Ap Computer Science Principles Vocabulary Flashcards
Selection structure
allows programmers to specify the conditions under which a statement is executed.one of the three control structures; tells the computer to make a decision before selecting the next instruction to process; also called the decision structure
Bit
Binary Digit. Single unit of information on a computer. Represented as a 0 or 1
Bit Rate
The number of bits that are conveyed or processed per unit of time
Protocol
A set of rules governing the exchange or transmission of data between devices. A set of rules for sending, receiving, and interpreting binary messages
Latency
The time it takes for a signal to arrive. Time units such as, miliseconds, seconds
Bandwidth
Transmission capacity, measured by bit rate
Binary
Information for which only two answers are possible
Fiberoptics
Method of transmitting data that utilizes light
Copper Wire
Method of transmitting data that utilizes electricity
WiFi
A wireless networking technology that utilizes radio waves to transmit information/data
Request for Comments (RFC)
Documents that define and publish the standards and protocols for all to see on the Internet Engineering Task Force website
Prototype
A preliminary sketch of an idea or model for something new. It's the original drawing from which something real might be built or created.
IP Address
A number assigned to any item that is connected to the Internet. Every device connected to the internet is assigned an Internet Protocol address
Packets
Small chunks of information that have been carefully formed from larger chunks of information.
Router
A computer which receives messages travelling across a network and redirects them towards their intended destinations based on the addressing information included with the message.
Transmission Control Protocol (TCP)
Provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.
Domain Name System (DNS)
An abbreviation for Domain Name System, the Internet's system for converting alphabetic names into numeric IP addresses. Web sites using names, such as example.com
Hypertext Transfer Protocol (HTTP)
The protocol used by the World Wide Web. It describes how messages are formatted and interchanged, and how web servers respond to commands.
Abstraction
Reducing information and detail to focus on essential characteristics.
Server
A computer that awaits and responds to requests for data.
Client
A computer that requests data stored on a server.
Net Neutrality
The principle that Internet service providers should enable access to all content and applications regardless of the source, and without favoring or blocking particular products or websites.
Internet Censorship
The control or suppression of what can be accessed, published, or viewed on the Internet. It may be carried out by governments or by private organizations at the behest of government, regulators, or on their own initiative.
Node
Vertex; Represented by a labeled circle
Edge
A line connecting two nodes
Cost
Weight; The number associated with an edge that indicates distance, time, or estimated cost
Cycle
A set of edges that begin at one node and can be followed through other nodes back where you started
Tree
A set of edges that connects nodes together in a way that does not form a cycle.
Shortest Path
The lowest weight path between two nodes
Efficiency
A measure of the number of steps per input size needed to complete an algorithm
Routing Table
A data table stored in a router that lists the routes to particular network destinations
Minimum Spanning Tree
Dictates the shortest aggregate path from one node to every nodeA spanning tree connecting all nodes together with the minimum aggregate value of its edges.
Shortest Path Tree
A spanning tree connecting a source node to all others using the smallest values possible.
Internet Engineering Task Force (IETF)
A group of volunteers, private citizens, government officials, etc. who promote internet standards
Peer-to-peer networks
Networks that are designed to connect similar computers that share data and software with each other.
Authenticated access
An extranet is made available to ____ connections that have been granted an ____ _____ to the resources in the extranet.
Anonymous access
Requires no username or password
Censorship of digital information (DI)
Commercial & governmental censorship of DI raise ethical and legal concerns.
Open source software
Software that results from the voluntary collaboration of developers who create programs that they distribute free to others
Licensing of software
Open source and Licensing of software and content raise ethical and legal concerns.
Aggregation of Information
consolidation of information, such as geolocation, cookies, browsing history, raise ethical and legal concerns.
Anonymity in online interactions
can be enable through the use of online anonymity software and proxi servers
exploitation of information
technology enables an act that exploits or victimizes someone (treats them unfairly)
proxy servers
server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers.
curation
How information and content is presented
target advertising
Companies target specific groups like teen or elders, etc.
intellectual property
Refers to intangibles such as ideas, music, art, photos, logos, movies, and programs that are the result of creativity and intellectual effort.
