1/77
Flashcards to help review lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Debugging
Finding and fixing errors in code.
Collaborative Development
Working together as a team.
Logic Error
An error that causes code to behave wrongly or unexpectedly.
Lossy Compression
Compressing data in a way that you loose some of it and revert to original fully
Lossless compression
Compression data in a way that you can compress decrease file size but you don’t loose data and your able to completely revert to original
Runtime Error
An error that occurs during the execution of the program.
Logic Error
Unexpected result of code, like division instead of multiplication
Syntax Error
Error before the code even starts, like using capital letter for variable instead of lowercase
Argument
A value that is passed to a procedure.
Parameter
A placeholder in a procedure that is replaced by an argument.
Procedural Abstraction
A built-in procedure.
Iteration
The repetition of an action until a certain requirement is met.
String
Text that is enclosed in quotation marks.
Variable
A data type that can do math (usually an Integer).
Traversal
Iterating through each item in a list.
Linear Search
Goes and checks through everything beginning to end.
Binary Search
Splits in 1/2 and uses middle index to check through; divides and rounds down; repeats until target is found.
Libraries
Tools or code that you already have.
API (Application Programming Interface)
Allows you to call other programs to get stuff you don't have.
Heuristic
A good enough, fast approach when finding the real one takes too long.
Decidable Program
A program where you can get a yes or no answer.
Modularity
The separation of your code into different functions that each do a part.
Nested Condition
An If statement within another If statement.
Data Abstraction
The simplified version of a more complex function; hiding content.
Internet
A network of networks; interconnection of computer networks; hardware-driven.
Routers
Computing devices along a path that send info along to the next stop.
Routing
The process of finding a path from the sender to the receiver.
Bandwidth
The amount of data that can be moved through a network at one time, measured in bits per second (bps).
Internet Protocol (IP)
Every device has an IP Address; handles the addressing and routing of data packets.
TCP (Transmission Control Protocol)
This is reliable and makes sure all data packets come in the right order. If a packet is missing, it's re-sent.
UDP (User Datagram Protocol)
This is faster than TCP but is not as reliable. Sends data without checking, mainly used in Video calls and games where speed matters more than perfection.
Scalability
Systems ability to handle growth, adapting the server when more users arrive so it doesn't crash.
Fault Tolerance
Systems ability to still work even if a part fails; finds a way to keep going.
Hardware Failure
When physical devices stop working.
Operational Failure
Systems or software don't work as expected.
Environmental Issues
Hurricanes, earthquakes, or floods can destroy physical infrastructure because most cables go through the land and sea.
Solar Flare
A burst of radiation from the sun that can disrupt satellites.
Cyberattacks
Intentional attacks on systems or data.
Phishing
Tricking people into giving passwords.
Malware
Damages or spies on systems.
DDos
Overloads website with fake traffic to make it crash.
SQL Injection
Hacks into data by inserting fake commands.
Man in the Middle
Eavesdrops or alters communication between 2 parties.
Parallel Computing
Breaking up big tasks into smaller parts in which the computer has different processors and runs them all at the same time.
Distributed Computing
Where a problem is split up among multiple computers. Not just one; each computer does its own thing then sends it back.
Protocol
An agreed-upon set of rules.
Redundancy
Extra paths to help with the fault tolerance of a system.
Latency
The delay between sending data.
DNS (Domain Name System)
Turns URIs into IP addresses.
HTTP
The set of rules that powers the World Wide Web.
Cloud Computing
Storing data to the Internet cloud at a different location other than the same location as your other files; makes teamwork access easier.
Open Access
Free access to research or datasets available to the public.
Open Source Software
Software that everyone has access to so people can contribute all over.
Creative Commons
A speaking license that lets you do what you want with the work and how can be reused.
World Wide Web
Access linked pages all over the Internet.
Crowdsourcing
Using large online groups to help solve a problem.
Citizen Science
Where the public helps in research purposes for scientists.
Data Analytics
Analytics tools to see what people are doing online.
Personally Identifiable Info
Data that can identify you.
Cookies
Small files that track your activity on Websites; make experience smoother but can invade privacy.
Digital Footprint
Tracks you leave behind on the Internet.
Bias
Favoring a certain face or group.
Data Mining
Digging through huge datasets to find patterns.
Cybersecurity
Protecting systems from attacks.
Multi-factor Authentication
Using multiple proofs like a password and code.
Encryption
Scrambling data so it can't be accessed without a key.
Symmetric Encryption
Same key is used for both encrypt and decrypt.
Public Key Encryption
Two different keys; public key to encrypt and you key to decrypt.
Phishing
A scam to trick people into giving info.
Virus
A malware that can copy and infect files.
Keyloggers
Records when you type; can be used to figure out passwords.
Rogue Access Point
A wireless point that provides with unauthorized access to traffic over network
Mod
Division with remainder.
Binary
Start at 2 to the 0, and go up by 1 power each 0, start from right to left.
Hexadecimal
Numbers go from 0-9, then start going by letter starting from 10 which is A is in base 16
Binary Code
Can be error prone, can be used for any code, harder for humans to read
Base
Ex) if base is 10 and number is 71 (7×10)+(10×1)
Ex) if base is 16 and number is 71 (7×16)+(1×16)
Incognito
Still allows for a admin to monitor your data not completely invisible, but doesn’t save cookies or data, like shopping carts.