1/50
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Syntax error
A mistake in typed code that violates the rules of the programming language. Code with syntax errors will not run.
Logic error
A mistake in an algorithm or program that causes unexpected behavior or incorrect results.
Run-time error
An error that occurs only when the program is running, such as accessing nonexistent memory.
Overflow error
An error that happens when a number exceeds the storage capacity (like an odometer rolling over).
Bit
A binary digit, either 0 or 1.
Byte
A sequence of 8 bits.
Roundoff
Error caused by insufficient bits to represent a number with full precision (e.g., 3.14 for π).
Analog data
Data that changes smoothly over time (e.g., live concert volume).
Lossless
Compression that preserves all data and allows full recovery.
Lossy
Compression that discards some data, making full recovery impossible.
Metadata
Data about data (e.g., file descriptions).
Sequencing
Executing steps in order, like a recipe.
Selection
Using a Boolean condition to choose between two paths.
Iteration
Repeating steps for a set amount of times or until a condition is met.
Linear search
Checking each item in a list until the target is found.
Binary search
Searching a sorted list by repeatedly dividing it in half.
Reasonable time
Algorithm runtime that doesn’t grow faster than a polynomial function.
Heuristic
A technique that finds a good solution for a complex problem.
Undecidable
A problem with no algorithm that guarantees an answer for all inputs.
Library
A collection of reusable code procedures.
API
A library of procedures with descriptions on how to use them.
Modularity
Dividing a program into independent modules.
Traversal
Iterating through items in a list (full or partial).
Computing device
Any physical device that can run a program (e.g., phone, computer).
Computer network
A group of devices that send/receive data.
Bandwidth
Maximum data transfer rate over a network (bits per second).
Protocol
A set of rules that define system behavior.
Scalability
A system’s ability to handle increased demand.
IP (Internet Protocol)
Defines addressing and routing of data.
TCP (Transmission Control Protocol)
Reliable data transport protocol.
UDP (User Datagram Protocol)
A fast but less reliable data transport protocol.
World Wide Web
A system of linked web pages and media.
HTTP (Hypertext Transfer Protocol)
The protocol for web page requests and form submissions.
Parallel computing
Running multiple tasks simultaneously.
Speedup
Performance improvement in parallel computing (sequential time / parallel time).
Distributed computing
Running different parts of a program on multiple devices.
Digital divide
The gap between those with and without computing access.
Crowdsourcing
Many users contributing to a project (e.g., Wikipedia).
Citizen science
Volunteers participating in scientific research.
Creative Commons
Alternative to copyright allowing flexible content usage.
Open access
Free availability of documents or datasets.
PII (Personally Identifiable Information)
Data that can identify an individual.
Multifactor authentication (MFA)
Authentication requiring multiple verification methods.
Encryption
Scrambling data to prevent unauthorized access.
Symmetric encryption
Uses the same key for encryption and decryption.
Public key encryption
Uses different keys for encryption and decryption.
Cookie
Small text file that tracks user data on websites.
Virus
Malware that replicates itself.
Phishing
A scam tricking users into revealing personal information.
Rogue access point
An unauthorized network access point used for attacks.