APCSP VoCab

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Nested for loop

A for loop written, or "nested", inside of another for loop.

Bootstrap

A framework with predefined web page components that respond automatically to window resizing.

Acute Triangle

A triangle where all angles are less than 90 degrees.

Obtuse Triangle

A triangle where one angle is greater than 90 degrees.

Grid

A two-dimensional array

Degrees

A unit of measurement of angles

Instance Variable

A variable defined in a Class, for which each object of the class has its own copy.

Edge Case

An edge case is a problem in your code that only occurs in extreme situations.

Integer(int value) and Double(double value)

Constructs a new Integer object or a new Double Object that represents the specified int or double value

<ul> Tag

Defines an unordered list in HTML.

Off by One Error

In Java When a for loop iteration is off by one too many or one too few.

Scanner class

In Java a class within java.util. It contains code specifically designed to help with user input.

variable.nextLine()

In Java allows users to input String values.

Visibility

In Java visibility (usually public or private) defines who has access to something (usually a variable or method). Public means code outside of the class can access, private means only code inside the class can access.

System reliability

In Java when all programs and code will work as intended.

Selection Sort

In Java, a sorting algorithm that swaps the minimum value left in an array with the current array index. Generally a Sorting algorithm that takes an array of values and sorts it. The idea is to have a sorted part of the list and an unsorted part. On each iteration, selection sort finds the lowest value in the unsorted section of the list and adds it to the end of the sorted part.

Sentinel

In JavaScript A constant that has the specific purpose of being the value that breaks out of a loop.

Set

In JavaScript A data structure that stores values in no particular order. Each value can only appear once in the set.

Loop-and-a-half

In JavaScript A loop, most often set with while(true), that has a break in the loop body.

Semicolon

In JavaScript A punctuation marks that looks like ;

Return

In JavaScript Exit a function and return a value

Println

In JavaScript a function that prints out a line to the user

readFloat

In JavaScript allows for the reading of user input when a float number is used

readLine

In JavaScript allows for the reading of user input when a string is used

Vigenère Cipher

In JavaScript an encryption method that uses a series of interwoven Caesar ciphers based on the letters of a keyword

Syntax error

In JavaScript an error in the sequence of words or rules in a program that prevents the program from running.

Return Value

In JavaScript the value returned from a function when the function is called.

List

In Python A heterogenous, mutable data type that stores an ordered sequence of things.

Print

In Python Displaying text on the screen

DRY Principle

Otherwise known as Don't Repeat Yourself, this principle is designed to help eliminate repeated code and reduce the complexity of a solution

Override

Override a method occurs when a subclass has the same method signature as a superclass. When a method is overridden, Java uses the method from the subclass.,

double abs(double x)

Returns the absolute value of a double value

test two

asdf asdfsadf

Color saturation

the intensity of a color, expressed as the degree to which it differs from white

Brightness

the overall lightness or darkness of the image

De Morgan's Laws

!(A && B) == !A || !B; !(A || B) == !A && !B

Indexing into an array

Getting a value at a particular index in an array.

GIF

Graphics Interchange Format; an image format that allows animations

getWidth()

JavaScript function that returns the width of the graphics canvas

Karel

Karel is a dog who listens to your commands.

While Loop

Lets us repeat code as long as something is true. In Python, sets us repeat code as long as something is true.

public static void main(String args[])

Main method. Code to be run must be placed within the main method.

HTML Tables

Tables display information in a grid.

extend()

Takes a list as an argument and extends the current list with the list given as an argument. Applies to Python code.

Literal

The fixed value being assigned to a variable. Often primitive data types.

Hexadecimal

The hexadecimal number system is the Base 16 number system. It is a number system that only uses 16 digits (0 1 2 3 4 5 6 7 8 9 A B C D E F)

Loop

A loop is a way to repeat code in your program.

IPv6

A new 128 bit version of the Internet Protocol.

Computer

A person or device that makes calculations, stores data, and executes instructions according to a program.

Internet

A philosophy of making information and knowledge open and accessible to ALL. A network of networks built on open, agreed upon protocols.

String

A sequence of characters. In Java, a string is a Java type that represents a string of characters (text)

Event

An event is an action (such as clicking the mouse or pressing a key on the keyboard) that a program detects and uses as input.

Number System

Defines how we represent numbers. Which digits we can use, and what each position (place ) in a number means.

Selector

Defines which HTML elements a CSS rule applies to.

Define a Function

Defining a function means to teach the computer a new command and explain what it should do when receiving that command.

Decimal Number System

The number system we use in out everyday lives. It has 10 digits, 0-9.

Pop

To remove the item in the last position from an array

IndexOutOfBoundsException

A String object has index values from 0 to length - 1. Attempting to access indices outside this range will result in this error.

Byte

A byte is 8 bits.

Growth Mindset

A can-do attitude in which a person views challenges and setbacks as ways to learn rather than terminal obstacles in their path to their goal

Class

A class is a template, or a blueprint, from which Java objects are created. All Java programs start with a class.

Abstract Class

A class, usually at the top of a Class Hierarchy, that cannot be instantiated, because not all of its methods are defined.

Carousel

A component that continually displays different content, often with the goal of highlighting particular areas or content of the website

Gigabyte

A gigabyte (GB) is 2^30 bytes (1024 MB) of binary data.

Networks

A group of 2 or more computer systems linked together.

Copyright

A law that grants the creator of an original work exclusive rights to its use, distribution, and sale

Infinite Loop

A loop that has no way of stopping, and will keep looping forever.

Enhanced For Loop

A loop that is an alternate to a for or while loop that accesses each value in an array starting at the first value and proceeding in order.

Megabyte

A megabyte (MB) is 2^20 bytes (1024 kB) of binary data.

Comment

A message in your code that explains what is going on.

count()

A method that counts occurrences of specific items in a list.

Mutator Method

A method that enables user to change the value of an object's instance and static variables.

Accessor Method

A method that enables user to obtain information about an object's instance and static variables.

Call site

A method's call site is the point in the code where the method is called.

Method signature

A method's method signature is the name of the method and the parameter list.

Abstract method

A method, written in an Abstract Class, that is not defined. The word abstract must come right before the method's return type. It is up to the subclass to fill in the definition for the abstract method.

Prototype

A model designed to demonstrate the most basic functionality or basic design of a product, sometimes used as a proof of concept

ArrayLists

A mutable list of object references. We can create ArrayLists by using the constructor new ArrayList<E>() array[index]: Accesses an element in the array to either update or retrieve.

Nested Function

A nested function is a function that is defined inside another function. This should be avoided.

Magic Number

A number in your code that appears arbitrary. These should all be replaced with calculations or constants.

Use case

A particular sequence of actions that a user takes to accomplish a particular task

Data Structure

A particular way of organizing data in our programs.

