data within data
metadate
process that enables an operating system to respond to a failure in hardware or software.
fault tolerant
type of proprietary software that is initially shared by the owner for trial use at little or no cost.
shareware
most basic unit of information in computing and digital communications
bits
what is the name of this donkey kong friend with a red nose, long arms, and overalls
lanky kong
used to add a element in python
append
method for finding an element within a list in sequential order
Linear search
variable has only two possible values: true or false
boolean variable
-written text or illustration that accompanies computer software or is embedded in the source code.
program documentation
how many times does bowser say peach in the peaches song
36
attempt to steal sensitive information, typically in the form of usernames, passwords, credit card numbers, bank account information or other important data in order to utilize or sell the stolen information.
phishing attack
on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user.
cloud computing
finite sequence of rigorous instructions, typically used to solve a class of specific problems or to perform a computation
algorithhm
an error that happens when a program receives a number, value or variable outside the scope of its ability to handle
overflow
What is the name of the penguin whos child you throw to their death in super mario 64
Tuxie
an unexpected problem with software or hardware
bug
cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network
Ddos attack
data structure consisting of a collection of elements, of same memory size, each identified by at least one array index or key
array
hierarchical and distributed naming system for computers, services, and other resources in the Internet or other Internet Protocol networks. It associates various information with domain names assigned to each of the associated entities.
domain name system
mario sunshine
problem-solving strategy or method that is not guaranteed to find the optimal solution, but is designed to find a satisfactory solution in a reasonable amount of time
Heuristic
half-interval search, logarithmic search, or binary chop, is a search algorithm that finds the position of a target value within a sorted array
binary search
sequence of instruction s that is continually repeated until a certain condition is reached
loop
way for you to provide more information to a function.
argument
how many super mario games have come out
49