Digital Information
Cybersecurity
Big Data
The Internet
Protocols
100

What is metadata?

Data that describes other data. For example, a digital image may include metadata that describes the size of the image, number of colors, or resolution.

100

What is key logging?

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.

100

What is parallel processing?

a method in computing in which separate parts of an overall complex task are broken up and run simultaneously on multiple CPUs, thereby reducing the amount of time for processing.

100

What is the internet?

A group of computers and servers that are connected to each other.

100

What is bandwidth?

Transmission capacity measure by bit rate

200

What is a heuristic?

A problem solving approach (algorithm) to find a satisfactory solution where finding an optimal or exact solution is impractical or impossible.

200

What is Phishing?

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

200

What is big data?

extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions.


200

What is the digital divide?

 the gulf between those who have ready access to computers and the Internet, and those who do not.

200

What is protocol?

 A set of rules governing the exchange or transmission of data between devices.

300

What is Lossy vs. Lossless Compression?

Lossless compression is a data compression algorithm that allows the original data to be perfectly reconstructed from the compressed data. Lossy compression is a method that uses inexact approximations, discarding some data to represent the content. Most commonly seen in image formats like .jpg.

300

What is Malware?

software intended to damage a computing system or to take partial control over its operation

300

When does data need to be cleaned?

When data is incomplete, data is invalid, multiple tables are combined into one

300

What is internet censorship?

the control or suppression of what can be accessed, published, or viewed on the Internet enacted by regulators, or on their own initiative

300

What is binary?

A way of representing information using only two options

400

What are intellectual property rights?

Legal rights that give creators exclusive rights over their work for a set period of time

400

What is a Caesar Cipher?

a technique for encryption that shifts the alphabet by some number of characters

400

What is citizen science?

the collection and analysis of data relating to the natural world by members of the general public, typically as part of a collaborative project with professional scientists.

400

what is network redundancy?

having multiple backups to ensure reliability during cases of high usage or failure

400

What is a bit?

A contraction of "Binary Digit"; the single unit of information in a computer, typically represented as a 0 or 1

500

What is a Creative Commons license?

A work or invention that is the result of creativity, such as a piece of writing or a design, to which one has rights and for which one may apply for a patent, copyright, trademark, etc.

500

What is a DDos Attack?

Distributed Denial of Service Attack. Typically a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed.

500

What is crowdsourcing?

the practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.

500

What is fault tolerant?

Can continue to function even in the event of individual component failures. This is important because elements of complex systems like a computer network fail at unexpected times, often in groups.

500

What is latency?

Time it takes for a bit to travel from its sender to its receiver.