1/21
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Computing Innovations
Innovations that utilize a program as a key component of their function.
Collaboration
Essential in Computer Science for incorporating diverse ideas and thoughts catering to various individuals.
Pair Programming
Two individuals sharing a computer, taking turns in coding.
Errors
Mistakes in programming that include Logic Errors, Syntax Errors, Run-Time Errors, and Overflow Errors.
Incremental Development Process
Breaking down a problem into smaller parts and reassembling the solution.
Waterfall Development Model
A step-by-step process where each step flows into the next.
Data
Information collected from various sources, including numbers and facts.
Abstraction
Simplifying complexity by focusing on essential parts and hiding irrelevant details.
Data Compression
Reducing data size based on the method used and the amount of repeated information.
Metadata
Information about data.
Pseudocode
Used in the AP Exam, a high-level description of a computer program.
Loops
Used to traverse through lists, arrays, and strings.
Algorithms
Instructions to accomplish a task or solve a problem using sequencing, selection, and iteration.
Procedures
Programming instructions also known as methods or functions.
Logical Operators
NOT, AND, and OR used in programming.
Parallel Computing
Breaking a program into smaller operations processed simultaneously using multiple processors.
Fault Tolerant
Ability to function despite partial malfunction.
Internet
Interconnection of networks allowing communication between computing devices.
Digital Divide
Disparities in internet access due to demographics, socioeconomic status, and geographic location.
Intellectual Property
Work considered one's own, including Copyright, Creative Commons, Open-sourcing, and Open access.
Malware
Malicious software that takes control of a system.
Encryption
Encoding data to prevent unauthorized access, including Symmetric key encryption and Public key encryption.