Practice TestTake a test on your terms and definitions
Spaced RepetitionScientifically backed study method
Matching GameHow quick can you match all your cards?
FlashcardsStudy terms and definitions
1 / 91
There's no tags or description
Looks like no one added any tags here yet for you.
92 Terms
1
Algorithm
a finite set of instructions that accomplish a task
New cards
2
API Application Program Interface
specifications for how functions in a library behave and can be used
New cards
3
Argument
the value passed to the parameter
New cards
4
Assignment Operator
allows a program to change the value represented by a variable
New cards
5
Bandwidth
the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second
New cards
6
Binary Search
a search algorithm that starts at the middle of a sorted set of numbers and removes half of the data; this process repeats until the desired value is found or all elements have been eliminated
New cards
7
Boolean Value
a data type that is either true or false
New cards
8
Citizen Science
scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices.
New cards
9
Cleaning Data
a process that makes the data uniform without changing its meaning (e.g., replacing all equivalent abbreviations, spellings, and capitalizations with the same word).
New cards
10
Comment
form of program documentation written into the program to be read by people and which do not affect how a program runs
New cards
11
Comparison Operator
New cards
12
Computer Virus Scanning Software
protects a computing system against infection
New cards
13
Computing Device
a machine that can run a program, including computers, tablets, servers, routers, and smart sensors
New cards
14
Computing Innovation
includes a program as an integral part of its function. Can be physical (e.g. self
New cards
15
Computing Network
a group of interconnected computing devices capable of sending or receiving data.
New cards
16
Computing System
a group of computing devices and programs working together for a common purpose
New cards
17
Conditional Statement
affects the sequential flow of control by executing different statements based on the value of a Boolean expression
New cards
18
Correlation
a relationship between two pieces of data, typically referring to the amount that one varies in relation to the other.
New cards
19
Crowdsourcing
the practice of obtaining input or information from a large number of people via the Internet
New cards
20
Data Abstraction
manage complexity in programs by giving a collection of data a name without referencing the specific details of the representation
New cards
21
Data Bias
data that does not accurately reflect the full population or phenomenon being studied
New cards
22
Data Filtering
choosing a smaller subset of a data set to use for analysis, for example by eliminating / keeping only certain rows in a table
New cards
23
Debugging
Finding and fixing problems in an algorithm or program
New cards
24
Decision Problem
a problem with a yes/no answer (e.g., is there a path from A to B?)
New cards
25
Decryption
a process that reverses encryption, taking a secret message and reproducing the original plain text
New cards
26
Development Process
the steps or phases used to create a piece of software. Typical phases include investigating, designing, prototyping, and testing.
New cards
27
Digital Divide
differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics
New cards
28
Distributed Computing
a model in which programs are run by multiple devices
New cards
29
Documentation
a written description of how a command or piece of code works or was developed
New cards
30
Domain Name System (DNS)
the system responsible for translating domain names like example.com into IP addresses
New cards
31
Efficiency
a measure of how many steps are needed to complete an algorithm
New cards
32
Element
an individual value in a list that is assigned a unique index
New cards
33
Encryption
a process of encoding messages to keep them secret, so only "authorized" parties can read it
New cards
34
Event Driven Programming
some program statements run when triggered by an event, like a mouse click or a key press
New cards
35
Expression
a combination of operators and values that evaluates to a single value
New cards
36
Fault Tolerant
Can continue to function even in the event of individual component failures. This is important because elements of complex systems like a computer network fail at unexpected times, often in groups.
New cards
37
Function
a named group of programming instructions. Also referred to as a “procedure”.
New cards
38
Function Call
a command that executes the code within a function
New cards
39
Heuristic
provides a "good enough" solution to a problem when an actual solution is impractical or impossible
New cards
40
HyperText Transfer Protocol (HTTP)
the protocol used for transmitting web pages over the Internet
New cards
41
Index
a common method for referencing the elements in a list or string using numbers
New cards
42
Infinite Loop
occurs when the ending condition will never evaluate to true
New cards
43
Information
the collection of facts and patterns extracted from data
New cards
44
Information
the collection of facts and patterns extracted from data
New cards
45
Input
data that are sent to a computer for processing by a program. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.
