APCSP Vocab Flashcards

1
Q

Overflow

A

Error that occurs when the number of bits is not enough to hold the number
Ex. If one byte was used to store a piece of data and the piece of data was greater than 256, it would cause an overflow error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Round-off

A

Error that occurs when the number of bits is not enough to reprsent the actual number
Ex. 3.14 (3 digits) used to represent pi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Lossy

A

Compressing data in a way that loses some of the original data. The decompressed image is not the same as the original image
Ex. Sending a picture as a small file, resulting in lost resolution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Lossless

A

Compressing data in a way that preserves all data and allows full recovery of original image. When sending, the file is not as compressed as a lossy file would be
Ex. Text files, computer programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Metadata

A

Data about data
Ex. a camera storing location, shutter speed, and aperture for a digital photo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Sequencing

A

The order in which steps in a code are performed (typically line by line)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Selection

A

A boolean condition to determine which of two algorithmic paths are taken, if any
Usually if-statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Iteration

A

Using a looping control control structure to go through every item in a list
Usually for or while

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Reasonable Time

A

The number of steps an algorithm takes in the worst case based on input size is less than or equal to a polynomial function
(can’t increase superpolynomially like 2^n or n!)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Not Reasonable Time

A

Usually exponential in the number of steps, like doubling every time your input grows by one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Heuristic

A

Using a “rule” to guide an algorithm, like always walking toward the north star if you were stuck in a forest
Using heuristic problem solving allows an algorithm to find the best approximate solution from n! solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Undecidable

A

A problem that is so difficult we can’t ever create an algorithm that would be able to answer yes or no for all inputs,
Ex. determining if a user’s program run on some input would always stop and not run forever

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Linear Search

A

Going one by one and examining each element in a list until the value is found
Ex. looking for a word in the dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Binary Search

A

Requires the list to be sorted in order. Then the list is cut in half and either the right or left side of the list is kept depending on the value of the element that is being searched for.
If a list is a certain length, then the number of times that list an be cut in half is the maximum number of times the list can be searched to find a certain value.
If there are more ways to search, the list is cut more times (like looking for a spot on a grid based off a current location, listwould be cut in four)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

API’s

A

Application Programming Interface
APIs allow developers to sync data between multiple platforms and can facilitate communication among the various microservices in web applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Citizen Science

A

Lots of people to help with a scientific project
Ex. asking everyone around the world to count the butterflies they see in one day.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cloud Computing

A

Using distributed calculations and/or storage for big data or a web application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Crowdsourcing

A

Asking lots of users to help with something
Ex. funding a projects, running SETI@Home to look for extraterrestrial signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Creative Commons

A

An alternative to copyright that allows people to declare how they want their artistic creation to be shared, remixed, used in noncommercial contexts, and how the policy should propogate with remixed versions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Open Access

A

A policy that allows people to have read access to things
Ex. libraries or online data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Moore’s Law

A

The number of transistors on a chip doubles every two years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Peer-to-Peer Networks

A

A system where one user’s computer connects through the internet to another user’s computer without going through an intermediary “centralized” computer to manage the connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Digital Divide

A

The idea that some commuities/populations have less access to computing than others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ISP

A

Internet Service Provider
A company that provides access to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How does internet communication arrive at its destination?

A

Speech on the internet goes from the source to an ISP, into the cloud, out of the cloud, to another ISP, and to its destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How can the government control speech on the internet?

A

1.) It can try to control the speaker or the speaker’s ISP by criminalizing certain kinds of speech (this won’t work is the speaker isn’t in the same country as the listener)
2.) It can try to control the listener by prohibiting posession of certain kinds of materials. In the U.S., possession of copyrighted software w/out appropriate liscensing is illegal, as is possession of other copyrighted material w/ the intent to profit from redistributing it
3.) The government can try to control the intermediaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How can internet posters evade being convicted for defamation/slander on the web?

A

The poster could evade responsibility as long as they remain ananymous, which can easily be done on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What has congress given ISP’s relating to an Internet Defamation case?

