1/30
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
overflow error
data too large to represent
roundoff error
data too specific to represent
bits can be used to represent
color, sound, words
heuristic
no perfect solution, so approximate solution decent
argument
value given to parameters
parameter
variables in function
return
value of expression after function
abstraction
allows procedure to be used knowing what it does, not how it does it, allowing solution to be based on smaller subsolutions (functions0
number of binary searches for list of n variables
log base2 n
packets
chunk of data sent over network (pieces of larger messages - can be sent in order or out of order or not)
digital certificates
verifies identity
phishing
tricks user into providing information
rogue access point
gives unauthorized access to networks
malware
virus installed that controls computer
symettric encryption
one key for both
public key
anyone can encrypt it but the reciever needs a private key to decrypt it
when is binary search possible
can have repeat elements but must be sorted in numerical/alphabet order
sequencing
putting steps in an order
selection
deciding which steps to do next
iteration
repeating some steps
procedure
function
assignment operator
allows a program to change the value represented by a variable
documentation
description of how a peice of code works (ie. comment)
DOmain name system
translates domain names into IP addresses
HTTP
transmits web pages
bandwidth
max data that can be sent in x amount of time
analog data
has values that change continuously (position of person during race, music, colors)
byte
8 bits
tcp
reliable but slower
udp
faster but less reliable