Computer Science Vocabulary

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/143

flashcard set

Earn XP

Description and Tags

Flashcards about key vocabulary terms in computer science.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

144 Terms

1
New cards

Ubiquitous Computing

The field that focuses on computing being integrated into everyday objects and activities.

2
New cards

Singularity

A hypothetical point in time when technological growth becomes uncontrollable and irreversible, resulting in unforeseeable changes to human civilization.

3
New cards

Technological Unemployment

The displacement of human workers by technology, particularly computers and AI.

4
New cards

Active learning

Learning techniques where students actively participate in the learning process, enhancing information retention.

5
New cards

Massive Open Online Courses (MOOCs)

Online courses open to a very large number of participants.

6
New cards

Intelligent Tutoring Systems

AI-powered systems that provide personalized instruction by assessing a learner’s knowledge and adapting accordingly.

7
New cards

Domain Model

A formal representation of the knowledge, procedures, and skills of a particular discipline, used in intelligent tutoring systems.

8
New cards

Student Model

A model built and maintained by intelligent tutoring systems to track what a student has learned and where practice is needed.

9
New cards

Bayesian Knowledge Tracing

A technique for determining a student's knowledge by treating it as a set of hidden variables and updating estimates based on the correctness of their interactions.

10
New cards

Latent Variables

Variables whose true values are hidden from an outside observer.

11
New cards

Educational Data Mining

The field of collecting and analyzing data from educational settings to discover patterns and improve learning.

12
New cards

Affordances

The idea that a design should intuitively communicate its function, allowing users to understand how to use it just by looking at it.

13
New cards

Recognition

The ability to easily identify something previously experienced after encountering it again.

14
New cards

Recall

The ability to produce something from memory.

15
New cards

Emotionally Intelligent

Computer interfaces able to adapt their behavior based on a user's emotional state.

16
New cards

Affect-Aware Systems

Systems that use sensors and computational models to recognize and respond to human emotions.

17
New cards

Computer-Mediated Communication

The study of how people interact via computers, including synchronous and asynchronous communication.

18
New cards

Augmented Gaze

Software that adjusts the head and eye movements in video to make it appear as if the instructor is looking directly at the camera.

19
New cards

Human Robot Interaction (HRI)

The study of how humans interact with robots, considering both their appearance and behavior.

20
New cards

Robots

Self-operating machines capable of carrying out a series of actions automatically with computer control guidance.

21
New cards

Automatons

Automated machines that are self-operating.

22
New cards

CNC

Computer Numerical Control, which enable machines to run programs that instruct the machine.

23
New cards

Negative Feedback Control Loop

A control system that measures real-world conditions, calculates errors, and instructs the system to minimize these errors.

24
New cards

Proportional-Integral-Derivative Controller

A widely used feedback mechanism that calculates proportional, integral, and derivative values to control a system.

25
New cards

Lethal Autonomous Weapons

Robots with the intelligence and capability to take human lives.

26
New cards

Natural Language Processing (NLP)

A field that combines computer science and linguistics to enable computers to understand and process human language.

27
New cards

Phrase Structure Rules

Rules that codify the grammar of a language, used by computers to generate natural language text.

28
New cards

Parse Tree

Diagram that reveals how a sentence is constructed by tagging each word with its part of speech and identifying the noun focus.

29
New cards

Phonemes

Sound pieces that make up spoken words, used by computers to recognize speech.

30
New cards

Language Model

Contains statistics about sequences of words, improving speech recognition accuracy.

31
New cards

Spectrogram

A graph plotting the magnitude of different frequencies that make up a sound, used in speech recognition.

32
New cards

Fast Fourier Transform

An algorithm that converts waveforms of sound into frequencies, used in speech recognition.

33
New cards

Patches

Small pixel regions considered by computer vision algorithms to identify features like edges.

34
New cards

Prewitt Operators

Edge enhancing kernels used in computer vision algorithms to find edges in an image.

35
New cards

Convolutional Neural Networks

Algorithms that use banks of artificial neurons to process image data, each outfitting a new image digested by learned kernels.

36
New cards

Features

Values used to characterize the things to be classified in machine learning.

37
New cards

Training Data

Data used to train a machine learning algorithm.

38
New cards

Decision Boundaries

Lines or boundaries that chop up the decision space in machine learning.

39
New cards

Confusion Matrix

A table used to evaluate the performance of a classification algorithm, showing where the algorithm fails.

40
New cards

Support Vector Machines

A type of machine learning technique that slices up the decision space using arbitrary lines.

41
New cards

Deep Neural Networks

A type of artificial neural network with multiple hidden layers between the inputs and outputs.

42
New cards

Strong AI

A type of AI that is more human-like.

43
New cards

Weak AI

An AI that can only perform specific tasks.

44
New cards

Reinforcement Learning

An approach where AIs learn from themselves and others over time, gobbling up tons of information.

45
New cards

Defense in Depth

Using many layers of varying security mechanisms to frustrate attackers and protect a system.

46
New cards

Cryptography

The practice of making information secret through the use of ciphers.

47
New cards

Cipher

An algorithm used to convert plain text into ciphertext.