A

Congress had given the ISP’s a complete waiver of responsibility for the consequences of false and damaging statements, even when the ISP knew they were false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Internet Protocol Hourglass

A

Each protocol interfaces only to those in the layer immediatelly above and below it, and all data is turned into IP bit packets in order to pass from an application to one of the physical media that make up the network.
- email, web, phone
- SMTP, HTTPP
- TCP, UDP
- IP
- wire, fiber, radio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

TCP

A

Transmission Control Protocol
Guaranteed reliable transmissions by breaking messages into packets, keeping track of which packets have been recieved successfully, resending any that have been lost, and specifying the order for reassembling the data on the other end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

UDP

A

User Datagram Protocol
-Provides timely but less reliable message delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

HTTP

A

HyperText Transport Protocol
-used for sending and receiving web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

SMTP

A

Simple Mail Transport Protocol
-Used for sending email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What does “end to end” mean in regard to the internet

A

“End-to-end” in the internet, means that the switches making up the core of the network should be dumb-optimized to carry out their single limited function of passing packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

RFC

A

Request for Comment
-Standards adopted through a remarkable process of consensus-building, nohieraechial in the extreme. Someone posts a proposal, and a cycle of comment and revision, or buy-in and objection, eventually coverges on something useful, if not universally regarded as perfect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Shortcut for going from binary to hexadecimal

A

-To translate a binary numeral (like 1101011101) to hexadecimal, start by splitting it into groups of four bits, from left to right (like this: 11 0101 1101)
Then determine the value of each group and write the corresponding hex digit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Internet

A

A network of independent but connected devices all over the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

World Wide Web

A

The collection of interlinked website documents (such as HTML files) that you can view with a web browser by typing addresses like
http://bjc.berkely.edu/website/privacy.html.

The collection of web pages that you view when you are online on a computer or other device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

HTML

A

Hypertext markup language
Most web pages are written with________

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

URL

A

Uniform Resource Locator
An address for accessing specific wevb data located on a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Server

A

A computer hosting data for other to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Protocol

A

The standard for communication between browsers and servers (usually “http” or “https”)
Sometimes not visible in browsers like Google Chrome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Domain Name

A

The name of the server that hosts the data (bjc.berkeley.edu)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Path

A

The location of the data in a hierarchy of folders on the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Protocols

A

Standards for communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

IP

A

Internet Protocol
An addressing system that finds paths to distant computers
Specifies how a router handles a request for another IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Redundant

A

There are multiple pathways among the physical connections of the internet to create redundancy. Even if one pathway is unavailable, there is still another way to transmit a message from a sender to receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Hierarchial

A

There are two ___________ internet addressing systems: domain names and IP addresses. These address ____________ works much like the postal system, which locates people first by state, then city, then street, then house number, then apartment, and then finally person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Fault Tolerance

A

Ability to work around problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Scalability

A

The ability f the net to keep working even as the size of the network and the amount of traffic over the network increase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Virus

A

A kind of malware that tries to spread itself over the network to other computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Antivirus Software

A

Helps protect against virus attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Phising

A

An attacker send you an email that appears to be from some official organiziation (like a bank) and tricks you into giving info to them (like a bank password)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

DDoS

A

Distributed Denial of Service
-Consists of sending a lot of requests to a server at the same time. This can overload the server’s network bandwidth
-Causes a temporary inability to reach the targeted server so other users of that server are denied service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which protocols are used to keep secure HTTP connections

A

Transport Layer Security (TLS) or maybe even an older version called Secure Sockets Layer (SSL). With these protocols, the site you are visiting sends its public key, and your browser uses it to encrypt the info you send.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Certificate Authorities

A

Used by many websites for encryption to protect files and info that is transmitted over the internet. They issue certificates to verify the identity of a user or computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Public IP Address

A

The IP address that is logged by various servers/devices when you connect to them through you internet connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Private IP Address

A

An IP address that’s reserved for internal use behind a router or other Network Address Translation (NAT) device, apart from the public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

IP v4

A

This adress is big enough to support 2^32 computers. That’s about 4 billion (4^109), but there are more than seven billion people on Earth, so there aren’t enough IP addrresses to go around. Each of the four numbers in a typical IP address today is an eight-bit byte with a value between 0 and 255.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

IP v6

A

The long-term solution is to increase the length of an IP address. The new IP addresses are 128 bits wide, which is enough to support 2^128 computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Routers

A

The “connection points” of the internet. Networking devices that route traffic between subnetworks on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Packets

A

When you send a message over the internet, your computer divides it into small chunks, called _______ that it sends individually, each on its own path. A ________ can include any kind of data: text, numbers, lists, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Packet Switching Network

