Legal document outlining how a company can collect and use your data
any data that can be used to identify an individual, such as their name, address, or social security number
Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.
A computer system able to perform tasks that ordinarily require human intelligence
a video or image of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.
The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
The protection of information from people who are not authorized to view it.
Aims at ensuring that information is protected from unauthorized or unintentional alteration.
The assurance that systems and data are accessible by authorized users when and where needed.
Ensures that one cannot deny having sent or received a message.
A flaw or weakness in a system or device.
The potential for loss when an attack happens.
A potential for a cybercriminal to exploit a vulnerability.
The process of identifying a user and granting them access. Authentication is proving that someone is who they say they are.
The process of enforcing policies and user privileges. Once a user is authenticated, they may only be authorized to access specific areas or may only have rights to perform specific tasks.
The process of measuring what is happening within the system. This is the final process of the AAA framework and ensures that there is a log of all actions within the network or system.
Any type of software that is designed to intentionally harm or damage a computer or network.
A type of malware that attaches itself onto a host program, such as a document. It can cause serious damage to files or an entire device.
A software that prevents users from accessing their files or network until a ransom is paid.
Once downloaded onto a user’s computer, the software secretly gathers information about a person or organization and sends it to the attacker.
A cybercrime in which a person is contacted by email, telephone or text message by someone who is posing as a legitimate company.
A network security device that monitors and filters incoming and outgoing network traffic.
A type of authentication that is similar to a password but longer and is usually a sentence or a series of words
(2FA) A type of multifactor authentication that typically combines something the user knows (like a password) with something the user has (like a mobile phone)
(MFA) An extra layer of authentication that requires two or more factors for authentication. Typically, these factors fall into three categories: something you know (password), something you have (such as a phone), or something you are (such as your fingerprint).
A form of authentication that uses an individual’s physical or behavioral characteristics to verify their identity
Tools that store and manage passwords for various accounts, generating strong passwords and auto-filling login credentials.
The information about a particular person that exists on the Internet as a result of their online activity
the use of electronic communication to bully a person
A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
The moral principle that governs a person's behavior.
refers to an external mechanism of control
A specific group of hackers who are motivated by their ideological views.
Have political motivations with the intent to harm, typically resulting in violence.
Sponsored by and funded by a government with the goal of giving their country a competitive advantage on a global scale.
A person or device that makes calculations, stores data, and executes instructions according to a program.
The physical components of a computer
Programs that can be run on a computer
An operating system such as Windows, Mac OS, Android or iOS.
Software that only works on one platform, such as only on Android phones, or only on Mac computers.
Software that works on multiple platforms.
Used to log in to a computer, comprised of a username, password, personalized settings and set permissions.
Has full access and full control to manage other users, set permissions and change computer settings and programs.
Authorization given to user accounts that grants them certain privileges and enables them to access specific folders and files.
The main, controlling account responsible for providing security updates, antivirus software and setting permissions for anyone on the same network.
An agreed upon set of rules and permissions.
Specifying access rights and permissions for each user.
Proving the identity of the user.
Updates that address and fix security vulnerabilities within a program or product.
A type of computer program that can spread by modifying other computer programs and inserting its own code (rules).
A copy or snapshot of the state of your computer.
Backs up everything on your computer.
Backs up only what has changed since the last backup.
Legally binding guidelines for use and distribution of software.
Software that is available for anyone to access and modify.
Software that is owned by an individual or company.
Refers to the design of the essential parts of an application and how they are connected to each other.
Software installation that is performed on your local computer.
Software installation that is performed on a local area network (LAN).
Software that is installed, hosted and accessed entirely from a remote server or location.
The process of learning about the world using data and computation.
A question that could have a variety of different answers.
A file containing Python definitions and statements.
A collection of related modules.
A collection of modules and packages.
Written instructions detailing the functions, methods, and variables available and how to use them.
A data structure that stores and aligns data in a table using rows and columns.
Lists the data types used in each column in the DataFrame
Prints the number of rows and columns in the format (rows, columns)
Lists the data types used in each column, non-null values, and memory usage info
Lists the descriptive statistics for each column.
Lists the first num rows
Lists the last num rows
Lists the rows from index a to index b, exclusively (not including b).
A sequence of steps for processing and using data.
Numerical data that can be counted or measured.
Data that can be divided into different categories.
A one-dimensional, labeled array (or list) that is formatted like a single column of a data table.
Used to describe how data is spread. It also describes the variability of the dataset.
A measure of how spread out a group of numbers are, calculated by taking the square root of the variance.
Used to describe how far each number in the dataset is from the mean and calculated by determining the average of the squared differences from the mean.
The difference between the largest number and the smallest number. The larger the range, the larger the spread or dispersion.
The difference between the first and third quartiles. Indicates how spread out the middle 50% of the set of data is. Helps to avoid outliers affecting the data.
Median of the first half of the data or the 25% point.
Median of the second half of the data or the 75% point.
A animated model that represents a real-life thing, process, or situation.
A set of rules for how things interact within a simulation.
An algorithm is a set of steps or rules to follow to solve a particular problem.
Managing complexity by "abstracting away" information and detail, in order to focus on the relevant concepts.
A method that uses decomposition, pattern recognition, abstraction, and algorithms in order to reliably solve complex problems.
a software testing method that isolates and tests individual components or "units" of code, like functions.
the practice of designing inputs for AI tools that will produce optimal outputs.
the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings
The ability to perceive and interpret information, and to retain it as knowledge to be applied in the correct context
A test that determines how realistic, or humanlike a computer system really is. If a human is unable to tell if it is talking to a computer or a human, then the computer is said to have passed the Turing test.