Enigma

A physical machine used in WWII that built on the complexity of substitution ciphers.

Divide and Conquer

A problem solving approach where you divide the problem into several smaller sub-problems of similar form, and keep doing so until the problems are trivially simple to solve (conquer)

Fencepost Problem

A problem when using a while loop where you forget one action at the beginning or the end.

Image filter

A procedure that applies a particular function to an image's pixels to change its appearance

Browser

A program on your computer that sends requests for webpages and displays them.

Internet Protocol (IP)

A protocol that defines the structure of an Internet address and assigns a unique address to every device on the Internet.

Mergesort

A recursive sorting algorithm that sorts an array of values more efficiently than Selection Sort and Insertion Sort using a Divide and Conquer approach.

Is A

A relationship between two items that represent a superclass / subclass relationship

Has A

A relationship between two items that represents an instance variable relationship. In Java, objects are defined by having the attributes, or instance variables that they are assigned.

Binary Search

A search that starts at the middle of a sorted array or ArrayList and eliminates half of the array or ArrayList in each iteration until the desired value is found or all elements have been eliminated.

Table

A set of data elements (values) using a model of vertical columns (shown by a name) and horizontal rows (fields), the cell (record) being the unit where a row and column intersect. A table has a specified number of columns by design, but can have any number of rows.

Javadoc

A specific standard for commenting Java programs. Javadoc is a format to follow when commenting in order to clearly explain your code.

Select

A statement in SQL that allows you to ask for a row or multiple rows from a table in a database. SELECT * FROM House; (SELECT and FROM are key words, meaning they can't be used for anything else like table names, column attributes, etc.) * chooses every column in the table; House is the name of the table SELECT name FROM House (returns the House table with only the name column) SELECT name, id FROM House (returns the House table with the name and id columns). Also, a statement in SQL that allows you to ask for a row or multiple rows from a table in a database.

Variable

A symbol or container that holds a value.

Div

A tag that creates a new area of content on a web page that can be styled independently of the rest of the site

Span

A tag that creates an inline area of content on a webpage that can be manipulated separately from the block it is enclosed in

Compiler

A tool that compiles your Java code, it takes the Java code you've written and turns it into an executable program.

Right Triangle

A triangle that includes one 90 degree angle.

Equilateral Triangle

A triangle where all angles and side lengths are equal.

Constant

A variable in a program that has a value that does not change.

Argument

A variable passed as a value to a function

Parameter

A variable passed in from outside the function

Global variable

A variable that can be used throughout a program, in every scope

Local Variable in Java

A variable that is defined in a method or constructor. It only exists in the context of the method that it belongs to.

Local variable

A variable that is restricted to use in a certain scope of a program

Alias

A variable that references an existing object. When the alias variable is manipulated, so is the original object, and vice versa.

Counter

A variable used to count the number of times an action has been performed

Counter

A variable used to count the number of times an action has been performed.

Visibility

An attribute that determines if a particular element can be seen by the viewer of the web page

Caesar Cipher

An encryption method in which each letter of the message is shifted by a certain amount, called the key

Compile Time Error

An error in the actual Java code. The code will not compile into an executable program, because there are errors in the text of the code.

Runtime error

An error that results in a crash when the program is run.

Exception

An exception is thrown by Java when a runtime error is encountered. The exception provides information about what kind of error occurred.

Moore's Law

An observation that the processing speed of computers is doubling every year. This is exponential growth. Computers are getting smaller and faster at an exponential rate.

Curly Bracket

An open curly bracket is { and a close curly bracket is }

Intrusion Detection System (IDS)

Intrusion detection systems (IDSs) are available in two different types: host-based intrusion system (HBIS) and network-based intrusion system (NBIS). An IDS tries to detect malicious activity such as denial-of-service attacks, port scans and attacks by monitoring the network traffic.

new

Necessary keyword for instantiating a new class object.

Network Protocols

Protocols for data sharing on the internet that define rules and conventions for communication between network devices.

Cybersecurity

Protocols for encrypting/decrypting information. Most cybersecurity breaches happen due to human error, not software bugs.

Pseudocode

Pseudocode is a brief explanation of code in plain English.

RADIUS

Remote Authentication Dial-In User Service (RADIUS) is a client / server protocol and software that enables remote access servers to communicate with a central server to authenticate users and authorize their access to the requested system or service.

Iteration

Repetition of instructions a specified number of times, or until a condition is met.

Column

Represents a piece of information (or attribute).

Decimal

The decimal number system is the Base 10 number system. It is a number system that only uses 10 digits (0 through 9).

Order of Operations

The order in which mathematical expressions should be evaluated. Starts with Parentheses, Exponents, Multiplications and Division, Addition and Subtraction.

Digest

The output from any input that has been processed through a hashing algorithm / function.

Method body

The part of the method that contains the commands

Hardware

The physical components of a computer

Data Compression

The process of encoding information, using fewer bits than the original representation. We can use algorithms to compress the data to use less bits for storage and then decompress it when we want to view it again.

Symmetric Encryption

The same key is used to encrypt and decrypt (e.g., Caesar, Vigenere)

Canvas

The screen in which our graphics programs are drawn.

Casting

Turning something of one type into another type!

Aliases

Two object references are considered aliases when they both reference the same object.

Jumbotron

Typically a very large container at the top of a web page that showcases the most important information

Ultra Karel

Ultra Karel is the same as Super Karel, except Ultra Karel has the ability to paint the grid world!

Immutable

Unable to be changed or manipulated. Strings are immutable, meaning you can't change it once you make it. If you take a substring of a String, or concatenate something to a String, the result is a brand new String, rather than a modification of the original.

Data Limitations

Visualizations can be misleading by skewing the axes or labels, or leaving out relevant data.

Data Visualization Limitation

Visualizations can be misleading by skewing the axes or labels, or leaving out relevant data.

Exploit

a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, etc.

chord progression

a sequence of chords

Metadata

a set of data that describes and gives information about other data.

Calling a Method

objectName.method(): Calling a method: Calling a method actually gives the command, so the computer will run the code for that method.

Scene

one image in a series of images that make up a GIF

Parentheses

( and )

Bug

A bug is a problem in your code.

Return statement

In Java The return statement exits a method and returns a value.

Return value

In Java The value returned from a method.

Negate

To flip a boolean value, or take the opposite of a boolean value. If you negate true, you get false. If you negate false, you get true.

Randomize

To generate or select a random object

Decrement

To subtract from or decrease

Hello World

Traditionally the very first program you write when learning a programming language, a program that prints "Hello world" to the user.

