Send a link to your students to track their progress
273 Terms
1
New cards
abstraction
a general representation of something -- of some person or place or event or process. An abstraction extracts common features from specific examples in order to generalize concepts. Words, symbols, maps, and models are all examples of everyday abstractions.
2
New cards
abstraction layer
The Internet is organized into several of these which are controlled by various protocols. From the bottom up, we have the link layer (Ethernet protocol), the Internet layer (IP), transport layer (TCP), and application layer (HTTP).
3
New cards
accumulator
a special register in the CPU where data is put in order to peform arithmetic and logic operations.
4
New cards
ADT
defines a general data type like list that describes a collection of data without worrying about the specific implementation.
5
New cards
algorithm
a precise sequence of instructions for processes that can be implemented by a programming language and executed by a computer.
6
New cards
algorithm
a step-by-step procedures for solving a particular problem.
7
New cards
ALU
the part of the CPU that performs all logic and arithmetic operations.
8
New cards
analog
refers to data with values that change continuously, or smoothly, over time like sound and music files
9
New cards
AND gate
a circuit with two inputs and one output defined such that its output is TRUE (or ON) only when both of its inputs are TRUE (or ON).
10
New cards
API
for a program or web service defines how other programs can communicate with it and use it.
11
New cards
API
The Application Programming Interface for a program or web service defines how other programs can communicate with it and use it.
12
New cards
arguments
specify the values of the parameters when a procedure is called.
13
New cards
artificial intelligence
A branch of computer science that works on creating machines and programs that exhibit human-like intelligence.
14
New cards
ASCII
short for American Standard Code for Information Interchange is a character encoding scheme in which each character is represented by a 7-bit (originally) or 8-bit binary sequence. For example, the ASCII sequence 01000001 represents the letter 'A'.
15
New cards
assembly language
low-level language that uses symbolic names, rather than binary sequences of 0s and 1s, to represent the machine language instructions.
16
New cards
assignment
sets a variable to a value or a mathematical expression.
17
New cards
asymmetric cipher
A cipher in which separate but related keys are used for encryption and decryption.
18
New cards
back propagation
A algorithm that repeatedly adjusts the connections (weights) between the nodes in the neural network
19
New cards
bandwidth
the rate at which data is downloaded or uploaded in a network
20
New cards
base
the number of distinct digits or symbols used to represent numbers in that system. Our decimal system is base-10 because it uses 10 digits, 0 through 9.
21
New cards
binary number system
number system in which all numbers are represented in terms of the 2 binary digits, 0 and 1.
22
New cards
binary search
a search algorithm that repeatedly divides a sorted list to narrow in on the searched-for item
23
New cards
binary sequence
a sequence of 0s and 1s.
24
New cards
biometrics
using unique physical characteristics such as finger prints, face recognition, etc. for identification
25
New cards
bit
a single binary digit, either 0 or 1. It is the smallest unit of data in a computer.
26
New cards
bit
short for 'binary digit'
27
New cards
bitmap
a type of memory organization or image file format used to store digital images.
28
New cards
blacklist
In internet terminology, a blacklist is a generic term for a list of email addresses or IP addresses for organizations that known to be spammers.
29
New cards
boolean
condition is a true/false condition. It is named after George Boole (1815-1864) an English mathematician.
30
New cards
browser
a program that displays web pages and is used to navigate the WWW.
31
New cards
brute force
solve by trial and error; trying every possible option
32
New cards
brute force attack
An attempt to try every possible encryption key to break a secret message.
33
New cards
byte
A group of eight binary digits or bits.
34
New cards
byte
equals 8 bits.
35
New cards
centralized
when the resources and workload are coordinated and managed by a centralized computer (server)
36
New cards
certificate authority
An entity that issues digital certificates.
37
New cards
character
any symbol that requires one byte of storage.
38
New cards
chip
an informal way of describing an integrated circuit (IC) consisting of millions of tiny circuits.
39
New cards
cipher
A system for creating secret messages.
40
New cards
ciphertext
unreadable, secret message.
41
New cards
client
A computer or software application that requests services from a server located on the internet -- e.g., a Web browser is an example of a client.
42
New cards
cloud computing
relies on sharing resources online on the Internet rather than having data and process located on a personal computer.
43
New cards
comment
a non-executable block of text that can be added to a program to provide clarification and documentation of the code.
44
New cards
compilation
The process of translating the entire source code into a single binary file.
45
New cards
computer
a machine that processes information under the control of a program.
46
New cards
computer bug
An informal term for error in computer hardware or software -- the term was coined by Grace Hopper.
47
New cards
computer bug
An informal term for error in computer hardware or software -- the term was coined by Grace Hopper.
48
New cards
Computing Innovation
includes a program as an integral part of its function. Can be physical, non-physical computing software, or non-physical computing concepts. For example, self-driving cars, picture editing software, e-commerce, a mobile app
49
New cards
computing system
A group of computing devices and programs working together for a common purpose.
