1/50
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
syntax error
A mistake in typed code that violates the rules of the programming language.
logic error
A mistake in an algorithm or program that causes it to behave unexpectedly or return the incorrect value.
run-time error
A mistake in a program that happens only when the program is actually run such as a program attempting to access memory that does not exist.
overflow error
Error that results when the number of bits is not enough to represent the number.
data bit
A binary digit, either 0 or 1.
byte
A sequence of 8 bits.
roundoff
Error that results when the number of bits is not enough to represent the number with full precision.
analog data
Values that change smoothly, rather than in discrete intervals, over time.
lossless
Compressing data in a way that preserves all data and allows full recovery of the original.
lossy
Compressing data in a way that discards some data and makes it impossible to recover the original.
metadata
Data about data, like descriptive information about a file or a row in a database.
sequencing
The sequential execution of steps in an algorithm or code in a program.
selection
A Boolean condition to determine which of two paths are taken in an algorithm or program.
iteration
The repetition of steps in an algorithm or program for a certain amount of times or until a certain condition is met.
linear search
An algorithm that iterates through each item in a list until it finds the target value.
binary search
An algorithm that searches a sorted list for a value by repeatedly splitting the list in half.
reasonable time
A run time for an algorithm that doesn't increase faster than a polynomial function of the input size.
unreasonable run time
A run time that increases superpolynomially.
heuristic
A technique that helps an algorithm find a good solution in a hard problem.
undecidable
A problem that is so logically difficult, we can’t ever create an algorithm that would be able to answer 'yes' or 'no' for all inputs.
library
A collection of procedures that are useful in creating programs.
API
Application Programming Interface, a library of procedures and a description of how to call each procedure.
modularity
The separation of a program into independent modules that are each responsible for one aspect of the program's functionality.
traversal
The iteration over the items in a list.
computing device
A physical device that can run a program.
computer network
A group of interconnected computing devices capable of sending or receiving data.
bandwidth
The maximum amount of data that can be sent in a fixed period of time over a network connection.
protocol
An agreed upon set of rules that specify the behavior of a system.
scalability
The ability of a system to adjust in scale to meet new demands.
IP (Internet Protocol)
The protocol that determines how to address nodes on the network and how to route data from one node to a destination node.
TCP (Transmission Control Protocol)
A data transport protocol that includes mechanisms for reliably transmitting packets to a destination.
UDP (User Datagram Protocol)
A lightweight data transport protocol with minimal error checking.
World Wide Web
A system of linked pages, media, and files, browsable over HTTP.
HTTP (Hypertext Transfer Protocol)
The protocol that powers the Web, used to request webpages from servers.
parallel computing
A computational model which splits a program into multiple tasks, some of which can be executed simultaneously.
speedup
The improvement in the amount of time a parallelized program takes to solve a problem.
distributed computing
A computational model which uses multiple devices to run different parts of a program.
digital divide
The idea that some communities have less access to computing than others.
crowdsourcing
A model in which many online users combine efforts to help fund projects or create goods.
citizen science
Crowdsourcing for science, involving volunteers in scientific research.
Creative Commons
An alternative to copyright that allows sharing and remixing of artistic creations.
open access
A policy that allows access to documents or data for reading or analysis.
PII (Personally identifiable information)
Information about an individual that can uniquely identify them.
multifactor authentication (MFA)
A method of user authentication requiring multiple pieces of evidence.
encryption
The process of scrambling data to prevent unauthorized access.
symmetric encryption
A technique for encrypting data where the same key is used for both encrypting and decrypting.
public key encryption
An asymmetric encryption technique that uses different keys for encrypting and decrypting.
cookie
A small amount of text that tracks information about a user visiting a website.
virus
A type of computer malware that can make copies of itself.
phishing
An attack where a user is tricked into revealing private information.
rogue access point
A wireless access point that provides unauthorized access to network traffic.