Please enable JavaScript to use CodeHS

Computing Glossary

Flashcards

Course:

Module:

Lesson:

Search:

Cybercrime General

Identity theft, stealing money, stealing private information, controlling private computers.

Ransomware General

Ransomware is a type cyber attack that threatens to publish the victim's data or block access to it unless a ransom is paid.

Internet of Things General

The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.

Cybersecurity General

Protection of computer systems, networks, and data from digital attacks.

Phishing General

The usage of deceptive emails and websites to maliciously gather personal information

CIA Triad General

The CIA Triad is a widely-accepted security measure that should be guaranteed in every secure system. It stands for Confidentiality, Integrity, and Availability.

Confidentiality General

The protection of information from people who are not authorized to view it.

Integrity General

Aims at ensuring that information is protected from unauthorized or unintentional alteration.

Availability General

The assurance that systems and data are accessible by authorized users when and where needed.

Network General

A group of two or more computer systems linked together.

Bitrate General

The amount of data (in bits) that can be sent in a fixed amount of time.

Bandwidth General

The capacity of data transfer in a system. Measured by bitrate.

Latency General

The latency of a system is the time it takes for a bit to travel from sender to receiver. Fiber optic cables have low latency.

IPv6 General

A new 128 bit version of the Internet Protocol.

IP (Internet Protocol) General

The protocol that defines the payout of an an Internet address.

DDoS Attack General

Distributed Denial of Service attack. Spam a web server with so many requests so close together that it crashes. Sometimes spitting out valuable information as it crashes.

vulnerability General

a weakness which can be exploited by a malicious actor / attacker to perform unauthorized actions within a computer system.

exploit General

a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, etc.

Domain Name System (DNS) General

Used to translate domain names into IP addresses.

Routing General

The process of sending data between two computers on the internet. The data is sent through routers that determine the route.

Redundancy General

When multiple paths exist between two points. This improves reliability and makes the internet fault tolerable. Makes the routing system scalable.

HTML Documentation HTML

Documentation and syntax for HTML

html docs html documentation

Packets General

Packets are the units of data that are sent over the network.

Metadata General

a set of data that describes and gives information about other data.

Internet Protocol (IP) General

Standardizes the layout of all packets. All packets must have a destination IP address, a from IP address, and the actual data being sent. Defines the layout of a SINGLE packet.

Transmission Control Protocol (TCP) General

Allows for sending MULTIPLE packets between two computers. TCP checks that all packets arrived and can be put back in the proper order. The metadata must include a destination IP address, a from IP address, the message size and the packet order number.

HTTP (HyperText Transfer Protocol) General

Protocol that standardizes the language for talking to web servers to send and receive web resources. Defines how computers send and receive hypertext information. (HTTPS: The “S” denotes a secure connection using HTTP.)