Used to log in to a computer, comprised of a username, password, personalized settings and set permissions.
Has full access and full control to manage other users, set permissions and change computer settings and programs.
Authorization given to user accounts that grants them certain privileges and enables them to access specific folders and files.
The main, controlling account responsible for providing security updates, antivirus software and setting permissions for anyone on the same network.
An agreed upon set of rules and permissions.
Specifying access rights and permissions for each user.
Proving the identity of the user.
Updates that address and fix security vulnerabilities within a program or product.
A type of computer program that can spread by modifying other computer programs and inserting its own code (rules).
A copy or snapshot of the state of your computer.
Backs up everything on your computer.
Backs up only what has changed since the last backup.
Legal document outlining how a company can collect and use your data
any data that can be used to identify an individual, such as their name, address, or social security number
Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.
A computer system able to perform tasks that ordinarily require human intelligence
a video or image of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.
Displays the HTML, CSS, and JavaScript code of a website.
Browser tools that help programmers diagnose problems, build and maintain secure websites.
Used for inspecting and making live-edits of the HTML and CSS.
Used for entering live JavaScript for testing and debugging.
Used for inspecting all resources that are loaded like databases, storage, cookies, images, etc.
Temporary storage that is emptied when the browser is closed.
Persistent storage; should be encrypted.
Stores website data such as HTML and CSS to reduce load time.
Stores website preferences and personal data.
Used for debugging issues and checking the website’s digital certificate.
A method in cryptography by which keys (public or private) are exchanged between two parties.
Working backwards through an encryption to unveil the input, or the key.
Occurs when someone secretly intercepts communications between two parties by impersonating one or both parties.
Any type of software that is designed to intentionally harm or damage a computer or network.
A type of malware that attaches itself onto a host program, such as a document. It can cause serious damage to files or an entire device.
A software that prevents users from accessing their files or network until a ransom is paid.
Once downloaded onto a user’s computer, the software secretly gathers information about a person or organization and sends it to the attacker.
A cybercrime in which a person is contacted by email, telephone or text message by someone who is posing as a legitimate company.
A network security device that monitors and filters incoming and outgoing network traffic.
When the same key is used to both encrypt and decrypt.
When one key encrypts and a different key decrypts.
A cipher that changes one character or symbol into another.
A cipher that groups bits into blocks of plaintext before applying the encryption.
A cipher that shifts the positions of plaintext character (or groups of characters) according to a regular system.
A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
The moral principle that governs a person's behavior.
refers to an external mechanism of control
A specific group of hackers who are motivated by their ideological views.
Have political motivations with the intent to harm, typically resulting in violence.
Sponsored by and funded by a government with the goal of giving their country a competitive advantage on a global scale.
The information about a particular person that exists on the Internet as a result of their online activity
the use of electronic communication to bully a person
The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
The protection of information from people who are not authorized to view it.
Aims at ensuring that information is protected from unauthorized or unintentional alteration.
The assurance that systems and data are accessible by authorized users when and where needed.
Ensures that one cannot deny having sent or received a message.
A flaw or weakness in a system or device.
The potential for loss when an attack happens.
A potential for a cybercriminal to exploit a vulnerability.
The process of identifying a user and granting them access. Authentication is proving that someone is who they say they are.
The process of enforcing policies and user privileges. Once a user is authenticated, they may only be authorized to access specific areas or may only have rights to perform specific tasks.
The process of measuring what is happening within the system. This is the final process of the AAA framework and ensures that there is a log of all actions within the network or system.
false or inaccurate information, especially that which is deliberately intended to deceive.
websites and apps that allow users to create, share, and view content and communicate with others
A type of authentication that is similar to a password but longer and is usually a sentence or a series of words
(2FA) A type of multifactor authentication that typically combines something the user knows (like a password) with something the user has (like a mobile phone)
(MFA) An extra layer of authentication that requires two or more factors for authentication. Typically, these factors fall into three categories: something you know (password), something you have (such as a phone), or something you are (such as your fingerprint).
A form of authentication that uses an individual’s physical or behavioral characteristics to verify their identity
Tools that store and manage passwords for various accounts, generating strong passwords and auto-filling login credentials.
A new 128 bit version of the Internet Protocol.
The protocol that defines the payout of an an Internet address.
An agreed upon set of rules that outlines how to communicate or send information.
The original 32 bit IP protocol that was created in the 1980s.
Stands for Uniform Resource Locator. You are locating a resource that exists somewhere on the internet.
Used to translate domain names into IP addresses.
Protocol that standardizes the language for talking to web servers to send and receive web resources. Defines how computers send and receive hypertext information. (HTTPS: The “S” denotes a secure connection using HTTP.)
