What is the term used for Data with values that change continuously, or smoothly, over time. Some examples of analog data include music, colors of a painting, or position of a sprinter during a race.
Analog Data
What is a computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols.
Internet
What is when a program statements run in order, from top to bottom
Sequential Programming
What is a named reference to a value that can be used repeatedly throughout a program
Variable
What involves one key for both encryption and decryption.
Symmetric Key Encryption
What is the process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples.
Sampling
What is the inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network.
Redundancy
What is data that is sent to a computer for processing by a program. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text
Input
What is a data type that is either true or false
Boolean
What is a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
Phishing
What is the term for an error caused from attempting to represent a number that is too precise. The value is rounded.
Round-off Error
What is differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics
Digital Divide
What is the inputs and outputs that allow a user to interact with a piece of software. User interfaces can include a variety of forms such as buttons, menus, images, text, and graphics.
User Interface
What is a named group of programming instructions. Also referred to as a “procedure”.
Function
What is software intended to damage a computing system or to take partial control over its operation
Malware
What is the process for reducing the number of bits needed to represent something in which some information is lost or thrown away. This process is not reversible
Lossy Compression
What is the protocol for sending data across the Internet that assigns unique numbers (IP addresses) to each connected device
Internet Protocol (IP)
What is associated with an action and supplies input data to a program. Can be generated when a key is pressed, a mouse is clicked, a program is started, or by any other defined action that affects the flow of execution
Event
What is a command that executes the code within a function
Function Call
What is a wireless access point that gives unauthorized access to secure networks.
Rogue Access Point
What is a collection of public copyright licenses that enable the free distribution of an otherwise copyrighted work, used when an author wants to give people the right to share, use, and build upon a work that they have created
Creative Commons
What is the system responsible for translating domain names like example.com into IP addresses
Domain Name System (DNS)
What is a collection of program statements. Programs run (or “execute”) one command at a time
Program
What is an ordered sequence of characters.
String
What is a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
Multi-factor Authentication