Coordinate system

A coordinate system uses numbers as coordinates to place objects in a geometric space.

event handler

determines how the game (or website or app) responds to different events

Double

double is a Java type that represents a real number with decimal values

Music Visualization

generated animated imagery based on a piece of music.

id Attribute

id is an attribute we can add to an HTML tag to style that specific element.

if statements

if (boolean expression) { //execute statements if condition is true }

Minified Code

in computer programming languages and especially JavaScript, is the process of removing all unnecessary characters from source code without changing its functionality.

Int

int is a Java type that represents an integer (a whole number)

Bit

Bit means "binary digit". A bit is a single digit in a binary number. A bit can either be 0 or 1.

Instantiate

Create an instance of a class object.

HTML Documentation

Documentation and syntax for HTML

@Override

Java key term used to denote the user intendeds to override a method.

array.length

Returns the length of the array

Collage

a collection of images

Data privacy

how company's use your data

Data security

protecting your data online

Multi-Line Comment

/* This is a multi- Line comment*/

Javadoc Comment

/** 1. One sentence description of code's function. 2. Preconditions 3. Postconditions 4. Block tags */

World

A "world" or "Karel World" is a grid that Karel lives in.

2d List

A 2d list is a list whose items are also lists.

Boolean

A Boolean is a true or false value.

List Interface

A Java Interface that represents a general List. The interface provides a list of methods that classes should implement if they want to be used as a List.

Boolean

A True or False value

Inspector

A browser's built in functionality that allows the programmer to look at and temporarily modify the code that defines the website

Website

A collection of related webpages, usually registered under the same domain name

Command

A command is an instruction you can give to Karel.

ConcurrentModificationException

A common error that occurs when attempting to modify an ArrayList while using an enhanced for loop.

Console

A computer program that is run using a text-only interface.

JavaScript

A computer programming language that is an object-oriented language commonly used to create interactive effects within web browsers.

Colorblind

A condition in which a person has difficulty distinguishing particular colors from each other

Condition

A condition is code that you put inside an if statement or while-loop.

Correlation

A connection between two things.

Constant

A constant is a variable you define at the top of the program that doesn't change. The reason to define constants is to store named variables that have relevant values for the program.

Constructor

A constructor is a special method of a Class that constructs a new object (a new instance) of the Class and sets the initial values for the instance variables.

Elif

A control flow tool used as a second condition check after an if statement. It is a contraction of else if. Applies to Python code.

Control Structure

A control structure lets us change the flow of the code.

Instance

A created object with defined attributes.

Array

A data structure that stores a fixed number of elements, all of the same type, one after another like a list.

HashMap

A data structure that stores key -> value mappings.

Dictionary

A data structure to store key/value pairs.

Web page

A document that can be viewed by a web browser, usually written in HTML

Firewall Rule

A firewall is a system that provides network security by filtering incoming and outgoing network traffic based on a set of firewall rules. The purpose of a firewall is to reduce or eliminate the occurrence of unwanted network communications while allowing all legitimate communication to flow freely.

Float

A float, or floating point value, is a numeric value that can have decimal level precision (ex: 3.14)

For Loop

A for loop lets us repeat code a fixed number of times.

For Each

A for loop that is written differently so that it loops through each element in a data structure, as opposed to having a loop counter variable that goes from 0 to length-1.

Function

A function is a way to teach Karel a new word.

Function

A function is like a command that you get to invent and name. It allows us to break our program into smaller parts, making the program easier to understand.

Callback Function

A function passed as a parameter to another function in order to be called later.

Key

A key is the value used to look something up in a HashMap

Null

A keyword that indicates a reference object doesn't point to any object data.

Kilobyte

A kilobyte (kB) is 2^10 bytes (1024 bytes) of binary data.

Iterate

A single run through the instructions contained a loop

Tooltip

A small box with extra information about an element that appears when the cursor hovers over the element.

Insertion Sort

A sorting algorithm that shifts the already sorted section of an array to place the current array value in the correct index.

Computational Artifact

A video, a visualization, a graphic, a program, or an audio recording that students submit providing an illustration, representation, or explanation of the computing innovation's intended purpose, its function, or its effect.

Big-O Notation

A way to represent how long an algorithm will take to execute. It helps to determine how efficient different approaches to solving a problem are.

Responsive Website

A website in which the parts of the webpage react and possibly reorder or hide when the window changes size

Integer

A whole number (not a fraction)

Protocol

A widely agreed upon set of rules that standardize communication between machines. Also, A set of rules or procedures for transmitting data between electronic devices. In order for computers to exchange information, there must be an agreement as to how the information will be structured and how each side will send and receive it.

Python

A widely used programming language that is beginner friendly. Google, YouTube, and CodeHS are among the many companies that use Python to build their products.

AAA

AAA in network security stands for Authentication, Authorization and Accounting. It is used to refer to a family of protocols which mediate network access.

Application Programming Interfaces

APIs and libraries simplify complex programming tasks by providing sets of clearly defined methods of communication among various computing components.

ASCII

ASCII is the standard protocol for encoding text information as bits. The ASCII table assigns a unique binary number to every text character.

Fiber Optic Cables

Able to send bits from router to router across long distances, but they are very expensive.

Append()

Add a particular item to the end of a list.

Concatenation

Adding two strings together using the "+" operator.

Integrity

Aims at ensuring that information is protected from unauthorized or unintentional alteration.

Common Array Algorithms

Algorithms that are often used in computer science to do basic analysis on a list. These often include traversing and selection processing.

public

Allows access to data and methods from classes outside the declaring class.

<img> Tag

Allows adding an image to a web page. It is self-closing. The attributes of a image tags include src, which specifies where to get the image from (the url for an image ), and width and height attributes, which specify the size of the image in pixels.

Style Attribute

Allows adding several different types of styles to HTML elements.

Transmission Control Protocol (TCP)

Allows for sending MULTIPLE packets between two computers. TCP checks that all packets arrived and can be put back in the proper order. The metadata must include a destination IP address, a from IP address, the message size and the packet order number.

Constructor/Signature

Allows for the creation of a new object. Consists of the constructor name and parameter list.

Compound Assignment Operators

Allows programmers to shortcut variable assignments that include the variable being assigned a new value: x = x + y; shortcut: x += y;

<a> Tag

Allows putting links on a web page. It uses the href attribute to specify what the link should point to.

Object

Also called a dictionary or map. Lets us store pairs of keys that are matched with a specific value.

Array

Also called a list. A data structure that holds a collection of values in a particular order

Dynamic Binding

Also called late binding, this refers to Java choosing the proper method to call at run time, as opposed to at compile time.

Linear Search

Also called sequential search, a search algorithm that searches for a given value in a list of values. Linear search is less efficient than binary search.