48
New cards

Encryption

The process of making text secret using a cipher.

49
New cards

Substitution Cipher

A cipher that replaces each letter in a message with something else.

50
New cards

Permutation Cipher

A cipher that rearranges letters according to a predetermined pattern.

51
New cards

Key Exchange

An algorithm that lets two computers agree on a key without ever sending the key.

52
New cards

Symmetric Keys

Encryption in which sender encrypts a message with a key and the recipient decrypts it using the same key.

53
New cards

Asymmetric Encryption

Has 2 different keys, a public one and a private key.

54
New cards

White Hats

Hackers who help with security evaluations.

55
New cards

Black Hats

Hackers who have malicious goals.

56
New cards

Hacktivists

Hackers who use their skills to promote social and political goals.

57
New cards

Social Engineering

Tricking someone to let hackers in or manipulating someone into sharing confidential data to allow an attack.

58
New cards

Phishing

Common social engineering technique where a scammer sends a fraudulent message designed to trick a person into revealing sensitive information to the attacker.

59
New cards

Pretexting

A social engineering attack in which attackers call a company attempting to be IT, ask to be transferred to a second, and can then instruct someone to configure their computer in a compromising way.

60
New cards

Malware

Malicious software that might steal data, or encrypt files and demand a ransom.

61
New cards

NAND Mirroring

Attaching wires to the memory chip and making a copy of its contents.

62
New cards

Buffer Overflow

An attack that is when the amount of data in the buffer exceeds its capacity.

63
New cards

Bounds Checking

Checks the length of an input before entering to avoid a buffer overflow.

64
New cards

Canaries

Regions that programs create to leave open some buffer space and keep an eye on those values.

65
New cards

Code Injection

Inserting malicious code, commonly used on big websites, and exploits a vulnerability.

66
New cards

Zero-Day Vulnerability

When a new bug is discovered.

67
New cards

Botnet

When bugs are left open on enough systems, allowing hackers to write a program to automatically take over a computer.

68
New cards

Cybersecurity

The protection of computer systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction.

69
New cards

Secrecy

The idea that only authorized users should access specific computers/data.

70
New cards

Integrity

The goal that only authorized individuals should be able to use and modify systems/data.

71
New cards

Availability

Authorized people should ALWAYS have access to their systems.

72
New cards

Threat Models

Used to protect security goals by profiling attackers.

73
New cards

Authentication

Used to differentiate between right and wrong people.

74
New cards

Brute Force Attack

An attack on computers where it just tries every possible combo.

75
New cards

Access Control Lists

Describe what access each user has for every file, folder, and program on a computer.

76
New cards

Bell-LaPadula Model

A security model that provides key rules for companies with different levels of access.

77
New cards

Security Kernel/ Trusted Computing Base

A minimal set of operating system software that’s close to provably secure.

78
New cards

Independent Verification and Validation

Code that is audited by a crowd of security minded developers.

79
New cards

Isolation

If one part is compromised, the whole system should maintain relative stability. Gives each sandbox application their own memory block.

80
New cards

Network Neutrality

The principle that all internet packets should be treated equally, being sent at the same time and priority.

81
New cards

Packets

Breaking up data into packets, which have to conform to IP.

82
New cards

User Datagram Protocol (UDP)

Sits on top of IP and has it’s own header.

83
New cards

Port Number

A process where the operating system looks at the UDP header and reads the port number to know what application to send it to.

84
New cards

Transmission Control Protocol (TCP)

TCP that rides inside the data payload of IP.

85
New cards

Domain Name System (DNS)

Used to map an IP address to a domain name.

86
New cards

Local Area Networks (LAN)

Small networks of close computers.

87
New cards

Carrier Sense Multiple Access (CMSA)

The term for when a computer wanted to transmit data, it wrote the data as an electrical signal onto the cable. Each computer must have a MAC.

88
New cards

Collison

Term for when network traffic is heavy, the probability that two computers will try to write data at the same time also increases.

89
New cards

Exponential Backoff

The process to have computers wait a 1 second plus a random amount of time before trying again.

90
New cards

Collision Domain

A network can be broken up into two domains.

91
New cards

Packet Switching

Chopping up data and passing them along flexible routes with spare capacity.

92
New cards

Orthographic Projections

When the parallel sides of an object appear parallel in the projection.

93
New cards

Perspective Projection

Occurs when parallel lines converge as they get further from view.

94
New cards

Mesh

A collection of polygons.

95
New cards

Scanline Rendering

Reads the three points that make up the polygon, finding the highest and lowest y values and only considers rows in that.

96
New cards

Antialiasing

Instead of filling pixels of a polygon with all one color, adjust the color based on how much the polycon cuts through each pixel.

97
New cards

Painter’s Algorithm

Sorts all the polygons from farthest to nearest and then renders them in that order.

98
New cards

Z-Buffering

Keeps track of the closest distance to a polygon for every pixel in the scene by maintaining a matrix of values that sits in memory.

99
New cards

Z-Fighting

Flickering that occurs when two polygons have the same distance.

100
New cards

Back-Face Culling

A technique used in 3D computer graphics to improve rendering.