a text-based open-source programming language built for visual and electronic media design and manipulation.
2
New cards
semicolon
in some programming languages, the semicolon is often used to separate multiple statements or are required after every statement (terminators).
3
New cards
braces
Braces (aka: curly braces) are used to group the statements in an if statement, a loop, or other control structures.
4
New cards
debugging
locating and correcting errors in a program.
5
New cards
bug
any unwanted or unintended property of a program or piece of hardware, especially one that causes it to malfunction.
6
New cards
phi phenomenon
the optical illusion that is created when looking in rapid succession at a series of photos, animation and movement provided in rapid succession.
7
New cards
pixel
pixel (picture element) is the smallest element or unit that makes up a digital image that can be individually processed.
8
New cards
setup() function
a function used in the Processing language that runs and sets up the initial properties such as screen size, fonts, etc. when the program starts.
9
New cards
draw() function
an implicit looping structure that is executed every time the screen is redrawn in the Processing language.
10
New cards
while loop
a control flow statement that allows code to be executed repeatedly according to a given Boolean condition (consists of Initialization, condition, action and update)
11
New cards
iterative
repeating a process to generate an unbounded sequence of outcomes, or with the aim of approaching a desired goal or result.
12
New cards
initialization
to set a variable to an initial value (example: int numberDrawn = 0;)
13
New cards
RGB
an additive color model where Red Green and Blue light are added together to produce a variety of colors to display electronically.
14
New cards
CMYK
a subtractive color model where Cyan, Magenta, Yellow and Key (Black) reduce the brightness from the white background to produce a variety of colors for primarily for printed media.
15
New cards
hexadecimal
a positional number system based on 16 and uses 16 symbols to represent values (0-9, A-F)
16
New cards
raster format image
an image represented by a grid of pixels - also known as bitmap. Can be scaled down with no quality loss, but when scaling up, can become fuzzy or pixelated.
17
New cards
bitmap
a file format used to store digital images comprised of a map of bits.
18
New cards
vector format image
a graphic image made up of paths, not a specific number of dots, so they can be rescaled and not lose any image quality.
19
New cards
raw format image
an original image from a digital camera that is neither processed nor compressed and is a larger file format.
20
New cards
jpeg format image
a processed and compressed image that is more accessible and generally has a smaller file format.
21
New cards
file formats
the way a file is encoded for structure and storage. Denoted with file extensions: .jpg, .gif, .pdf, .mp3, etc.
22
New cards
encoding
the process of putting a sequence of characters (letters, numbers, punctuation, symbols) into a particular format for transmission or storage.
23
New cards
run-length encoding (RLE)
Lossless data compression where sequences of the same data value are stored as a single value. Example: WWWWWWWWWEEEEEEEE would be compressed to 9W8E
24
New cards
encoding scheme
the conversion of a sequence of characters (letters, numbers, punctuation, symbols, etc.) - the use of code to convert original data into another format
25
New cards
filter
a technique that changes the appearance of an image by altering shades and colors of pixels.
26
New cards
remix
to alter a piece of media by adding, removing or changing pieces of the original state (re-mash).
27
New cards
sampling
a technique for measuring the sound wave and digitally encoding sound to make a digital representation.
28
New cards
sampling rate
the number of samples of sound that can be taken per second to represent the sound digitally.
29
New cards
autotune
digitally transforming out-of-tune bits of an audio file to improve the pitch and sound quality.
30
New cards
frequency
the speed of the vibration which determines the pitch of sound. Measured in wave cycles that occur in one second (Hertz)
31
New cards
Theremin
an electronic musical instrument where tone is generated through high-frequency and the pitch is controlled by hand motions to and from the circuit.
32
New cards
backmasking
a technique for recording audio backward.
33
New cards
amplitude
the length and width of soundwaves - volume or loudness
34
New cards
compression algorithm
the reduction in the amount of data needed to represent an audio sample.
35
New cards
lossless compression
compression that has occurred with no loss of information so when decompression occurs, no data is ever lost if reverting back.
36
New cards
lossy compression
irreversible compression that uses a more aggressive compression ratio through approximations resulting in partial data loss.
37
New cards
syntax
the spelling and grammar of a programming language - the set of rules that define the combinations of symbols the computer expects.
38
New cards
social media
applications and websites that allow users to share content and participate in social networking that may have otherwise had socioeconomic barriers.
39
New cards
socioeconomic
the differences among groups based on geographical, social and economic factors.
40
New cards
search tools
directories and search engines on the Internet that are essential for finding information efficiently on the Web.
41
New cards
cloud computing
storing, accessing and processing data using remote servers over a network rather than a local server or computer.
42
New cards
client-server model
the client(s) are the end-user(s) and communicates with the server (a centralized computer) that services the clients.
43
New cards
digital divide
the gap between those who have ready access to computers and the Internet, and those who do not.
44
New cards
routing
the process of moving information (or packets) over a network via a device called a router.
45
New cards
SMTP protocol
Email communication standard developed and overseen by the Internet Engineering Task Force (Simple Mail Transfer Protocol)
46
New cards
HTTP
Hypertext Transfer Protocol developed by the Engineering Task Force, this protocol determines how data and messages are formatted, transmitted, and responded to via the Internet.
47
New cards
HTTPS
HTTP with a Secured Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer that encrypts and decrypts user data and requests for added security (Hypertext Transfer Protocol Secure)
48
New cards
Internet protocol
the protocol by which data is sent from one computer to another on the Internet.
