Please enable JavaScript to use CodeHS

Indiana Computer Science: 7th Grade Glossary

Flashcards

Course:

Module:

Search:

Bug General

A bug is a problem in your code.

Bug

Debugging General

Debugging is fixing a problem in your code.

Debugging

CIA Triad General

The CIA Triad is a widely-accepted security measure that should be guaranteed in every secure system. It stands for Confidentiality, Integrity, and Availability.

Confidentiality General

The protection of information from people who are not authorized to view it.

Integrity General

Aims at ensuring that information is protected from unauthorized or unintentional alteration.

Availability General

The assurance that systems and data are accessible by authorized users when and where needed.

Internet General

A philosophy of making information and knowledge open and accessible to all people. A network of networks built on open, agreed upon protocols.

Protocol General

A widely agreed upon set of rules that standardize communication between machines.

Network General

A group of two or more computer systems linked together.

Server Device General

Examples of servers include web servers, mail servers, and file servers. Each of these servers provide resources to client devices. Most servers have a one-to-many relationship with clients, meaning a single server can provide multiple resources to multiple clients at one time.

modem General

A network device that allows a device to connect to the Internet.

router General

An access point that allows for network management and security configuration.

Connecting Point General

In cyber security, a connecting point refers to any physical or logical location where a device or system connects to a network, enabling data exchange. These connecting points, also known as endpoints, are crucial entry points for cyberattacks, as threat actors can exploit vulnerabilities at these locations to gain unauthorized access to networks and data.

Phishing General

The usage of deceptive emails and websites to maliciously gather personal information

Ransomware General

Ransomware is a type cyber attack that threatens to publish the victim's data or block access to it unless a ransom is paid.

Internet of Things General

The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.

Cybersecurity General

Protection of computer systems, networks, and data from digital attacks.

Cryptography General

Scrambling digital information into an unreadable form. Only those with verified authority (password, key, etc) can unscramble it to read it.

Caesar Cipher General

An encryption method in which each letter of the message is shifted by a certain amount, called the key

Decryption General

The conversion of encrypted data into its original form.

Encryption General

the process of converting information or data, usually to prevent unauthorized access

HTML HTML

Hypertext Markup Language

HTML

HTML Tag HTML

Tags are the building blocks of an HTML document

Tag

<ul> Tag HTML

Defines an unordered list in HTML.

<li> Tag HTML

defines a list item inside an HMTL list.

<ol> Tag HTML

The <ol> tag defines an ordered list. An ordered list can be numerical or alphabetical.

CSS CSS

Cascading Style Sheets. The language for designing web pages and adding style.

Web page General

A document that can be viewed by a web browser, usually written in HTML