Skip to content

Latest commit

 

History

History
37 lines (35 loc) · 3.31 KB

Definitions.md

File metadata and controls

37 lines (35 loc) · 3.31 KB

Definitions

Useful definitions

Name Definition Additional info
Bit A bit is the fundemental unit of information. A bit is either a 0 or a 1.
Byte A byte is a group of 8 bits.
Encryption The process of converting a plain text into a cipher text using a key.
Hardware The physical components which make up a computer system.
Software The programs which run on the software.
Processor Instruction Set The set of instructions which can run on a processor. Each instruction set is processor specific.
Baud rate Baud rate is the number of signal changes per second.
Bit rate Bit rate is the number of bits transferred per second. Bit rate can be higher than baud rate if more than one bit is encoded in each signal change.
Bandwidth A range of frequencies within a given band used for transmission of a signal. Bit rate is directly proportionate to bandwidth.
Latency Time delay between the moment something is initiated and the moment its effect begins.
Protocol A set of rules about the way devices communicate. Needed to ensure successful transmission between different computers.
Router
Gateway
API An application programming interface is a set of functions or procedures that allow the creation of applications which access the data or features of another service.
HTTP HTTP is a set of rules for transferring data and files on the World Wide Web. Stands for Hypertext Transfer Protocol
REST Rest is used as a design methodology for networked applications. It allows simple HTTP methods to be used in place of complex mechanisms such as SOAP. Since there is a HTTP method which maps to each CRUD method, REST can use only HTTP to achieve full data manipulation.
URL A URL is an address of a resource on the world wide web. Stands for Uniform Resource Locator
URI A URI is a series of characters used to identify a resource. Stands for Uniform Resource Identifier
Web Socket The websocket protocol is a set of rules that creates a persistent connection between two computers on a network to enable real-time collaboration. It establishes a full-duplex socket connection between a web-browser and the server over TCP.
Analysis The first stage of system development, where the problem is identified, researched and alternative solutions proposed.
Hash Function A function H which when applied to a key k, generates a hash value H(k) (of a range smaller than the domain of values of k)
Copyright Protects material such as literature, art, music, films and recordings.
Design Right Protects how something looks
Patent Protects how an invention works or what it does
Trademark Protects the name or logo used to identify a business or product
Cracking Illegally breaking into a computer system
Hacking Illegally breaking into a computer system; programming in an unstructured way
Personal Data Data relating to a living individual who can be identified from it
Data Subject An individual who is the subject of personal data
Data Controller Someone who determines why and how personal data is processed
Data Processor Someone who processes data on behalf of the data controller