Syntax error
A mistake in typed code that violates the rules of the programming language, preventing the code from running.
Logic error
A mistake in an algorithm or program causing unexpected behavior or incorrect results.
Run-time error
A mistake in a program that occurs during execution, like accessing non-existent memory.
Overflow error
Error due to insufficient bits to represent a number, similar to an odometer "rolling over."
Bit
A binary digit, 0 or 1, fundamental in binary numbers.
Byte
A sequence of 8 bits, essential in computing and data storage.
Analog data
Values changing smoothly over time, like pitch and volume in music.
Lossless
Data compression preserving all original data for full recovery.
Lossy
Data compression discarding some data, making full recovery impossible.
Metadata
Information about data, like file descriptions or database rows.
Sequencing
Sequential execution of steps in an algorithm or program.
Selection
Using Boolean conditions to choose paths in an algorithm.
Iteration
Repeating steps in an algorithm until a condition is met.
Linear search
Algorithm searching for a target value by iterating through a list.
Binary search
Algorithm searching a sorted list by splitting it in half.
Reasonable time
Algorithm runtime not increasing faster than a polynomial function.
Heuristic
Technique aiding algorithms in finding solutions in complex problems.
Undecidable
Problems without an algorithm to answer for all inputs.
Library
Collection of useful procedures for program creation.
API
Application Programming Interface, a set of procedures and their descriptions.
Modularity
Separating a program into independent modules for functionality.
Traversal
Iterating over items in a list, either fully or partially.
Computing device
Physical device capable of running programs.
Computer network
Interconnected devices for data exchange.
Bandwidth
Maximum data transfer rate over a network connection.
Protocol
Agreed rules specifying system behavior.
Scalability
System's ability to adjust to new demands.
IP (Internet Protocol)
Protocol for addressing and routing data on networks.
TCP (Transmission Control Protocol)
Ensures reliable data transmission.
UDP (User Datagram Protocol)
Lightweight data transport protocol.
World Wide Web
System of linked pages and media browsable over HTTP.
HTTP (Hypertext Transfer Protocol)
Web protocol for requesting and submitting data.
Parallel computing
Splitting a program into tasks for simultaneous execution.
Speedup
Improvement in time taken by parallelized programs.
Distributed computing
Using multiple devices to run program parts.
Digital divide
Disparity in computing access among communities.
Crowdsourcing
Collaborative model for funding projects or generating ideas.
Citizen science
Involving public volunteers in scientific research.
Creative Commons
Alternative to copyright for sharing artistic creations.
Open access
Policy allowing access to documents and data.
PII (Personally identifiable information)
Data identifying individuals.
Multifactor authentication (MFA)
User authentication with multiple evidence pieces.
Encryption
Scrambling data to prevent unauthorized access.
Symmetric encryption
Using the same key for encrypting and decrypting data.
Public key encryption
Asymmetric encryption with different keys for encryption and decryption.
Cookie
Small text tracking user information on websites.
Virus
Self-replicating computer malware.
Phishing
Deceptive attack to obtain private information.
Rogue access point
Unauthorized wireless access point for network interception.