Unit One: Primitive Types

studied byStudied by 5 people
5.0(1)
Get a hint
Hint

Bit

1 / 54

55 Terms

1

Bit

short for binary digit, the smallest unit of unit of information on a machine

New cards
2

Blacklist

in internet terminology, a generic term for a list of email addresses or IP addresses that are origination with known spammers

New cards
3

Byte

a byte is 8 bits

New cards
4

Character

any symbol that requires one byte of storage

New cards
5

Cyberspace

a metaphor for describing the non-physical terrain created by computer systems

New cards
6

Data

data is distinct information that is formatted in a special way. Data exists in a variety of forms, like text on paper or bytes stored in electronic memory

New cards
7

Data center

physical or virtual infrastructures used by enterprises to house computer, server and networking systems and components for the company's IT (information technology) needs

New cards
8

Data network

a telecommunications network which allows computers to exchange data

New cards
9

Disk drive

a randomly addressable and rewritable storage device

New cards
10

Intellectual property

refers to any property that is created using original thought. Traditional intellectual property include patents, copyrights, and trademarks.

New cards
11

Moore's Law

The number of transistors per square inch on integrated circuits has doubled every year since the integrated circuit was invented.

New cards
12

network

a group of two or more computer systems linked together

New cards
13

Processor

short for microprocessor or CPU

New cards
14

Social network

a social structure made of nodes that are generally individuals or organizations. A social network represents relationships and flows between people, groups, organizations, animals, computers, or other information/knowledge processing entities

New cards
15

Whitelist

a generic name for a list of email address or IP addresses that are considered to be spam free

New cards
16

Ad hoc

when used to describe programming, it means a quick fix for a problem, not usually the best example that will sustain an issue.

New cards
17

Cloud computing

comparable to grid computing, cloud computing relies on sharing resources rather than having local servers handle applications.

New cards
18

cookie

a small text file placed when you access a site and used by websites to track your activity on their site. A cookie allows the website to store and easily look up your records in their archive.

New cards
19

Database

a collection of information organized in such a way that a computer program can quickly selected the desired pieces of data. Often abbreviated DB

New cards
20

Data aggregation

process in which information is gathered and expressed in a summary form for purposes such as statistical analysis

New cards
21

Data mining

a class of database applications that look for hidden patterns in a group of data that could be used to predict future behavior

New cards
22

Data repository

generically refers to a general place where data is stored and maintained

New cards
23

Data sources

name given to the connection setup from a database to a server. The name is commonly used when creating a query to the database

New cards
24

Digital detritus

term used to describe unsightly debris that accrues as the result of the experience of digital living

New cards
25

Dossier

a collection of documents about a person, event, or subject

New cards
26

EDR

event data recorder

New cards
27

Encode

the phrase used to describe the method of preparing data for storage or transmission.

New cards
28

Encryption

the translation of data into secret code

New cards
29

Geotagging

the process of adding geographical information to various media in the form of metadata. The data usually consists of coordinates like latitude and longitude, but may even include bearing, altitude, distance and place names.

New cards
30

IP address

an identifier for devices on a TCP/IP network

New cards
31

ISP

Internet Service Provider

New cards
32

Metadata

data about data; describes how and when and by whom a particular set of data was collected, and how data is formatted

New cards
33

Prism

a secret program or tool that performs data collection for the NSA

New cards
34

Query

a request for information from a database

New cards
35

RFID

radio frequency identification, similar to barcodes

New cards
36

Server

a computer program or a device that provides functionality for other programs or devices, called "clients". A server can be used to share data or resources among multiple clients or to perform computations.

New cards
37

Iterative process

a process wherein a set of instructions or structures are repeated in a sequence a specified number of times or until a condition is met. When the first set of instructions is executed again, it is called an iteration.A

New cards
38

Code segment

as a text segment or simply as text

New cards
39

Collaboration

the act of working together

New cards
40

Commenting

a programmer-readable explanation or annotation in the source code of a computer program

New cards
41

Debugging

Finding and fixing problems in your algorithm or program.

New cards
42

Event-driven programming

a programming approach whereby the program's behavior is controlled by writing code that responds to various events that occur, such as Button clicks.

New cards
43

Incremental process

breaks the software development process down into small, manageable portions known as increments. Each increment builds on the previous version so that improvements are made step by step.

New cards
44

logic error

An error in a program that makes it do something other than what the programmer intended.

New cards
45

Overflow error

when a calculation is run but the computer is unable to store the answer correctly.

New cards
46

Program input

the user giving something to the program

New cards
47

Program output

the program giving something to the user.

New cards
48

Prototype

The process of building a model of a system. It helps system designers build an information system that intuitive and easy to manipulate for end users

New cards
49

Requirements

help prevent software project failure. The software requirements specification document lists sufficient and necessary requirements for the project development.

New cards
50

Runtime error

an error that occurs while the program is running after being successfully compiled. Runtime errors are commonly called referred to as "bugs"

New cards
51

Syntax error

mistakes in the source code, such as spelling and punctuation errors, incorrect labels

New cards
52

Testing

used at key checkpoints in the overall process to determine whether objectives are being met.

New cards
53

User interface

interactions between humans and machines occur.

New cards
54

Documentation

written text or illustration that accompanies computer software or is embedded in the source code.

New cards
55

Software development process

planning, analysis, design, development & testing

New cards

Explore top notes

note Note
studied byStudied by 4 people
... ago
5.0(1)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 18 people
... ago
5.0(1)
note Note
studied byStudied by 6 people
... ago
5.0(1)
note Note
studied byStudied by 22 people
... ago
5.0(2)
note Note
studied byStudied by 14 people
... ago
5.0(1)
note Note
studied byStudied by 272 people
... ago
4.0(1)

Explore top flashcards

flashcards Flashcard (105)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (60)
studied byStudied by 17 people
... ago
5.0(1)
flashcards Flashcard (28)
studied byStudied by 45 people
... ago
5.0(2)
flashcards Flashcard (69)
studied byStudied by 18 people
... ago
5.0(1)
flashcards Flashcard (44)
studied byStudied by 4 people
... ago
4.0(1)
flashcards Flashcard (29)
studied byStudied by 11 people
... ago
5.0(1)
flashcards Flashcard (56)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (67)
studied byStudied by 8 people
... ago
5.0(1)
robot