Unit One: Primitive Types

5.0(1)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/54

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

55 Terms

1
New cards
Bit
short for binary digit, the smallest unit of unit of information on a machine
2
New cards
Blacklist
in internet terminology, a generic term for a list of email addresses or IP addresses that are origination with known spammers
3
New cards
Byte
a byte is 8 bits
4
New cards
Character
any symbol that requires one byte of storage
5
New cards
Cyberspace
a metaphor for describing the non-physical terrain created by computer systems
6
New cards
Data
data is distinct information that is formatted in a special way. Data exists in a variety of forms, like text on paper or bytes stored in electronic memory
7
New cards
Data center
physical or virtual infrastructures used by enterprises to house computer, server and networking systems and components for the company's IT (information technology) needs
8
New cards
Data network
a telecommunications network which allows computers to exchange data
9
New cards
Disk drive
a randomly addressable and rewritable storage device
10
New cards
Intellectual property
refers to any property that is created using original thought. Traditional intellectual property include patents, copyrights, and trademarks.
11
New cards
Moore's Law
The number of transistors per square inch on integrated circuits has doubled every year since the integrated circuit was invented.
12
New cards
network
a group of two or more computer systems linked together
13
New cards
Processor
short for microprocessor or CPU
14
New cards
Social network
a social structure made of nodes that are generally individuals or organizations. A social network represents relationships and flows between people, groups, organizations, animals, computers, or other information/knowledge processing entities
15
New cards
Whitelist
a generic name for a list of email address or IP addresses that are considered to be spam free
16
New cards
Ad hoc
when used to describe programming, it means a quick fix for a problem, not usually the best example that will sustain an issue.
17
New cards
Cloud computing
comparable to grid computing, cloud computing relies on sharing resources rather than having local servers handle applications.
18
New cards
cookie
a small text file placed when you access a site and used by websites to track your activity on their site. A cookie allows the website to store and easily look up your records in their archive.
19
New cards
Database
a collection of information organized in such a way that a computer program can quickly selected the desired pieces of data. Often abbreviated DB
20
New cards
Data aggregation
process in which information is gathered and expressed in a summary form for purposes such as statistical analysis
21
New cards
Data mining
a class of database applications that look for hidden patterns in a group of data that could be used to predict future behavior
22
New cards
Data repository
generically refers to a general place where data is stored and maintained
23
New cards
Data sources
name given to the connection setup from a database to a server. The name is commonly used when creating a query to the database
24
New cards
Digital detritus
term used to describe unsightly debris that accrues as the result of the experience of digital living
25
New cards
Dossier
a collection of documents about a person, event, or subject
26
New cards
EDR
event data recorder
27
New cards
Encode
the phrase used to describe the method of preparing data for storage or transmission.
28
New cards
Encryption
the translation of data into secret code
29
New cards
Geotagging
the process of adding geographical information to various media in the form of metadata. The data usually consists of coordinates like latitude and longitude, but may even include bearing, altitude, distance and place names.
30
New cards
IP address
an identifier for devices on a TCP/IP network
31
New cards
ISP
Internet Service Provider
32
New cards
Metadata
data about data; describes how and when and by whom a particular set of data was collected, and how data is formatted
33
New cards
Prism
a secret program or tool that performs data collection for the NSA
34
New cards
Query
a request for information from a database
35
New cards
RFID
radio frequency identification, similar to barcodes
36
New cards
Server
a computer program or a device that provides functionality for other programs or devices, called "clients". A server can be used to share data or resources among multiple clients or to perform computations.
37
New cards
Iterative process
a process wherein a set of instructions or structures are repeated in a sequence a specified number of times or until a condition is met. When the first set of instructions is executed again, it is called an iteration.A
38
New cards
Code segment
as a text segment or simply as text
39
New cards
Collaboration
the act of working together
40
New cards
Commenting
a programmer-readable explanation or annotation in the source code of a computer program
41
New cards
Debugging
Finding and fixing problems in your algorithm or program.
42
New cards
Event-driven programming
a programming approach whereby the program's behavior is controlled by writing code that responds to various events that occur, such as Button clicks.
43
New cards
Incremental process
breaks the software development process down into small, manageable portions known as increments. Each increment builds on the previous version so that improvements are made step by step.
44
New cards
logic error
An error in a program that makes it do something other than what the programmer intended.
45
New cards
Overflow error
when a calculation is run but the computer is unable to store the answer correctly.
46
New cards
Program input
the user giving something to the program
47
New cards
Program output
the program giving something to the user.
48
New cards
Prototype
The process of building a model of a system. It helps system designers build an information system that intuitive and easy to manipulate for end users
49
New cards
Requirements
help prevent software project failure. The software requirements specification document lists sufficient and necessary requirements for the project development.
50
New cards
Runtime error
an error that occurs while the program is running after being successfully compiled. Runtime errors are commonly called referred to as "bugs"
51
New cards
Syntax error
mistakes in the source code, such as spelling and punctuation errors, incorrect labels
52
New cards
Testing
used at key checkpoints in the overall process to determine whether objectives are being met.
53
New cards
User interface
interactions between humans and machines occur.
54
New cards
Documentation
written text or illustration that accompanies computer software or is embedded in the source code.
55
New cards
Software development process
planning, analysis, design, development & testing