Complete Verified Solution 100%
Selection structure
allows programmers to specify the conditions under which a statement is executed.
one of the three control structures; tells the computer to make a decision before
selecting the next instruction to process; also called the decision structure
Bit
Binary Digit. Single unit of information on a computer. Represented as a 0 or 1
Bit Rate
The number of bits that are conveyed or processed per unit of time
Protocol
A set of rules governing the exchange or transmission of data between devices. A set of
rules for sending, receiving, and interpreting binary messages
Latency
The time it takes for a signal to arrive. Time units such as, miliseconds, seconds
Bandwidth
Transmission capacity, measured by bit rate
Binary
Information for which only two answers are possible
Fiberoptics
Method of transmitting data that utilizes light
Copper Wire
Method of transmitting data that utilizes electricity
WiFi
A wireless networking technology that utilizes radio waves to transmit information/data
Request for Comments (RFC)
Documents that define and publish the standards and protocols for all to see on the
Internet Engineering Task Force website
Prototype
A preliminary sketch of an idea or model for something new. It's the original drawing
from which something real might be built or created.
IP Address
A number assigned to any item that is connected to the Internet. Every device
connected to the internet is assigned an Internet Protocol address
Packets
Small chunks of information that have been carefully formed from larger chunks of
information.
Router
A computer which receives messages travelling across a network and redirects them
towards their intended destinations based on the addressing information included with
the message.
Transmission Control Protocol (TCP)
Provides reliable, ordered, and error-checked delivery of a stream of packets on the
internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.
,Domain Name System (DNS)
An abbreviation for Domain Name System, the Internet's system for converting
alphabetic names into numeric IP addresses. Web sites using names, such as
example.com
Hypertext Transfer Protocol (HTTP)
The protocol used by the World Wide Web. It describes how messages are formatted
and interchanged, and how web servers respond to commands.
Abstraction
Reducing information and detail to focus on essential characteristics.
Server
A computer that awaits and responds to requests for data.
Client
A computer that requests data stored on a server.
Net Neutrality
The principle that Internet service providers should enable access to all content and
applications regardless of the source, and without favoring or blocking particular
products or websites.
Internet Censorship
The control or suppression of what can be accessed, published, or viewed on the
Internet. It may be carried out by governments or by private organizations at the behest
of government, regulators, or on their own initiative.
Node
Vertex; Represented by a labeled circle
Edge
A line connecting two nodes
Cost
Weight; The number associated with an edge that indicates distance, time, or estimated
cost
Cycle
A set of edges that begin at one node and can be followed through other nodes back
where you started
Tree
A set of edges that connects nodes together in a way that does not form a cycle.
Shortest Path
The lowest weight path between two nodes
Efficiency
A measure of the number of steps per input size needed to complete an algorithm
Routing Table
A data table stored in a router that lists the routes to particular network destinations
Minimum Spanning Tree
Dictates the shortest aggregate path from one node to every node
A spanning tree connecting all nodes together with the minimum aggregate value of its
edges.
Shortest Path Tree
, A spanning tree connecting a source node to all others using the smallest values
possible.
Internet Engineering Task Force (IETF)
A group of volunteers, private citizens, government officials, etc. who promote internet
standards
Peer-to-peer networks
Networks that are designed to connect similar computers that share data and software
with each other.
Authenticated access
An extranet is made available to ____ connections that have been granted an ____
_____ to the resources in the extranet.
Anonymous access
Requires no username or password
Censorship of digital information (DI)
Commercial & governmental censorship of DI raise ethical and legal concerns.
Open source software
Software that results from the voluntary collaboration of developers who create
programs that they distribute free to others
Licensing of software
Open source and Licensing of software and content raise ethical and legal concerns.
Aggregation of Information
consolidation of information, such as geolocation, cookies, browsing history, raise
ethical and legal concerns.
Anonymity in online interactions
can be enable through the use of online anonymity software and proxi servers
exploitation of information
technology enables an act that exploits or victimizes someone (treats them unfairly)
proxy servers
server (a computer system or an application) that acts as an intermediary for requests
from clients seeking resources from other servers.
target advertising
Companies target specific groups like teen or elders, etc.
intellectual property
Refers to intangibles such as ideas, music, art, photos, logos, movies, and programs
that are the result of creativity and intellectual effort.
Copyright
An exclusive right granted by the federal government allowing the owner to reproduce
and sell an artistic or published work.
digital millennium copyright Act
1998 act that criminalized the circumvention of any anti-piracy encryption technology on
commercial software, eBooks, videos, and music. It bans the sale and manufacture of
devices used to illegally copy digital content.
wireless
a form of computer networking or other communication that uses radio signals and
microwaves to transmit data
digital divide