Upgrade to remove ads
UTeach Computer Science Principles Unit 1: Computational Thinking
Terms in this set (62)
a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
an action, or event, leads to the next ordered action in a predetermined orde
a question is asked, and depending on the answer, the program takes one of two courses of action, after which the program moves on to the next event.
repetition of a mathematical or computational procedure applied to the result of a previous application, typically as a means of obtaining successively closer approximations to the solution of a problem.
features of a programming language, which perform different computations or actions depending on whether a programmer-specified boolean condition evaluates to true or false.
a loop that waits for some condition to become true. In general, it's not obvious how many iterations it takes. For example, you might be looking for the first number that is divisible by 2, 3, 5, 7, and 11.
a loop where you know the exact number of iterations prior to entering the loop. Usually, the number of iterations is based on an int variable.
a diagram of the sequence of movements or actions of people or things involved in a complex system or activity.
gives a command; usually ends with a period, but it may also end with an exclamation point; ask or tell people to do something.
a word or phrase apparently modifying an unintended word because of its placement in a sentence
the study of codes, or the art of writing and solving them.
text that is not computationally tagged, specially formatted, or written in code.
encrypted text; plaintext is what you have before encryption, and this is the encrypted result.
one of the simplest forms of encryption. It is a substitution cipher where each letter in the original message (called the plaintext) is replaced with a letter corresponding to a certain number of letters up or down in the alphabet. (also known as a shift cipher)
a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers based on the letters of a keyword.
the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
a model designed to guide policies for information security within an organization
the state of keeping or being kept secret or private
refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
a general term that is used to describe the amount of time over a one-year period that the system resources is available in the wake of component failures in the system
the process of identifying an individual, usually based on a username and password
Secure Sockets Layer (SSL)
a standard security technology for establishing an encrypted link between a server and a client—typically a web server (website) and a browser, or a mail server and a mail client
Distributed Denial-of-Service (DDoS) Attack
(Denial of Service) a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack.
the use of centralized planning in an attempt to manage social change and regulate the future development and behavior of a society.
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
software that is intended to damage or disable computers and computer systems
the quality of being open to more than one interpretation; inexactness.
a language that has developed naturally in use (as contrasted with an artificial language or computer code).
a language devised by an individual or a small group of individuals and proposed for an international language or for some more specific purpose (such as aptitude testing) but not functioning as the native speech of its users — compare natural language.
visual programming languages
any programming language that lets users create programs by manipulating program elements graphically rather than by specifying them textually.
programs written in a high-level language must be translated into machine language by a compiler or interpreter
a programming language that provides little or no abstraction from a computer's instruction set architecture—commands or functions in the language map closely to processor instructions
a text listing of commands to be compiled or assembled into an executable computer program.
a set of instructions executed directly by a computer's central processing unit.
the action or process of producing something, especially a list, book, or report, by assembling information collected from other sources.
a program that converts instructions into a machine-code or lower-level form so that they can be read and executed by a computer.
(Random Access Memory) a type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes
Central Processing Unit
the part of a computer in which operations are controlled and executed.
a notation resembling a simplified programming language, used in program design.
The Halting Problem
the problem of determining, from a description of an arbitrary computer program and an input, whether the program will finish running or continue to run forever.
the decision problem, the question of the existence of an effective method for determining membership in a set of formulas, or, more precisely, an algorithm that can and will return a boolean true or false value that is correct
the ability of a computing process to be used or produced in a range of capabilities.
a method for finding a target value within a list. It sequentially checks each element of the list for the target value until a match is found or until all the elements have been searched.
search a sorted array by repeatedly dividing the search interval in half. Begin with an interval covering the whole array. If the value of the search key is less than the item in the middle of the interval, narrow the interval to the lower half.
provides a natural means to transform one view into the other: The sum of two shifts corresponds to the composition of two scalings.
a unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
a trial and error method through exhaustive effort (using brute force) rather than employing intellectual strategies.
refers to an observation made by Intel co-founder Gordon Moore in 1965. He noticed that the number of transistors per square inch on integrated circuits had doubled every year since their invention. Moore's law predicts that this trend will continue into the foreseeable future.
(Domain Name Servers) the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol addresses.
(Dynamic Host Configuration Protocol) a client/server protocol that automatically provides an Internet Protocol host with its IP address and other related configuration information such as the subnet mask and default gateway.
a router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. A data packet is typically forwarded from one router to another router through the networks that constitute an internetwork until it reaches its destination node.
a set of rules governing the format of data sent over the Internet or other network.
(Transmission Control Protocol) a set of rules that governs the delivery of data over the Internet or other network that uses the Internet Protocol, and sets up a connection between the sending and receiving computers.
a piece of a message transmitted over a packet-switching network. See under packet switching. One of the key features of a packet is that it contains the destination address in addition to the data. In IP networks, packets are often called datagrams.
criminal activities carried out by means of computers or the Internet.
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages.
a weak spot
A process of encoding messages to keep them secret, so only "authorized" parties can read it
A process that reverses encryption, taking a secret message and reproducing the original text
The generic term for a technique(or algorithm) that performs encryption
When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption
THIS SET IS OFTEN IN FOLDERS WITH...
Unit 2 AP CSP UTeachCS Vocab
AP Government Court Cases
Unit 3: Data Representation Vocabulary UTeach CS P…
AP Computer Science Principles Exam Prep
YOU MIGHT ALSO LIKE...
Computer Science Chapter 1
Computer Science Chapter 1
[ 전산 영어 기출 ]
Ch. 9-10 Test Review
OTHER SETS BY THIS CREATOR
AP CS Principles Code.org Unit 3 20-21
AP CS Principles Code.org Unit 4 20-21
Unit 2 Code.Org
CSP (Code.org) Unit 2 Review
OTHER QUIZLET SETS
Unit Three Week 12
Chapter 9 Mental Health Assessment Skills
EC 392 MIDTERM
OrgCom Exam 1