AI that is built for a specific purpose and excels in its limited domain
a more human-like AI; versatile across various cognitive functions and tasks, having broader capabilities
A form of artificial intelligence that uses what it has learned to predict an outcome
A form of artificial intelligence that generates new content such as text or art
Machine learning is a field of Artificial Intelligence that uses inputs and outputs to create computer models that teaches a computer to have intelligence.
A form of machine learning where algorithms are trained to make predictions using testing data, where the outcome of a specific event is already determined
A large percent of a dataset that is used to teach a machine learning model
A smaller subset of a dataset that is used test a trained machine learning model
A form of machine learning where algorithms are able to group data and find patterns in the data on their own
A form of machine learning where a computer agent learns to make decisions by interacting with its environment and receiving feedback.
are machine learning models that can comprehend and generate human language text.
a model that is capable of processing information from multiple types of data, including images, videos, and text
A type of machine learning that uses a computational model that uses nodes inspired by the structure and functioning of the human brain and learns by trial and error.
Convolutional Neural Networks are a type of neural network that are commonly used to classify images by using a weighted kernel.
Occurs when a result is more favorable to a certain outcome.
An individual characteristic or property in a data set
A collection of examples used to teach an AI model
The outcome or answer the model is being trained to predict
A correct data point showing what the model should learn
A skew in the data that can affect fairness in AI predictions
How information is converted into numerical form for AI
A data point that shows what the model should not learn
Depends on whether or not the data is correct.
A question or command given to an AI to generate a response
A predictive modeling problem where a label is predicted for a given input
A common unsupervised learning technique that takes a data set and divides it into subgroups, or clusters, based on similarities
A computer program that helps us organize, manipulate, and analyze data.
An iterative set of steps used to analyze and interpret data.
the "average" of a range of numbers, where you add up all the numbers and then divide by the number of numbers.
the middle value in a range of numbers.
the number that is repeated more often than any other.
Information (numbers, words, measurements, observations, etc) that is in a computer-readable form.
false or inaccurate information, especially that which is deliberately intended to deceive.
False information provided by an AI
An attack where hackers manipulate generative AI systems by feeding them malicious inputs disguised as legitimate user prompts.
The right to control access to personal information
A balance achieved between two desirable but incompatible features
The simulation of human intelligence by machines
A declared position or opinion on how rules or laws should be created or enforced
Openness in communication and disclosure of how AI is used
AI systems that could potentially harm people’s rights or safety if misused
The use of machines or technology to perform tasks without human input.
Design Thinking is an iterative process in which you seek to understand your users, challenge, assumptions, redefine problems and create innovative solutions which you can prototype and test.
A model designed to demonstrate the most basic functionality or basic design of a product, sometimes used as a proof of concept
A chance to get feedback on your solutions, refine them, and make them better.
A circuit board with ports and sockets used to connect the main devices of a computer.
A special kind of firmware that runs programs strictly to start up your computer.
The core component of a device that accepts and executes instructions.
A fast type of computer memory which temporarily stores all the information your device needs right away.
A fast access storage device used in computers.
A component designed to speed up the creation of images and output them to a display device, like a monitor.
A component with a built in wired network port that allows the computer to connect to a network.
A location where information is sent from one computer to another.
Checks to see which ports on a network are open.
A device or software that blocks unwanted Internet traffic while allowing legitimate traffic.
A device that will be recognized by your computer and install on its own.
A group of files that allows a device to communicate with the computer’s operating system.
A short-range wireless communication technology that uses radio waves to transmit information.
Enables short-range communication between compatible devices.
A wireless LAN that uses radio frequency technology to send and receive data.
A virtual LAN that allows for the setup of separate networks by configuring a network device.
A set of protocols that specify how your Wi-Fi network and other data transmissions work.
Processes commands to a computer program in the form of lines of text.
A list of specific routing destinations; essentially a map for the router.
A new 128 bit version of the Internet Protocol.
The protocol that defines the payout of an an Internet address.
An agreed upon set of rules that outlines how to communicate or send information.
The original 32 bit IP protocol that was created in the 1980s.
The process of sending data between two computers on the internet. The data is sent through routers that determine the route.
Allows for sending MULTIPLE packets between two computers. TCP checks that all packets arrived and can be put back in the proper order. The metadata must include a destination IP address, a from IP address, the message size and the packet order number.
An access point that allows for network management and security configuration.
a system that will operate with no interruption when one or more of its components fail
When data is passed from one network segment to another.
The number of hops it takes for data to get to its final destination.
Advanced Research Projects Agency Network, precursor to the modern internet
UDP is often used in real-time applications where timely delivery of data is more important than the accuracy of delivery. UDP does not number the packets and it does not retransmit packets that are lost.
Stands for Uniform Resource Locator. You are locating a resource that exists somewhere on the internet.
A philosophy of making information and knowledge open and accessible to all people. A network of networks built on open, agreed upon protocols.
A network where devices are connected via physical cables.
A network where devices connect without physical cables, typically using radio waves.
The process of varying a signal to transmit data.
Undersea cables used for transmitting telecommunications signals across oceans.
A computer scientist known as one of the "fathers of the internet."
An electronic device which is required for communication between devices.
An internal component of a computer that is used for communicating over a network.
A network device that allows a device to connect to the Internet.
Enables wired connections between more than one computer or device.
A network device that allows other Wi-Fi devices to connect to a wired network.
A systematic approach to solving a problem.