A

A diggital networking communications method that groups all transmitted data into suitably sized blocks, called packets, which are transmitted via a medium that may be shared by multiple simultaneous communication sessions.
Ex. Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Hierarchy of Abstractions

A

Manages complexity of finternet by hiding the details of lower levels of the system. The highest level of abstraction includes the most general features of the internet that have to work the same across all devices. At lower levels of abstraction, things get more device-specific.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Application Layer Protocols

A

The highest level of abstraction because they manage how data is interpreted and displayed to users. These protocols give meaning to the bits sent by lower-level protocols; user and server computers must agree on what the bits mean, and application protocols (like HTTP) offer this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Transport Layer Protocols

A

Manage the breakdown of a message into packets to be transmitted by lower level protocols and the reconstruction of the message from the packets upon arrival

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Internet Layer Protocols

A

Manage the pathways that the data packets travel across networks. These protocols treat the internet like one large network even though the physical reality on the lower level is one of many tiny subnetworks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Networrk Interface Hardware

A

Also known as Link Layer
All Internet devices connect through a physical interface that uses a protocol to manage the connection to the local network. These local protocols are the least abstract because they deal directly with your physical hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

DNS

A

Domain Name System
The hierarchial addressing protocol that is human-readable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Who is in charge of the internet?

A

The computers on the internet and the connections among them don’t belong to any one oranization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

ICANN

A

The Internet Corporation for Assigned Names and Numbers
Controls the DNS hierarchy and the allocation of IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

For how long has the U.S. dominated the internet and why?

A

The U.S. has “controlled” the Internet up until 2009. The Advanced Research Project Agency (ARPA) first developed the Internet in 1969.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Open Protocols

A

Standards that are not owned by a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

IETF

A

Internet Engineering Task Force alongside the Internet Society oversee internet protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What does the internet rely on to operate properly?

A

The internet relies on the cooperation of many different elements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Firewall

A

Used to limit the kinds of connections (HTTP requests, incoming mail, etc) outsiders can make to your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Cipher

A

The set of rules your are using to encode the info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Key

A

What tells you how to arrange cipher’s rules. _______ is applied using an algorithm to a string or block of unencrypted text to produce encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Deciphering

A

Analyzing the code and working back from it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Monoalphabetic Cipher

A

A class of ciphers where thhe code is based on one letter of the alphabet standing for another letter consistently throughout the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Brute Force

A

Trying all the possible ways to crack a code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Frequency Analysis

A

Based on the idea that every linaguage has its own specific patterns. The study of the frequency of letters or groups of letters in a ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Crib

A

Words, letters, and phrases that are so common that it is hard to form a sentence without them
Ex. e and the

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Polyalphabetic Cipher

A

The way you scramble the alphabet actually changes throughout the message
Ex. Vigenere cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Vingenere Square

A

Alphabet goes up on the top and also to the side in order to help write a code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

How can you crack Vigenere cipher?

A

By using a type of frequency analysis by Charles Babbage. Babbage realized that some patterns in a long message may still show up and he counted how many letters separated those repeated patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

One Time Pad Encryption

A

Only way to create an unbreakable cipher. Uses the key that is as long as the message itself. Once a sheet is used for a message, you destroy it. Then you use the next sheet for the next message so you never repeat a key. As long as you keep the pad safe, no one can ever decrypt the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

The Enigma Machine

A

An example of a one time pad encryption device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

The British Bombe

A

Device developed by Alan Turing used by the British military to crack the enigma machine. As long as this device kenw 20 characters of the message, it could crack the code.

89
Q

Prime Number

A

Numbers only divisible by themselves and one. Very useful for internet securiy because of this trait.

90
Q

Public Key

A

A code that is available for anyone to use.

91
Q

Private Key

A

A code that must remain confidential to its respective owner.

92
Q

How does Public Key/ Private Key Cryptography work?

A

Example: If Bob wants to send sensitive data to Alice, and wants to be sure that only Alice may be able to read it, he will encrypt the data with Alice’s Public Key. Only Alice has access to her corresponding Private Key and as a result is the only person with the capability of decrypting the encrypted data back into its original form. As only Alice has access to her Private Key, it is possible that only Alice can decrypt the encrypted data. Even if someone else gains access to the encrypted data, it will remain confidential as they should not have access to Alice’s Private Key.

