The protocol that determines how to address devices on the network.
IP (Internet Protocol)
An algorithm that searches a sorted list for a value in O(logn) time by repeatedly splitting the list in half.
What is a Binary Search?
Compressing data in a way that discards some data and makes it impossible to recover the original.
What is Lossy Compression?
An attack where a user is tricked into revealing private information, often via a deceptive email.
What is phishing?
The participation of volunteers from the public in a scientific research project.
What is citizen science?
The maximum amount of data that can be sent in a fixed period of time over a network connection, typically measured in bits per second.
What is Bandwidth?
A technique in which you find a good enough solution to a hard problem (usually one that would take an unreasonable amount of time to solve).
What is a heuristic?
Data about data, like descriptive information about a file or a row in a database.
What is metadata?
A wireless access point that provides an attacker with unauthorized access to the traffic going over the network.
What is a Rogue Access Point?
The idea that some communities or populations have less access to computing than others, typically due to limitations of Internet speed or computer hardware access.
What is the Digital Divide?
A data transport protocol that includes mechanisms for reliably transmitting packets to a destination.
What is TCP?
A computational model which splits a program into multiple tasks, some of which can be executed simultaneously.
What is parallel computing?
Values that change smoothly/continuously, rather than in discrete intervals, over time.
What is analogy data?
A technique for encrypting data where the same key is used to both encrypt and decrypt data.
What is symmetric encryption?
An license that allows people to declare how they want their creations to be shared, remixed, or used in noncommercial contexts.
What is Creative Commons?
A protocol used to request and receive files, such as an HTML file, for web page.
What is HTTP?
A computational model which uses multiple devices to run different parts of a program.
What is a Distributed Computing?
Error that results when the number of bits is not enough to represent the number exactly (like using 3 digits to represent π as 3.14).
What is a roundoff error (or precision error)?
A written description of the function of a code segment, procedure, or program, and how it was developed.
What is documentation?
Information about an individual that can be used to uniquely identify them (directly or indirectly).
What is PII?
A protocol for sending data over a network that does not check if all packets arrived successfully.
What is UDP
A problem that can be solved by an algorithm for some instances, but not all of them.
What is an undecidable probelm?
Error that results when the number of bits is not enough to represent the number.
What is an overflow error?
A type of cyberattack where an attacker overwhelms a website, server, or network with malicious traffic, rendering it inaccessible to legitimate users.
What is DDoS (Distributed Denial of Service)
A process of extracting information and discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.
What is Data Mining?