Please enable JavaScript to use CodeHS

FL Programming Glossary

Flashcards

Course:

Module:

Lesson:

Search:

user account General

Used to log in to a computer, comprised of a username, password, personalized settings and set permissions.

admin account General

Has full access and full control to manage other users, set permissions and change computer settings and programs.

user permissions General

Authorization given to user accounts that grants them certain privileges and enables them to access specific folders and files.

host account General

The main, controlling account responsible for providing security updates, antivirus software and setting permissions for anyone on the same network.

security baseline General

An agreed upon set of rules and permissions.

authorization General

Specifying access rights and permissions for each user.

authentication General

Proving the identity of the user.

patches General

Updates that address and fix security vulnerabilities within a program or product.

computer virus General

A type of computer program that can spread by modifying other computer programs and inserting its own code (rules).

backup General

A copy or snapshot of the state of your computer.

full backup General

Backs up everything on your computer.

incremental backup General

Backs up only what has changed since the last backup.

Privacy Policy General

Legal document outlining how a company can collect and use your data

personally identifiable information General

any data that can be used to identify an individual, such as their name, address, or social security number

Information Literacy General

Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.

Artificial Intelligence General

A computer system able to perform tasks that ordinarily require human intelligence

Deepfake General

a video or image of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.

View Page Source General

Displays the HTML, CSS, and JavaScript code of a website.

Developer Tools General

Browser tools that help programmers diagnose problems, build and maintain secure websites.

Elements Panel General

Used for inspecting and making live-edits of the HTML and CSS.

Console Panel General

Used for entering live JavaScript for testing and debugging.

Application Panel General

Used for inspecting all resources that are loaded like databases, storage, cookies, images, etc.

Session Storage General

Temporary storage that is emptied when the browser is closed.

Local Storage General

Persistent storage; should be encrypted.

Cache General

Stores website data such as HTML and CSS to reduce load time.

Cookies General

Stores website preferences and personal data.

Security Panel JavaScript

Used for debugging issues and checking the website’s digital certificate.

Key Exchange General

A method in cryptography by which keys (public or private) are exchanged between two parties.

Reverse Engineering General

Working backwards through an encryption to unveil the input, or the key.

Man-in-the-Middle Attack General

Occurs when someone secretly intercepts communications between two parties by impersonating one or both parties.

Malware General

Any type of software that is designed to intentionally harm or damage a computer or network.

Virus General

A type of malware that attaches itself onto a host program, such as a document. It can cause serious damage to files or an entire device.

Ransomware General

A software that prevents users from accessing their files or network until a ransom is paid.

Spyware General

Once downloaded onto a user’s computer, the software secretly gathers information about a person or organization and sends it to the attacker.

Phishing General

A cybercrime in which a person is contacted by email, telephone or text message by someone who is posing as a legitimate company.

Firewall General

A network security device that monitors and filters incoming and outgoing network traffic.

Symmetric encryption General

When the same key is used to both encrypt and decrypt.

Asymmetric encryption General

When one key encrypts and a different key decrypts.

Substitution Cipher General

A cipher that changes one character or symbol into another.

Block Cipher JavaScript

A cipher that groups bits into blocks of plaintext before applying the encryption.

Transposition Cipher General

A cipher that shifts the positions of plaintext character (or groups of characters) according to a regular system.

Copyright General

A law that grants the creator of an original work exclusive rights to its use, distribution, and sale

Ethics General

The moral principle that governs a person's behavior.

Law General

refers to an external mechanism of control

Hacktivist General

A specific group of hackers who are motivated by their ideological views.

Cyberterrorists General

Have political motivations with the intent to harm, typically resulting in violence.

Nation State Hackers General

Sponsored by and funded by a government with the goal of giving their country a competitive advantage on a global scale.

Digital Footprint General

The information about a particular person that exists on the Internet as a result of their online activity

Cyberbullying General

the use of electronic communication to bully a person

Internet of Things General

The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.

Confidentiality General

The protection of information from people who are not authorized to view it.

Integrity General

Aims at ensuring that information is protected from unauthorized or unintentional alteration.

Availability General

The assurance that systems and data are accessible by authorized users when and where needed.

Non-Repudiation General

Ensures that one cannot deny having sent or received a message.

Vulnerability General

A flaw or weakness in a system or device.

Risk General

The potential for loss when an attack happens.

Threat JavaScript

A potential for a cybercriminal to exploit a vulnerability.

Authentication General

The process of identifying a user and granting them access. Authentication is proving that someone is who they say they are.

Authorization JavaScript

The process of enforcing policies and user privileges. Once a user is authenticated, they may only be authorized to access specific areas or may only have rights to perform specific tasks.

Accounting General

The process of measuring what is happening within the system. This is the final process of the AAA framework and ensures that there is a log of all actions within the network or system.

Misinformation General

false or inaccurate information, especially that which is deliberately intended to deceive.

social media General

websites and apps that allow users to create, share, and view content and communicate with others

Passphrase JavaScript

A type of authentication that is similar to a password but longer and is usually a sentence or a series of words

Two-Factor Authentication JavaScript

(2FA) A type of multifactor authentication that typically combines something the user knows (like a password) with something the user has (like a mobile phone)

Multifactor Authentication JavaScript

(MFA) An extra layer of authentication that requires two or more factors for authentication. Typically, these factors fall into three categories: something you know (password), something you have (such as a phone), or something you are (such as your fingerprint).

Biometric Authentication General

A form of authentication that uses an individual’s physical or behavioral characteristics to verify their identity

Password Manager General

Tools that store and manage passwords for various accounts, generating strong passwords and auto-filling login credentials.