Looks like no one added any tags here yet for you.
Decimal number
a base 10 number with ten possible different digits
Binary number
a base 2 number with two possible different digits
Bit
Each 1 or 0 in binary represents …
Byte
8 bits are a …
how many binary numbers can we create with n-bits.
2^n binary numbers
what is the largest binary number we can create with n-bits?
2^n-1
Overflow Error
When you try to represent a number that is so large that it requires more bits to the left of the decimal point than have been allotted
Roundoff Error
When you try to represent a fractional value that requires more bits to the right of the decimal point than have been allotted
Abstraction
Hiding complex system details for easier use and understanding
Metadata
Data describing other data
Analog Data
Data with continuously changing values
Digital Data
Data with discreet changes through a finite set of values
Sampling
Converting analog data into digital data through distinct samples
Lossless Compression
Reducing message size while maintaining exact reconstruction
Lossy Compression
Reducing message size without exact reconstruction
Computing Device
Machine running programs like computers, tablets, servers
Computing Network
Interconnected devices capable of communication
Path
Connections between computing devices on a network
Redundancy
Multiple paths between devices in a network
Fault Tolerant
Network's ability to function despite component failures
Bandwidth
Maximum data sent in a fixed time, measured in bits per second
Protocol
Agreed-upon rules specifying system behavior
IP Address
Unique number assigned to devices on the Internet
Router
Computer forwarding data across a network
Datastream
Information passed through the internet in packets
Packet
Chunk of data sent over a network
TCP
Protocol ensuring error-free packet transmission
UDP
Protocol for quick packet transmission with minimal error-checking
Server
Computer storing and sharing data on the internet
DNS
Protocol converting domain names to IP addresses
HTTP
A series of commands (like GET and POST) that tells a computer what it should do with the data it was just sent.
HTML
the code, functions, and commands given to your web browser by a web server that the browser uses to render a webpage.
HTTPS
A safety protocol to ensure the website you are visiting is what it says it is.
Digital Divide
Inequalities between those with and without computer and online access
Net Neutrality
Principle of treating all internet communications equally
Creative Commons
Copyright licensing allowing free distribution
Copyright Issues
Legal concerns regarding intellectual property rights
Debugging
Finding and fixing errors in code
Syntax Error
Error due to incorrect programming language
Logic Error
Program runs without crashing but doesn't perform as intended
Sequential Programming
Program statements run in order
Event Driven Programming
Program statements triggered by events like mouse clicks
Value
Number or string in programming
Expression
Combination of operators and values evaluating to a single value
Variable
Container holding one value at a time
Assignment Operator
Allows assigning or changing variable values
Boolean Value
Data type representing true or false
Global Variable
Defined outside functions, usable anywhere in the program
Local Variable
Defined inside functions, usable only within that function
Comparison Operators
Operators comparing Boolean values
Logical Operators
Operators like AND, OR, NOT
List
Ordered collection of elements
Element
Individual value in a list with a unique index
Index
Method for referencing list elements using numbers
Length of a List
Number of elements in a list
appendItem()
Adds an element to the end of a list
insertItem()
Places an element at a specific index in a list
removeItem()
Removes an element at a specific index in a list
myList.length
Returns the length of a list
Iteration
Repetitive portion of an algorithm
Simulations
Computer-based simulations for complex tasks
Functions
Reusable code chunks in programming
Parameter
Variable in a function definition
Argument
Value passed into a function as a parameter
Return
Used to pass information back from a function to the main program
Library
Group of functions used in creating programs
API
Specifications for library functions' behavior
Procedural Abstraction
Naming functions for use without knowing implementation
Modularity
Subdivision of a program into subprograms
Problem
General task description solvable with an algorithm
Algorithm
Set of instructions accomplishing a task
Efficiency
Algorithm's speed in solving a problem
Linear Search
Algorithm checking each list element until finding the desired value
Binary Search
Algorithm starting in the middle of a sorted set to find a value
linear search
sequentially checks data starting from the beginning to the end of the list?
binary search
checks the middle of the list, elimates numbers too small, forms a new middle and eliminates numbers, continues the process until completed
What is the difference between binary search and linear search?
binary search requires a sorted list
Which growth problems are unreasonable?
exponential, factorial
Which growth problems are reasonable?
log, linear, polynomial
heuristic
provide a "good enough" solution to a problem when an actual “perfect solution” is impractical or impossible
parallel processing
adding more processors within a single computer and dividing a task among those processors
distributed processing
adding more computers within a network and dividing a task among those computers
sequential computing
a single processor runs a program in order, one command at a time
speedup
the time used to complete a task sequentially divided by the time to complete a task in parallel (ie slow time divide by fast time)
bar chart
used for single data columns
counts frequency of data values
can be used with strings
cannot be used if data has too many unique values
histogram
used for single data columns
counts frequency of data value ranges
cant be used with strings`
cross tab chart
used with two data columns
counts frequency of data pairs
can be used with strings
cannot be used if data has too many unique values
scatter plot
used with two data columns
plots data values on two axes
can be used with strings
does not show frequnecy
When does data need to be cleaned?
when it is incomplete
when it is invalid
multiple tables are combined into one
filtering data
allows the user to look at a subset of the data
big data
Data sets that are too large to be analyzed by normal statistical methods
citizen science / crowdsource data
members of the public help collect and contrubute data to big data sets for large organizations to study
open data
large organizations provide their big data sets to the general public for open analysis
machine learning
the process in which a machine can find patterns in data and use it to classify objects not in the original data set
bias
diverse data sets need to be used in order to create accurate data
Personal Identifiable Information (PII)
information about an indivivual that identidies, links, relates, or describes them
phishing
technique that attempts to trick a user into providing personal information, usually by pretending to be an authority figure
keylogging
the use of a program to record every keystroke made by a computer in order to gain fraudulent access to confidential information
malware
software intended to damage a computing system or to take partial control over its operation
DOS (denial of service)
a technique that floods the network server with more requests than it can handle in an attempt to bring the network down