Computer Science Semester 2 Final Vocab

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/36

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:52 PM on 5/18/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

37 Terms

1
New cards

Parameter

A variable in a function definition. Used as a placeholder for values that will be passed through the function.

2
New cards

Argument

The value passed to the parameter.

3
New cards

Return

Used to return the flow of control to the point where the procedure (also known as a function) was called and to return the value of expression.

4
New cards

Procedural abstraction

A process and allows a procedure to be used only knowing what it does, not how it does it. Procedural abstraction allows a solution to a large problem to be based on the solution of smaller subproblems.

5
New cards

Library

A group of functions (procedures) that may be used in creating new programs.

6
New cards

API (Application Program Interface)

Specifications for how functions in a library behave and can be used.

7
New cards

Modularity

The subdivision of a computer program into separate subprograms.

8
New cards

Computing Innovation

Includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).

9
New cards

Personally Identifiable Information (PII)

Information about an individual that identifies, links, relates, or describes them.

10
New cards

Phishing

A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

11
New cards

Keylogging

The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.

12
New cards

Malware

Software intended to damage a computing system or to take partial control over its operation.

13
New cards

Rogue Access Point

A wireless access point that gives unauthorized access to secure networks.

14
New cards

Encryption

A process of encoding messages to keep them secret, so only "authorized" parties can read it.

15
New cards

Decryption

A process that reverses encryption, taking a secret message and reproducing the original plain text.

16
New cards

Symmetric Key Encryption

Involves one key for both encryption and decryption.

17
New cards

Public Key Encryption

Pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message.

18
New cards

Multi-factor Authentication

A system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access.

19
New cards

Computer Virus Scanning Software

Protects a computing system against infection.

20
New cards

Problem

A general description of a task that can (or cannot) be solved with an algorithm.

21
New cards

Algorithm

A finite set of instructions that accomplish a task.

22
New cards

Sequencing

Putting steps in an order.

23
New cards

Selection

Deciding which steps to do next.

24
New cards

Iteration

Doing some steps over and over.

25
New cards

Efficiency

A measure of how many steps are needed to complete an algorithm.

26
New cards

Linear Search

A search algorithm which checks each element of a list, in order, until the desired value is found or all elements in the list have been checked.

27
New cards

Binary Search

A search algorithm that starts at the middle of a sorted set of numbers and removes half of the data; this process repeats until the desired value is found or all elements have been eliminated.

28
New cards

Reasonable Time

Algorithms with a polynomial efficiency or lower (constant, linear, square, cube, etc.) are said to run in a reasonable amount of time.

29
New cards

Unreasonable Time

Algorithms with exponential or factorial efficiencies are examples of algorithms that run in an unreasonable amount of time.

30
New cards

Heuristic

Provides a "good enough" solution to a problem when an actual solution is impractical or impossible.

31
New cards

Decision Problem

A problem with a yes/no answer (e.g., is there a path from A to B?).

32
New cards

Optimization Problem

A problem with the goal of finding the "best" solution among many (e.g., what is the shortest path from A to B?).

33
New cards

Undecidable Problem

A problem for which no algorithm can be constructed that is always capable of providing a correct yes-or-no answer.

34
New cards

Sequential Computing

A model in which programs run in order, one command at a time.

35
New cards

Parallel Computing

A model in which programs are broken into small pieces, some of which are run simultaneously.

36
New cards

Distributed Computing

A model in which programs are run by multiple devices.

37
New cards

Speedup

The time used to complete a task sequentially divided by the time to complete a task in parallel.