Study Guide Review 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Parameter

(n.) a determining or characteristic element; a factor that shapes the total outcome; a limit, boundary

Elvira is experimenting with assigning and displaying variables. Here's a snippet of her code: a ← 12 DISPLAY (a) b ← 32 DISPLAY (b) a ← b b ← 52 DISPLAY (a) DISPLAY (b) What will be the output of that code?

12 32 32 52

Danielle is programming a kitty simulator. Here's part of her code: hunger ← 6 cuddliness ← 9 playfulness ← 7 DISPLAY (playfulness) DISPLAY (cuddliness) DISPLAY (hunger) After running that code, what will be displayed?

7 9 6

Nested Conditional

A conditional statement that appears in one of the branches of another conditional statement.

Psuedocode

A cross between human language and a programming language.

datebase

A database is a collection of data organized in a manner that allows access, retrieval, and use of that data. Excel, as a spreadsheet, is not the database tool. Access is the database tool in Office.

nested loop

A loop inside the body of another loop.

Phishing Scam

A scam where someone tries to deceive you into providing personal information by impersonating someone, like a bank representative.

string

A sequence of characters

Boolean Operators

AND, OR, and NOT used in search strings to refine the scope of the search

Geolocation

An HTML5 application programming interface that allows developers to retrieve the geographical location information for a client-side device.

private key

An asymmetric encryption key that does have to be protected.

Symmetric Encryption

An encryption method whereby the same key is used to encode and to decode the message

OR operator

An operator used in a query that selects records that match at least one of two or more conditions in a query.

Return Value

Any value that a method or function gives back to the statement command from which the function or method is called.

Concatenation

Attaching two things side-by-side, frequently strings of text.

A team of songwriters is working on song lyrics together for a pop star. They're trying to decide between two ways of working: Working on documents in a desktop text editing application and emailing their latest version of the document after editing them. Using an online collaborative text editor with real-time updates and revision history. Which of these is a benefit of using the online collaborative text editor? A) They don't have to worry about anyone stealing their lyrics since an online collaborative text editor is more secure than emailing documents from their desktop applications B) They don't have to worry about being embarrassed about the earlier versions of their lyrics, since the online collaborative text editor only stores the latest version C) With the online collaborative text editor, they can iterate more quickly on the lyrics and even edit at the same time D) The online collaborative text editor can correct their spelling better than the desktop editor

C) With the online collaborative text editor, they can iterate more quickly on the lyrics and even edit at the same time

A company develops a mobile app designed for parents to monitor what their children are doing. The parents install the app on the phone, and it can record details like who the child is conversing with and what apps they're using. It can also record and store the geolocation of the child. Which of these questions from parents could not be answered by the recorded geolocation data?

Did my child hang out in the park in a group of more than 20 people?

Comma Separated Values (CSV)

File format for transferring data, which stores fields and records in a plain text file, separated by commas. See also TSV (Tab Separated Values).

Andy is using machine learning for an algorithm that classifies photos of restaurant meals by category (such as "sandwich", "curry", or "salad"). He trains a neural network on a large open database of photos of restaurant meals. He then tests the network on local restaurants and notices that the Ethiopian restaurant meals aren't classified correctly. What's the best way to improve the machine learning algorithm's ability to recognize Ethiopian meals?

He can add Ethiopian meals to the training data set, by finding photos online, crowd-sourcing, or taking them himself.

data security

Keeping the organization's data safe from theft, modification, and/or destruction

NOT operator

Logical operator that negates a single boolean value. Written as !. !a will be true if a is false, and false if a is true.

Citizen Science

Lots of people to help with a scientific project, like asking everyone around the world to count the butterflies they see one day

PII

Personally Identifiable Information. Information about individuals that can be used to trace a person's identity, such as a full name, birthdate, biometric data, and identifying numbers such as a Social Security number (SSN). Organizations have an obligation to protect PII and often identify procedures for handling and retaining PII in data policies.

Encryption

Process of converting readable data into unreadable characters to prevent unauthorized access.

Eloise wants to share her political views with family members living in another state but doesn't want her posts to be viewed by potential employers in the future. What is the best strategy for ensuring that? A) She can write blog posts on a website that is only viewable over a secure connection. B) She can send email messages with family members CC'ed on the email thread. C) She can write her views in the comments of a public Instagram post. D) She can share her views in tweets on a Twitter account, with the default privacy settings.

She can send email messages with family members CC'ed on the email thread.

SMS

Short Message Service

computer malware

Software that does malicious things, includes viruses, worms, Trojan Horses, spyware, and some adware.

else statement

The code to be executed if the if-condition evaluates to False in an if-structure. See also if-structure.

Data Analysis

The process of compiling, analyzing, and interpreting the results of primary and secondary data collection.

The code segment below uses a loop to repeatedly sum up numbers. sum ← 0 i ← 10 REPEAT 11 TIMES { sum ← sum + i i ← i + 1 } Which description best describes what this program does?

This program sums up the integers from 10 to 20 (inclusive).

chained conditional

Two "if, then" statements linked so that the consequent of one statement is also the antecedent of the other statement.

Public Key Encryption

Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.

data breach

When sensitive or confidential information is copied, transmitted, or viewed by an individual who is not authorized to handle the data.

Rouge Access Point

Your company security policy stated that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?

Big Data

a broad term for datasets so large or complex that traditional data processing applications are inadequate.

text file

a file that holds text without any formatting and can be opened in numerous applications

Sensor Network

a group of sensors where each sensor monitors data in a different location and sends that data to a central location for storage, viewing, and analysis.

echo chamber

a metaphorical description of a situation in which information, ideas, or beliefs are amplified or reinforced by communication and repetition inside a defined system.

Vigenere Cipher

a method of encrypting text by applying a series of Caesar ciphers based on the letters of a keyword.

substring

a portion of a string

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text

Spreadsheet

a screen-oriented interactive program enabling a user to lay out financial data on the screen

conditional statement

a statement that can be written in if-then form

social media

any tool or service that uses the internet to facilitate conversations

Web Cookies

collection of data that is sent to a computer by some websites

Boolean Expression

in programming, an expression that evaluates to True or False.

What can a string contain?

letters, numbers, and symbols

Machine Learning

the extraction of knowledge from data based on algorithms created from training data

Logical equivalence

the idea that more than one expression can have the same meaning, but have a different form (often a form that helps make the meaning more clear).


Set pelajaran terkait

Marketing: Midterm 1 (Chapters 1, 2, 5, 9, 10, 11, 12, 15, 16)

View Set

chapter 12 & 20 FINAL ( pharmacology , airway clearance technique), Neo CH. 25, Lesson 1-5 Pediatrics Final, Neo CH. 26, practicum 3 exam review, Chapter 26 - Vicky - Fall 16, CHAPTER 10 & 11 FINAL 02 ADMINISTRATION/AERSOL FINAL, Ch. 12, Neo CH. 25,...

View Set

C248 Intermediate Accounting 1, Intermediate Accounting Test 1, Intermediate Accounting 1

View Set

AP Stat AP classroom Unit 1 Part A

View Set

FFPN Module 8 Tax Implications of Financial Decisions

View Set

Evolve practice question for Exam 2

View Set

C&CR Financial Literacy Study Guide

View Set

HESI EAQ - Neurologic and Sensory Systems

View Set

Positive Psychology (3615) Compton and Hoffman book

View Set

AP Microeconomics Midterm Review

View Set