Important Vocab Flashcards

(23 cards)

1
Q

Data with values that change continuously or smoothly over time. Some examples are music, colors, position of a sprinter during a race

A

analog data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

data that changes discretely, individually through a finite set of possible values

A

digital data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples

A

sampling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

process for reducing the number of bits needed to represent something without losing any information. REVERSIBLE process

process for reducing the number of bits where some information is lost or thrown away NOT REVERSIBLE

A

lossless
lossy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a collection of public copyright licenses that enable the free distribution of an otherwise copyrighted work, used when an author wants to give people the right to share, use , or build upon work

A

Creative Commons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a chunk of data sent over a network. may arrive at the destination in order, out of order, or not at all

A

packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the protocol used for transmitting web pages over the Internet

A

HTTP, HyperText Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

differing access to computing devices and the internet based on socioeconomic, geographic, or demographic characteristics

A

digital divide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the inputs and outputs that allow a user to interact with a piece of software, buttons, menus, images, text, graphics

A

user interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

program statements run in order from top to bottom

some program statements run when triggered

A

sequential programming
event driven programming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met

A

iteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

manage complexity in programs by giving a collection of data a name without referencing the specific details of the representation

A

data abstraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

putting steps in an order
deciding which steps to do next
doing some steps over and over

A

sequencing
selection
iteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What algorithms run in reasonable time? Which run in unreasonable time?

A

polynomial efficiency, constant, linear, square, cubic

exponential or factorial efficiencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

provides a good enough solution to a problem when an actual solution is impractical or impossible

A

heuristic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a problem with a yes or no answer
a problem with the goal of finding the best solution among many
a problem for which no algorithm can be constructed that can provide a yes or no answer

A

decision problem
optimization problem
undecidable problem

17
Q

a variable in a function definition. Used as a placeholder for values that will be passed through the function

18
Q

scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices
***Usually information generally known by the public, such as observations

A

citizen science

19
Q

the practice of obtaining input or information from a large number of people via the Internet

A

crowdsourcing

20
Q

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

21
Q

software intended to damage a computing system or to take partial control over its operation

22
Q

one key for encryption and decryption
Paris a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message but the receiver’s private key is required to decrypt the message

A

symmetric key encryption
public key encryption