Introduction to Programming
Images, Bit by Bit
Security
Algorithms & Procedural Abstraction
Connected Computers
Computer Code
The Future is now
100

Another term for 'repetition'

Iteration

100

Refers to data with values that change continuously, or smoothly, over time like sound and music files. 

Analog

100

The practice of controlling access to personal information and protecting against unauthorized use and aquisition

Data security

100

The goal of finding the best solution among many

Optimization problem

100

The rate at which data is downloaded or uploaded in a network

Bandwidth

100

Evaluate:

!(True && 3 > 4)

True

100
Through this, computers are able to be programmed without explicit instructions. It requires training, and is susceptible to bias in the training data. 

Machine learning

200

Actions by the user such as button clicks. 

User Events

200

Equals 8 bits

Byte

200

An entity that issues digital certificates

Certificate authority

200

Are input variables for a procedure

Parameters

200

The capability of a system to continue operating properly in the even of the failure of one or more of its components

Fault-tolerant

200

A procedure that computes and returns a value

Function

200

the collection and analysis of data relating to the natural world by members of the general public, typically as part of a collaborative project with professional scientists.

Citizen Science

300

Data sent back from the program to the device and can be tactile, audible, visual, or text. 

Output

300

123 in binary

101010

300

A piece of secret data used by encryption and decryption algorithms

key

300

For a parallel solution, this is measured in the time it took to complete the task sequentially divided by the time it took to complete the task when done in parallel

Speedup

300

A company that provides customers with Internet access

Internet Service Provider

300

An abstract data type that stores multiple objects in order

List

300

A method of user authentication which requires the user to present multiple pieces of evidence in multiple categories (such as knowledge and possession)

multifactor authentication (MFA)

400

A system of rules that govern the behavior of some system. 

Protocol

400

A way to store large amounts of persistant data in rows and columns

Database

400

A method of encoding a message into a secret text. One of these is named after Caesar

Cipher

400

A problem that has a yes or no answer

Decision problem

400

A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network

IP Address

400

A non-executable block of text that can be added to a program to provide clarification and documentation of the code

Comment

400

Can solve large problems by using resources online rather than processing the data on a single local computer

Cloud computing

500

To diagnose and solve problems with your code

Debug

500

data about data

metadata
500

A program to record every keystroke made by a computer user

Keylogger

500

This usually means it runs faster or uses less space

More efficient

500

A hierarchical name (such as trincoll.edu) that identifies an institution on the internet. 

Domain name

500

Gives the remainder when one number is divided by another

Mod operator

500

The gap between those who have access to the internet and computers and those who do not, usually affected by socioeconomic, geographic, or demography characteristics 

Digital divide

600

Can run many different programs (ie. a smartphone)

General Purpose Computer 

600

Of the two types of compression, this one is usually faster

Lossy compression

600

An attempt to try every possible encryption key to break a secret message

Brute force attack

600

The undecidable problem of determining whether a computer program will procedure an answer at some point or loop forever on a given input

The Halting Problem

600

The protocol that powers the Web, used to request webpages from servers and submit form data to servers

HTTP (Hypertext Transfer Protocol)

600

An algorithm that runs faster than its linear counterpart, but requires the data to be sorted.

binary search

600

When the allocation of resources and workload are distributed to individual devices on a network

Decentralized or Distributed Computing

700

Of the 3 building blocks of algorithms, if statements represent this concept. 

Selection

700

Provides simpler, generalized way to access a more complex collection of data

Data abstraction

700

Relatively small amounts of data that web browsers store on your computer. 

Cookies

700

An example of a runtime that is reasonable

Polynomial time or linear time

700

A lightweight data transport protocol with minimal error checking

UDP (User Datagram Protocol)

700

Evaluate:

(3 * 4 % 2 + 3) * 6 - 10 / 2

13

700

Rights given to persons over the creations of their minds, such as inventions, literary and artistic works, designs, symbols, names, and images

Intellectual Property Rights

800

a library of procedures and a description of how to call each procedure

API (Application Programming Interface)

800

1011 0111 is the binary form of this number

183

800

This is performed by counting the occurrence of the letters in an encrypted message in an effort to discover patterns that might reveal the encryption key

Frequency analysis

800

Finds an approximate solution for a hard problem; Helpful for finding a solution in a reasonable amount of time

Heuristic algorithm

800

A data transport protocol that includes mechanisms for reliably transmitting packets to a destination

TCP (Transmission Control Protocol)

800

An error that results when the number of bits is not enough to represent the number with full precision (like using 3 digits to represent π as 3.14)

Roundoff error

800

A set of licenses that allow creates to communicate which rights they reserve, and which rights they waive for the benefit of recipients or other creators

Creative commons

M
e
n
u