1/29
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
algorithm
a step-by-step procedure or set of rules designed to solve a specific problem or perform a particular task
analysis
examining and understanding the problem thoroughly to identify its requirements, constraints, and objectives
design
planning and creating a solution to the problem based on the analysis; often involves the creation of algorithms and data structures
implementation
writing code or programming to execute the designed solution using a specific programming language or tool
maintenance
the ongoing process of keeping a system, machine, or software in good working condition
testing
evaluating the solution by running the program with different inputs to ensure it produces the expected outputs and behaves correctly
end user
the person who ultimately uses a software application or system
debugging
the process of identifying and fixing errors or "bugs" in the code that cause unexpected behavior or incorrect results
documentation
all the paperwork needed to produce a program
high-level programming language
a type of programming language designed to be easy for humans to read and write
low-level programming language
a type of programming language closer to the machine's native language
software development lifecycle
a systematic process consisting of several phases that are followed to produce high-quality software
Association for Computing Machinery (ACM)
an international organization dedicated to advancing computing as a science and profession
code of ethics
professional code of conduct and ethical guidelines established by organizations and industry associations to govern the behavior of computer scientists and technology professionals
Institute of Electrical and Electronics Engineers (IEEE)
an international organization focused on fostering innovation and excellence in electrical, electronics, and computing engineering
privacy
respecting and protecting individuals' privacy and confidentiality in the collection, storage, and use of personal data
professionalism
demonstrating competence, responsibility, and accountability in all professional activities and interactions
public interest
prioritizing the well-being and safety of the public in the design, development, and deployment of computing technology and systems
security
ensuring the security and integrity of computing systems and data and taking measures to prevent unauthorized access, misuse, and harm
copyright
a legal right granted to the creators of original works—such as literature, music, and art—protecting the creator's work from being used without permission
cyberbullying
harassment and intimidation conducted through digital platforms, including social media, messaging apps, and online forums
cybercrime
illegal activities conducted using computers and the internet, such as hacking, identity theft, and online fraud
fair use
a legal doctrine that allows the limited use of copyrighted material
file sharing
the practice of distributing or providing access to digital files—such as documents, music, or software—over the internet or a network ·
intellectual property
creations of the mind, such as inventions, literary and artistic works, designs, symbols, names, and images
malware
malicious software; refers to any software designed to harm, exploit, or otherwise compromise the operation of computers, networks, or devices
patent
a legal right granted to an inventor giving them exclusive control over the use and commercialization of their invention for a specific period
peer-to-peer networks
a decentralized network where each participant (peer) has equal privileges and can directly share resources, such as files, with other peers without needing a central server
piracy
the unauthorized use, reproduction, or distribution of copyrighted materials, such as software, music, movies, and books
trademark
a symbol, word, or phrase legally registered or established by use as representing a company or product