Top Secret: Hackster - page 9

Index
code, 9, 13, 14
cyberattacks, 20, 21, 30
data transfers, 9, 11
database, 17
debugging, 13
ethical hacking, 30
GPS, 22
hackers/hacking, 16, 20, 21,
22, 30
honeypot, 20, 22, 27
IoT (Internet of Things), 30
IP address, 10, 11, 19
languages, programming,
14
malware protection, 21
memory leaks, 9
metadata, 22
modem, 8, 9
network, computer, 11
privacy, 11
programming, 14
proxy server, 10, 11, 19
rebooting, 9
router, 8, 9, 19
safeguards, 21
security, 11, 20, 21, 22, 30
selfies, 22, 27
smart devices, 8, 9
syntax, 12
VPNs (virtual private net-
works), 10, 11, 19
web filtering, 11
white hat, 16, 21
31
Glossary
database
(DAY-tuh-base) large
collection of organized data
debug
(dee-BUHG) to find and correct
errors in a computer program
GPS
(GEE PEE ES) global positioning
system; navigational system that uses
signals from satellites, ground stations,
and receivers to determine the
position of an object
IT
(EYE TEE) information technology;
relating to computer technology or
networks or the internet
memory leak
(MEM-ur-ee LEEK) result
of an error in a program, like an app
or operating system such as Microsoft
Windows or MacOS, that can cause it
to crash due to a lack of memory
metadata
(MEH-tuh-day-tuh) data
that further describes and provides
information on other data
mitigation
(mit-uh-GAY-shuhn) the act
of making something less dangerous
or damaging
modem
(MOH-duhm) device that
connects to the internet
router
(ROU-tur) device that moves
data from a modem to smart devices
like computers, smartphones, and
smart TVs
smart device
(SMAHRT dih-VISE)
electronic device, or piece of
equipment, that connects to other
devices through a wireless connection,
or the internet
strategic
(struh-TEE-jik) useful or
important in achieving a plan or
strategy
syntax
(SIN-taks) rules on how to
write statements in a programming
language, similar to the spelling and
grammar rules in human language;
different programming languages have
different rules
1,2,3,4,5,6,7,8 10,11,12
Powered by FlippingBook