The unique address that is assigned to each device connected to the internet. It is part of the Internet Protocol.
A computer that stores web pages and makes them available to users on the internet.
The process of sending data between two computers on the internet. The data is sent through routers that determine the route.
Allows for sending MULTIPLE packets between two computers. TCP checks that all packets arrived and can be put back in the proper order. The metadata must include a destination IP address, a from IP address, the message size and the packet order number.
An access point that allows for network management and security configuration.
a system that will operate with no interruption when one or more of its components fail
When data is passed from one network segment to another.
The number of hops it takes for data to get to its final destination.
Advanced Research Projects Agency Network, precursor to the modern internet
UDP is often used in real-time applications where timely delivery of data is more important than the accuracy of delivery. UDP does not number the packets and it does not retransmit packets that are lost.
A philosophy of making information and knowledge open and accessible to all people. A network of networks built on open, agreed upon protocols.
A network where devices are connected via physical cables.
A network where devices connect without physical cables, typically using radio waves.
The process of varying a signal to transmit data.
Undersea cables used for transmitting telecommunications signals across oceans.
A computer scientist known as one of the "fathers of the internet."
A location where information is sent from one computer to another.
Checks to see which ports on a network are open.
A device or software that blocks unwanted Internet traffic while allowing legitimate traffic.
A device that will be recognized by your computer and install on its own.
A group of files that allows a device to communicate with the computer’s operating system.
A short-range wireless communication technology that uses radio waves to transmit information.
Enables short-range communication between compatible devices.
Storage that is available only while the system is on and disappears when the system is turned off.
Storage that is saved and available even when the system is shut down.
Storage that contains one or more drives that can be accessed over a network.
Network attached storage that is equipped with powerful network adapters.
Processes commands to a computer program in the form of lines of text.
Legally binding guidelines for use and distribution of software.
Software that is available for anyone to access and modify.
Software that is owned by an individual or company.
Refers to the design of the essential parts of an application and how they are connected to each other.
Software installation that is performed on your local computer.
Software installation that is performed on a local area network (LAN).
Software that is installed, hosted and accessed entirely from a remote server or location.
A wireless LAN that uses radio frequency technology to send and receive data.
A virtual LAN that allows for the setup of separate networks by configuring a network device.
A set of protocols that specify how your Wi-Fi network and other data transmissions work.
Processes commands to a computer program in the form of lines of text.
A list of specific routing destinations; essentially a map for the router.
An electronic device which is required for communication between devices.
An internal component of a computer that is used for communicating over a network.
A network device that allows a device to connect to the Internet.
Enables wired connections between more than one computer or device.
A network device that allows other Wi-Fi devices to connect to a wired network.
A circuit board with ports and sockets used to connect the main devices of a computer.
A special kind of firmware that runs programs strictly to start up your computer.
The core component of a device that accepts and executes instructions.
A fast type of computer memory which temporarily stores all the information your device needs right away.
A fast access storage device used in computers.
A component designed to speed up the creation of images and output them to a display device, like a monitor.
A component with a built in wired network port that allows the computer to connect to a network.
sequential programming refers to programs that are executed sequentially – once through, from start to finish, without other processing executing.
Completes multiple tasks at a time, simultaneously.
An algorithm is a set of steps or rules to follow to solve a particular problem.
Managing complexity by "abstracting away" information and detail, in order to focus on the relevant concepts.
A method that uses decomposition, pattern recognition, abstraction, and algorithms in order to reliably solve complex problems.
A float, or floating point value, is a numeric value that can have decimal level precision (ex: 3.14)
The way humans communicate with each other, like English, Spanish, or Mandarin.
A set of instructions (commands) and rules used to communicate with computers. Examples include Python, JavaScript, and HTML.
A way to classify the kind of information you can use in programming, like numbers, words, or true/false values.
Translates and executes program code line by line into machine code.
Translates, or “compiles” the entire code into machine code and then runs the program, or sets aside to run later.
A programming language is any set of rules that converts strings, or graphical program elements in the case of visual programming languages, to various kinds of machine code output.
a computer programming language consisting of binary instructions
A language where variable types are determined at runtime, not in advance.
The process of verifying and enforcing the constraints of types in a programming language.
The period when a program is running, after it has been compiled or interpreted.
A language where variable types are explicitly declared and checked at compile time.
A language where variable types are explicitly declared and checked at compile time.
Identifying and fixing errors in code.
A professional who finds and fixes bugs in a product or program before its launch, collaborating with developers on fixes to those problems when necessary.
A report that stores all information needed to document, report and fix problems occurred in software or on a website
Conditions that a software product must satisfy to be accepted by a user, customer or other stakeholder
a layout of an application (e.g. web page) that demonstrates what interface elements will exist on key pages.