49
New cards
TCP/IP
standard for packets and routing (Transmission Control Protocol/Internet Protocol)
50
New cards
SMS
Short Message Services. Text messaging that allows the user to send up to 160 characters to another device. If message is longer it may truncate, concatenate and/or split up into several individual messages.
51
New cards
interface
a user-friendly picture-oriented way to interact with technology, contributing to the widespread use of the Internet
52
New cards
protocols
a common set of rules that computers must abide by in order to connect with each other.
53
New cards
IP address
a unique numeric identification for each device that is connected to a computer network and uses Internet Protocol.
54
New cards
IPv6
Internet Protocol, Version 6 - 128-bit Internet address consisting of eight 4-character hexadecimal numbers to handle routing of many more devices.
55
New cards
IPv4
Internet Protocol, Version 4 - A 32-bit Internet address consisting of four numbers each between 0 through 255, separated by periods (represents 8 bits).
56
New cards
domain
a group of devices connected on a network using the same protocol to access and administer web pages.
57
New cards
domain name system (DNS)
the way that domain names are located and translated into Internet Protocol (IP) addresses.
58
New cards
packet switching
digital data is sent by breaking the data into blocks of bits called packets, which contain both the data being transmitted and control information for routing the data.
59
New cards
net neutrality
the Internet is built around the notion of free and open access to information with no blocking, no throttling or paid prioritization.
60
New cards
encryption
the process of converting information or data into a code, especially to prevent unauthorized access.
61
New cards
public-key encryption
an asymmetric encryption method that uses a public key (made available publicly) and a private key (available to owner only).
62
New cards
certificate authorities
CA's issue digital certificates that validate ownership of encrypted keys used in secured communications and are based on a trust model.
63
New cards
trust model
validation of one's identity necessary for an event or transaction to occur.
64
New cards
open platforms
software based on open standards where there is no single ownership and is freely available through open license.
65
New cards
closed platforms
proprietary software where the provider has control over the application and content and can restrict access
66
New cards
cybersecurity
measures taken to protect a computer or computer system against unauthorized access or attack
67
New cards
confidentiality
the ability to limit access to information to a certain set of users.
68
New cards
integrity
the certainty that information is accurate
69
New cards
availability
the reliability of access to information
70
New cards
firewall
part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
71
New cards
Secure Sockets Layer (SSL)
the standard security technology for establishing an encrypted link between a web server and a browser, typically indicated with padlock icon in the address bar.
72
New cards
DDoS Attack
Distributed Denial of Service - an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.
73
New cards
viruses
code that is capable of copying itself and corrupting a system or destroying data.
74
New cards
social engineering
the psychological manipulation of people into performing actions or divulging confidential information
75
New cards
malware
software that is intended to damage or disable computers and computer systems.
76
New cards
phishing
obtaining confidential information by masquerading as an "official" person, site, or entity. A form of social engineering
77
New cards
Internet
the network infrastructure composed of devices (or nodes) that communicate via protocols
78
New cards
World Wide Web
a network of online content formatted in html and accessed via HTTP (WWW)
79
New cards
Tim Berners-Lee
created the set of fundamental tools and technologies that make up the World Wide Web.
80
New cards
hyperlinks
clickable bits of text, images or other screen elements within an HTML document that a user can select to request another document or web location.
81
New cards
distributed computing
computers that interact with each other in order to achieve a common goal.
82
New cards
botnets
a network of private computers infected with a malicious software and controlled as a group without the owners knowing.
83
New cards
bitcoin mining
the processing of transactions in the digital currency system, in which the records of current Bitcoin transactions, known as a blocks, are added to the record of past transactions, known as the blockchain.
84
New cards
Internet of Things
the network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these objects to connect and exchange data.
85
New cards
autonomous technology
technology that can function without being told what to do - i.e. Robots.
86
New cards
computing innovation
a new method or idea utilizing computing that has meaningful impact on society, economy, culture or environment.
87
New cards
crowdfunding
entrepreneurs using online access to customers as a means of funding their project.
88
New cards
network
connection of devices and networks to communicate using addresses and protocols.
89
New cards
sensor networks
autonomous sensors that measure environmental conditions such as light, temperature and sound which facilitate new ways of interacting with the environment and with physical systems.
90
New cards
Application Program Interfaces (APIs)/Libraries
a set of routines, protocols, and tools for building software applications which simplify complex programming tasks
91
New cards
hierarchy
an arrangement of elements in a ranking of superiority. the Internet and systems are built from the top (root) down.
92
New cards
metadata
descriptive data about an image, a web page, or other complex objects (data about data)
93
New cards
bandwidth
a measure of bit rate of a system or data (measured in bits) that can be sent in a fixed amount of time over a system.
94
New cards
latency
the time elapsed between the transmission and the receipt of a request in a system.
95
New cards
open standard
a standard where documentation and specifications are open to the public.
96
New cards
closed standard
a standard where documentation and specifications are not available to the public.
97
New cards
open source
publicly available information that is free to use, distribute, modify, and study.
98
New cards
closed source
privately owned information that is proprietary.
99
New cards
symmetric key system
an encryption method where each pair of users share a secret key
100
New cards
asymmetric key system
an encryption method that uses different keys to encrypt and decrypt