Study Guide Review 2
Parameter
(n.) a determining or characteristic element; a factor that shapes the total outcome; a limit, boundary
Elvira is experimenting with assigning and displaying variables. Here's a snippet of her code: a ← 12 DISPLAY (a) b ← 32 DISPLAY (b) a ← b b ← 52 DISPLAY (a) DISPLAY (b) What will be the output of that code?
12 32 32 52
Danielle is programming a kitty simulator. Here's part of her code: hunger ← 6 cuddliness ← 9 playfulness ← 7 DISPLAY (playfulness) DISPLAY (cuddliness) DISPLAY (hunger) After running that code, what will be displayed?
7 9 6
Nested Conditional
A conditional statement that appears in one of the branches of another conditional statement.
Psuedocode
A cross between human language and a programming language.
datebase
A database is a collection of data organized in a manner that allows access, retrieval, and use of that data. Excel, as a spreadsheet, is not the database tool. Access is the database tool in Office.
nested loop
A loop inside the body of another loop.
Phishing Scam
A scam where someone tries to deceive you into providing personal information by impersonating someone, like a bank representative.
string
A sequence of characters
Boolean Operators
AND, OR, and NOT used in search strings to refine the scope of the search
Geolocation
An HTML5 application programming interface that allows developers to retrieve the geographical location information for a client-side device.
private key
An asymmetric encryption key that does have to be protected.
Symmetric Encryption
An encryption method whereby the same key is used to encode and to decode the message
OR operator
An operator used in a query that selects records that match at least one of two or more conditions in a query.
Return Value
Any value that a method or function gives back to the statement command from which the function or method is called.
Concatenation
Attaching two things side-by-side, frequently strings of text.
A team of songwriters is working on song lyrics together for a pop star. They're trying to decide between two ways of working: Working on documents in a desktop text editing application and emailing their latest version of the document after editing them. Using an online collaborative text editor with real-time updates and revision history. Which of these is a benefit of using the online collaborative text editor? A) They don't have to worry about anyone stealing their lyrics since an online collaborative text editor is more secure than emailing documents from their desktop applications B) They don't have to worry about being embarrassed about the earlier versions of their lyrics, since the online collaborative text editor only stores the latest version C) With the online collaborative text editor, they can iterate more quickly on the lyrics and even edit at the same time D) The online collaborative text editor can correct their spelling better than the desktop editor
C) With the online collaborative text editor, they can iterate more quickly on the lyrics and even edit at the same time
A company develops a mobile app designed for parents to monitor what their children are doing. The parents install the app on the phone, and it can record details like who the child is conversing with and what apps they're using. It can also record and store the geolocation of the child. Which of these questions from parents could not be answered by the recorded geolocation data?
Did my child hang out in the park in a group of more than 20 people?
Comma Separated Values (CSV)
File format for transferring data, which stores fields and records in a plain text file, separated by commas. See also TSV (Tab Separated Values).
Andy is using machine learning for an algorithm that classifies photos of restaurant meals by category (such as "sandwich", "curry", or "salad"). He trains a neural network on a large open database of photos of restaurant meals. He then tests the network on local restaurants and notices that the Ethiopian restaurant meals aren't classified correctly. What's the best way to improve the machine learning algorithm's ability to recognize Ethiopian meals?
He can add Ethiopian meals to the training data set, by finding photos online, crowd-sourcing, or taking them himself.
data security
Keeping the organization's data safe from theft, modification, and/or destruction
NOT operator
Logical operator that negates a single boolean value. Written as !. !a will be true if a is false, and false if a is true.
Citizen Science
Lots of people to help with a scientific project, like asking everyone around the world to count the butterflies they see one day
PII
Personally Identifiable Information. Information about individuals that can be used to trace a person's identity, such as a full name, birthdate, biometric data, and identifying numbers such as a Social Security number (SSN). Organizations have an obligation to protect PII and often identify procedures for handling and retaining PII in data policies.
Encryption
Process of converting readable data into unreadable characters to prevent unauthorized access.
Eloise wants to share her political views with family members living in another state but doesn't want her posts to be viewed by potential employers in the future. What is the best strategy for ensuring that? A) She can write blog posts on a website that is only viewable over a secure connection. B) She can send email messages with family members CC'ed on the email thread. C) She can write her views in the comments of a public Instagram post. D) She can share her views in tweets on a Twitter account, with the default privacy settings.
She can send email messages with family members CC'ed on the email thread.
SMS
Short Message Service
computer malware
Software that does malicious things, includes viruses, worms, Trojan Horses, spyware, and some adware.
else statement
The code to be executed if the if-condition evaluates to False in an if-structure. See also if-structure.
Data Analysis
The process of compiling, analyzing, and interpreting the results of primary and secondary data collection.
The code segment below uses a loop to repeatedly sum up numbers. sum ← 0 i ← 10 REPEAT 11 TIMES { sum ← sum + i i ← i + 1 } Which description best describes what this program does?
This program sums up the integers from 10 to 20 (inclusive).
chained conditional
Two "if, then" statements linked so that the consequent of one statement is also the antecedent of the other statement.
Public Key Encryption
Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.
data breach
When sensitive or confidential information is copied, transmitted, or viewed by an individual who is not authorized to handle the data.
Rouge Access Point
Your company security policy stated that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?
Big Data
a broad term for datasets so large or complex that traditional data processing applications are inadequate.
text file
a file that holds text without any formatting and can be opened in numerous applications
Sensor Network
a group of sensors where each sensor monitors data in a different location and sends that data to a central location for storage, viewing, and analysis.
echo chamber
a metaphorical description of a situation in which information, ideas, or beliefs are amplified or reinforced by communication and repetition inside a defined system.
Vigenere Cipher
a method of encrypting text by applying a series of Caesar ciphers based on the letters of a keyword.
substring
a portion of a string
Decryption
a process that reverses encryption, taking a secret message and reproducing the original plain text
Spreadsheet
a screen-oriented interactive program enabling a user to lay out financial data on the screen
conditional statement
a statement that can be written in if-then form
social media
any tool or service that uses the internet to facilitate conversations
Web Cookies
collection of data that is sent to a computer by some websites
Boolean Expression
in programming, an expression that evaluates to True or False.
What can a string contain?
letters, numbers, and symbols
Machine Learning
the extraction of knowledge from data based on algorithms created from training data
Logical equivalence
the idea that more than one expression can have the same meaning, but have a different form (often a form that helps make the meaning more clear).