Study online at https://quizlet.com/_fvzhaa
1. Radix point: is general term for "decimal point"
2. ASCII: stands for American Standard Code for Information Interchange. originally used seven bits to represent
each character, allowing for 128 unique characters
3. Analog Data and Digital Data: Analog Data - A continuous representation, analogous to the actual
information it represents
Digital Data - A discrete representation, breaking the information up into separate elements
4. Text Compression: Keyword encoding, Run-length encoding, Hu�man encoding
5. The Fetch Execute Cycle: Fetch the next instruction
Decode the instruction
Get data if needed
Execute the instruction
6. Information Security: The techniques and policies used to ensure proper access to data
7. Cyber Security: The ability to protect resources accessible on the Internet
8. Keyword Encoding: Replace frequently used patterns of text with a single special character
9. Run-Length Encoding: single value may be Repeated over and over again in a long sequence
10. Hu�man Encoding: zero and ones = letters
11. Worm: stands alone, targets network resources
12. Trojan horse: disguised as benevolent resource
13. Logic bomb: set up to execute at system event
14. Virus: self -replicating
15. Cryptography: The eld of study related to encoded information (comes from Greek word for "secret
writing")
16. Encryption: The process of converting plaintext into ciphertext
17. Decryption: The process of converting ciphertext into plaintext
18. Substitution Cipher: A cipher that substitutes one character with another
19. Caesar Cipher: A substitution cipher that shifts characters a certain number of positions in the alphabet
20. Transposition Ciphers
Cryptanalysis - The process of decrypting a message without knowing the
cipher or the key used to encrypt it: A cipher that rearranges the order of existing characters in a
message in a certain way (e.g., a route cipher)
1/2