1/115
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Algorithm
An ordered set of clearly defined instructions used to accomplish a specific task.
(Turtle) Methods
Commands that tell the turtle to do a certain task.
Parameter
A value you can give the method to specify exactly how to behave; found in the parenthesis () after a method.
Input
Algorithms designed to accept information.
Expression
The variable(s) to the right of the assignment operator; an input statement.
Code statement
A part of a program code that expresses an actions to be carried out.
Output
The result of the algorithm.
Python terminal
The window that displays the text.
Variable
A place inside a program that can hold a value.
Data type
The data returned by the input statement.
Assignment operator
The = sign.
String
A sequence of the users input in "".
Integer
Users input, but all together as a number.
Code segment
A collection of program statements that is part of a program.
Iteration
A repeating portion of an algorithm a specified amount of times.
For loop
Iterates code (n) amount of times.
Equality operator
Checking to see if things are equal, then the method is performed (==).
Modulo operator
Calculates the remainder of division.
Relational operators
Test the relationship between 2 variables, expressions, or values (
Conditional expressions
Constructs that use relational operators and evaluate to true or false.
Boolean
An expression that evaluates to either true or false.
While loop
Happens as long as something stays true.
If statements
Only look over it once and move on after it happens, or skips over if condition isn’t met.
Zero iteration condition
Sometimes a loop never starts, it is this when it never does.
Arithmetic operations
Mathematical processes such as +, -, x, /, and modulus operations.
Nested loop/iteration
A loop within another loop.
Decidable problem
Problem for which an algorithm can be written to produce correct output for all inputs.
Undecidable problem
Problem for which no algorithm can be constructed that is capable of always providing a correct Yes-or-No answer.
Bugs
Imperfections and errors in code.
Debug
The process of figuring out why code doesn’t behave as expected and eliminating bugs to make it work as desired.
Sequentially
Code that executes in the order they appear in the code segment.
Initialized
When a variable is given a value for the first time. Until it is, it is undefined.
Block strings
Strings that begin with ‘ ‘ ‘ - this deactivates the code temporarily.
Incrementing counter
Adds one to itself at each iteration of the while loop.
List
A construct that groups data types.
Literals
A fixed value in source code such as 5 or “hello”.
Element
Each item in a list separated by a comma (similar to value).
.append(v)
Adds an element to the end of the list in the blank.
.pop()
Removes last element from a list, (can) assign it to a variable to save for later.
if conditional statement
Evaluates a Boolean (true or false), if met is executed.
if else conditional statement
Same as if statement, but if it isn’t met, it executes the else.
elif statement
Will only execute after the previous conditions evaluate to false and its own condition evaluates to true.
Modular code
A group of code that includes the necessary code to execute a specific desired functionality.
Function definition
def function_name(param1, param2):
Calling a function
function_name(value1, value2)
Procedures
Functions.
Event
A “trigger” that causes a specific part of the program to execute.
Global variables
Variables that are accessible inside and outside of a function.
Newline
The space at the end of a line of text, represented by /n.
Return values
Any value that a method or function gives back to the statement command from which the function or method is called (you get something back).
Logical operators
Boolean operators, compare two Boolean expressions: and, or, not.
Personally identifiable information (PII)
Information about an individual that is unique to the person.
Data breach
The unauthorized and illegal access of confidential or otherwise protected data.
Cookies
Little bits of saved information about your browser.
Phishing
Sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive info.
Malware
Software intended to damage a computing system.
Key-logger
A malware that detects and tracks what keys you press.
Cryptography
The science and art of delivering a message securely and confidentially.
Cipher
A secret or disguised way of writing, a code.
Encryption
The process if encoding data to prevent unauthorized access.
Decrypt
The process of decoding a message, reversing the encryption process.
Substitution cipher
A cipher in which each letter of the alphabet is replaced with a different character or symbol.
Key
Contains info necessary to determine the output of an encryption.
Brute force
Sequentially testing all solutions until it works.
Private key encryption
Encryption method where sender and receiver share a private key.
Symmetric key
Process where a single key is used in both encryption and decryption.
Public key encryption
There are 2 paired keys, one is public and the other is private.
Asymmetric encryption
Encryption using public key encryption.
SSL certificate
Digital document that verifies the person/place.
GUI
Graphical user interface providing human computer interaction.
API
Application programming interface to share code with other programmers.
Logic errors
The logic of your code poses a problem/error.
Syntax errors
Letter, words, punctuation errors, how it is written.
Runtime errors
Error while the program is running, often due to unexpected input or data.
isdigit
Determines if string consists of digits, if yes True, if no False.
isalpha
Determines if string has all letters, if yes, True, if no, False.
Breakpoint
Red dot next to line that pauses there when debugging.
Exception
An error or other message raised by the interpreter or compiler to indicate a special circumstance that should be handled by an exception handler.
Overflow error
Error when computer tries to handle a number outside of the defined range of value.
Byte
8 bits of binary code.
Bandwidth
Speed your computer can download or send data.
Computing device
Device that can connect to the network.
Network path
Directly connected computing devices beginning at sender, ends at receiver.
Servers
Larger computers that host shared resources.
DNS
A big phone book with IP addresses.
Routers
Connect networks and control traffic on the internet.
Packets
Small units of data transmitted on a network.
Metadata
Info about the packet that’s needed for its transmission.
lossless
Method of compression in which original data can be completely recovered from the compressed data without any loss of content.
lossy
Compression where data is lost and cannot be recovered from compressed data.
Threads
Separate independent tasks within a job.
Parallel processing/computing
Using two or more central processing units simultaneously, multitask on the same computing devices using different processors
Sequential processing
Processing that occurs in the order that it’s received.
Scalable
Has the potential to be enlarged to accommodate growth in user demand.
HTTP
Hypertext transfer protocol, powers the web by requesting webpages and send data.
IP
Internet protocol, determines how to address nodes (connection points).
API
Application programming interface, a library of procedures and how to call it.
TCP
Transmission Control Protocol, ensures all of your data is being sent, confirms it’s sent correctly and organized right.
UDP
User datagram protocol, sends data like TCP but doesn’t check that it’s all correct, best for videos.
Heuristic
A problem-solving technique or shortcut that prioritizes speed and efficiency over finding the absolute optimal solution.