The process of reducing complexity by focusing on the main idea
2
New cards
Algorithm
Is a finite set of instructions that accomplish a specific task
3
New cards
Analog (data)
have values that change smoothly, rather than in discrete intervals, over time
4
New cards
Argument
Specify the values of the parameters when a procedure is called
5
New cards
Asymmetric encryption
Uses a public key for encryption and a private key for decryption
6
New cards
Bandwidth
The maximum amount of data that can be sent in a fixed amount of time
7
New cards
Bias
In computer systems causes unfair tendencies for or against individuals or groups of individuals
8
New cards
Binary search
An algorithm that is often more efficient than linear search because it starts at the middle of a sorted data set and eliminates half of the data; the process repeats until a desired value is found or all elements have been eliminated. Data must be sorted in order to use this method.
9
New cards
Bit
Shorthand for binary digit and is either 0 or 1
10
New cards
Boolean
A value that is either true or false
11
New cards
Byte
8 bits
12
New cards
Certificate authorities
Entities that issue digital certificates that validate the ownership of encryption keys used in secure communications
13
New cards
Citizen science
Scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices
14
New cards
Cleaning data
Is a process that makes the data uniform without changing their meaning (e.g., replacing all equivalent abbreviations, spellings, and capitalizations with the same word)
15
New cards
Computer Network
Is a group of interconnected computing devices capable of sending and receiving data (is a type of computing system)
16
New cards
Computer virus
Is a malicious program that can copy itself and gain access to a computer in an unauthorized way
17
New cards
Computing innovation
Includes a program as an integral part of its function
18
New cards
Computing system
Is a group of computing devices and programs working together for a common purpose
19
New cards
conditional statement
(“if”-statements) execute different statements based on the value of a Boolean expression
20
New cards
creative commons
A public copyright license that enables the free distribution of an otherwise copyrighted work. This is used when the content creator wants to give others the right to share, use, and build upon the work they created
21
New cards
crowdsourcing
Obtaining input or information from a large number of people via the Internet
22
New cards
data compression
Can reduce the size (number of bits) transmitted or stored data
23
New cards
decidable problem
A decision problem for which an algorithm can be written to produce a correct output for all inputs
24
New cards
decision problem
A problem with a yes/no answer
25
New cards
decryption
The process of decoding data that has been encrypted
26
New cards
digital divide
The difference in access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics
27
New cards
distributed computing
A computational model in which program operations are run on multiple devices
28
New cards
encryption
The process of encoding data to prevent unauthorized access
29
New cards
fault tolerant
The ability of a computer system to continue functioning when one or more of its devices or connections fail
30
New cards
Heuristic
An approach to a problem that produces a solution that is not guaranteed to be optimal but may be used when finding a guaranteed optimal solution is impractical
31
New cards
Iteration (for or while loop)
Is a repeating portion of an algorithm
32
New cards
Keylogging
The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
33
New cards
Linear search
Check each element of a list, in order, until the desired value is found or all elements in the list have been checked
34
New cards
logic error
Is a mistake in an algorithm or program that causes it to behave incorrectly or unexpectedly
35
New cards
Lossless compression
Algorithm to reduce the number of bits stored or transmitted while guaranteeing complete reconstruction of the original data
36
New cards
Lossy compression
Algorithm to reduce the number of bits stored or transmitted but only allows reconstruction of an approximation of the original data
37
New cards
Malware
Software intended to damage a computing system or to take partial control over its operation
38
New cards
Metadata
Data about data. For example, for an image, it may include the date of creation or the file size of the image
39
New cards
Multi-factor authentication
A method of computer access control in which a user is only granted access after successfully presenting several pieces of evidence
40
New cards
Nested conditional statements
Consist of conditional statements within conditional statements
41
New cards
Open access
Online research output free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions
42
New cards
Open source
Programs that are made freely available and may be redistributed and modified
43
New cards
Overflow error
Is an error that occurs when a program attempts to handle data that is outside of the defined range of values
44
New cards
Packet
A small amount of data along with some metadata used for routing it between the origin and the destination on the Internet, as well as data for reassembly
45
New cards
Parallel computing
A computational model in which program operations are broken into multiple smaller sequential computing operations, some of which are performed simultaneously Time takes as long as its sequential tasks plus the longest of its parallel tasks
46
New cards
Parallel systems
Multiple computing devices connected to complete many calculations or processes simultaneously
47
New cards
Parameter
Are input variables of a procedure (used to define the function)
48
New cards
Personally Identifiable Information (PII)
Information about an individual that identifies, links, relates, or describes them
49
New cards
Phishing
A technique that attempts to trick a user into providing personal information P
50
New cards
Protocol
An agreed-upon set of rules that specify the behavior of a system Internet protocols are open (everyone has access to them)
51
New cards
Redundancy
The inclusion of extra components that can be used to mitigate failure of a system if other components fail (helps create fault-tolerance)
52
New cards
Rogue access point
A wireless access point that gives unauthorized access to secure networks
53
New cards
Round-off error
Is the difference between an approximation of a number used in computation and its exact (correct) value Occurs when a value exceeds the range of numbers that can be represented by a fixed number of bits
54
New cards
Routing
The process of finding a path from the send device to receiving device
55
New cards
Run-time error
Is a mistake in a program that occurs during the execution of the program
56
New cards
Scalability
Is the capacity for a system to change in size and scale to meet new demands
57
New cards
Selection (if or if/else)
Determines which parts of an algorithm are executed based on a condition being true or false
58
New cards
Sequencing
Is the application of each step of an algorithm in the order in which the code statements are given
59
New cards
Sequential computing
A computational model in which program operations are performed in order one at a time
60
New cards
Software library
Collection of procedures (functions) that are ready to be used in creating new programs
61
New cards
Speedup
The speedup of a parallel solution is measured in the time it took to complete the task sequentially divided by the time it took to complete the task in parallel
62
New cards
String
is an ordered sequence of characters
63
New cards
String concatenation
Joins two or more strings end-to-end to make a new string
64
New cards
Symmetric encryption
Uses a single key for both encryption and decryption
65
New cards
Syntax error
Is a mistake in a program where the rules of the programming language are not followed
66
New cards
The Internet
The world-wide computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols
67
New cards
Undecidable problem
A decision problem for which no algorithm can be constructed that is always capable of providing a correct yes-or-no answer
68
New cards
World Wide Web (WWW)
A system of linked pages, programs, and files shared on the internet HTTP is a protocol used by the WWW WWW uses the Internet