Iframe

An HTML page embedded inside of another HTML page

User-friendly

An adjective that generally is used to describe a UI that is intuitive to use, easy to navigate, and allows the user to quickly and efficiently complete the desired task

Dashboard

An admin-like web page with the functionality to manage the website

Algorithm

An algorithm is a set of steps or rules to follow to solve a particular problem.

Linear Search

An algorithm that searches data sets in a sequential order, checking each value from the 0th index to the end of the data set to see what index a specific element can be located at.

Abstract Expressionism

An art movement in the 1940s and 1950s characterized by creative spontaneous acts, such as Jackson Pollock's dripping paintings.

Pop Art

An art movement in the 1950s that is characterized by pop culture imagery such as celebrities and advertisements.

If Statement

An if statement lets you ask a question to the program and only run code if the answer is true.

Pixel Image

An image can be represented as a grid of values. Each value encodes the color at that position in the image.

Union-based SQLi

An injection risk where the attacker can add a condition that's always true, like 1=1, often by appending it to the query to pull up even more in a results set. This fundamentally changes the query and can allow someone to pull the entire contents of the database.

Error-based SQLi

An injection risk where the website returns errors that the hacker can use to explore the database more. This is the first clear test that an attacker can use to test to see if a site is vulnerable. It is usually displayed as an unhandled internal exception error. This info is meant for the developer and is not meant to go back and deliver it to a person's webpage.

Instance Method

An instance method is a method that defines the behavior of an object. It defines an action that the object can perform.

Getter Method

An instance method that allows the client to get the value of an instance variable on an object.

Interface

An interface provides a list of methods that must be defined if a class chooses to implement the interface.

Database

An organized collection of data (e.g., text, images, videos, audio, geospatial, tabular) An electronic system that allows data to be easily accessed, manipulated and updated via a Database Management System (DBMS).

Index

Array values are stored at a particular index and we access elements in the array by referencing this index value. Index values in Arrays start a 0.

ArrayList

ArrayList is a Java class that is like an Array with extra powers. It can automatically resize and comes with other helpful methods.

Array

Arrays are lists that store many values of the same type

2D Array

Arrays that store arrays. The methods associated with these are the same as regular arrays.

Assigning to a variable

Assigning to a variable is updating the variable's value

ACM

Association for Computing Machinery: organization for computing professionals to provide guidance related to ethics and responsibilities.

Precondition

Assumptions we make about what must be true before the function is called. Conditions that must be true prior to execution in order for that code segment to behave as expected.

Autoboxing

Automatic conversion between primitive types and their corresponding object wrapper classes

Null Pointer

Before an object variable is initialized, it doesn't point to any memory. It holds a null pointer.

Break Down (Decompose)

Breaking down (decomposing) your code is splitting it into more functions.

Break Down (Decompose)

Breaking down (decomposing) your code is splitting it up into several smaller, simpler methods

Break

Breaks out of a while loop and executes statements that immediately follow while loop.

Call a Function

Calling a function actually gives the command, so the computer will run the code for that function.

Math.random

Can be manipulated to produce a random int or double in a defined range.

Logical Operators

Can be used to connect Boolean expressions to make more complex expression. NOT ! AND && OR ||

CSSCSS

Cascading Style Sheets. The language for designing web pages and adding style.

Casting

Casting is turning something of one type into another type

Class Hierarchy

Class hierarchy refers to the arrangement of classes and how they relate to each other.

Class

Classes are the template through which objects are created. It is the formal blueprint for creating objects.

Method Overloading

Classes can have multiple methods with the same name, as long as the parameters to those methods are different. Doing this is called "overloading" a method. If a subclass defines a new method body for a method defined in the superclass, then the subclass has overridden the method of the superclass.

Front-end

Client devices and applications are often referred to as the "front end" - meaning what the user actually sees.

Client Device

Client devices are typically personal computing devices with network software applications installed that request and receive information over the network or Internet. Mobile devices like your smart phone, tablets, iPads, laptops and also desktop computers can can all function as clients.

Client Application

Client-server applications are programs or apps that run on our client devices AND need to access resources from a server. In other words, they need help and can't do what they need to do alone.

Client-server model

Clients and servers communicate over a computer network on separate hardware, but both client and server may reside in the same system. A server host runs one or more server programs which share their resources with clients. A client does not share any of its resources, but requests a server's content or service function. Servers store and protect data and process requests from clients. Clients make requests and format data on the device for the end user.

Cloud Computing

Cloud computing is the on demand availability of computer system resources, especially data storage and computing power, without direct active management by the user.

Code

Code is the name for the instructions you write to a computer in a program.

Complementary colors

Colors that create a greyscale color when combined. When placed next to each other, they create the strongest contrast available for those particular colors.

backward(a_number)

Command that lets you tell Tracy to move backward. In between the parentheses you need to put a number to tell Tracy how far to move backward.

Color("red")

Command to change Tracy's color.

Comment Out

Commenting out code makes the computer ignore it, so it does not run.

Logical equality

Compares the data of the objects instead of the value of the references. Uses the .equals() method.

Concatenation

Concatenation is another word for combining. Concatenating Strings is when we add Strings together.

Postconditions

Conditions that must be true after the code segment is executed.

If Else Statement

Control structure that lets us do either one section of code or another depending on a test.

Animation

Creating the illusion of motion using rapidly changing still images.

Cross-site Scripting (XSS)

Cross-site scripting (XSS) is a security bug that can affect websites. If present in your website, this bug can allow an attacker to add their own malicious JavaScript code onto the HTML pages displayed to your users. Once executed by the victim's browser, this code could then perform actions such as completely changing the behavior or appearance of the website, stealing private data, or performing actions on behalf of the user.

Debugging

Debugging is fixing a problem in your code.

Declare a Variable

Declaring a variable is defining it for the first time.

Declare a variable

Declaring a variable is defining it for the first time.

Decomposition

Decomposition is breaking your program into smaller parts.

Decrement

Decrease the value of a variable by one. variable--;

Define a method

Defining a method means to teach the computer a new command and explain what it should do when receiving that command.

Web design

Designing web page to make it appealing and easy to use for viewers

Access Specifier

Determines who has access to using the method when writing classes and objects.

DDoS Attack

Distributed Denial of Service attack. Spam a web server with so many requests so close together that it crashes. Sometimes spitting out valuable information as it crashes.

Karel Documentation

Documentation for all Karel Commands and Syntax.

JavaScript Documentation

Documentation for the syntax and objects in Javascript that we use on CodeHS.

Documentation

Documentation is the reference for how to use different methods and classes

Java Documentation

Documentation showing the syntax and examples for how to use the various features of Java.

DRY Principle

Don't Repeat Yourself: Simplify your HTML by grouping code into classes, stylesheets, or other types of templates

DRY Principle

Don't repeat yourself: try to simplify your code and avoid repeating code unnecessarily.

