Data
Network
Abbreviations
Privacy
Programming key terms
100

Data with values that change continuously, or smoothly, over time

Analog Data

100

The pieces of a system being put together or working together

Network

100

Manages the sending and receiving of all your data as packets

TCP Transmission Control Protocol

100

The right to see or do what you do alone or without anyone knowing

Privacy

100

How you type your code and how its read

Programing languages

200

Data that changes discreetly through a finite set of possible values

Digital Data

200

The hub where all digital information is pulled from

Internet

200

Translate human-readable
domains into IP
addresses that can be
used by the Internet

Personally identifiable information (PII)

200

A run through of a program

Simulation

200

The value passed to the parameter

Argument

300

A process for creating a digital representation of analog data by measuring the analog data at regular intervals

Sampling

300

The shared way that all devices and computers label their messages with the sender and receiver

IP Address

300

Translate human-readable domains into IP addresses that can be used by the Internet.

DNS: Domain Name System

300

Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

Malware

300

Organizing your data

Filtering

400

A smaller portion of a large file sent through the internet to decrease risk while being sent

Packet

400

Connect multiple devices to the internet through one location

Router

400

Provides internet to users through large systems.

ISP Internet Service Provider,

400
The use of a computer program to record every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.


Keylogging

400

That a function returns to the calling script or function when it completes its task

Return values

500
A set of data that describes and gives information about other data


Metadata

500

Physically connecting devices to one another so that information can move through the network.

Physical Network

500

Specifications for how functions in a library behave and can be used

API Application Program Interface

500

The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

Phishing

500

The time used to complete a task sequentially divided by the time to complete a task in parallel

Speedup