New cards
46
Internet Protocol (IP)
a protocol for sending data across the Internet that assigns unique numbers (IP addresses) to each connected device
New cards
47
IP Address
The unique number assigned to each device on the Internet
New cards
48
Iteration
a repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met
New cards
49
Iteration
a repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met
New cards
50
Keylogging
the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
New cards
51
Library
a group of functions (procedures) that may be used in creating new programs
New cards
52
Linear Search
a search algorithm which checks each element of a list, in order, until the desired value is found or all elements in the list have been checked
New cards
53
List
an ordered collection of elements
New cards
54
Logical Operator
NOT, AND, and OR, which evaluate to a Boolean value
New cards
55
Logical Operator
NOT, AND, and OR, which evaluate to a Boolean value
New cards
56
Malware
software intended to damage a computing system or to take partial control over its operation
New cards
57
Metadata
data about data
New cards
58
Modularity
the subdivision of a computer program into separate subprograms
New cards
59
Multi
factor Authentication
New cards
60
Optimization Problem
a problem with the goal of finding the "best" solution among many (e.g., what is the shortest path from A to B?)
New cards
61
Output
any data that are sent from a program to a device. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.
New cards
62
Packet
A chunk of data sent over a network. Larger messages are divided into packets that may arrive at the destination in order, out
New cards
63
Pair Programming
a collaborative programming style in which two programmers switch between the roles of writing code and tracking or planning high level progress
New cards
64
Parallel Computing
a model in which programs are broken into small pieces, some of which are run simultaneously
New cards
65
Parameter
a variable in a function definition. Used as a placeholder for values that will be passed through the function
New cards
66
Path
the series of connections between computing devices on a network starting with a sender and ending with a receiver
New cards
67
Personally Identifiable Information (PII)
information about an individual that identifies, links, relates, or describes them
New cards
68
Phishing
a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
New cards
69
Problem
a general description of a task that can (or cannot) be solved with an algorithm
New cards
70
Procedural Abstraction
a process and allows a procedure to be used only knowing what it does, not how it does it. Procedural abstraction allows a solution to a large problem to be based on the solution of smaller subproblems. This is accomplished by creating procedures to solve each of the subproblems.
New cards
71
Program
a collection of program statements. Programs run (or “execute”) one command at a time.
New cards
72
Program Statement
a command or instruction. Sometimes also referred to as a code statement.
New cards
73
Protocol
An agreed
New cards
74
Public Key Encryption
pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message
New cards
75
Reasonable Time
Algorithms with a polynomial efficiency or lower (constant, linear, square, cube, etc.) are said to run in a reasonable amount of time
New cards
76
Redundancy
The inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network
New cards
77
Return
used to return the flow of control to the point where the procedure (also known as a function) was called and to return the value of expression
New cards
78
Rouge Access Point
a wireless access point that gives unauthorized access to secure networks
New cards
79
Router A type of computer that forwards data across a network
New cards
80
Selection
deciding which steps to do next
New cards
81
Sequencing
putting steps in an order
New cards
82
Sequential Computing
a model in which programs run in order, one command at a time
New cards
83
Sequential Programming
program statements run in order, from top to bottom
New cards
84
Speedup
the time used to complete a task sequentially divided by the time to complete a task in parallel
New cards
85
String
an ordered sequence of characters
New cards
86
Symmetric Key Encryption involves one key for both encryption and decryption
New cards
87
Traversal
the process of accessing each item in a list one at a time
New cards
88
Undecidable Problem
a problem for which no algorithm can be constructed that is always capable of providing a correct yes
New cards
89
Unreasonable Time
Algorithms with exponential or factorial efficiencies are examples of algorithms that run in an unreasonable amount of time
New cards
90
User Interface
the inputs and outputs that allow a user to interact with a piece of software. User interfaces can include a variety of forms such as buttons, menus, images, text, and graphics.
New cards
91
Variable
a named reference to a value that can be used repeatedly throughout a program