Comp. Science Test 2

studied byStudied by 6 people
5.0(1)
Get a hint
Hint

Algorithm

1 / 41

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

42 Terms

1

Algorithm

A finite set of instructions that accomplish a specific task.

New cards
2

Algorithmic thinking

The process of solving problems by identifying the tasks required to solve a problem and using algorithms to clearly describe each task.

New cards
3

Iteration

A repeating portion of an algorithm that repeats a specified number of times or until a given condition is met.

New cards
4

Code segment

A collection of program statements that is part of a program.

New cards
5

Relational operators

Operators used to test the relationship between two variables, expressions, or values.

New cards
6

Boolean expression

An expression that evaluates to either true or false.

New cards
7

Conditional expression

A comparison that evaluates to a Boolean value of True or False.

New cards
8

Bug

A part of a program that causes an error or undesired output.

New cards
9

Incrementing counter

A variable that stores an integer with an increasing (or decreasing) value.

New cards
10

List

An ordered collection of items or values.

New cards
11

Loop variable

A variable set to a value in a sequence or other data collection in each iteration step.

New cards
12

Conditional statement

A feature of a programming language that performs different computations or actions depending on a Boolean condition.

New cards
13

Modular code

A group of instructive code that exists as an independent unit and is easy to use with other code.

New cards
14

Concatenate

The act of attaching two things side-by-side, frequently strings of text.

New cards
15

Return value

Any value that a method or function gives back to the statement command from which it is called.

New cards
16

Personally identifiable information (PII)

Information about an individual that can be used to identify them.

New cards
17

Data breach

The unauthorized access or retrieval of confidential or protected data.

New cards
18

Cookie

Small text-based bits of information about your browser that a web server saves.

New cards
19

Phishing

The practice of sending fraudulent emails to induce people to share sensitive information.

New cards
20

Keystroke logger

A program that records every keystroke made by a computer user to gain fraudulent access to confidential information.

New cards
21

Malware

Software intended to damage a computing system or take partial control over its operation.

New cards
22

Rogue access point

A wireless access point that gives unauthorized access to secure networks.

New cards
23

Encryption

The process of encoding data to prevent unauthorized access.

New cards
24

Decrypt

The process of decoding encrypted data to make it human-readable again.

New cards
25

Substitution cipher

A cipher in which each letter in an alphabet is replaced with a different character or symbol.

New cards
26

Encryption key

A string of characters used as a parameter that determines the output of an encryption algorithm.

New cards
27

Brute force

A method for determining a solution to a problem by sequentially testing all possible solutions.

New cards
28

Private key encryption

An encryption method where the sender and receiver share a private key to use in the encryption algorithm.

New cards
29

Symmetric key encryption

A process in which a single key is used in both the encryption and decryption algorithm to encode/decode data.

New cards
30

Public key encryption

A method of paired key encryption in which the key used to encrypt data is made available to anybody and its corresponding decryption key is kept secret.

New cards
31

Paired keys

Two keys that are related in such a way that one can be used to encrypt data, which can then only be decrypted by the other key.

New cards
32

System administrator

A person responsible for managing computers, networks, servers, and other computing resources.

New cards
33

Multi-factor authentication

A method of computer access control that requires presenting several separate pieces of evidence to an authentication mechanism.

New cards
34

Graphical user interface (GUI)

The dominant method for designing human-computer interaction.

New cards
35

Application programming interface (API)

A way programmers share their code with other programmers.

New cards
36

Widget

A standard component of a graphical user interface.

New cards
37

Argument

An input value to a command that specifies the values of the parameters when a procedure is called.

New cards
38

Logic error

A mistake in the algorithm or program that causes it to behave incorrectly.

New cards
39

Syntax

Precise rules defining how the elements of a programming language are required to be used together.

New cards
40

Runtime error

A mistake in the program that occurs during its execution.

New cards
41

Global variable

A variable that can be used in any part of the program.

New cards
42

Pseudocode

An outline of the basic ideas behind how algorithms will work.

New cards

Explore top notes

note Note
studied byStudied by 79 people
... ago
5.0(2)
note Note
studied byStudied by 57 people
... ago
5.0(1)
note Note
studied byStudied by 81 people
... ago
5.0(1)
note Note
studied byStudied by 1 person
... ago
5.0(1)
note Note
studied byStudied by 312 people
... ago
5.0(2)
note Note
studied byStudied by 11 people
... ago
4.0(1)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 30 people
... ago
4.0(1)

Explore top flashcards

flashcards Flashcard (30)
studied byStudied by 20 people
... ago
5.0(2)
flashcards Flashcard (23)
studied byStudied by 10 people
... ago
5.0(1)
flashcards Flashcard (26)
studied byStudied by 34 people
... ago
5.0(1)
flashcards Flashcard (38)
studied byStudied by 173 people
... ago
5.0(1)
flashcards Flashcard (22)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (38)
studied byStudied by 193 people
... ago
5.0(1)
flashcards Flashcard (187)
studied byStudied by 54 people
... ago
5.0(1)
flashcards Flashcard (75)
studied byStudied by 6 people
... ago
5.0(1)
robot