final

¡Supera tus tareas y exámenes ahora con Quizwiz!

lossy compression

(or irreversible compression) a data compression method that uses inexact approximations, discarding some data to represent the content. Most commonly seen in image formats like .jpg.

DDoS Attack

- Distributed Denial of Service Attack. Typically a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed.

cloud computing disadvantages

1. Cloud Computing is dependent on Internet Access. 2. Documents editors are quite basic so they don't have the range of features available in commercial software. I.e. think about Microsoft Word Vs a Google Doc 3. Not good at memory heavy applications such as Video editing. These have to be done on a desktop Computer.

Hexadecimal

A base-16 number system that uses sixteen distinct symbols 0-9 and A-F to represent numbers from 0 to 15.

hexidecimal

A base-16 number system that uses sixteen distinct symbols 0-9 and A-F to represent numbers from 0 to 15.

byte

A byte is a unit of data that is 8 bits long. A byte is the standard "chunk size" for binary information in most modern computer.

bit

A contraction of "Binary Digit"; the single unit of information in a computer, typically represented as a 0 or 1

Array

A data structure in JavaScript used to represent a list.

Sub domain

A domain name under the control of a higher-level domain name.

List

A generic term for a programming data structure that holds multiple items.

Internet:

A group of computers and servers that are connected to each other.

Pair Programming

A method of programming in which two programmers write code using a single computer. One programmer in the "driver" role uses the mouse and keyboard to actually write the code while a second acts as a "navigator", keeping track of the big picture, catching errors, and making suggestions. Programmers switch roles frequently and communicate throughout the process.

Function

A named group of programming instructions. Functions are reusable abstractions that reduce the complexity of writing and maintaining programs.

innovation

A new or improved idea, device, product, etc, or the development thereof

IP Address:

A number assigned to any item that is connected to the Internet.

Variable

A placeholder for a piece of information that can change.

algorithm

A precise sequence of instructions for processes that can be executed by a computer

Low Level Programming Language

A programming language that captures only the most primitive operations available to a machine. Anything that a computer can do can be represented with combinations of low level commands.

High Level Programming Language

A programming language with many commands and features designed to make common tasks easier to program. Any high level functionality is encapsulated as combinations of low level commands.

Protocol

A set of rules governing the exchange or transmission of data between devices.

Protocol:

A set of rules governing the exchange or transmission of data between devices.

protocol

A set of rules governing the exchange or transmission of data between devices.

Boolean

A single value of either TRUE or FALSE

Router:

A type of computer that forwards data across a network

image

A type of data used for graphics or pictures.

Global Variable

A variable whose scope is "global" to the program, it can be used and updated by any part of the code. Its global scope is typically derived from the variable being declared (created) outside of any function, object, or method.

binary

A way of representing information using only two options.

Data Type

All values in a programming language have a "type" - such as a Number, Boolean, or String - that dictates how the computer will interpret it. For example 7+5 is interpreted differently from "7"+"5"

ACII

American Standard Code for Information Interchange; the universally recognized raw text format that any computer can understand

Event

An action that causes something to happen.

URL

An easy-to-remember address for calling a web page (like www.code.org).

SSL/TLS - Secure Sockets layer / Transport Layer Security

An encryption layer of HTTP that uses public key cryptography to establish a secure connection.

parameter

An extra piece of information passed to a function to customize it for a specific need

==

The equality operator (sometimes read: "equal equal") is used to compare two values, and returns a Boolean (true/false). Avoid confusion with the assignment operator "=",

Debugging

Finding and fixing problems in an algorithm or program.

HTTP

HyperText Transfer Protocol - the protocol used for transmitting web pages over the Internet

Private Key

In an asymmetric encryption scheme the decryption key is kept private and never shared, so only the intended recipient has the ability to decrypt a message that has been encrypted with a public key.

IETF

Internet Engineering Task Force - develops and promotes voluntary Internet standards and protocols, in particular the standards that comprise the Internet protocol suite (TCP/IP).

If-Statement

The common programming structure that implements "conditional statements".

for loop

Loops that have a predetermined beginning, end, and increment (step interval).

Sequencing

Putting commands in correct order so computers can read the commands.

Packets:

Small chunks of information that have been carefully formed from larger chunks of information.

loop

The action of doing something over and over again.

DNS

The service that translates URLs to IP addresses.

User Interface

The visual elements of a program through which a user controls or communicates with the application. Often abbreviated UI.

latency

Time it takes for a bit to travel from its sender to its receiver.