Beats

Drum sounds played sequentially in a repetitive pattern

Escape Sequences

Enable users to use special characters and actions within String objects.

Escape Sequence

Escape sequences are characters with special meanings.

Server Device

Examples of servers include web servers, mail servers, and file servers. Each of these servers provide resources to client devices. Most servers have a one-to-many relationship with clients, meaning a single server can provide multiple resources to multiple clients at one time.

ArithmeticException"

Exception that is thrown to warn programmers about arithmetic errors in their code.

Modulo Operation

Finds the remainder after division of one number by another (sometimes called modulus). Example: 14 ➗ 4 = 3 remainder 2 14 mod 4 = 2 14 % 4 = 2

Computing

Executing instructions, calculating, or using a computer.

Break

Exits the current loop and resumes execution at the next statement.

In

For Python Keyword that helps in iteration in loops (for letter in "hello": ...) or to identify if an iterable (like a list or a long string) contains something ("h" in "hello" would evaluate to True).

HTML Formatting

HTML provides several tags for formatting text on web pages.

Formal and Actual Parameters

Formal parameters are the parameters outlined in the parameter list in the constructor, while actual parameters are the parameters that are input when a new instance of a class object is created.

Schema

How we define what is stored in a table.

Reference Type

In Java Reference variables store the address of the value

HTTP

HyperText Transfer Protocol is a protocol that standardizes the language for talking to web servers to send and receive web pages, or HyperText information (HTML pages).

HTML

Hypertext Markup Language

Cybercrime

Identity theft, stealing money, stealing private information, controlling private computers.

Unboxing

In Java Reverse of autoboxing; automatic conversion from the wrapper class to the primitive type

Static Methods

In Java Static methods are the methods in Java that can be called without creating an object of class. Static methods are called using the dot operator along with the class name unless they are defined in the enclosing class.

State

In Java The data that is associated with an object or class. Generally, the state of an object is all of the object's associated data. It is the state that the object is in.

Statement execution count

In Java The number of times a statement is executed by the program.

Variable Shadowing

If two variables have the same name, and exist inside of the same scope, the variable with the more specific scope takes precedence. This is called shadowing. Local variables and parameters shadow the more general global variables (instance variables).

Pixel

Images are made up of pixels, which are essentially a grid of values. Each value, or pixel, encodes the color at that position in the image.

Single Line Comments

In Java //This is a single line comment

Relational Operators

In Java == , !=. <. > , <=, >= These allow for the comparison or primitive type values. The result of these expressions can be stored as a Boolean value.

Static method

In Java A method called on the Class, rather than on a specific object of the Class.

Method

In Java A method is a way to teach the computer a new command

Superclass

In Java A parent class that contains common attributes and behaviors used by subclasses (children). So, if a class A extends the class B, then B is the superclass of A.

Sequential / Linear Search

In Java A search technique that starts at the first element and goes through each element until it finds the target value.

toString Method

In Java A specific accessor method that returns a String value with information about an object's instance values. This overrides the object's inherit toString method when an object is printed using System.out.print or System.out.println

Substring

In Java A substring is a smaller sequence of characters in a larger String.

Parameter

In Java A variable passed into a method from outside the method. It is also apiece of data provided as input to change the specifics of a program

Setter Method

In Java An instance method that allows the client to set the value of an instance variable on an object.

Object

In Java An object is a variable of a data type that is user defined. Every object has a state and a behavior. An object is also a single instance of a Java class. An object has both state and behavior.

Shadowing

In Java If two variables within the same scope have the same name, the variable with the more specific scope will be called.

Return Type

In Java Indicates what type value is being returned from the method

Primitive Type

In Java Primitive types are the basic, simple data types that are inherent to Java (int, double, char, and boolean)

Traversing an Array

In Java Traversing an array is the process to loop through an array and access each of the elements. Caution must be taken to avoid looping beyond the valid index values.

Short Circuit Evaluation

In Java When the result of a logical expression using && or || can be determined by evaluating only the first Boolean operand, the second is not evaluated. Generally, a short cut when evaluating Boolean expressions. If the result can be determined solely by the first part of a Boolean expression, the second part is not evaluated, it is skipped.

Return

In Java a keyword used in methods to return a value back to the initial program that called the method.

readDouble

In Java a method that lets us read in a decimal value input from the user

readLine

In Java a method that lets us read in a line of input from the user as a String

readBoolean

In Java a method that lets us read in a true or false value input from the user

Return type

In Java a method's return type is the type of value returned from that method.

String Literals

In Java a sequence of characters enclosed in double quotations " ".

Variable

In Java a symbol or container that holds a value.

Truth Tables

In Java a truth table is a table used in logic for comparing Boolean expressions.

Static variable

In Java a variable or attribute of a class that is shared between all instance of a class. Each instance does not get their own copy. Generally, Static Variables can be accessed by all objects of a class. They are called using the class name, and can be used in static and non-static methods.

variable.nextDouble()

In Java allows users to input double values.

variable.nextInt()

In Java allows users to input int values.

Recursion

In Java an iterative process where a method calls itself.

System.out.print

In Java displays output on the computer monitor. Also, a Java method that lets us print output to the user, without ending the line printed. Finally, it sisplays output on the computer monitor and moves cursor to next line.

Subclass

In Java if a class A extends the class B, then A is a subclass of B. Or A child class that inherits attributes and behaviors from a superclass (parent).

String(String str) constructor

In Java it constructs a new String object that represents the same sequence of characters as str

String substring(int from)

In Java it returns substring(from, length())

String substring(int from, int to)

In Java it returns the substring beginning at index from and ending at index to − 1

Reference equality

In Java the Equality operator (==) compares the references (addresses in memory) of 2 objects

public class MyProgram

In Java the name of MyProgram must match the name of the file.

Row Major Order

In Java the process of traversing a 2D array by accessing all elements in a row before moving on to the next row. Or the first index is the row, and the second index is the col. arr[2][0] would access the element on the third row and first column

The run method

In Java the run method is where a Java program begins.

super

In Java the super keyword lets us reference the superclass when writing code inside of a subclass. Also, a Java keyword used to refer to the superclass object. In this lesson we saw it used to call the superclass constructor and other methods from the superclass.

this

In Java the this keyword is a reference to the current object (the current instance). It also makes a call to the current object in a class file. Allows programmers to specify which objects and instance variables should be called.

Type

In Java the type of a variable defines what kinds of values the variable can hold

Value (HashMap value)

In Java the value is the result you get when you look up a key in a HashMap. It is the value paired with a key.

return keyword

In Java used to return a value back to the main program from a method.

Server Application

In JavaScript A server computer program or application provides functionality for client programs or devices. So a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client. Generally, a server computer program or application provides functionality for client programs or devices. So a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client.