Copyright
An exclusive right granted by the federal government allowing the owner to reproduce and sell an artistic or published work.
digital millennium copyright Act
1998 act that criminalized the circumvention of any anti-piracy encryption technology on commercial software, eBooks, videos, and music. It bans the sale and manufacture of devices used to illegally copy digital content.
wireless
a form of computer networking or other communication that uses radio signals and microwaves to transmit data
digital divide
A term used to describe the discrepancy between people who have access to and the resources to use new information and communication tools, such as the internet, and people who do not have the resources and access to the technology.
socioeconomic
A person's position in society as determined by income, wealth, occupation, education, place of residence, and other factors
infrastructure
Fundamental facilities and systems serving a country, city, or area, as transportation and communication systems, power plants, and schools
commercial
related to business
browser
A program that allows the user to find and view pages on the world wide web.
hosts
Computers that link individual personal computer users to the Internet are called:
lossy compression
a process of reducing a file's size by altering and/or eliminating some pixels
lossless compression
A compression technique that is able to reconstitute all of the data in the original file; hence "lossless" means that this compression technique does not lose data
ISP
Internet Service Provider
Biometrics
An automated method of recognizing a person based on physical characteristics. Among the features measured are face, fingerprints, hand geometry, iris and voice
High level programming
Provides strong abstraction from the hardware and allows a program to be written in a language that can run on multiple types of computers.Visual by humans.Visual Basics, Python, Java.English type language for programming.Differentiates the language from assembly language and binary which are technically also programming languages
low-level programming
written to correspond closely to a computer processor's circuitry, a programming language that a computer can interpret quickly but that bears little resemblance to human language.One that corresponds closely to a computer processor's circuity. (e.g., Machine Language).are closer to the hardware than are high-level programming languages, which are closer to human languages
CPU
Abbreviation of central processing unit. The CPU is the brains of the computer. Sometimes referred to simply as the processor or central processor, the CPU is where most calculations take place.(Central Processing Unit) The key component of a computer system, which contains the circuitry necessary to interpret and execute program instructions
Internet speed
Bandwidth
block programming
When a programmer strings together a group of similar programs.
data abstraction
Representing or storing information with methods that separate layers of concerns so that the programmer can work with information while ignoring lower-level details about how the information is represented.
Parallel processing
The processing of several aspects of a problem simultaneously; the brain's natural mode of information processing for many functions, including vision. Contrasts with the step-by-step (serial) processing of most computers and of conscious problem solving.
Procedural abstraction
is the concept of being able to look at programming code, identify a block of repetitive programming statements, and place them within one procedure that can be referenced by many objects, thus making the code easier to understand and reuse.
Model
A pattern, plan, representation, or description designed to show the structure or workings of an object, system, or concept
RGB
The RGB color model is an additive color model in which red, green, and blue light are added together in various ways to reproduce a broad array of colors. The name of the model comes from the initials of the three additive primary colors, red(0-255), green(0-255), and blue(0-255).
Huffman compression
Huffman coding is a lossless data compression algorithm. The idea is to assign variable-legth codes to input characters, lengths of the assigned codes are based on the frequencies of corresponding characters. The most frequent character gets the smallest code and the least frequent character gets the largest code.
Internet packets
are made up of binary sequences that are sent through the lowest layer of OSI
Open source interconnection
What does the acronym "OSI" stand for?
Logic gate
an electronic circuit that performs a Boolean function.AND, OR, NOT
Routing packets
Router. In packet switching networks, routing is the higher-level decision making that directs network packets from their source toward their destination through intermediate network nodes by specific packet forwarding mechanisms.
Resource sharing
____ is the ability to share physical resources, such as a printer or storage device, as well as logical resources, such as software and information.
Data encryption
What process secures a wireless network by protecting data packets being transmitted?scrambling the data in a message in a systematic way in order to prevent competitors from electronically monitoring confidential data transmission
Network backbone
A very high speed transmission path that carries the majority of network data. Connects small networks into larger a structure or server nodes to a network where the majority of client computer are attached.
