1/104
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Algorithm
A step-by-step set of instructions used to solve a problem or complete a task.
Variables
A named container used to store information that can change while a program runs.
Collaboration
Working with others to solve problems, develop code, or design computing solutions.
Driver
In pair programming, the person who types the code and controls the computer.
Navigator
In pair programming, the person who reviews the code, offers ideas, and helps catch mistakes.
Conditionals
Statements that run certain code only when a specific condition is true (e.g., if statements).
Sprite
A character or object in a visual programming environment that can be moved or controlled.
Broadcast
A way to send a message in a program to trigger events or actions (used in environments like Scratch).
Command
An instruction for the computer to perform a specific task.
Event/Control
An action that causes something to happen in a program, like clicking a mouse or pressing a key.
Input
Data or signals received by a computer program (e.g., user typing, mouse clicks).
Output
Information a program gives back to the user (e.g., text on screen, sounds, images).
Pseudocode
A simplified way to describe algorithms using plain language or code-like statements, without specific syntax.
Digital Divide
The gap between people who have access to computers and the internet and those who do not.
Sequence
The specific order in which instructions or steps are carried out in a program.
Local Variable
A variable that is only accessible within the part of the program where it was created (e.g., inside a function).
Global Variable
A variable that can be used throughout the entire program.
Initializing
Setting a variable to a starting value when it is first created.
Data Types
Different kinds of data a program can use, like numbers (integers), text (strings), or true/false values (Booleans).
Lists
An ordered collection of items (elements) that can be accessed by their position (index).
Strings
A sequence of characters (like letters, numbers, or symbols) treated as text.
Prototype
A basic or early version of a program or function used to test ideas or demonstrate features.
Expression
A combination of values, variables, and operators that is evaluated to produce a result.
Parameter
A variable used in a procedure or function definition that acts as a placeholder for values passed into it.
Argument
The actual value that is passed into a function or procedure when it is called.
Iteration
Repeating a set of instructions (looping) until a condition is met.
Procedure
A named block of code designed to perform a specific task; also called a function or method.
Boolean
A data type that represents only two values: true or false.
Abstraction
Simplifying complex problems by hiding unnecessary details to focus on important parts.
Infinite Loop
A loop that never ends because the stopping condition is never met.
Modulus
An operator that returns the remainder after division (e.g., 7 % 3 is 1).
Code Segment
A portion or snippet of code that performs a specific task or function.
Operators
Symbols used to perform operations on values or variables (e.g., +, -, *, /, %).
Readability
How easy it is to read and understand the code, often improved by good naming, spacing, and comments.
Traverse
To go through each item in a list, usually with a loop.
Index
The position of an item in a list or string, usually starting at 0.
Element
An individual item or value within a list.
Sublist
A smaller list that is part of a larger list.
Data Abstraction
Managing complexity by organizing and working with data in a simplified way (e.g., using lists instead of individual variables).
Selection
Using conditionals to choose which set of instructions to run (e.g., if, else).
Conditional
A statement that runs code only if a certain condition is true (e.g., if x > 10).
Nested Conditional
A conditional statement inside another conditional statement.
Return Statement
A command in a procedure that sends a value back to where the procedure was called.
Computer Virus
A type of malicious software that can replicate itself and spread to other computers, often damaging files or systems.
Cybersecurity
The practice of protecting computers, networks, and data from unauthorized access, attacks, or damage.
Keylogging
A type of spyware that records every key pressed on a keyboard to steal sensitive information like passwords.
Malware
Short for "malicious software," it includes viruses, spyware, worms, and other harmful programs designed to damage or control systems.
Personally Identifiable Information (PII)
Any data that can be used to identify a specific person, such as name, address, phone number, or Social Security number.
Phishing
A cyber attack where fake emails or websites trick people into giving away personal or sensitive information.
Targeted Marketing
Using personal data, such as browsing history or online behavior, to send customized advertisements to users.
Debugging
The process of finding and fixing errors or bugs in a computer program.
DDoS (Distributed Denial of Service)
An attack where many computers flood a website or server with traffic, making it slow or unavailable.
