1/28
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Algorithm
An ordered set of clearly defined instructions used to accomplish a specific task. An expression of any task as a sequence of detailed steps.
Abstraction
A technique or process that manages complexity in a program or computer system by hiding details; creating modular code to execute specific desired functionality.
Variable
A place inside a program that can hold a value.
Loop
A programming construct used to repeat code. An infinite loop occurs when the ending condition will never evaluate to true.
Conditional Statement
Constructs that evaluate a relation as true or false. A block of statements indented under an "if" statement will execute if the condition is true.
Function / Procedure
A named group of programming instructions. In Python, procedures are known as functions.
Parameter
A value you can give to a method or function (e.g., in painter.forward(5), the 5 is the parameter).
Debugging*
The process of finding and fixing errors or bugs in a program's source code.
Decomposition
When a programmer breaks down code into smaller, more manageable chunks.
Creative Computing*
The practice of using computing and programming to create expressive, interactive, and visually engaging digital projects.
Packet
Small units of data transmitted on a network.
Metadata
Data about data; it is found in the header of a packet and includes things like IP addresses and packet size.
IP Address*
A unique numerical identifier assigned to a computing device to allow it to communicate over the Internet.
DNS (Domain Name System)
A system that provides client machines with the IP address of a server by turning human
TCP (Transmission Control Protocol)
A reliable, connection
UDP (User Datagram Protocol)
A lightweight and connectionless protocol that sends packets faster without checking for missing pieces.
TCP/IP*
The foundational suite of communication protocols used to interconnect network devices on the internet.
Redundancy
Having many machines ready to respond to a web request. It makes systems fault
Routing*
The process of transmitting data packets across networks from a source to a specific destination.
Encryption (Public Key)
A system using two paired keys: one key is used to encrypt, one to decrypt. One is shared publicly, and the other is kept private.
HTTPS (Hypertext Transfer Protocol Secure)*
A secure protocol used for exchanging web page content securely over the Internet using encryption.
Firewall*
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Password Safety*
The practice of protecting online accounts, primarily by using different, complex passwords for every platform to prevent unauthorized access.
Phishing
Tricking a user into providing personal information (e.g., a scammer sending an email or text that makes you enter data).
PII (Personally Identifiable Information)
Information about an individual that is unique to them, such as their age, SSN, or medical info.
Bandwidth
The maximum amount of data that can be sent over a network connection in a given amount of time.
Latency
A measure of the delay in communication between two devices over a network.
Data Privacy*
The appropriate handling, protection, and use of sensitive personal information (like PII) to keep it safe from unauthorized access.
Ethical Impacts*
The broader societal and moral consequences of computing innovations, including issues of bias, accessibility, and privacy.