Malware
Malicious software created specifically for the purpose of infiltrating or damaging a computer system without the user's knowledge or consent includes a variety of technologies, including viruses, Trojan horses, worms, spyware, and adware
Data vs Information
Data are raw facts; information is data converted into a meaningful & useful context for decision making
Iterative
a process that can be applied repeatedly
Filter
A device used to remove contamination from a fluid.
Clustering
Identifying patterns in data based on common temporal (time) or spatial (geographic) traits is based on what type of data mining analysis?
Data Classification
System of organizing data according to its sensitivity. Common classifications include public, highly confidential, and top secret.
Creative Expression (Digital)
Refers to participation in a range of activities that allow for creative and imaginative expression
Data-driven problems
Problems with Data gathered during testing
Visualizations
A class of maps that use sophisticated software to create dynamic computer maps, some of which are three dimensional or interactive.
Extract(ing)
pulling out information
Online Collaborative tools
Helps with gathering and processing info
Patterns
refers to finding a collection of symptoms that tend to go together, and not just seeing a single symptom
Number Bases
The number of different digits or combination of digits and letters that a system of counting uses to represent numbers.
Bits
A basic unit of information in computing and digital communications. Can have only one of two values. A 0 or 1
Creative development process
Employing non traditional techniques, combination of artifacts, or tools.
Hexadecimal
Represents values using numbers 0-9 and letters A-F
Digital Data
Discrete, discontinuous representations of information or works, as contrasted with continuous, or analog signals which behave in a continuous manner, or represent information using a continuous function.
Computing tools
programming, integrated IDES, spreadsheets, etc
Programming Languages
Language of computers, examples: Java, Python, C, C++
Real Numbers (Floating-Point)
Formula representation of an approximation of real numbers
Levels of Abstraction
Different programming languages offer different levels of human to computer communication
High-Level Languages
Programming language similar to human language. Uses multiple abstractions to manage complexity
Abstraction Hierarchy
Most general concepts on top of the hierarchy and specific concepts on the bottom
Low-Level Languages
programming language similar to machine code
Analyze
Artifact, usability, functionality and sustainability of true artifact
Collaboration
Joint effort by more than one person to achieve a goal
Scalability
Ability to either handle increasing workloads or to be easily expanded to manage workload increases. In a software context, systems that aren't scalable often require significant rewrites or the purchase or development of entirely new systems.
Digital Data Representation
Digital Representation of Information. Digital encoding of information means the data is stored in discrete units -- effectively numbers -- and it is contrasted with analog encoding which uses a physical quantity, e.g. charge, varying over a continuous range.
Software
programs and other info used by a computer
Binary Sequences
Used to represent digital data.
Metadata
Data about data.Provides information about the content of a digital item e.g. each digital images from a digital camera has a file attached listing such things as date, time camera and shutter speed
Computational artifact
something created by a human using a computer.
Computing Tools
used software development utility used to maintain computers.
Binary Numbers
Represents values using 0 and 1
Lossy data compression
losses ability to reconstruct compressed data
Floating-point numbers
A number that can have a fractional part
data file formats
data stored in multiple formats based on data characteristics
privacy concerns
arise when personal data
security concerns
concern for protection of info
storage media
affects methods and costs of manipulating data
algorithm
precise sequence of instructions
sequencing
application of each step of an algorithm
boolean condition
determines which part of algorithm used
selection
uses Boolean condition to select algorithm used
iteration
repetition of part of an algorithm
pseudo code
notation of simplified programming language
natural language
describe algorithms so humans can understand them
runtime
time program takes to run
reasonable time
number of algorithm steps less than or equal to size of the input
solvable problem
exactly what is says
unsolvable problem
exactly what is says
Networks
defined by Manuel Castells as a set of interconnected nodes without a center
Internet Protocol
Standard protocol used on many LANs and on the Internet. See TCP.
Domain name system
Converts IP addresses into domains
IP address
A number that uniquely identifies each computer or device connected to the Internet.
IPv4
Internet Protocol version 4. represents each IP Address as a 32 bit-binary number. 2^32
HTTP
Hypertext Transfer Protocol. A conventional set of communication rules for controlling how Web browsers and servers pass information back and forth over the Internet.
