What is metadata?
Data that describes other data. For example, a digital image may include metadata that describes the size of the image, number of colors, or resolution.
What is key logging?
the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
What is parallel processing?
a method in computing in which separate parts of an overall complex task are broken up and run simultaneously on multiple CPUs, thereby reducing the amount of time for processing.
What is the internet?
A group of computers and servers that are connected to each other.
What is bandwidth?
Transmission capacity measure by bit rate
What is a heuristic?
A problem solving approach (algorithm) to find a satisfactory solution where finding an optimal or exact solution is impractical or impossible.
What is Phishing?
a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
What is big data?
extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions.
What is the digital divide?
the gulf between those who have ready access to computers and the Internet, and those who do not.
What is protocol?
A set of rules governing the exchange or transmission of data between devices.
What is Lossy vs. Lossless Compression?
Lossless compression is a data compression algorithm that allows the original data to be perfectly reconstructed from the compressed data. Lossy compression is a method that uses inexact approximations, discarding some data to represent the content. Most commonly seen in image formats like .jpg.
What is Malware?
software intended to damage a computing system or to take partial control over its operation
When does data need to be cleaned?
When data is incomplete, data is invalid, multiple tables are combined into one
What is internet censorship?
the control or suppression of what can be accessed, published, or viewed on the Internet enacted by regulators, or on their own initiative
What is binary?
A way of representing information using only two options
What are intellectual property rights?
Legal rights that give creators exclusive rights over their work for a set period of time
What is a Caesar Cipher?
a technique for encryption that shifts the alphabet by some number of characters
What is citizen science?
the collection and analysis of data relating to the natural world by members of the general public, typically as part of a collaborative project with professional scientists.
what is network redundancy?
having multiple backups to ensure reliability during cases of high usage or failure
What is a bit?
A contraction of "Binary Digit"; the single unit of information in a computer, typically represented as a 0 or 1
What is a Creative Commons license?
A work or invention that is the result of creativity, such as a piece of writing or a design, to which one has rights and for which one may apply for a patent, copyright, trademark, etc.
What is a DDos Attack?
Distributed Denial of Service Attack. Typically a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed.
What is crowdsourcing?
the practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
What is fault tolerant?
Can continue to function even in the event of individual component failures. This is important because elements of complex systems like a computer network fail at unexpected times, often in groups.
What is latency?
Time it takes for a bit to travel from its sender to its receiver.