List

In JavaScript Also called an array. A data structure that holds a collection of values in a particular order

Radius

In JavaScript The length between the center and edge of a circle

Function body

In JavaScript The part of a function that contains the commands

Start Function

In JavaScript This is the function that is called when you click run.

Timer

In JavaScript Timers are used to used perform repeated action in a program

Top Down Design

In JavaScript Top Down Design is a method for breaking our program down into smaller parts.

Function

In Python A function is like a command that you get to invent and name. It allows us to break our program into smaller parts, making the program easier to understand.

input()

In Python A function that prints a prompt and retrieves text from the user.

Slicing

In Python Accessing specific chunks of a string.

forward(a_number)

In Python Command that lets you tell Tracy to move forward. In between the parentheses you need to put a number to tell Tracy how far to move forward.

Return

In Python Exits a function, optionally passing back an expression to the caller. A return statement with no arguments is the same as return None.

Function body

In Python In Python functions, the function body is the indented block of code that comes after the def my_function(): line. The function body is what will be executed when the function is called.

Try and Except

In Python Programming constructs that can be used to gracefully handle exceptions so that a program can continue in spite of them.

Packing

In Python Taking some variables and packing them into a list.

Loginal Operator

In Python Used to make logical associations between Boolean values.

Identity

In Python When two variables refer to the same object in memory.

left(degrees)

In Python a Command that tells tracy to turn left and in between parentheses, how many degrees to turn left.

List Comprehension

In Python a concept used to construct lists in a concise manner.

Tuple

In Python a heterogeneous, immutable data type that stores an ordered sequence of things.

lower()

In Python a method that changes letters to lowercase.

upper()

In Python a method that changes letters to uppercase.

strip()

In Python a method that returns a copy of the string you call it on, without any whitespace at the beginning or end.

Modulus

In Python a represented with "%" it returns the remainder of the division between two numbers. For example, 14%5 would return 4.

Floating Point Numbers

In Python also called floats, floating point numbers represent real numbers and are written with a decimal point dividing the integer and fractional parts.

Function Body

In Python functions, the function body is the indented block of code that comes after the def my_function(): line. The function body is what will be executed when the function is called.

islower()

In Python islower() method returns True is a string is all lowercase letters and False if otherwise.

isupper()

In Python isupper() method returns True is a string is all uppercase letters and False if otherwise.

String Indexing

In Python it is accessing certain characters in a string.

String Slicing

In Python it is accessing specific chunks of a string.

Parameters

In Python pieces of information you can give to functions when you define them. When the function is called the arguments are the data you pass into the function's parameters. Parameter is the variable in the declaration of the function. Argument is the actual value of this variable that gets passed to the function.

String Immutability

In Python strings cannot be mutated or changed.

Unpacking

In Python to Unpack some variables from a list.

Access control

In network security, access control is the restriction of access to a place or other resource on a network. Permission to access a resource is called authorization.

Embed

In the context of an HTML page, inserting outside content into an HTML page

Scope

In what part of the program the variable exits. Also, in Java, it defines which part of the program a variable can be accessed from.

Java Main Skeleton

Includes the class and main method arguments. Must include both in order to run successfully.

Increment

Increase the value of a variable by one. variable++;

Indentation

Indentation is the visual structure of how your code is laid out. It uses tabs to organize code into a hierarchy.

Infinite Recursion

Infinite recursion occurs when the base case can never be reached.

Data

Information (numbers, words, measurements, observations, etc) that is in a computer-readable form.

Information Literacy

Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.

Initialize a variable

Initializing a variable is giving it an initial value, or a starting value.

Initialize a Variable

Initializing a variable is giving it an initial value.

Instance

Instance is what you call a specific object constructed from a class. Instance and object generally refer to the same thing. An object is a specific instance of a class.

object.instanceVariable

Instance variables can be accessed directly by using the reference variable name + . + the instance variable name. This only works within the class file if the instance variables are set to private.

De Morgan's Law

Laws that define how we can negate an AND statement and how we can negate an OR statement

Privacy Policy

Legal document outlining how a company can collect and use your data

Queries

Let you quickly perform an action on a table in a database like apply changes or retrieve information. Normally a question (noun) or to ask a question (verb) - often in relation to a database.

And operator

Logical operator that ANDs two Boolean values. Written as &&. a && b will be true if both a and b are true.

Or operator

Logical operator that ORs two Boolean values. Written as ||. a || b will be true if a or b is true.

Not operator

Logical operator that negates a single Boolean value. Written as !. !a will be true if a is false, and false if a is true.

Iterating over an array

Looping through all of the elements of an array

Abstraction

Managing complexity by "abstracting away" information and detail, in order to focus on the relevant concepts.

Merge Sort

Merge sort is a recursive sorting algorithm that can be used to sort elements in an array or ArrayList.

Method overloading

Methods can have multiple signatures. Java will use the correct signature based on the actual parameters used in a program.

Data Collecting Methods

Methods to gather various data points. Surveys, sensors, transactional data from credit cards, websites storing information about you, crowdsourcing data.

Accessor Methods

Methods used to access instance variable and object data. Also referred to as getter methods.

Mutator Methods

Methods used to change or manipulate instance variable or object data. Also referred to as setter methods.

Box model

Modeling every element on a web page as if it were wrapped in a box

Pseudorandom

Not actually random, but appears to be random

Truncated Y-Axis

Not starting the y-axis at zero.

Big-Oh Notation

Notation that describes how complex an algorithm is. A larger number inside of the Big-Oh notation means the algorithm takes longer to complete, a smaller number means the algorithm takes less time to complete.

Hexadecimal Number System

Number system that has 16 digits 1 - 9 and A - F.

Binary Number System

Number system that has 2 digits, 0 and 1. This is how computers represent numbers at the base level.

Public domain

Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.

Infinite loops

Occurs when the expression in a while loop never evaluates to false. The program continues to run infinitely.

Blind SQL

Often used when error-based and union-based SQLi do not work. It essentially involves asking the database a series of targeting questions and based on the results gives clues as to how to get the DB to give up its contents.

Row

One entry in a table. Each row has an ID that is unique to the table.

Asymmetric Encryption

One key encrypts, a different key decrypts.

Grid Layout

One of Bootstrap's layout options that allows the developer to segment the web page into a table of rows and columns in which to place content

OWASP

Open Web Application Security Project; highly-regarded organization and much used by cybersecurity professionals.

Package

Packages are used to group code into a folder for easy use. They are also related classes that are grouped together into packages.

Packets

Packets are the units of data that are sent over the network.

Algorithm

Step-by-step process that solves a problem.