IETF
The Internet Engineering Task Force develops and promotes Internet standards.
Hierarchy
A group organized by rank
Redundancy
unnecessary repetition
Domain name syntax
is hierarchical
Routing
The process of determining the best path from Point A on one network to Point B on another is known as ____
decidable problem
possible to make single algorithm that is always correct
undecidable problem
impossible to construct a single correct algorithm that always outputs yes or no
Latency
the delay before a transfer of data begins following an instruction for its transfer.
Trust Model
provides a framework for delivering security mechanisms. must include implicit or explicit validation of an entity's identity or the characteristics necessary for a particular event or transaction to occur.
Cybersecurity
the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
Cyber Warfare
the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
DDoS Distribute denial-of-service
the intentional paralyzing of a computer network by flooding it with data sent simultaneously from many individual computers.
Phishing
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Viruses
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
Antivirus Software
computer software used to prevent, detect and remove malicious software.
Firewall
a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
Cryptography
the art of writing or solving codes.
Symmetric Encryption
The secret key is used for both encryption and decryption of messages,
Public Key Encryption
technique that uses a paired public and private key (or asymmetric key) algorithm for secure data communication.
Certificate authorities
is an entity that issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate.
Computing Innovation(s)
a new method, idea, product in the computing world.
Email; SMS; chat
new methods of communication.
Video Chat
a face-to-face conversation held over the Internet by means of webcams and dedicated software.
Heuristic solution
solutions close to to the real solution (approximate)
End to end architecture
Facilitates connecting new devices and networks on the internet
Devices
Make up internet are connected and communicating using addresses and protocols
Arithmetic operators
The symbols +, -, *, /, %, and ^ used to denote addition, subtraction, multiplication, division, percentage, and exponentiation in an Excel formula
The internet
This invention make it possible for people to work from home, to send information to different places, and made the economy mor dependent
Web Servers
________ are programs that run on a server-tier computer and that manage HTTP traffic by sending and receiving Web pages to and from clients
SSL
____ is a method of encrypting TCP/IP transmissions above the network layer.
Browsers
information-search services, such as Microsoft's Internet Explorer, Firefox, and Google Chrome, that offer detailed organizational maps to the Internet.
Syntax
Sentence structure
Distributed solutions
must scale to solve problems
Citizen science
Home PC on scientific research
Human computation
Harnesses control and makes use of it
Digital collaboration
Enhances human capabilities
substring
A substring of a string is another string that occurs "in". For example, "the best of" is a substring of "It was the best of times". This is not to be confused with subsequence, which is a generalization of substring. For example, "Itwastimes" is a subsequence of "It was the best of times", but not a substring.
TCP
Transmission Control Protocol is one of the main protocols of the Internet protocol suite. It originated in the initial network implementation in which it complemented the Internet Protocol (IP). Therefore, the entire suite is commonly referred to as TCP/IP. TCP provides reliable, ordered, and error-checked delivery of a stream of octets between applications running on hosts communicating by an IP network. Major Internet applications such as the World Wide Web, email, remote administration, and file transfer rely on TCP. Applications that do not require reliable data stream service may use the User Datagram Protocol (UDP), which provides a connectionless datagram service that emphasizes reduced latency over reliability.
Packet Switching
breaks up digital information into individually addressed chunks
Boolean algebra
A method for expressing mathematically a logic circuit
LOGICAL CONCEPTS
concepts with clearly defined rules for membership
Real numbers (floating-point)
Real numbers are approximated by floating-point representation that do not necessarily have infinite precision
Integers
whole numbers and their opposites
Self Identifying variables
Locating and correcting errors in a program is called debugging the program
Open Standards
are standards made available to the general public and are developed (or approved) and maintained via a collaborative and consensus driven process. "Open Standards" facilitate interoperability and data exchange among different products or services and are intended for widespread adoption.
Debugging
Correcting errors in software.