93
Q

Encryption

A

Works by converting information or data into a language that cannot be understood in one glance. Usually, the information is sent to a person who can decrypt it using a key only they have access, keeping the information’s privacy intact.

94
Q

Three Principles of Encryption

A

1.) Authentication
2.) Integrity
3.) Non-Repudation

95
Q

Authentication

A

Helps to verify that original author of the code is what he or she claims to be

96
Q

Integrity

A

Essential towards maintaining the privacy of the message because it must be known that the message was not tampered with in any way, shape, or form

97
Q

Non-Repudation

A

Where the user sends a message to another person but later denies he or she actually sent the message, causing confusion and bringing the integrity of the message into question

98
Q

Three types of encryption?

A

1.) Secret key cryptography
2.) Public key cryptography
3.) Hash function

99
Q

Secret Key Cryptography

A

Where a single key is sent with the message to another user for the receiver to decode the message.

100
Q

Public Key Cryptography

A

Where the user has a public key that he or she uses to encrypt the message to send to the receiver who will then use his or her private key to decode the message.

101
Q

Hash Function

A

Types of systems where the user sends a plain text message to another user without a key. They are usually generated based on the message which helps determine whether the integrity of the message has been tampered.

102
Q

Diffie-Hellman-Merkle Method

A

A method of secret key agreement that makes secret key distribution much easier.

103
Q

How does the Diffie-Hellman-Merkle Method work?

A

In Diffie-Hellman, Alice and Bob make the shared secret key, online, together, in full view of any other eavesdropper. The breakthrough allows Alice and Bob to openly exchange some Diffie-Hellman numbers. In private, they use each other’s DH numbers, their secret random numbers, and the DH method to agree on the same secret key. Although the eavesdropper knows the DH method and copies Alice and Bob’s conversation, he cannot figure out Alice and Bob’s agreed-on secret key.

104
Q

What are some problems of the Diffie-Hellman-Merkle Method

A

1.) Lack of authentication
2.) Failing to provide a versatile means for secret key exchange

105
Q

Caesar Cipher

A

Also known as a shift cipher, is one of the simplest forms of encryption. It is a substitution cipher where each letter in the original message (called the plaintext) is replaced with a letter corresponding to a certain number of letters up or down in the alphabet.

106
Q

AND

A

A Boolean operator. Both must be true in order for it to evaluate to true.

107
Q

OR

A

A Boolean operator. One or the other must be true in order for it to evaluate to true.

108
Q

NOT

A

A Boolean operator. Evaluates to true if input is false.

109
Q

Boolean Expression

A

an expression that results in a __________ value, that is, in a value of either true or false.

110
Q

Composition of Functions

A

An act or mechanism to combine simple functions to build more complicated ones.

111
Q

Conditional Statement

A

Set of rules performed if a certain condition is met

112
Q

Data Type

A

A classification of data which tells the compiler or interpreter how the programmer intends to use the data. Examples include : real, integer, float (decimal point number)

113
Q

Debugging

A

A multi-step process that involves identifying a problem, isolating the source of the problem, and then either correcting the problem or determining a way to work around it. The final step of ______________ is to test the correction or workaround and make sure it works.

114
Q

Default Value

A

What the code is set to when it is started.

115
Q

If () Clause

A

Keep Checking:
If this is true, then do this

116
Q

If ()…Else Clause

A

Keep Checking:
If this is true, then do this. If not, then do this

117
Q

Input Type

A

Set up variables to take a specific ________ ________.

118
Q

Lists

A

Reports a newly created _________ with the given items.
The _______ items can be anything: text, numbers, blocks, scripts, and even other ______.

119
Q

Mathematical Expression

A

Numbers, symbols and operators (such as + and ×) grouped together that show the value of something.

120
Q

Nested IF Statements

A

If you need to test for more than one condition, then take one of several actions, depending on the result of the tests, you can nest multiple IF statements together in one formula.

121
Q

Predicate

A

A ________ is a special kind of reporter that always reports true or false. ________ have a hexagonal shape. The special shape is a reminder that ______________ don’t generally make sense in an input slot of blocks that are expecting a number or text.

122
Q

Reporter Block

A

Has an oval shape. It is called a “ ______ “ because when it’s run, instead of carrying out an action, it reports a value that can be used as an input to another block.

