1/68
Flashcards for reviewing computer science lecture notes, focusing on vocabulary terms and definitions.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Program Development Life Cycle
The stages of designing, writing, testing, and refining a program.
Collaboration in Programming
Working with others to brainstorm, divide tasks, and debug efficiently in programming.
Program Documentation
Writing comments or explanations that describe what code does for future reference.
Iterative Design
Continuously improving a program through repeated testing and refinement.
Incremental Development
Building a program step by step and testing each part as you go.
Binary Numbers (bits, bytes)
Data in computers is stored using only 0s and 1s.
Data Types (numbers, text, Boolean)
Different kinds of data like integers, text (strings), or true/false values.
Data Abstraction
Organizing data in a way that hides complexity, like using lists or tables.
Data Compression (lossy vs. lossless)
Reducing data size by removing redundancy (lossless) or quality (lossy).
Patterns in Data
Identifying trends, similarities, or anomalies in datasets.
Metadata
Data that describes other data, like a file’s size or date created.
Data Collection Tools
Software or hardware used to gather information (e.g., surveys, sensors).
Cleaning Data
Removing errors, duplicates, or inconsistencies in datasets.
Using Programs to Process Data
Writing code to analyze or manipulate data automatically.
Visualizing Data
Creating graphs or charts to better understand and communicate data insights.
Variables and Assignments
Storing values in named containers that can be changed.
Data Types (numeric, Boolean, string)
Specific kinds of values used in code (numbers, true/false, or text).
Lists (arrays)
A collection of elements stored in a single variable.
Indexing Lists
Accessing specific items in a list by their position (starting at 1 in pseudocode).
Logic Expressions (AND, OR, NOT)
Statements that combine conditions to return true or false.
Arithmetic Expressions
Math calculations in code (e.g., +, -, *, /, %).
Relational Operators (==, !=, >,
Compare values and return true or false.
Conditional Statements (if, if-else, nested if)
Code that runs only if certain conditions are true.
Iteration (for loop, while loop)
Repeating code multiple times using loops.
Traversing a List
Going through each item in a list one by one.
Functions/Procedures
Reusable blocks of code that perform specific tasks.
Parameters and Arguments
Inputs passed into a function to affect how it runs.
Return Values
The output that a function gives back after being called.
Abstraction Through Functions
Hiding complexity by using named blocks of code for specific actions.
Developing Algorithms
Creating a clear step-by-step process to solve a problem.
Sequencing, Selection, and Iteration
The three basic control structures: order, decisions, and repetition.
String Operations
Manipulating text, like combining or slicing strings.
Random Values
Using code to generate unpredictable numbers.
Efficiency of Algorithms
How quickly or effectively an algorithm solves a problem.
Simulations
Modeling real-world processes with a program to test different scenarios.
Computing Devices
Machines like computers, tablets, or smartphones that run programs.
Input/Output Devices
Hardware that sends data to (input) or receives data from (output) a computer.
The Internet
A global network that connects devices and allows data sharing.
IP Addresses
Unique numbers that identify devices on the Internet.
DNS (Domain Name System)
Translates website names into IP addresses.
HTTP/HTTPS
Protocols used to request and send web data (HTTPS is secure).
TCP/IP Protocols
Rules that govern how data is split into packets and sent across networks.
Fault Tolerance
The ability of a system to keep working even if parts fail.
Redundancy
Having extra pathways or backups to ensure reliability.
Packet Switching
Breaking data into packets that travel separately and reassemble at the destination.
Parallel and Distributed Computing
Running tasks simultaneously on multiple computers or processors.
Scalability
The ability of a system to handle increased demand by adding resources.
Cybersecurity Basics
Practices to protect systems and data from unauthorized access or attacks.
Public Key Encryption
A secure way of sending data using paired public and private keys.
Phishing and Other Threats
Tactics used by attackers to steal information or harm systems.
Digital Certificates
Used to verify that a website is secure and legitimate.
Computing Innovations
New technology or applications created using computing tools.
Beneficial and Harmful Effects of Computing
Positive and negative consequences of computer use.
Bias in Computing
When algorithms reflect unfair assumptions or data.
Digital Divide
Unequal access to technology based on geography, income, or other factors.
Crowdsourcing
Gathering input or data from a large group of people, often online.
Legal and Ethical Concerns
Questions about what is right or allowed in computing.
Data Privacy
Protecting personal information from unauthorized use.
Intellectual Property
Legal rights over creative works like software or media.
Open Source vs. Licensed Software
Free-to-use and modify software versus software with restrictions.
List
A variable that stores multiple related items.
Procedure with Parameter
A function that takes an input to modify its behavior.
Mathematical/Logic Expressions
Uses math or Boolean logic in code.
Iteration
Repetition using a loop.
Selection
A decision using if/else or similar logic.
Input/Output
Receiving data from the user and displaying results.
Purpose and Functionality
What your program is meant to do and how it works.
Test Cases
Examples that show your program works correctly.
Written Responses (sections 2a–2d)
Short written explanations submitted with the project.