Interfaces
Connections between two or more computer systems
Protocols
List of steps, such as assessments and interventions, to be taken in different situations.
strings; string operation
a contiguous sequence of symbols or values, such as a sequence of characters or a sequence of binary values
integers
a whole number; a number that is not a fraction.
concatenation
a series of interconnected things or events
Functionality
The degree to which a system performs its intended function
Productivity
Internet and web have impacted productivity positively and negatively in many areas.
program documentation
A process in which a complex programs functions are portrayed and described in order for someone else to make sense of what is going on later, or just to describe what the program is doing and where it is doing it. ALSO describes the inputs, outputs, and processing logic for all program modules
program development
consists of a series of steps programmers use to build computer programs
e-commerce
Online shopping, amazon, buying online and on site transactions conducted electronically.
procedures
Descriptions of the way work is to be done
parameters
limits, characteristics of a population
Internet vs. WWW
Enhanced methods of an opportunity for communication and collaboration.
Redundancy of routing
is a computer networking protocol that provides for automatic assignment of available Internet Protocol (IP) routers to participating hosts. This increases the availability and reliability of routing paths via automatic default gateway selections on an IP sub-network.
Program Justification
Justification ca include a written explanation about how a program meets its specifications
Primary Source
is an artifact, a document, diary, manuscript, autobiography, a recording, or any other source of information that was created at the time under study
Online Databases/ Virtual Libraries
is a collection of resources available on one or more computer systems, where a single interface or entry point to the collections is provided.
Commercial
concerned with or engaged in commerce.
Infrastructure
the basic physical and organizational structures and facilities (e.g., buildings, roads, and power supplies) needed for the operation of a society or enterprise.
Socioeconomic
relating to or concerned with the interaction of social and economic factors.
Digital Divide
the gulf between those who have ready access to computers and the Internet, and those who do not.
Innovation
a new method, idea, product, etc.
Wireless
using radio, microwaves, etc. (as opposed to wires or cables) to transmit signals.
Digital Millennium Copyright Act
a 1998 US law intended to update copyright law for electronic commerce and electronic content providers. It criminalizes the circumvention of electronic and digital copyright protection systems.
executable programs
are files that can be executed by an operating system to run in memory as a process and perform a useful function.
Anonymous Access
login is a process that allows a user to login to a website anonymously
Censorship (of digital info)
the suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable, or a threat to security.
Bandwidth
defined as the amount of data that can be transmitted in a fixed amount of time. expressed in bits
processes
a series of steps by which resources are changed into a desired product
Smart Technologies
Grids, Buildings, Transportation, facilitating human capability.
Authenticated Access
The process of identifying an individual, usually based on a username and password.
Peer-to-peer Networks
A network of computers configured to allow certain files and folders to be shared with everyone or with selected users.
program execution
when you give the computer a program and some data and tell the computer to follow the instructions in the program, you are running, or executing, the program on the data
HIERARCHY
A system or organization in which people or groups are ranked one above the other according to status or authority.
Scalabilty
Google's track record of maintaining excellent performance while dramatically increasing the number of simultaneous users accessing its systems best exemplifies what network/system attribute?
Streaming
a method of transmitting or receiving data (especially video and audio material) over a computer network as a steady, continuous flow, allowing playback to proceed while subsequent data is being received.
REDUNDANCY
unnecessary repetition of data
IETF
Internet Engineering Task ForceInternet Engineering Task Force. A large international group concerned with the evolution of the Internet architecture and its smooth operation. DEVELOPS STANDARDS
Sensor Networks
Facilitate new ways of interacting with the environment and with physical systems.
Download
copy (data) from one computer system to another, typically over the Internet
incremental development
A program development plan intended to avoid debugging by adding and testing only a small amount of code at a time. it also helps create large correct programs.
Routing
The process of determining the best path from Point A on one network to Point B on another is known as ____The process of determining the best path from Point A on one network to Point B on another is known as ____
HTTP
Hypertext Transfer Protocolis the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web. As soon as a Web user opens their Web browser, the user is indirectly making use of HTTP. HTTP is an application protocol that runs on top of the TCP/IP suite of protocols (the foundation protocols for the Internet).
