1/49
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Syntax error
A mistake in typed code that violates the rules of the programming language, preventing the code from running.
Logic error
A mistake in an algorithm or program causing unexpected behavior or incorrect results.
Run-time error
A mistake in a program that occurs during execution, like accessing non-existent memory.
Overflow error
Error due to insufficient bits to represent a number, similar to a car's odometer "rolling over."
Bit
A binary digit, 0 or 1, fundamental in binary numbers.
Byte
A sequence of 8 bits, essential in bytes.
Roundoff
Error from insufficient bits to represent a number precisely, like approximating π as 3.14.
Analog data
Values changing smoothly over time, like pitch and volume in live concerts.
Lossless
Data compression preserving all original data for full recovery.
Lossy
Data compression discarding some data, making full recovery impossible.
Metadata
Information about data, like file descriptions or database rows.
Sequencing
Sequential execution of steps in an algorithm or program.
Selection
Using Boolean conditions to choose paths in an algorithm.
Iteration
Repeating steps in an algorithm until a condition is met.
Linear search
Algorithm searching for a target value by iterating through a list.
Binary search
Algorithm searching a sorted list by splitting it in half.
Reasonable time
Algorithm runtime not increasing faster than a polynomial function.
Heuristic
Technique aiding algorithms in finding solutions in complex problems.
Undecidable
A problem too complex for an algorithm to answer for all inputs.
Library
Collection of useful procedures for program creation.
API
Application Programming Interface, a library with procedure descriptions.
Modularity
Separating a program into independent modules for functionality.
Traversal
Iterating over items in a list, either fully or partially.
Computing device
Physical device running programs, like computers or smartphones.
Computer network
Interconnected devices capable of data exchange.
Bandwidth
Maximum data transfer rate over a network connection.
Protocol
Agreed rules specifying system behavior.
Scalability
System's ability to adjust to new demands.
IP (Internet Protocol)
Protocol for addressing and routing data on networks.
TCP (Transmission Control Protocol)
Protocol for reliable data transmission.
UDP (User Datagram Protocol)
Lightweight data transport protocol.
World Wide Web
System of linked pages and media browsable over HTTP.
HTTP (Hypertext Transfer Protocol)
Protocol for web requests and data submission.
Parallel computing
Splitting a program into tasks for simultaneous execution.
Speedup
Improvement in time taken by a parallelized program.
Distributed computing
Using multiple devices to run program parts.
Digital divide
Disparity in computing access among communities.
Crowdsourcing
Collaborative model for funding projects or generating ideas.
Citizen science
Public participation in scientific research projects.
Creative Commons
Alternative to copyright for sharing artistic creations.
Open access
Policy allowing access to documents or data.
PII (Personally identifiable information)
Information uniquely identifying individuals.
Multifactor authentication (MFA)
User authentication with multiple evidence pieces.
Encryption
Scrambling data to prevent unauthorized access.
Symmetric encryption
Technique using the same key for encryption and decryption.
Public key encryption
Asymmetric encryption using different keys for encryption and decryption.
Cookie
Small text tracking user information on websites.
Virus
Self-replicating computer malware.
Phishing
Deceptive attack to obtain private information.
Rogue access point
Unauthorized wireless access point for network interception.