2.1.3 - 2.1.5 Notes Flashcards
To give permission, for example, to access information.
authorization
A method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism, typically in at least two of the following categories: knowledge (something they know); possession (something they have), and inherence (something they are).
multi-factor authentication
A program that provides visual navigation with menus and screen icons, and performs automated functions when users click command buttons.
Currently the dominant method for designing human-computer interaction
GUI (graphical user interface)
A way programmers share their code with other programmers. In object-oriented libraries, it specifies the methods of each class.
API (application programming interface)
chunks of code that have been designed to be added easily to a user’s website or profile page
Standard component of GUI
widgets
An input value to a command that specifies the values of the parameters when a procedure is called.
argument
A mistake in the algorithm or program that causes it to behave incorrectly, unexpectedly, or with undesirable results. The code compiles and runs but causes problems elsewhere, for example, giving incorrect information or mismanaging data.
logic errors
Precise rules defining how the letters, words, and punctuation of a programming language are required to be used together.
syntax
A mistake in the program that occurs during the execution of a program. Programming languages define their own run-time errors.
runtime error
A literal value (such as 5 or “hello”) that is hard coded into a program instead of being assigned to a well-named variable. When used in large programs, they can be hard to find, their purpose hard to learn, and debugging them difficult.
magic number
A designated stopping place in your code. Using a debugger, it lets you examine the state of the program and its variables.
breakpoint
A person who is responsible for managing computers, networks, servers, and other computing resources for an organization or group.
system administrator
attempt to discover information through trial and error
brute force attack
more than one word being used for a password
increases password strength
passphrase
confirm identity with knowledge known only to yourself
authentication