A way of representing information using only two options.
An agreed-upon set of rules that specify the behavior of some system.
What is a protocol?
Finding and fixing problems in an algorithm or program.
What is debugging?
A finite set of instructions that accomplish a task
What is an algorithm
This is software intended to damage a computing system or to take partial control over its operation
What is malware?
A process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples.
What is Sampling?
The maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second.
What is bandwidth?
A named reference to a value that can be used repeatedly throughout a program.
What is a variable?
A search algorithm that starts at the middle of a sorted set of numbers and removes half of the data; this process repeats until the desired value is found or all elements have been eliminated.
What is a binary search?
This is information about an individual that identifies, links, relates, or describes them.
What is personally identifiable information?
Data with values that change continuously, or smoothly, over time.
What are Analog Data?
A chunk of data sent over a network.
What is a packet?
A data type that is either true or false.
What is a boolean value?
A search algorithm that checks each element of a list, in order, until the desired value is found or all elements in the list have been checked.
What is a linear search?
This involves one key for both encryption and decryption.
What is symmetric key encryption?
This is the American Standard Code for Information Interchange and is a character encoding standard for electronic communication.
What is ASCII?
A computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols.
What is the internet?
A process that allows a procedure to be used only knowing what it does, not how it does it.
What is procedural abstraction?
This provides a "good enough" solution to a problem when an actual solution is impractical or impossible
What is a Heuristic?
A wireless access point that gives unauthorized access to secure networks.
What is a rogue access point?
This error occurs when attempting to represent a number that is too small.
What is a Round-off Error?
A group of interconnected computing devices capable of sending or receiving data
What is a computer network?
This manages complexity in programs by giving a collection of data a name without referencing the specific details of the representation.
What is data abstraction?
The time used to complete a task sequentially divided by the time to complete a task in parallel
What is speedup time?
Pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message
What is public key encryption?