Comp. Science Test 2

5.0(1)
studied byStudied by 6 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/41

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

42 Terms

1
New cards

Algorithm

A finite set of instructions that accomplish a specific task.

2
New cards

Algorithmic thinking

The process of solving problems by identifying the tasks required to solve a problem and using algorithms to clearly describe each task.

3
New cards

Iteration

A repeating portion of an algorithm that repeats a specified number of times or until a given condition is met.

4
New cards

Code segment

A collection of program statements that is part of a program.

5
New cards

Relational operators

Operators used to test the relationship between two variables, expressions, or values.

6
New cards

Boolean expression

An expression that evaluates to either true or false.

7
New cards

Conditional expression

A comparison that evaluates to a Boolean value of True or False.

8
New cards

Bug

A part of a program that causes an error or undesired output.

9
New cards

Incrementing counter

A variable that stores an integer with an increasing (or decreasing) value.

10
New cards

List

An ordered collection of items or values.

11
New cards

Loop variable

A variable set to a value in a sequence or other data collection in each iteration step.

12
New cards

Conditional statement

A feature of a programming language that performs different computations or actions depending on a Boolean condition.

13
New cards

Modular code

A group of instructive code that exists as an independent unit and is easy to use with other code.

14
New cards

Concatenate

The act of attaching two things side-by-side, frequently strings of text.

15
New cards

Return value

Any value that a method or function gives back to the statement command from which it is called.

16
New cards

Personally identifiable information (PII)

Information about an individual that can be used to identify them.

17
New cards

Data breach

The unauthorized access or retrieval of confidential or protected data.

18
New cards

Cookie

Small text-based bits of information about your browser that a web server saves.

19
New cards

Phishing

The practice of sending fraudulent emails to induce people to share sensitive information.

20
New cards

Keystroke logger

A program that records every keystroke made by a computer user to gain fraudulent access to confidential information.

21
New cards

Malware

Software intended to damage a computing system or take partial control over its operation.

22
New cards

Rogue access point

A wireless access point that gives unauthorized access to secure networks.

23
New cards

Encryption

The process of encoding data to prevent unauthorized access.

24
New cards

Decrypt

The process of decoding encrypted data to make it human-readable again.

25
New cards

Substitution cipher

A cipher in which each letter in an alphabet is replaced with a different character or symbol.

26
New cards

Encryption key

A string of characters used as a parameter that determines the output of an encryption algorithm.

27
New cards

Brute force

A method for determining a solution to a problem by sequentially testing all possible solutions.

28
New cards

Private key encryption

An encryption method where the sender and receiver share a private key to use in the encryption algorithm.

29
New cards

Symmetric key encryption

A process in which a single key is used in both the encryption and decryption algorithm to encode/decode data.

30
New cards

Public key encryption

A method of paired key encryption in which the key used to encrypt data is made available to anybody and its corresponding decryption key is kept secret.

31
New cards

Paired keys

Two keys that are related in such a way that one can be used to encrypt data, which can then only be decrypted by the other key.

32
New cards

System administrator

A person responsible for managing computers, networks, servers, and other computing resources.

33
New cards

Multi-factor authentication

A method of computer access control that requires presenting several separate pieces of evidence to an authentication mechanism.

34
New cards

Graphical user interface (GUI)

The dominant method for designing human-computer interaction.

35
New cards

Application programming interface (API)

A way programmers share their code with other programmers.

36
New cards

Widget

A standard component of a graphical user interface.

37
New cards

Argument

An input value to a command that specifies the values of the parameters when a procedure is called.

38
New cards

Logic error

A mistake in the algorithm or program that causes it to behave incorrectly.

39
New cards

Syntax

Precise rules defining how the elements of a programming language are required to be used together.

40
New cards

Runtime error

A mistake in the program that occurs during its execution.

41
New cards

Global variable

A variable that can be used in any part of the program.

42
New cards

Pseudocode

An outline of the basic ideas behind how algorithms will work.