syntax error
a mistake in the program where the rules of the programming language are not followed therefore a syntax error is printed.
logic error
a mistake in the algorithm or program that causes it to behave incorrectly or unexpectedly.
run-time error
A mistake in a program that happens only when the program is actually run, such as a program attempting to access memory that does not exist.
overflow error
Error from attempting to represent a number that is too large.
bit
binary digit; 0 or 1
byte
a group of 8 bits
roundoff
Error that results when the number of bits is not enough to represent the number with full precision
analog data
A continuous representation of data
lossless compression
a data compression algorithm that allows the original data to be perfectly reconstructed from the compressed data.
lossy compression
data compression techniques in which some amount of data is lost. This technique attempts to eliminate redundant information.
metadata
data that describes data
Sequencing
Putting commands in correct order so computers can read the commands.
Selection
the process of choosing which sensory information to focus on
Iteration
repetition
linear serach
checking each element of a list until the desired value is found or the whole list is checked
Binary Search
a search algorithm that starts at the middle of a sorted set of numbers and removes half of the data; this process repeats until the desired value is found or all elements have been eliminated.
reasonable time
polynomial in the number of steps an algorithm takes in the worst case based on the input size
heuristic
a simple thinking strategy that often allows us to make judgments and solve problems efficiently; usually speedier but also more error-prone than algorithms
library
a collection of commands / functions, typically with a shared purpose
API
Application Programming Interface, a library of procedures and a description of how to call each procedure.
Modularity
The subdivision of a computer program into separate subprograms
traversal
the process of accessing each item in a list one at a time
computing device
a physical device that can run a program
Bandwidth
The maximum amount of data that can pass from one point to another in a unit of time
protocol
A set of rules governing the exchange or transmission of data between devices.
Scalability
Refers to how well a system can adapt to increased demands
IP
(Internet Protocol) Routing protocol that is in charge of forwarding packets on the Internet.
TCP
(Transmission Control Protocol) provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.
UDP
User Datagram Protocol. Used instead of TCP when guaranteed delivery of each packet is not necessary. UDP uses a best-effort delivery mechanism.
World Wide Web
a system of linked pages, programs, and files
HTTP
HyperText Transfer Protocol - the protocol used for transmitting web pages over the Internet
Parallel Computing
a model in which programs are broken into small pieces, some of which are run simultaneously
speedup
the time used to complete a task sequentially divided by the time to complete a task in parallel
distributed computing
processes and manages algorithms across many machines in a computing environment
digital divide
A worldwide gap giving advantage to those with access to technology
crowdsourcing
using consumers to develop and market products
citizen science
scientific research by amateur scientists
Creative Commons
A kind of copyright that makes it easier for people to copy, share, and build on your creative work, as long as they give you credit for it.
Open Access
A policy that allows people to have read access to things, e.g., libraries or online data
PII
Personally Identifiable Information. Information about individuals that can be used to trace a person's identity, such as a full name, birthdate, biometric data, and identifying numbers such as a Social Security number
MFA
Multi-factor authentication (MFA) is a security control that requires users to verify their identities by providing multiple pieces of evidence before gaining access to a device or application.
Encryption
a process of encoding messages to keep them secret, so only "authorized" parties can read it.
Symmetic Encryption
the same key is used to encode and decode
Public Key Encryption
uses two keys: a public key that everyone can have and a private key for only the recipient
cookie
a small text file that a web server stores on your computer
virus
A tiny, nonliving particle that invades and then reproduces inside a living cell.
phishing
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
rogue access point
a wireless access point that gives unauthorized access to secure networks.