Useful definitions
Name | Definition | Additional info |
---|---|---|
Bit | A bit is the fundemental unit of information. | A bit is either a 0 or a 1 . |
Byte | A byte is a group of 8 bits. | |
Encryption | The process of converting a plain text into a cipher text using a key. | |
Hardware | The physical components which make up a computer system. | |
Software | The programs which run on the software. | |
Processor Instruction Set | The set of instructions which can run on a processor. | Each instruction set is processor specific. |
Baud rate | Baud rate is the number of signal changes per second. | |
Bit rate | Bit rate is the number of bits transferred per second. | Bit rate can be higher than baud rate if more than one bit is encoded in each signal change. |
Bandwidth | A range of frequencies within a given band used for transmission of a signal. | Bit rate is directly proportionate to bandwidth. |
Latency | Time delay between the moment something is initiated and the moment its effect begins. | |
Protocol | A set of rules about the way devices communicate. Needed to ensure successful transmission between different computers. | |
Router | ||
Gateway | ||
API | An application programming interface is a set of functions or procedures that allow the creation of applications which access the data or features of another service. | |
HTTP | HTTP is a set of rules for transferring data and files on the World Wide Web. | Stands for Hypertext Transfer Protocol |
REST | Rest is used as a design methodology for networked applications. It allows simple HTTP methods to be used in place of complex mechanisms such as SOAP. Since there is a HTTP method which maps to each CRUD method, REST can use only HTTP to achieve full data manipulation. | |
URL | A URL is an address of a resource on the world wide web. | Stands for Uniform Resource Locator |
URI | A URI is a series of characters used to identify a resource. | Stands for Uniform Resource Identifier |
Web Socket | The websocket protocol is a set of rules that creates a persistent connection between two computers on a network to enable real-time collaboration. It establishes a full-duplex socket connection between a web-browser and the server over TCP. | |
Analysis | The first stage of system development, where the problem is identified, researched and alternative solutions proposed. | |
Hash Function | A function H which when applied to a key k, generates a hash value H(k) (of a range smaller than the domain of values of k) | |
Copyright | Protects material such as literature, art, music, films and recordings. | |
Design Right | Protects how something looks | |
Patent | Protects how an invention works or what it does | |
Trademark | Protects the name or logo used to identify a business or product | |
Cracking | Illegally breaking into a computer system | |
Hacking | Illegally breaking into a computer system; programming in an unstructured way | |
Personal Data | Data relating to a living individual who can be identified from it | |
Data Subject | An individual who is the subject of personal data | |
Data Controller | Someone who determines why and how personal data is processed | |
Data Processor | Someone who processes data on behalf of the data controller |