1/77
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Algorithm
A finite set of step-by-step instructions that accomplishes a task.
Sequencing
Running program statements in a specific order.
Selection
A programming structure that uses a condition to choose between different paths.
Iteration
Repeating steps in a program, usually with a loop.
Loop
A structure that repeats a block of code multiple times.
Condition
A Boolean expression that evaluates to true or false.
Boolean value
A value that is either true or false.
Boolean expression
An expression that evaluates to true or false.
Variable
A named storage location that holds a value.
Assignment
Storing a value in a variable.
Procedure
A named group of programming instructions that can be called and reused.
Function
A procedure that usually returns a value.
Parameter
A variable listed in a procedure definition that receives input when the procedure is called.
Argument
The actual value passed into a procedure when it is called.
Return value
The value sent back by a procedure or function.
Input
Data given to a program, often from a user, file, sensor, or another program.
Output
Data produced by a program, such as text, images, sound, or stored information.
Testing
Running a program or procedure to check whether it works correctly.
Debugging
Finding and fixing errors in a program.
Logic error
An error where the program runs but produces the wrong result.
Syntax error
An error caused by violating the rules of a programming language.
Runtime error
An error that occurs while a program is running.
List
A collection of related values stored under one name.
Element
A single item in a list.
Index
The position of an item in a list.
Traversal
Visiting each item in a list, usually with a loop.
Append
Adding an item to the end of a list.
Insert
Adding an item at a specific position in a list.
Remove
Deleting an item from a list.
Abstraction
Reducing complexity by hiding unnecessary details.
Procedural abstraction
Using procedures to hide the details of how a task is performed.
Data abstraction
Using a data structure, such as a list, to manage and organize data.
AND
A Boolean operator that is true only when both conditions are true.
OR
A Boolean operator that is true when at least one condition is true.
NOT
A Boolean operator that reverses a Boolean value.
Bit
A single binary digit, either 0 or 1.
Byte
A group of 8 bits.
Binary
A base-2 number system using only 0 and 1.
Decimal
The base-10 number system.
Overflow
When a value is too large to be represented with the available number of bits.
Metadata
Data about data.
Data cleaning
Fixing or removing incorrect, incomplete, duplicate, or irrelevant data.
Data bias
A problem caused when data is unrepresentative, incomplete, or unfairly collected.
Compression
Reducing the size of a file or data.
Lossless compression
Compression that allows the original data to be perfectly restored.
Lossy compression
Compression that permanently removes some data to reduce file size.
Internet
A global network of interconnected computing devices.
Network
A group of connected computing devices that can communicate.
Protocol
A set of rules for communication between devices.
Packet
A small unit of data sent over a network.
Packet switching
Sending data in small packets that may take different routes to the destination.
IP address
A numeric address used to identify a device on a network.
IP
A protocol used for addressing and routing packets.
TCP
A protocol that helps ensure packets are delivered reliably and in order.
DNS
A system that translates domain names into IP addresses.
HTTP
A protocol used to transfer web pages and web data.
HTTPS
A secure version of HTTP that uses encryption.
Bandwidth
The amount of data that can be sent over a network in a given amount of time.
Latency
The delay before data begins to transfer.
Fault tolerance
The ability of a system to keep working even when part of it fails.
Redundancy
Having extra components or paths so a system can continue working after a failure.
Scalability
The ability of a system to handle growth or increased demand.
Cybersecurity
Protecting computing systems, networks, and data from unauthorized access or harm.
Encryption
Converting readable data into unreadable form to protect it.
Decryption
Converting encrypted data back into readable form.
Key
Information used to encrypt or decrypt data.
Authentication
Verifying a user's identity.
Multifactor authentication
Authentication that uses more than one method.
Authorization
Determining what an authenticated user is allowed to access.
Phishing
Tricking users into revealing sensitive information.
Malware
Software designed to harm, exploit, or gain unauthorized access to a system.
DDoS attack
An attack that overwhelms a server or network with excessive traffic.
Computing innovation
A physical or nonphysical invention that includes a computer or program as a key part.
Digital divide
Unequal access to computing technology and the internet.
Accessibility
Designing technology so people with disabilities can use it.
Crowdsourcing
Getting ideas, services, or content from a large group of people, usually online.
Citizen science
Scientific research conducted partly or fully by members of the public.
Open source software
Software whose source code is available for others