Application Program Interfaces Libraries
An interface that allows applications to make use of the operating system
IP
Internet Protocol.IP address lookup, location, proxy detection, email tracing, IP hiding tips, blacklist check, speed test, and forums
Commercial Access
Of or relating to commerce
IPv6
Internet Protocol version 6represents each IP Address as a 128 bit-binary number. 2^128
iterative process
a process based on repetition of steps and procedures.
GPS
Changed how humans traveled navigate and find information related to geolocation.
programming
a process that leads from an original formulation of a computing problem to executable computer programs. This includes: designing, writing, testing, debugging, and maintaining the source code of computer programs.
Moore's Law
number of transistors per square inch on integrated circuits had doubled every year since their invention
Public Data
Provide Widespread access and enables solutions to identified problems.
Dissemination
Spreading Widely
Cloud computing
Foster new ways to communicate and collaborate. It has also introduced new data-security concerns
program instructions
Special communications instructions that direct the travel of packets over the Internet are called
linear search
this search method starts at the beginning of the list and compares each element in turn with the required value until a match is found or the end of the list is reached.
Social Media
Face book, Twitter, Blogs, Blogs, Have enhanced dissemination.
credibility of sources
how true they are
plagarism
illegally copying information
secondary source
source gotten one step removed
Creative Commons License
is used when an author wants to give people the right to share, use, and build upon a work that he has created.
intellectual property
ideas/inventions protected by patent
curation of info
gaining info
target advertising
advertising to select group
Lists
a series of names or other items written or printed together in a meaningful grouping or sequence so as to constitute a record sequence so as to constitute a record
proxy server
intermediary server
exploitation
finding weaknesses in system
anonymity
no identification
empirical analysis
empirical analysis of an algorithm is done by implementing the algorithm and running it on different inputs
aggregation of information
a sum/total of a lot of info
sequential execution
The computer execution of program instructions performed in the sequence established by a programmer
collaborative development
this can decrease the size and complexity of tasks required.
Open source software
can be used by anyone
licensing of software
need to purchase/get permission to use
Lossless data compression
reduces number of bits but still retains perfect detail
Domain name syntax
is an identification string that defines a realm of administrative autonomy, authority or control within the Internet. Domain names are formed by the rules and procedures of the Domain Name System (DNS). Any name registered in the DNS is a domain name.
Touch screen
A type of display device that includes a touch-sensitive face to accept input from the user. (3)A touch sensitive surface that allows the user to select, control or move objects by touching icons and symbols using fingersA ____ is an input device that uses a monitor or LCD panel as the backdrop for input options.
Digital data
Discrete data which can be counted.This is discrete data that has exact values, such as exam grades (A, or B, or C... There is no level in-between)
Analog data
Analog data is represented using an infinite scale of values.The representation and measurement of the performance or behavior of a system by continuously variable physical entities such as currents, voltages and so on.
Piracy
The illegal copying and distribution of software.
Simulations
Representations of real situations; give organizations the opportunity to speculate as to what would happen if certain courses of action were pursued.
Cookies
Small text files that are sent to your computer from certain websites. They track your behaviour and transactions.A small text file placed on your computer when you visit a Web page. Used to remember you or your preferences when you revisit that page or to track your browsing activities, cookies facilitate virtual shopping carts, page customization, and targeted advertising. They are not programs and cannot read your hard drive or cause damage to your computer.
Plagiarism
a piece of writing that has been copied from someone else and is presented as being your own work.
Compression ratio
A ratio such as 5:1 that indicates the ratio of compression that has been applied to a file. High compression ratios such as 35:1 indicate more compression so data can be contained in smaller files.Summarizes the reduction in size of a file. Can be expressed two different ways, as follows. If more than 1, the compression ratio tells how many times bigger the original file is. If less than 1, the compression ratio tells the percentage by which the original file size has been reduced. A compressed data divided by original data
IEEE
Institute of Electrical and Electronics EngineersThe Institute of Electrical and Electronics Engineers, an international nonprofit organization that sets standards FOR COMPUTING...