Polymorphism

Polymorphism is the capability of a method do to different things depending on which object it is acting upon. An object can take on different forms depending on its implementation. Java can call the correct method even when an object is disguised as a more generic reference type

Bias

Prejudice in favor of or against one thing, person, or group compared with another, usually in a way considered to be unfair.

DNS Spoofing

Pretending to be a DNS name resolver. Feed your computer the wrong IP address for a given website, and your browser now goes to a false website.

Final

Prevents variables from changing value.

Method

Procedures that allow us to control and define the behavior of an object.

Read Like a Story

Programs that "Read like a story" have good decomposition and make the code easy to follow.

Software

Programs that can be run on a computer

Cybersecurity

Protection of computer systems, networks, and data from digital attacks.

HTTP (HyperText Transfer Protocol)

Protocol that standardizes the language for talking to web servers to send and receive web resources. Defines how computers send and receive hypertext information. (HTTPS: The "S" denotes a secure connection using HTTP.)

Public Key Encryption

Public key encryption is a type of asymmetric key encryption. There's one key that encrypts the information and there is a different key that decrypts the information.

find()

Python method that returns the index at which the string is found in another string, returns -1 if not found.

Ransomware

Ransomware is a type cyber attack that threatens to publish the victim's data or block access to it unless a ransom is paid.

SQL Injection (SQLi)

Refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application's database server (also commonly referred to as a Relational Database Management System - RDBMS).

Continue

Rejects all the remaining statements in the current iteration of the loop and moves the control back to the top of the loop to continue to the next iteration. Can be used in both while and for loops.

Private

Restricts access to data and methods to the declaring class.

double random()

Returns a double value greater than or equal to 0.0 and less than 1.0

int compareTo(String other)

Returns a value < 0 if this is less than other; returns zero if this is equal to other; returns a value > 0 if this is greater than other

int abs(int x)

Returns the absolute value of an int value

int indexOf(String str)

Returns the index of the first occurrence of str; returns -1 if not found

int length()

Returns the number of characters in a String object

double sqrt(double x)

Returns the positive square root of a double value

double pow(double base, double exponent)

Returns the value of the first parameter raised to the power of the second parameter

int intValue() and double doubleValue()

Returns the value of this Integer as an int and this Double as a double

(int)(x + 0.5)

Rounds the value of a double to the nearest whole number.

De Morgan's Laws

Rules that show how we can negate expressions with and and or.

Exceptions

Runtime errors in a program. by default, they stop the program. Applies to Python code.

Citizen Science

Science that harnesses the power of many individuals to solve hard, complex problems.

Cryptography

Scrambling digital information into an unreadable form. Only those with verified authority (password, key, etc) can unscramble it to read it.

Binary Search

Search algorithm that only works on a sorted list. It discards half of the list on each iteration, getting to the solution much faster than Linear Search.

Sequencing

Sequencing, or sequential execution, is step by step execution of instructions in the order they are given.

Back-end

Server devices and applications are often referred to as the "back end" - meaning the user doesn't actually SEE what is happening; it's hidden from their view and they just see the results on their end.

Double Quotes

The " character

Navbar

Short for navigation bar, it contains a series of links that the user can use to visit the main parts of a website

Animation

Showing several still images one after another very quickly, to give the illusion of animated movement.

Insertion Sort

Sorting algorithm that sorts an array of values. The idea behind insertion sort is to have a sorted part of the list and an unsorted part. On each iteration of the algorithm, we grab the next unsorted element and place it in its proper position in the sorted section.

Web components

Standardized widgets on a website that bundle the actual implementation details into reusable elements

Internet Protocol (IP)

Standardizes the layout of all packets. All packets must have a destination IP address, a from IP address, and the actual data being sent. Defines the layout of a SINGLE packet.

URL

Stands for Uniform Resource Locator. You are locating a resource that exists somewhere on the internet.

SQL

Structured Query Language; Programming language for managing and querying data from a relational database.

Super Karel

Super Karel is still Karel, but it knows two new commands: turnAround() and turnRight()

SuperKarel

SuperKarel is like Karel but already knows how to turnRight() and turnAround()

CIA Triad

The CIA Triad is a widely-accepted security measure that should be guaranteed in every secure system. It stands for Confidentiality, Integrity, and Availability.

HTML Tag

Tags are the building blocks of an HTML document

Comparable Interface

The Comparable Interface is a standard interface in Java that mandates that all classes implementing the Comparable interface must define a method called int compareTo(Object o) that returns a positive int if the parameter o passed in is less than the current instance, returns 0 if it is equal, and a negative int if it is greater.

Internet of Things

The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.

Math Class

The Math class is part of the java.lang package and contains only static methods.

Object Superclass

The Object class is the superclass of all other classes in Java.

RGB Color Encoding

The RGB encoding scheme allows us to encode colors such as numeric data. It defines the amount of Red, Green, and Blue light in a pixel.

Procedural Abstraction

The ability to use methods and programs that we do not fully understand, or are unable to write.

Bandwidth

The capacity of data transfer in a system. Measured by bitrate.

Behavior

The actions that can be completed by an object or class.

Bitrate

The amount of data (in bits) that can be sent in a fixed amount of time.

Data Privacy

The appropriate use of data based on circumstances

Steganography

The art and science of concealing secret messages in such a way that no one apart from the intended recipient knows about the existence of the message. In digital information, Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video.

Availability

The assurance that systems and data are accessible by authorized users when and where needed.

Implicit Conversion

The automatic process of transforming a variables data type. This occurs when a primitive and String object are concatenated by changing the primitive value to a String object type.

Base Case

The base case is the simplest form of the recursive problem. The base case can be immediately solved without breaking the problem down any further.

Behavior

The behavior of an object is what the object is able to do. It is the actions that can be performed by the object.

Binary

The binary number system is the Base 2 Number System. It is a number system that only uses 2 digits (0 and 1).

break statement

The break; statement breaks out of the current loop, without executing any more code in the loop.

Hyperlink

The connection between one HTML page to another HTML page

Integer.MAX_VALUE

The highest value Java is able to access. 2147483647

Digital Footprint

The information about a particular person that exists on the Internet as a result of their online activity

Data Security

The integrity, confidentiality, and availability of data

Octal

The octal number system is the Base 8 number system. It is a number system that only uses 8 digits (0 through 7).

Latency

The latency of a system is the time it takes for a bit to travel from sender to receiver. Fiber optic cables have low latency.

Integer.MIN_VALUE

The lowest value Java is able to access. -2147483648

Integer.MIN_VALUE and Integer.MAX_VALUE

The minimum/maximum value represented by an int or Integer, which are -2147483648 and 2147483647

Modulus operator

The modulus operator (written as % in most programming languages) divides two numbers and returns the remainder.