50
New cards
concatenation
Putting two strings together to make a new string.
51
New cards
constant
such as the numeral '5', is an abstraction that represents a single thing, e.g., the value 5.
52
New cards
control structure
a block of programming statements that controls the flow or behavior of an algorithm.
53
New cards
Cookies
Small files or bits of data that are stored on your computer.
54
New cards
copyright
a legal right that grants the creator of an original work exclusive rights for its use and distribution
55
New cards
CPU
that part of the computer's hardware that carries out the instructions of a computer program.
56
New cards
CPU
the part of the computer's hardware that interprets and runs the computer program.
57
New cards
creative commons
a set of licenses that allow creators to communicate which rights they reserve, and which rights they waive for the benefit of recipients or other creators
58
New cards
cryptography
means secret writing. It is the science of protecting information by transforming it into an unreadable format.
59
New cards
cryptography
The art and science of writing secret messages. 'secret writing'
60
New cards
CSV
A simple text format for data files is to put each row on a separate line with the column separated by commas.
61
New cards
cyberspace
a metaphor for describing the non-physical terrain created by computer systems.
62
New cards
data
the distinct information that is formatted in a special way. Exists in a variety of forms, like text on paper or bytes stored in electronic memory.
63
New cards
data abstraction
provides a general way to access a collection of data.
64
New cards
data abstraction
the practice of organizing and encapsulating certain data into a more general representation. An example would be storing the text 'hello' in a single variable rather than having numerous occurrences of 'hello' in a program.
65
New cards
data center
a physical or virtual infrastructures used by enterprises to house computer, server and networking systems and components for the company's IT (information technology) needs.
66
New cards
data network
a telecommunications network which allows computers to exchange data.
67
New cards
Data Privacy
assures that personal information (and sometimes corporate confidential information as well) are collected, processed (used), protected and destroyed legally and fairly
68
New cards
Data Security
controls access to personal information and protects against its unauthorized use and acquisition
69
New cards
Data Storage
This is how you archive your data. The two types of storage are hard data (RAM, Hard Drive, flash drives, solid state) and remote data (cloud computing)
70
New cards
data type
The type of data stored in a variable, for example number, string, boolean, or list.
71
New cards
database
one way to store persistent data. Examples include TinyDB and Firebase.
72
New cards
debugging
The process of removing errors from computer hardware or software.
73
New cards
debugging
The process of removing errors from computer hardware or software.
74
New cards
decentralized
when the allocation of resources and workload are distributed to individual devices on a network
75
New cards
decidable problems
problems in which an algorithm can be constructed to answer 'yes' or 'no' for all inputs (e.g., 'is the number even?').
76
New cards
decimal number system
a base-10 system that we use every day, consisting of the symbols 0 through 9.
77
New cards
decision problem
a problem that has a yes or no answer
78
New cards
decryption
The process of using a secret key to convert ciphertext into plaintext.
79
New cards
deep learning
A type of very successful machine learning algorithm using neural networks with many layers to learn data representations on its own from massive amounts of data.
80
New cards
deterministic
Completely predictable, an example would be a PRNG.
81
New cards
diffie-hellman
An algorithm used to establish a shared secret between two parties. It is primarily used to exchange a symmetric cryptographic key among two parties, Alice and Bob, who wish to communicate securely.
82
New cards
digital
any system based on discontinuous data or events. Computers are digital machines because at the basic level they can distinguish between just two values, 0 and 1.
83
New cards
digital certificate
A data packet that certifies the holder of a public key.
84
New cards
digital divide
the gap between those who have access to the Internet and computers and those who do not, usually affected by socioeconomic, geographic, or demographic characteristics.
85
New cards
digital signal processing
refers to manipulating analog information.
86
New cards
disk drive
a randomly addressable and rewritable storage device.
87
New cards
distributed computing
a computational model in which multiple networked computers are used to run a program
88
New cards
DMCA
US copyright law that criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works
89
New cards
DNS
An Internet service that translates domain names into IP addresses.
90
New cards
domain name
A hierarchical name (such as trincoll.edu) that identifies a domain and an institution on the Internet. Top levels include com, edu, gov.
91
New cards
download
to copy data (usually an entire file) from an online source to a personal computer.
92
New cards
DRM
various access control technologies that are used to restrict usage of proprietary hardware and copyrighted works
93
New cards
efficiency
how well an algorithm uses time and memory/space resources, CPU and RAM.
94
New cards
encryption
The process of using a secret key to convert plaintext into ciphertext.
95
New cards
encryption key
A piece of secret data used in by encryption and decryption algorithms.
96
New cards
ethernet
A network that uses wires to connect computers.
97
New cards
even parity
the number of 1s in the sequence add up to an even number.
98
New cards
Event Handler
A block of code that reacts to an event like a button click.
99
New cards
Event-driven Programming
the program is activated by events such as button clicks.
100
New cards
expression
involves values, variables, and operators for example (a+b)/2