individual value in a list that is assigned a unique index
3
New cards
Index
number used for referencing the elements in a list or string
4
New cards
Iteration
repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met
5
New cards
Infinite Loop
occurs when the ending condition of an ineration will never evaluate to true
6
New cards
Traversal
accessing each item in a list one at a time
7
New cards
Append
adding an element to the end of a list
8
New cards
Data Abstraction
collection of data to manage complexity without referencing specific details of the representation
9
New cards
Logic Error
mistake in the algorithm or program that causes it to behave incorrectly or unexpectedly
10
New cards
Simulation
abstractions of more complex objects or phenomena for a specific purpose.
11
New cards
Substring
part of an existing string
12
New cards
User Interface
inputs and outputs that allow a user to interact with a piece of software
13
New cards
Input
data sent to a computer for processing by a program
14
New cards
Output
data sent from a program to a device
15
New cards
Program Statement
code command or instruction
16
New cards
Program
collection of program statements.
17
New cards
Sequential Programming
program statements run in order, from top to bottom
18
New cards
Event Driven Programming
when program statements run when triggered by an event
19
New cards
Documentation
written description of how/why a command or piece of code works or was developed.
20
New cards
Comment
documentation written into the program to be read by people and which do not affect how a program runs
21
New cards
Pair Programming
collaborative style in which two programmers switch between the roles of writing code and tracking or planning high level progress
22
New cards
Debugging
finding and fixing problems in an algorithm or program
23
New cards
Development process
steps or phases used to create a piece of software (e.g. investigating, designing, prototyping, and testing)
24
New cards
Event
associated with an action and supplies input data to a program, and can be generated by any action that affects the flow of execution
25
New cards
Incremental Development Process
breaks the problem into smaller pieces and makes sure each piece works before adding it to the whole
26
New cards
Iterative Development Process
requires refinement and revision based on feedback, testing, or reflection, and may require revisiting earlier phases
27
New cards
Plagiarism
use of material created by someone else without permission and presented as one's own
28
New cards
Program Specification
describes how a program functions and may include requirements or a description of user interactions that a program must provide
29
New cards
Syntax Error
mistake in the program where the rules of the programming language are not followed
30
New cards
Software
program or a collection of programs
31
New cards
Citizen Science
scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices
32
New cards
Cleaning Data
process that makes the data uniform without changing its meaning (e.g. replacing all equivalent abbreviations, spellings, and capitalizations with the same word)
33
New cards
Correlation
relationship between two pieces of data
34
New cards
Crowdsourcing
obtaining input or information from a large number of people via the Internet.
35
New cards
Information
collection of facts and patterns extracted from data
36
New cards
Data bias
data that does not accurately reflect the full population or phenomenon being studied
37
New cards
Data filtering
choosing a smaller subset of a data set to use for analysis, for example by eliminating / keeping only certain rows in a table
38
New cards
Computing Innovation
includes a program as an integral part of its function. Can be physical, non-physical computing software, or non-physical computing concepts
39
New cards
Personally Identifiable Information (PII)
information about an individual that identifies, links, relates, or describes them
40
New cards
Phishing
technique that attempts to trick a user into providing personal information
41
New cards
Keylogging
program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
42
New cards
Malware
software intended to damage a computing system or to take partial control over its operation
43
New cards
Rogue Access Point
wireless access point that gives unauthorized access to secure networks.
44
New cards
Encryption
encoding messages to keep them secret, so only "authorized" parties can read it
45
New cards
Decryption
taking a secret message and reproducing the original plain text (reverses encryption)
46
New cards
Symmetric Key Encryption
involves one key for both encryption and decryption
47
New cards
Public Key Encryption
pairs a public key for encryption and a private key for decryption. The sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message
48
New cards
Computing Innovation
includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
49
New cards
Personally Identifiable Information (PII)
information about an individual that identifies, links, relates, or describes them.
50
New cards
Freeware
software that can be acquired at no monetary cost, so users should be wary it does not contain malicious code
51
New cards
Multi-factor Authentication
requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
52
New cards
Strong Password
something that is easy for a user to remember but would be difficult for someone else to guess based on knowledge of that user
53
New cards
Virus
malicious program that can copy itself and gain access to a computer in an unauthorized way - often attach themselves to legitimate programs and start running independently on a computer
54
New cards
Expression
combination of operators, values, and or procedure calls that evaluates to a single value
55
New cards
Assignment Operator
allows a program to change the value represented by a variable
56
New cards
Variable
named reference to a value that can be used repeatedly throughout a program
57
New cards
Boolean Value
data type that is either true or false
58
New cards
Function
named group of programming instructions, and also referred to as a "procedure"