Syntax error
A mistake in typed code that violates the rules of the programming language, preventing the code from running.
Logic error
A mistake in an algorithm or program causing unexpected behavior or incorrect results.
Run-time error
A mistake in a program that occurs during execution, like accessing non-existent memory.
Overflow error
Error due to insufficient bits to represent a number, similar to an odometer "rolling over."
Bit
A binary digit, 0 or 1, fundamental in binary numbers.
Byte
A sequence of 8 bits, essential in computing and data storage.
Roundoff
Error from insufficient bits to represent a number precisely, like approximating 3.14 with 3 digits.
Analog data
Data changing smoothly over time, like live concert pitch and volume.
Lossless
Data compression preserving all original data for full recovery.
Lossy
Data compression discarding some data, making full recovery impossible.
Metadata
Information about data, like file descriptions or database rows.
Sequencing
Sequential execution of steps in an algorithm or program, akin to a recipe.
Selection
Choosing a path based on a Boolean condition in an algorithm or program.
Iteration
Repeating steps in an algorithm until a condition is met.
Linear search
Algorithm searching for a target value by iterating through a list.
Binary search
Algorithm searching a sorted list by halving the search space.
Reasonable time
Algorithm runtime not increasing faster than a polynomial function of input size.
Heuristic
Technique aiding algorithms in finding solutions for complex problems.
Undecidable
A problem so complex no algorithm can answer for all inputs.
Library
Collection of useful procedures for program creation.
API
Application Programming Interface, a library with procedure descriptions.
Modularity
Separating a program into independent modules for functionality.
Traversal
Iterating over items in a list, either fully or partially.
Computing device
Physical device running programs, like computers or smartphones.
Computer network
Interconnected devices capable of data exchange.
Bandwidth
Maximum data transfer rate over a network connection.
Protocol
Agreed rules specifying system behavior.
Scalability
System's ability to adjust to new demands.
IP (Internet Protocol)
Protocol for addressing and routing data on networks.
TCP (Transmission Control Protocol)
Protocol for reliable data transmission.
UDP (User Datagram Protocol)
Lightweight data transport protocol.
World Wide Web
System of linked web pages and media.
HTTP (Hypertext Transfer Protocol)
Protocol for web data exchange.
Parallel computing
Splitting a program into tasks for simultaneous execution.
Speedup
Improvement in program time by parallel execution.
Distributed computing
Using multiple devices for program execution.
Digital divide
Disparity in computing access among communities.
Crowdsourcing
Collaborative model for funding, ideas, or goods creation.
Citizen science
Public participation in scientific research projects.
Creative Commons
Alternative to copyright for sharing artistic creations.
Open access
Policy allowing access to documents or data.
PII (Personally identifiable information)
Data identifying individuals.
Multifactor authentication (MFA)
User authentication with multiple evidence categories.
Encryption
Scrambling data to prevent unauthorized access.
Symmetric encryption
Technique using the same key for encryption and decryption.
Public key encryption
Asymmetric encryption using different keys for encryption and decryption.
Cookie
Small text tracking user information on websites.
Virus
Malware capable of self-replication.
Phishing
Deceptive attack to obtain private information.
Rogue access point
Unauthorized wireless access point intercepting network traffic.