Control structures
Instructions that specify the sequence in which a program is to be executed: sequence, selection, and repetition controls
Sequence structure
a set of statements that execute in the order that they appear
Repetition control
enables a program to perform one or more actions as long as a certain condition is met
Nested loop
a loop that has been put within another loop
Infinite loop
A logical error in which a repetition statement never terminates.A loop in which the terminating condition is never satisfied.
For loop
An iteration structure that repeats one or more statements a specified number of times
while loop
A control flow statement that allows code to be executed repeatedly.
counter-controlled repetition
Uses a variable called a counter to control the number of times a set of statements will execute. Often called definite repetition because number of repetitions is known before the loop begins executing. Used on Nested logic
Binary search algorithm
Start in the middle and eliminate half the stack and keep looking in the middle. The data is pre-sorted.The process of examining a middle value of a sorted array to see which half contains the value in question and halving until the value is located.
Asynchronous processing
A type of group policy processing that allows a user to log on and see the desktop while policies are still being processed.Method of processing multiple scripts at the same time without waiting for the outcome of a previously launched script to occur.
Repeat loop
Control structured
QR codes
"QR codes or Quick Response codes are matrix barcodes, which store data such as URLs, geotags and links, that provide a way to link to online services using a camera and QR reader. QR codes can be read quickly by a mobile phone and provide information such as discounts and details of an event, a business or location. Data can be stored horizontally and vertically, making it capable of holding more data than a traditional bar code which only stores data in one direction
Bit.ly link
A popular URL shortening site that condenses long URLs into short ones under the bit.ly domain (which happens to use the Libyan country code "ly." Users can also create a custom name as long as it has not been taken; for example, the Bitly link to a video of this product on YouTube is bit.ly/CDEhistory.Read more at http://www.yourdictionary.com/bitly#6hlQ1dH4O0c9RM1k.99
PNG
Portable Network GraphicsThis supports advanced transparency, has a relatively average file size, and can be interlaced, optimizing for internet use.A raster file that supports transparency and is best used for line art, logos, photographs and web but is not suitable for print.
Stand-alone circuit
A stand-alone power system (SAPS or SPS), also known as remote area power supply (RAPS), is an off-the-grid electricity system for locations that are not fitted with an electricity distribution system. Typical SAPS include one or more methods of electricity generation, energy storage, and regulation.
Trojan horse
What is the program that appears to be a legitimate application, utility, game, or screensaver and that performs malicious activities surreptitiously?masquerades as beneficial program while quietly destroying/damaging your system
Worm
Similar to a virus, but it has the capability to travel without any human action so it can infect many computers. It is able to replicate itself and can use the email address book to send itself to everyone listed. It consumes system memory to do this and slows down the computer or the network.
Encryption
Process of converting readable data into unreadable characters to prevent unauthorized access.
Or gate
a logic circuit whose output is 1 when at least one input is 1.
NAND gate
Logic circuit whose output is 0 when all inputs are 1
Spoofing
When someone pretends to be someone else with the intent of obtaining unauthorized data.
jpeg
is a file extension associated with images, used in applications such as Pixlr.The most common graphic file type, has full color graphic format, and has a relatively small file size.
Boolean Variable
Any variable, from the domain of Boolean algebra, having one of only two values
DMCA
The Digital Millennium Copyright Act (DMCA) is a United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO).
VRRP (VIRTUAL Redundancy Routing Protocol)
(VRRP) is a computer networking protocol that provides for automatic assignment of available Internet Protocol (IP) routers to participating hosts. ... The physical router that is forwarding packets at any given time is called the master router.
Network Redundancy
having multiple backups to ensure reliability during cases of high usage or failure. Router - A type of computer that forwards data across a network. Redundant routing is impossible if there is only one possible path from one device to another.
Byte Pair Encoding
Byte pair encoding or digram coding is a simple form of data compression in which the most common pair of consecutive bytes of data is replaced with a byte that does not occur within that data.
Symmetric Encryption
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plain text and decryption of cipher text. The keys may be identical or there may be a simple transformation to go between the two keys.
Crowdsourcing
the practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the Internet.
Domain internet vs Sub domain (second, third, fourth,, level domains)
For instance, http:// sub.example.comhttp is the protocolsub.example is second level domaincom is top level domain