1/49
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
syntax error
A mistake in typed code that violates the rules of the programming language, typically preventing the code from running.
logic error
A mistake in an algorithm or program that causes it to behave unexpectedly or return the incorrect value.
run-time error
A mistake in a program that occurs only when it is actually run, such as trying to access memory that does not exist.
overflow error
An error that results when the number of bits is insufficient to represent a number, akin to a car’s odometer rolling over.
bit
A binary digit, either 0 or 1.
byte
A sequence of 8 bits.
roundoff
An error that occurs when the number of bits is insufficient to represent a number with full precision.
analog data
Values that change smoothly over time rather than in discrete intervals.
lossless
A method of compressing data that allows full recovery of the original data.
lossy
A method of compressing data that discards some information, making it impossible to recover the original.
metadata
Data about data, like descriptive information about a file or a database row.
sequencing
The sequential execution of steps in an algorithm or program.
selection
A Boolean condition used to determine which of two paths to take in an algorithm or program.
iteration
The repetition of steps in an algorithm or program for a certain amount of time or until a condition is met.
linear search
An algorithm that checks each item in a list until the target value is found.
binary search
An algorithm that searches a sorted list by repeatedly splitting the list in half.
reasonable time
A run time for an algorithm that does not increase faster than a polynomial function of input size.
heuristic
A technique that helps an algorithm find a good solution to a difficult problem.
undecidable
A problem that is so complex, there is no algorithm that can determine a yes or no answer for all inputs.
library
A collection of procedures that are useful in creating programs.
API
Application Programming Interface, a library of procedures and descriptions on how to call each.
modularity
The separation of a program into independent modules, each responsible for one aspect of functionality.
traversal
Iterating over items in a list, either fully or partially.
computing device
A physical device capable of running a program.
computer network
A group of interconnected computing devices that can send or receive data.
bandwidth
The maximum amount of data that can be transmitted over a network connection in a fixed period of time.
protocol
A set of agreed-upon rules that govern the behavior of a system.
scalability
The ability of a system to adjust in size to meet new demands.
IP (Internet Protocol)
The protocol that addresses nodes on a network and routes data to destination nodes.
TCP (Transmission Control Protocol)
A data transport protocol that ensures reliable packet transmission to a destination.
UDP (User Datagram Protocol)
A lightweight protocol for data transport with minimal error checking.
World Wide Web
A system of linked pages and media accessible over HTTP.
HTTP (Hypertext Transfer Protocol)
The protocol used to request webpages from servers.
parallel computing
A model that splits a program into multiple tasks that can be executed simultaneously.
speedup
The improvement in execution time of a parallelized program compared to sequential execution.
distributed computing
A model using multiple devices to run different parts of a program.
digital divide
The gap between communities that have access to computing and those that do not.
crowdsourcing
A model where many users collaborate online to fund, generate ideas, or create projects.
citizen science
Crowdsourcing for scientific research involving public participation.
Creative Commons
A licensing alternative to copyright that allows creators to specify usage terms for their work.
open access
A policy that allows unrestricted access to research papers and governmental datasets.
PII (Personally identifiable information)
Information that can be used to identify an individual.
multifactor authentication (MFA)
A user authentication method requiring multiple forms of evidence.
encryption
The process of converting data into a coded format to prevent unauthorized access.
symmetric encryption
A method of data encryption using the same key for both encryption and decryption.
public key encryption
An asymmetric encryption method using different keys for encrypting and decrypting data.
cookie
Small text files that track information about a user visiting a website.
virus
A type of computer malware capable of making copies of itself.
phishing
An attack that tricks users into revealing private information through deceptive messages.
rogue access point
An unauthorized wireless access point providing an attacker access to network traffic.