a mistake in the program where the rules of the programming language are not followed therefore a syntax error is printed.
2
New cards
logic error
a mistake in the algorithm or program that causes it to behave incorrectly or unexpectedly.
3
New cards
run-time error
A mistake in a program that happens only when the program is actually run, such as a program attempting to access memory that does not exist.
4
New cards
overflow error
Error from attempting to represent a number that is too large.
5
New cards
bit
binary digit; 0 or 1
6
New cards
byte
a group of 8 bits
7
New cards
roundoff
Error that results when the number of bits is not enough to represent the number with full precision
8
New cards
analog data
A continuous representation of data
9
New cards
lossless compression
a data compression algorithm that allows the original data to be perfectly reconstructed from the compressed data.
10
New cards
lossy compression
data compression techniques in which some amount of data is lost. This technique attempts to eliminate redundant information.
11
New cards
metadata
data that describes data
12
New cards
Sequencing
Putting commands in correct order so computers can read the commands.
13
New cards
Selection
the process of choosing which sensory information to focus on
14
New cards
Iteration
repetition
15
New cards
linear serach
checking each element of a list until the desired value is found or the whole list is checked
16
New cards
Binary Search
a search algorithm that starts at the middle of a sorted set of numbers and removes half of the data; this process repeats until the desired value is found or all elements have been eliminated.
17
New cards
reasonable time
polynomial in the number of steps an algorithm takes in the worst case based on the input size
18
New cards
heuristic
a simple thinking strategy that often allows us to make judgments and solve problems efficiently; usually speedier but also more error-prone than algorithms
19
New cards
library
a collection of commands / functions, typically with a shared purpose
20
New cards
API
Application Programming Interface, a library of procedures and a description of how to call each procedure.
21
New cards
Modularity
The subdivision of a computer program into separate subprograms
22
New cards
traversal
the process of accessing each item in a list one at a time
23
New cards
computing device
a physical device that can run a program
24
New cards
Bandwidth
The maximum amount of data that can pass from one point to another in a unit of time
25
New cards
protocol
A set of rules governing the exchange or transmission of data between devices.
26
New cards
Scalability
Refers to how well a system can adapt to increased demands
27
New cards
IP
(Internet Protocol) Routing protocol that is in charge of forwarding packets on the Internet.
28
New cards
TCP
(Transmission Control Protocol) provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.
29
New cards
UDP
User Datagram Protocol. Used instead of TCP when guaranteed delivery of each packet is not necessary. UDP uses a best-effort delivery mechanism.
30
New cards
World Wide Web
a system of linked pages, programs, and files
31
New cards
HTTP
HyperText Transfer Protocol - the protocol used for transmitting web pages over the Internet
32
New cards
Parallel Computing
a model in which programs are broken into small pieces, some of which are run simultaneously
33
New cards
speedup
the time used to complete a task sequentially divided by the time to complete a task in parallel
34
New cards
distributed computing
processes and manages algorithms across many machines in a computing environment
35
New cards
digital divide
A worldwide gap giving advantage to those with access to technology
36
New cards
crowdsourcing
using consumers to develop and market products
37
New cards
citizen science
scientific research by amateur scientists
38
New cards
Creative Commons
A kind of copyright that makes it easier for people to copy, share, and build on your creative work, as long as they give you credit for it.
39
New cards
Open Access
A policy that allows people to have read access to things, e.g., libraries or online data
40
New cards
PII
Personally Identifiable Information. Information about individuals that can be used to trace a person's identity, such as a full name, birthdate, biometric data, and identifying numbers such as a Social Security number
41
New cards
MFA
Multi-factor authentication (MFA) is a security control that requires users to verify their identities by providing multiple pieces of evidence before gaining access to a device or application.
42
New cards
Encryption
a process of encoding messages to keep them secret, so only "authorized" parties can read it.
43
New cards
Symmetic Encryption
the same key is used to encode and decode
44
New cards
Public Key Encryption
uses two keys: a public key that everyone can have and a private key for only the recipient
45
New cards
cookie
a small text file that a web server stores on your computer
46
New cards
virus
A tiny, nonliving particle that invades and then reproduces inside a living cell.
47
New cards
phishing
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
48
New cards
rogue access point
a wireless access point that gives unauthorized access to secure networks.