The art of arranging letters and text in a way that makes the copy legible, clear, and visually appealing to the reader.
A combination of colors used by designers when designing an interface
The visible elements of a brand, such as color, design, and logo, that identify and distinguish the brand to consumers
Someone who designs the graphical user interface of an app, website, or device that a human interacts with
A professional responsible for planning, organizing, and overseeing the successful completion of a project within a specific timeframe and budget.
A computer science professionals who use knowledge of engineering principles and programming languages to build software products
The process of learning about the world using data and computation.
A question that could have a variety of different answers.
A file containing Python definitions and statements.
A collection of related modules.
A collection of modules and packages.
Written instructions detailing the functions, methods, and variables available and how to use them.
A data structure that stores and aligns data in a table using rows and columns.
Lists the data types used in each column in the DataFrame
Prints the number of rows and columns in the format (rows, columns)
Lists the data types used in each column, non-null values, and memory usage info
Lists the descriptive statistics for each column.
Lists the first num rows
Lists the last num rows
Lists the rows from index a to index b, exclusively (not including b).
A sequence of steps for processing and using data.
Numerical data that can be counted or measured.
Data that can be divided into different categories.
A one-dimensional, labeled array (or list) that is formatted like a single column of a data table.
Used to describe how data is spread. It also describes the variability of the dataset.
A measure of how spread out a group of numbers are, calculated by taking the square root of the variance.
Used to describe how far each number in the dataset is from the mean and calculated by determining the average of the squared differences from the mean.
The difference between the largest number and the smallest number. The larger the range, the larger the spread or dispersion.
The difference between the first and third quartiles. Indicates how spread out the middle 50% of the set of data is. Helps to avoid outliers affecting the data.
Median of the first half of the data or the 25% point.
Median of the second half of the data or the 75% point.
the practice of designing inputs for AI tools that will produce optimal outputs.
A form of artificial intelligence that uses what it has learned to predict an outcome
A form of artificial intelligence that generates new content such as text or art
Machine learning is a field of Artificial Intelligence that uses inputs and outputs to create computer models that teaches a computer to have intelligence.
A form of machine learning where algorithms are trained to make predictions using testing data, where the outcome of a specific event is already determined
A large percent of a dataset that is used to teach a machine learning model
A smaller subset of a dataset that is used test a trained machine learning model
A form of machine learning where algorithms are able to group data and find patterns in the data on their own
A form of machine learning where a computer agent learns to make decisions by interacting with its environment and receiving feedback.
are machine learning models that can comprehend and generate human language text.
a model that is capable of processing information from multiple types of data, including images, videos, and text
Occurs when a result is more favorable to a certain outcome.
the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings
The ability to perceive and interpret information, and to retain it as knowledge to be applied in the correct context
A test that determines how realistic, or humanlike a computer system really is. If a human is unable to tell if it is talking to a computer or a human, then the computer is said to have passed the Turing test.
AI that is built for a specific purpose and excels in its limited domain
a more human-like AI; versatile across various cognitive functions and tasks, having broader capabilities
A type of machine learning that uses a computational model that uses nodes inspired by the structure and functioning of the human brain and learns by trial and error.
Convolutional Neural Networks are a type of neural network that are commonly used to classify images by using a weighted kernel.
A computer program that simulates human decision-making using rules and facts.
A branch of AI that enables machines to understand and respond to human language.
The ability of machines to interpret sensory data such as images or sound.
The stored facts and rules used by an expert system.
The component that applies logic to the knowledge base to make decisions.
Information surrounding a word or event that helps determine its meaning.
The systematic and repeatable errors in a computer system that create unfair outcomes
A model designed to demonstrate the most basic functionality or basic design of a product, sometimes used as a proof of concept
A particular sequence of actions that a user takes to accomplish a particular task
A can-do attitude in which a person views challenges and setbacks as ways to learn rather than terminal obstacles in their path to their goal
A animated model that represents a real-life thing, process, or situation.
A set of rules for how things interact within a simulation.
At a high level, recursion is when a function (or method) calls itself.
The base case is the simplest form of the recursive problem. The base case can be immediately solved without breaking the problem down any further.
The recursive case is the general form of the recursive problem. In this case the problem needs to be broken down by one step toward the base case, and the algorithm makes a recursive call to itself to solve this slightly smaller problem. This process repeats until the base case is reached.
A problem that can be solved by an algorithm but is too slow or resource-heavy to be practical.
A problem for which no algorithm can be written to always produce a correct answer.
A famous undecidable problem that asks whether a program will stop or run forever.
The data an algorithm receives and produces.
A measure of how well an algorithm uses time or resources.
A variable that references an existing object. When the alias variable is manipulated, so is the original object, and vice versa.