Rogue Access Point
An unauthorized Wi-Fi hotspot set up to trick users into connecting, often used to steal information.
Syntax Error
An error in the code that breaks the rules of the programming language (e.g., missing punctuation or misspelled words).
Logic Error
An error where the code runs but produces the wrong result due to incorrect reasoning or logic.
Run Time Error
An error that occurs while the program is running, often causing it to crash (e.g., dividing by zero).
Index Out of Bounds
An error that happens when a program tries to access a list position that doesn’t exist (e.g., index 5 in a 3-element list).
Rounding Error
A small mistake that occurs when numbers are rounded during calculations, especially with decimals.
Privacy
The right to control your personal information and decide who has access to it.
Security
The measures taken to protect digital data and systems from unauthorized access or attacks.
Bias
A systematic error in data or algorithms that unfairly favors certain outcomes or groups.
Classifying Data
Sorting data into categories based on shared characteristics or features.
Cleaning Data
Fixing or removing incorrect, duplicate, or incomplete data to improve quality and accuracy.
Filtering Data
Selecting only the data that meets certain conditions or criteria.
Patterns in Data
Trends or repeated sequences found in data that can help make predictions or inform decisions.
Scalability
A system's ability to handle growing amounts of work or data without losing performance.
Internet
A global network that connects millions of computers and devices, enabling communication and data sharing.
Computer System
A combination of hardware and software working together to perform computing tasks.
Computer Network
A group of connected computers that can share resources and communicate.
Computing Device
Any electronic device that can run programs and process data, such as phones, laptops, or tablets.
Bandwidth
The maximum amount of data that can be transmitted over a network connection in a given time.
Distributed Computing System
A system where multiple computers work together on different parts of a larger task.
Fault Tolerance
A system’s ability to keep working even if some parts fail.
IP Address
A unique number assigned to each device on a network to identify and locate it.
TCP (Transmission Control Protocol)
A protocol that ensures data is sent and received accurately over the internet.
Packets
Small chunks of data sent across a network; the internet breaks files into packets for efficient transfer.
Parallel Computing System
A system where multiple processors work on parts of a task at the same time to solve problems faster.
Protocols
Rules that define how data is sent, received, and interpreted over a network.
Redundancy
Having extra components or pathways in a system to ensure it keeps working if something fails.
Router
A device that directs data packets between different networks, like from your home to the internet.
Sequential Computing System
A system where tasks are completed one after another, step by step.
World Wide Web (WWW)
A collection of web pages and resources accessed through the internet using browsers.
Encryption
Converting data into a code to prevent unauthorized access.
Decryption
Converting encrypted data back into its original, readable form.
Certificate Authority
A trusted organization that issues digital certificates to verify website identities for secure connections.
Public Key Encryption
A method of encrypting data using two keys: a public key to encrypt and a private key to decrypt.
Multifactor Authentication
A security method that requires two or more forms of identification to access a system (e.g., password + code sent to phone).
Authentication
Verifying a user's identity before granting access to a system.
Asymmetric Ciphers
Encryption that uses two different keys: one for encrypting and a different one for decrypting (used in public key encryption).
Symmetric Key Encryption
Encryption that uses the same key for both encrypting and decrypting data.
Crowdsourcing
Getting input or ideas from a large group of people, often online, to solve a problem or collect data.
Simulation
A computer program that imitates a real-world process or system to study its behavior under different conditions.
Undecidable Problem
A problem for which no algorithm can be created that always leads to a correct yes-or-no answer.
Lossy
A type of data compression that removes some data permanently to reduce file size (e.g., JPEG images, MP3 audio).
Lossless
A type of data compression that reduces file size without losing any information (e.g., PNG images, ZIP files).
Analog
Continuous data that can take on any value within a range (e.g., sound waves, light levels).
Bits
The smallest unit of data in computing, short for “binary digit,” which can be either 0 or 1.
Bytes
A group of 8 bits, often used to represent a single character (e.g., a letter or symbol).
Metadata
Data about data — for example, the author and date of a document or the dimensions of an image.
Overflow Errors
Errors that occur when a number is too large to be stored in the available space (like adding beyond the limit of bits).