CSP Study Guide

studied byStudied by 1 person
0.0(0)
get a hint
hint

Syntax error

1 / 49

50 Terms

1

Syntax error

A mistake in typed code that violates the rules of the programming language, preventing the code from running.

New cards
2

Logic error

A mistake in an algorithm or program causing unexpected behavior or incorrect results.

New cards
3

Run-time error

A mistake in a program that occurs during execution, like accessing non-existent memory.

New cards
4

Overflow error

Error due to insufficient bits to represent a number, similar to an odometer "rolling over."

New cards
5

Bit

A binary digit, 0 or 1, fundamental in binary numbers.

New cards
6

Byte

A sequence of 8 bits, essential in computing and data storage.

New cards
7

Roundoff

Error from insufficient bits to represent a number precisely, like approximating 3.14 with 3 digits.

New cards
8

Analog data

Data changing smoothly over time, like live concert pitch and volume.

New cards
9

Lossless

Data compression preserving all original data for full recovery.

New cards
10

Lossy

Data compression discarding some data, making full recovery impossible.

New cards
11

Metadata

Information about data, like file descriptions or database rows.

New cards
12

Sequencing

Sequential execution of steps in an algorithm or program, akin to a recipe.

New cards
13

Selection

Choosing a path based on a Boolean condition in an algorithm or program.

New cards
14

Iteration

Repeating steps in an algorithm until a condition is met.

New cards
15

Linear search

Algorithm searching for a target value by iterating through a list.

New cards
16

Binary search

Algorithm searching a sorted list by halving the search space.

New cards
17

Reasonable time

Algorithm runtime not increasing faster than a polynomial function of input size.

New cards
18

Heuristic

Technique aiding algorithms in finding solutions for complex problems.

New cards
19

Undecidable

A problem so complex no algorithm can answer for all inputs.

New cards
20

Library

Collection of useful procedures for program creation.

New cards
21

API

Application Programming Interface, a library with procedure descriptions.

New cards
22

Modularity

Separating a program into independent modules for functionality.

New cards
23

Traversal

Iterating over items in a list, either fully or partially.

New cards
24

Computing device

Physical device running programs, like computers or smartphones.

New cards
25

Computer network

Interconnected devices capable of data exchange.

New cards
26

Bandwidth

Maximum data transfer rate over a network connection.

New cards
27

Protocol

Agreed rules specifying system behavior.

New cards
28

Scalability

System's ability to adjust to new demands.

New cards
29

IP (Internet Protocol)

Protocol for addressing and routing data on networks.

New cards
30

TCP (Transmission Control Protocol)

Protocol for reliable data transmission.

New cards
31

UDP (User Datagram Protocol)

Lightweight data transport protocol.

New cards
32

World Wide Web

System of linked web pages and media.

New cards
33

HTTP (Hypertext Transfer Protocol)

Protocol for web data exchange.

New cards
34

Parallel computing

Splitting a program into tasks for simultaneous execution.

New cards
35

Speedup

Improvement in program time by parallel execution.

New cards
36

Distributed computing

Using multiple devices for program execution.

New cards
37

Digital divide

Disparity in computing access among communities.

New cards
38

Crowdsourcing

Collaborative model for funding, ideas, or goods creation.

New cards
39

Citizen science

Public participation in scientific research projects.

New cards
40

Creative Commons

Alternative to copyright for sharing artistic creations.

New cards
41

Open access

Policy allowing access to documents or data.

New cards
42

PII (Personally identifiable information)

Data identifying individuals.

New cards
43

Multifactor authentication (MFA)

User authentication with multiple evidence categories.

New cards
44

Encryption

Scrambling data to prevent unauthorized access.

New cards
45

Symmetric encryption

Technique using the same key for encryption and decryption.

New cards
46

Public key encryption

Asymmetric encryption using different keys for encryption and decryption.

New cards
47

Cookie

Small text tracking user information on websites.

New cards
48

Virus

Malware capable of self-replication.

New cards
49

Phishing

Deceptive attack to obtain private information.

New cards
50

Rogue access point

Unauthorized wireless access point intercepting network traffic.

New cards

Explore top notes

note Note
studied byStudied by 30 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 51 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 2555 people
Updated ... ago
4.9 Stars(7)
note Note
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 25 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 289 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 10105 people
Updated ... ago
5.0 Stars(23)

Explore top flashcards

flashcards Flashcard393 terms
studied byStudied by 268 people
Updated ... ago
5.0 Stars(4)
flashcards Flashcard28 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard214 terms
studied byStudied by 9 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard32 terms
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard80 terms
studied byStudied by 15 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard28 terms
studied byStudied by 22 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard49 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard46 terms
studied byStudied by 26 people
Updated ... ago
5.0 Stars(1)