolic addresses
Higher Level Languages
Python, OAMPLE
HTTP request message
sent from the client to the server, specifying the name of the website
HTTP response message
returned from the server to the client along the same connection
frequency test
with uniformity you expect roughly the same number of digits
serial test
frequency test applied to 2 digits at a time
poker test
analyze sequences of 5 numbers at a time, based on hands in poker
gap test
analyze distances between zeros
deterministic model
no randomness is used in developing the model
static model
provide a snapshot at a single point in time
dynamic models
model changes in response to input signals
spoofing
you fake that you are a legitimate site to gain information
SQL
a way to search a database using relational algebra
deliberative strategy for robots
says robots must have an internal representation of its environment
reactive strategy for robots
uses heuristic algorithms to allow the robot to respond directly to stimuli from its environment