Number Base

The number base of a number system defines how many digits are in the number system, and the base of the exponent for each place value in a number.

Array length

The number of elements an array can hold. You can get the length of an array arr by typing arr.length

Array Index

The position of an element in an array. The first element is at index 0, the second element is at index 1, and so on.

Cryptology

The practice of solving and writing encryptions

Concatenation

The process of adding two String values together. This creates a new String object. Primitives can be concatenated with String objects.

Method Decomposition

The process of breaking down large problems into smaller problems, each with a method that defines a subproblem in the larger problem.

Cryptanalysis

The process of decrypting coded messages without being told the key.

Encapsulation

The process of hiding the implementation details of a class from the user

Nested if Statements

The process of placing if statements within if statements.

Routing

The process of sending data between two computers on the internet. The data is sent through routers that determine the route.

Column Major Order

The process of traversing a 2D array by accessing all values at the first column in every row, before moving to the next column

Confidentiality

The protection of information from people who are not authorized to view it.

IP (Internet Protocol)

The protocol that defines the payout of an an Internet address.

Recursive Case

The recursive case is the general form of the recursive problem. In this case the problem needs to be broken down by one step toward the base case, and the algorithm makes a recursive call to itself to solve this slightly smaller problem. This process repeats until the base case is reached.

Base Case

The simplest version of our recursive process. This is the point when the problem cannot be reduced any further.

Tree

The structure of an HTML document

Computer Science

The study of computational thinking, the thinking humans need to in order to describe a step by step process to a computer.

Sort

To arrange a list of values in order from least to greatest (or greatest to least).

User Interface (UI)

The tools, visual aids, and other components available to a user in order to interact with a web page or other digital or mechanical device

Phishing

The usage of deceptive emails and websites to maliciously gather personal information

Object Oriented Programming

The use of object and class types in programming. Programming model that focuses on objects and the data and actions associated with the objects.

Programming Style

The way your code is written is the style. It covers the aspects of the code that goes beyond whether or not it just works.

Hash Functions or Hashing

The word hashing literally means to scramble. Hashing changes a message into an unreadable string of text for the purpose of verifying the message's contents, but not hiding the message itself. It must be easy to compute the output (the digest) for any input, but hard to compute the input for any output. A hash function takes an input string of arbitrary length and produces a fixed- size, short output called a digest. It's always the same length no matter how big the input is AND the output is always the same hash for any given input. Unlike symmetric and asymmetric algorithms, there are no "keys" in hashing functions.

Integer and Double Classes

These classes are part of the java.lang package and Object class and have a number of useful methods.

Lossy Compression

Throwing away some of the data to save space. We can throw away a lot of data without any noticeable difference from the original.

Push

To add an item to a list or array

Increment

To add to or increase

Domain Name System (DNS)

Translates names to IP addresses.

Comparison Operator

Used to make comparisons between values.

Logical operator

Used to make logical associations between Boolean values

Instance Variables

Used to store the state, or data of the object instances.

Domain Name System (DNS)

Used to translate domain names into IP addresses.

Selection

Using a condition to determine which part of an algorithm is executed.

Data Visualization

Using charts, graphs, or images to visualize complex data.

Enhanced For Loop Variable

Variable created in the enhanced for loop header that contains a copy of the array variable.

HTML Lists

Way to organize information with a simple structure that is easy to read and write on a webpage. There are ordered and unordered HTML lists.

Postcondition

What should be true after the function is called

Implicit Casting

When Java automatically casts the value correctly without the programmer needing to do so

Overflow

When a calculation relies on a number outside the acceptable number range, Java will wrap back to the MIN or MAX value depending on the value.

Overloading

When a class has more than one constructor with the same name, but different parameter lists.

Meme

a humorous image or video that is copied and spread; usually consists of an image and witty caption

Nested Loops

When a loop is placed within another loop. The total number of runs for a nested loop will be the outer loop * inner loop.

Inheritance

When a subclass extends a superclass, the subclass inherits all of the static methods, static variables, and public instance methods of the superclass. This is called inheritance.

Pointer

When an object is assigned to a variable, the variable doesn't hold all of the object's data, it only holds a pointer to the object's data. The variable holds a memory location (think of it as a pointer to that memory location), and the object data is stored at that memory location.

Redundancy

When multiple paths exist between two points. This improves reliability and makes the internet fault tolerable. Makes the routing system scalable.

Client

When someone else creates a Class (like String, or Randomizer), and you are using the functionality of that Class in your program, your program is a client of the class. You are using the class as a client.

Integer Division

When two integers are divided, the decimal values are truncated, or chopped off.

Equivalence

When two objects have the same properties but are not the same object. Applies to Python code.

Invert Filter

With respect to images, a filter that replaces pixels' color, hue, or brightness with their inverse. The result is light areas become dark and/or colors are replaced with their complementary color

Web development

Writing the HTML, CSS, and other code to actually generate a web page

Face Tracking

a computer technology being used in a variety of applications that identifies human faces in digital images

Where

a clause in SQL that allows you to filter results of s SELECT with certain conditions. Also allows you to filter results of SELECT with certain conditions.

White Hat Hacking

a computer security specialist who breaks into protected systems and networks to test and asses their security

Chord

a group of two or more notes sounded together

lowerCamelCase

a naming convention where the first letter is lower case, and each subsequent start of a word is upper case.

Filter

a software routine that changes the appearance of an image or part of an image by altering the shades and colors of the pixels in some manner

Vulnerability

a weakness which can be exploited by a malicious actor / attacker to perform unauthorized actions within a computer system.

Black Hat Hacking

attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons

Char

char is a Java type that represents a single character (a single letter)

charAt(int index)

charAt(int index) returns the character at the specified index.

Class Attribute

class is an attribute we can add to HTML tags in order to style a specific group of elements.

<li> Tag

defines a list item inside an HMTL list.

toString

is a special method you write in your class that returns a String representation of the object.

https

secure data transfer protocol when on the internet

Artificial Intelligence (AI)

the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings

Inversion

the act of switching colors along the color wheel (red to green, blue to orange, etc.)

Contrast

the difference in brightness between objects or regions

Cyberbullying

the use of electronic communication to bully a person

events

user actions or a particular scenario that might trigger an action during a game in video game development (or on a website or app)

events

user actions or a particular scenario that might trigger an action during a game in video game development (or on a website or app); we say that events are triggered by the user

Collisions

whenever 2 inputs map to the same output.

Reverse-engineerable

whenever you can work backwards through an algorithm (like a Caesar cipher)


Ensembles d'études connexes

Ancient Rome-Kirsch Ch. 5-10 + Epilogue

View Set

US History Unit 4 "The Americans"

View Set

Purchasing and Buyer Behavior Final Exam Review: Ch.2

View Set