A base 10 number with ten possible different digits
Decimal Number
The unique number assigned to each device on the internet
IP Address
The inputs and outputs that allow a user to interact with a piece of software. This part of an application can include a variety of forms such as buttons, menus, images, text, and graphics.
User Interface
Holds one value at a time; A reference to a value or expression that can be used repeatedly throughout a program
Variable
An ordered collection of elements
List
A measure of how many steps are needed to complete an alogrithm
Efficiency
Debugging
Sharing data with others so they can analyze it
Publicly avaliable data shared by governments, organizers, and others
Open Source
The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
Keylogging
A base 2 number with two possible different digits
Binary Number
A protocol for sending data across the internet that assigns unique numbers to each connected device
Internet Protocol (IP)
Data that are sent to a computer for processing by a program. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.
Input
Allows a program to change the value represented by a variable
Assignment Operator
A common method for referencing the elements in a list or string using numbers
Index
A search algorithm which checks each element of a list, in order, until the desired value is found or all elements in the list have been checked.
Linear Search
A variable in a function definition. Used as a placeholder for values that will be passed through the function
Parameter
Collecting data from others so you can analyze it
The practice of obtaining input or information from a large number of people via the internet
Citizen Science and Crowdsourcing
A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
Phising
Overflow Error
A type of computer that forwards data across a network
Any data that are sent from a program to a device. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.
Output
A permanent variable; Can be used anywhere in your code
Global Variable
A condition is checked, then a block of code is repeated as long as the Boolen condition remains true. Once the condition is false, the program stops
While Loop
A search algorithm that starts at the middle of a sorted set of numbers and removes half of the data; this process repeats until the desired value is found or all elements have been eliminated.
Binary Search
The value passed to the parameter
Argument
Data about data
Metadata
Software intended to damage a computing system or to take partial control over its operation
Malware
Error from attempting to represent a number that is too precise. The value is rounded.
Round-off Error
The inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network
Redundancy
Program statements run in order, from top to bottom.
Sequential Programming
A temporary variable; Can be used only in the part of the code where it was created.
Local Variable
A condition is checked, then the program runs until that condition is met
For Loop
The level of efficiency that describes algorithms which run in reasonable time
Polynomial efficiency (or lower)
A group of functions that may be used in creating new programs
Library
Data that changes discreetly through a finite set of possible values
Digital Data
A wireless access point that gives unauthorized access to secure networks.
Rogue Access Point
Can continue to function even in the event of individual component failures. This is important because elemets of complex systems like a computer network fail at unexpected times, often in groups
Fault Tolerant
When program statements run after being triggered by an event, like a mouse click or a key press
Event Driven Programming (onEvent)
A data type that is either true or false
Boolean Value
A repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met.
Iteration
The description of efficiency of algorithms that run in unreasonable time.
Exponential or factorial efficiencies
This command makes a value from the end of a function available to the rest of the program code.
Return
Data with values that change continuously, or smoothly, over time
Analog Data
A process of encoding messages to keep them secret, so only "aythorized" parties can read it
Encryption
Lossy Compression
Data added to packets to help route them through the network and reassemble the original message
Packet Metadata
Form of program documentation written into the program to be read by people; does not affect how a program runs
Comment
Your code doesn't follow the rules of the programming language
Syntax Error
Occurs when the ending condition never changes; it always stays "TRUE" or "FALSE" and causes the program to run ineffectively.
Infinite Loop
Provides a "good enough" solution to a problem when an actual solution is impractical or impossible
Heuristic
Specifications for how functions in a library behave and can be used
Application Program Interface (API)
A process for creating a sigital representation of analog data by measuring the analog data at regular intervals
Sampling
A process that reverses encryption, taking a secret message and reproducing the original plain text.
Decryption
A group of interconnected computing devices capable of sending or receiving data
Computing Network
A protocol for sending packets that does error-checking to ensure all packets are received and properly ordered
Transmission Control Protocol (TCP)
Differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics
Digital Divide
A named group of programming instructions. Also referred to as a 'procedure'
Function
The process of accessing each item in a list one at a time
Traversal
A problem for which no algorithm can be constructed that is always capable of providing a correct yes-or-no answer
Undecidable Problem
The subdivision of a computer program into seperate subprograms
Modularity
The generic term for a technique (or algorithm) that performs encryption
A protocol for sending packets quickly with minimal error-checking and no reseding of dropped packets
User Datagram Protocol (UDP)
<, >, <=, >=, ==, !=
This type of operator indicates a Boolean expression
Comparison Operators
A command that executes the code within a function
Function Call
Programs run in order, one command at a time.
Procedural Abstractiong
A method of computer access in which a user had to successfully provide evidence in at least two of the following categories: knowledge, possession, and inherence.
Multifactor Authentication
The system responsible for translating domain names like example.com into IP addresses
The Domain Name System (DNS)
The type of operators represented by the symbols &&, ||, != (AND, OR, NOT)
Logical Operators
Programs are run by multiple devices
Distributed Computing
Programs are broken into small pieces, some of which are run simultaneously
Parrallel Computing
Computer Virus Scanning Software
A protocol for computers to request and share the pages that make up the world wide web on the Internet
Hypertext Transfer Protocol (HTTP)