1/51
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Creative Commons (CC) license
a public copyright license that allows creators to share their work with the public under specific, pre-set conditions. It provides a middle ground between "all rights reserved"
Citizen science
Scientific research conducted with participation from the general public.
DDoS
Distributed Denial of Service — overwhelming a server with requests to make it unavailable.
Latency
The delay between sending and receiving data.
API
Application Programming Interface — a set of procedures available for a programmer to use.
Packet switching
Breaking data into packets that can take different routes to the destination.
Undecidable problem
A problem for which no algorithm can always produce a correct yes/no answer.
Reasonable / Unreasonable time
Polynomial time = reasonable; exponential time = unreasonable for large inputs
Library
A collection of pre-written procedures and functions a programmer can call.
Modularity
Breaking a program into smaller, independent, reusable parts.
recursion
A function that calls itself to solve a smaller version of a problem.
Lossless vs lossy
reduces file size while preserving 100% of the original data, allowing perfect reconstruction, whereas lossy compression achieves much smaller files by permanently discarding less noticeable data
lossy: reduces file size but loses some data
heuristic
a "good-enough" problem-solving approach or algorithm used when finding an exact, optimal solution is impractical or takes too long (unreasonable time)
Linear efficiency:
number of items (\(n\)) in a data set increases, the number of steps to process it increases proportionally. It is considered "reasonable time"
Redundancy
inclusion of extra components that can be used to mitigate failure of a system if other components fail
Internet
open protocol>can connect many devices
network of computing devices
network of valbes transmitters etc
World Wide Web
system of linked pages, programs, and files.
• HTTP is a protocol used by the World Wide Web, it defines how to use
links to navigate between pages. (transmits data)
collection of info
Protocol for transferring web pages; HTTPS adds encryption.
logic error
making amistake in the program like counting the average wrong
syntax error
not following rules: forget semi colon in python
run time error
occurs during execvution such as dividing by 0
overflow error
outside range of v alues
roundoff
decimals are rounded
hardware vs software
-components of device vs intructions for program
program documentation
descripotuon of function of code segement(program)
8 bits/bits
1 byte
-bits are the individual numbers in binary
bits represent abstractions (simplyfying complexity) which includes numbres colors or characters
binary sequences
represent digial data including colors, boolean and lists
analog vs digital signals
a:continuons values (volume pitch) digi are analogs broken up (approcimates digital data with sameples>smaller sampel rate is more accurate)
data compression
reducing bumber of bits (doesnt mean less info)
cleaning data
process that makes data uniform without changing its meaning ie chainging abbreviations w the same word
geolocation
finds ip address and info like time zone or zip code
meta data
data that describes data if the pic is data then meta data is the time it was taken (chainging metadata doesnt affect the data)
abstraction
represent essentail features without including background info it reduces complexity
-includes by block and list
mod
gives remainders
relational vs logical operators
r: greater equal
l:and or not
linear search vs binary
goes through list one by one: doesnt need to be sorted
cuts at the middle and needs to be sorted
flow charts
represents algorithm visually: shapes with instructions
traversing a list
accessing elements of lists one by one
procedure + parameter
code that invokes part of program (my block) a
variable thats inputed into procedure
PII
personal identifiable info
concat
join
rogue access pt
wireless accessss pt that gives unauthorized access to secure networks
symmetric vs asymetric or public encryption
s: same key for encrypt and decryp
one private key for decrypt and pone public one for everyone
crowdsourcing
obtaining info from many ppl via internet
selection, iteration sequencing
(if/else), repeat, code being on after another
speed up
seq time/paralle time
parallel vs sequential computing vs distributed
seq: preformed in order 1 at a time, one central privacy unit
para breaks up tasks into sequential pieces, many cpus, used for simulations
d: multiple devices to complete takss while parllel uses one with many processors
udp
user design protocl
allows apps to send messages without checking for missing pachets to save time (not as reliable and doesnt send out missing packets of data
dns
domain name
tcp
transmission control protocol
defines how computers sends opackets of data (rulkes abt how to divide data into packets and can resend lost packets
ip
internet protocol, addressing and routing requests
can change
routing
process of finding a path from sener to receiver
fault tolerance allows for rerouting
bandwidth
max amt of data sent in an amt of time
-larger circles is more bandwidth