Iterate

To repeat in order to achieve, or get closer to, a desired goal.

Iterate

To repeat in order to achieve, or get closer to, a desired goal. Selection - A generic term for a type of programming statement (usually an if-statement) that uses a Boolean condition to determine, or select, whether or not to run a certain block of statements.

TCP

Transmission Control Protocol - provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.

Public Key Encryption

Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.

Cracking encryption

When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption. Decryption - a process that reverses encryption, taking a secret message and reproducing the original plain text

Computationally Hard

a "hard' problem for a computer is one in which it cannot arrive at a solution in a reasonable amount of time

big data

a broad term for datasets so large or complex that traditional data processing applications are inadequate.

Turtle Programming

a classic method for learning programming with commands to control movement and drawing of an on-screen robot called a "turtle". The turtle hearkens back to early implementations in which children programmed a physical robot whose dome-like shape was reminiscent of a turtle.

Library

a collection of commands / functions, typically with a shared purpose

API

a collection of commands made available to a programmer

lossless

a data compression algorithm that allows the original data to be perfectly reconstructed from the compressed data.

Documentation

a description of the behavior of a command, function, library, API, etc.

Callback function

a function specified as part of an event listener; it is written by the programmer but called by the system as the result of an event trigger.

modulo

a mathematical operation that returns the remainder after integer division. Example: 7 MOD 4 = 3

Moore's Law

a prediction made by Gordon Moore in 1965 that computing power will double every 1.5-2 years, it has remained more or less true ever since.

Heurisitics

a problem solving approach (algorithm) to find a satisfactory solution where finding the best or exact solution is impractical or impossible.

Top Down Design

a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

Event-driven program

a program designed to run blocks of code or functions

Event-driven program

a program designed to run blocks of code or functions in response to specified events (e.g. a mouse click)

Virus

a program that runs on a computer to do something the owner of the computer does not intend.

Models and Simulations

a program which replicates or mimics key features of a real world event in order to investigate its behavior without the cost, time, or danger of running an experiment in real life

while loop

a programming construct used to repeat a set of commands (loop) as long as (while) a boolean condition is true.

Abstraction

a simplified representation of something more complex. Abstractions allow you to hide details to help you manage complexity, focus on relevant concepts, and reason about problems at a higher level.

abstraction

a simplified representation of something more complex. Abstractions allow you to hide details to help you manage complexity, focus on relevant concepts, and reason about problems at a higher level.

Caesar Cipher

a technique for encryption that shifts the alphabet by some number of characters

Phishing Scam

a thief trying to trick you into sending them sensitive information. Typically these include emails about system updates asking you send your username and password, social security number or other things.

symmetric encryption

an encryption scheme in which the key used to encrypt data is also used to decrypt (contrast with: asymmetric encryption)

Random Substitution Cipher

an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.

asymmetric means

different keys are used to encrypt and decrypt a message (public and private)- anyone can send encrypted messages but she is the only one that can decode them with her private key

cloud computing advantages

example of cloud computing - google docs - 1. create documents 2. save online 3. access anywhere 4. share with others 5. Collaborate (work with other person at the same time from different devices) on a document

Network Redundancy:

having multiple backups to ensure reliability during cases of high usage or failure

Boolean Expression

in programming, an expression that evaluates to True or False.

metadata

is data that describes other data. For example, a digital image may include metadata that describe the size of the image, number of colors, or resolution.

selection

making choices (if x is less then four)

UI Elements

on-screen objects, like buttons, images, text boxes, pull down menus, screens and so on.

pixel

short for "picture element", the fundamental unit of a digital image, typically a tiny square or dot that contains a single point of color of a larger image.

Firewall

software that runs on servers (often routers) that only allows traffic through according to some set of security rules.

bit rate

sometimes written bitrate) the number of bits that are conveyed or processed per unit of time. e.g. 8 bits/sec.

RGB

the RGB color model uses varying intensities of (R)ed, (G)reen, and (B)lue light are added together in to reproduce a broad array of colors.

Cipher

the generic term for a technique (or algorithm) that performs encryption

Cloud Computing

the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

Net Neutrality:

the principle that all Internet traffic should be treated equally by Internet Service Providers.

net neutrality

the principle that all Internet traffic should be treated equally by Internet Service Providers.

asymmetric encryption

used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt.

Antivirus Software

usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them.


Conjuntos de estudio relacionados

Maternity Exam 2 Practice Questions 2 (main)

View Set

Russia and Its Neighbors (Russia Study Set)

View Set

History 1112 chapter 16 practice

View Set