A base 10 number with ten possible different digits
Decimal Number
The unique number assigned to each device on the internet
IP Address
The inputs and outputs that allow a user to interact with a piece of software. User interfaces can include a variety of forms such as buttons, menus, images, text, and graphics.
User Interface
program expression to store a value of something
Variable
An ordered collection of elements
List
A finite set of instructions that accomplish a task
Algorithm
A variable in a function definition. Used as a placeholder for values that will be passed through the function
Parameter
The binary number 101 in decimal form.
5
Information about an individual that identifies, links, relates, or describes them
Personally Idenfitiable Information (PII)
A base 2 number with two possible different digits
Binary Number
A protocol for sending data across the internet that assigns unique numbers to each connected device
Internet Protocol (IP)
Data that are sent to a computer for processing by a program. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.
Input
This type of operator allows a program to change the value represented by a variable
Assignment Operator
the index number of the first item in a list
0
The hexadecimal number B in decimal form.
11
The binary number 1001 in decimal form
9
denoting software for which the original source code is made freely available and may be redistributed and modified
Open Source
A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
Phishing
Overflow Error
A type of computer that forwards data across a network
Router
Any data that are sent from a program to a device. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.
Output
A type of variable that is permanent; Can be used anywhere in your code
Global Variable
a 'for' loop has three parts, this is the second part
condition
A type of search algorithm which checks each element of a list, in order, until the desired value is found or all elements in the list have been checked.
Linear Search
The value passed to the parameter
Argument
Collecting data from others so you can analyze it
The practice of obtaining input or information from a large number of people via the internet
Citizen Science or Crowdsourcing
The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
Keylogging
Error from attempting to represent a number that is too precise. The value is rounded.
Round-off Error
The inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network
Redundancy
A command or instruction. Sometimes also referred to as a code statement
Program Statement
A type of variable that is temporary; Can be used only in the part of the code where it was created.
Local Variable
(var x = 0; x < 10; x++) is what type of loop?
for loop
A type of search algorithm that starts at the middle of a sorted set of numbers and removes half of the data; this process repeats until the desired value is found or all elements have been eliminated.
Binary Search
A group of functions that may be used in creating new programs
Library
the use and development of computer systems that are able to learn and adapt without following explicit instructions
AI // machine learning
Software intended to damage a computing system or to take partial control over its operation
Malware
A process for reducing the number of bits needed to represent something without losing any information. The process is reversible.
Lossless Compression
A process that allows a system to continue to function even in the event of individual component failures. This is important because elements of complex systems like a computer network fail at unexpected times, often in groups
Faut Tolerant
A type of programming where statements run in order, from top to bottom.
Sequential Programming
A data type that is either true or false
Boolean Value
a 'for' loop has three parts, this is the first part
initialization
Algorithms with a polynomial efficiency or lower (constant, linear, square, cube, etc.) are said to run in this type of time
Reasonable Time
Specifications for how functions in a library behave and can be used
Application Program Interface (API)
when data is stored on a device is it measured in megabits or megabytes
MB megabytes
a process that reverses encryption, taking a secret message and reproducing the original plain text
decryption
Lossy Compression
Data added to packets to help route them through the network (Data about data)
Packet Metadata
A type of programming where statements run when triggered by something like a mouse click or a key press.
Event Drive Programming
This type of error occurs when your code doesn't follow the rules of the programming language
Syntax Error
A repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met.
Iteration
Algorithms with exponential or factorial efficiencies are examples of algorithms that run in this type of time
Unreasonable Time
12
This type of data has values that change continuously, or smoothly, over time (NOT digital data)
Analog Data
A process of encoding messages to keep them secret, so only "aythorized" parties can read it
Encryption
A group of computer devices and programs working together for a common purpose
Computing System
A protocol for sending packets that does error-checking to ensure all packets are received and properly ordered
Transmission Control Protocol (TCP)
code that is ignored by the compiler. It is just notes describing the program
comments
This type of error occurs when your code follows the rules of the programming language, but doesn't do what you intended
Logic Error
This type of loop occurs when the ending condition will never evaluate to true.
In other words, the Boolean expression will never evaluate to false.
Infinite Loop
or death loop
When a "good enough" solution to a problem is provided when an actual solution is impractical or impossible
Heuristic
This type of abstraction involves extracting shared features to generalize functionality
Procedural Abstraction
This type of data changes discreetly through a finite set of possible values
Digital Data
public key encryption (2 keys ) AKA
asymetric encryption
A group of interconnected computing devices capable of sending or receiving data
Computing Network
A protocol for sending packets quickly with minimal error-checking (broadcast / stream)
User Datagram Protocol (UDP)
finding approximate solutions to problems when exact answer is not necessary
heuristic
A named group of programming instructions. Also referred to as a 'procedure'
Function
The process of accessing each item in a list one at a time
Traversal
This type of problem is when no algorithm can be constructed that is always capable of providing a correct yes-or-no answer
Undecidable Problem
or unsolvable problem
The process of finding and fixing problems in code
Debugging
which is larger -megabyte or gigabyte
GB gigabytes
private key (symmetric ) has this many keys
1
A machine that can run a program, including computers, tablets, servers, routers, and smart sensors
Computing Device
The system responsible for translating domain names like example.com into IP addresses
The Domain Name System (DNS)
a step by step process that describes how to solve a problem in a way that always gives a correct answer
algorithm
<, >, <=, >=, ==, !=
Indicates a Boolean expression
Comparison Operators
A command that executes the code within a function
Function Call
With this type of computing, programs run in order, one command at a time.
Sequential Computing
when a function sends data back to where the function was called , this word is used
Return
1024 bytes is a
KB kilobyte
A method of computer access in which a user had to successfully provide evidence in at least two of the following categories: knowledge, possession, and inherence.
Multifactor Authentication
The series of connections between computing devices on a network starting with a sender and ending with a receiver
Path
A protocol for computers to request and share the pages that make up the world wide web on the Internet
Hypertext Transfer Protocol (HTTP)
The concept that revolves around differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics
Digital Divide
&&, ||, != (AND, OR, NOT).
Both sides this are reduced to a single Boolean value
Logical Operators
With this type of computing, programs are run by multiple devices
Distributed Computing
With this type of computing, programs are broken into small pieces, some of which are run simultaneously
Parallel Computing
A variable in a function definition. Used as a placeholder for values that will be passed through the function
Parameter
Data about data
Metadata
Protects a computing system against infection
antivirus