123
Q

Script Variable

A

Used when you only need a variable temporarily, during the running of a particular script. You can use ____ ________ block to make the variable. Example : for loop, the (length) only works inside the for loop

124
Q

() < ()

A

An Operators block and a Boolean block. The block checks if the first value is less than the other value. If it is greater, the block returns true; if not, it returns false.

125
Q

() = ()

A

An Operators block and a Boolean block. The block checks if the first value is equal to the other value. If the values are equal, the block returns true; if not, false. This block is not case-sensitive.

126
Q

() > ()

A

an Operators block and a Boolean block. The block checks if the first value is greater than the other value. If it is less, the block returns true; if not, it returns false.

127
Q

() and ()

A

An Operators block and a Boolean block. The block joins two boolean blocks so they both have to be true to return true. If they are both true, the block returns true; if they are not all true or none true, it returns false.

128
Q

() mod ()

A

Finds the remainder after division of one number by another

129
Q

() or ()

A

An Operators block and a Boolean block. The block joins two boolean blocks so any one of them can be true to return true — if at least one of them is true, the block returns true; if neither of them are true, it returns false.

This block can be stacked inside itself — this can be used to fit more booleans in.

130
Q

Abs ()

A

Takes the ___________ ___________ of a number. The distance the number is away from zero. It is always positive.

131
Q

Ceiling of ()

A

Rounding up

132
Q

FALSE

A

Reported input is false

133
Q

Floor of ()

A

Rounding down

134
Q

Join words () >

A

An Operators block and a Reporter block. The block concatenates, or “links” the two values together and reports the result
Example : print “This is my” + “ “ + variable + “ “ + “class.”

135
Q

Not ()

A

An Operators block and a Boolean block. The block checks if the boolean inside it is false — if it is false, the block returns true; if the condition is true, it returns false.

136
Q

Report ()

A

Reporters that report Boolean (true or false) values.

137
Q

Script Variables

A

Used when you only need a variable temporarily, during the running of a particular script. You can use ____ ________ block to make the variable.

138
Q

Set (variable name) to (value)

A

Variables block and a Stack block. The block will set the specified variable to the given value: a string or number.
Example : Set (score) to (0)

139
Q

Touching ()?

A

A Sensing block and a Boolean block. The block checks if its sprite is touching the mouse-pointer, edge, or another sprite (a Reporter block holding the sprite’s name can be used). If the sprite is touching the selected object, the block returns true; if it is not, it returns false.

140
Q

TRUE

A

Reported input is true

141
Q

Unicode () as letter

A

Reports the letter with a given code.
Letters and other characters are represented inside the computer using a numeric code called Unicode. Unicode can represent the characters of all human languages, plus many non-letter symbols.

142
Q

Unicode of ()

A

Reports the Unicode value of a letter.
Letters and other characters are represented inside the computer using a numeric code called Unicode. Type or paste a single character into the input to get its Unicode number.

143
Q

T and T equals

A

T

144
Q

T and F equals

A

F

145
Q

F and T equals

A

F

146
Q

F and F equals

A

F

147
Q

T or T equals

A

T

148
Q

T or F equals

A

T

149
Q

F or T equals

A

T

150
Q

F or F equals

A

F

151
Q

Why is the use of variables, script variables, and input variables important?

A

Because important information can be maintained and referenced. They can symbolically represent anything from numbers to words which can be helpful when programming in Snap.

152
Q

Why is abstraction important?

A

It eliminates the details and condenses it down to one line of code.

153
Q

Why is it useful to specify the type of input that a block is expected to receive?

A

So the function does not result in an error or does not work in the way the user intended it.

154
Q

Logical Error or Semantic Error

A

You are not logically setting up the program to process correctly.

155
Q

Algorithm

A

A standard way to perform an operation

156
Q

Tip for Debugging Code

A

Put a wait after every command

157
Q

Computer

A

a programmable device that stores, retrieves, and processes data; an electronic machine or device that performs processes, calculations and operations based on instructions provided by a software program.

158
Q

Central Processing Unit

A

part of the computer that processes data and allows the computer to “think.” Sometimes referred to as a “computer chip”.

159
Q

Memory

A

How a computer stores data

160
Q

Bits

A

Represent data-a single character

161
Q

Byte

A

8 bits

162
Q

Random Access Memory

A

short-term memory that computers use to cache temporary data that they can access quickly; data that gets constantly deleted or over-written.

163
Q

Storage

A

long-term memory that computers use to store data files or other more permanent pieces of information that a user would expect to be able to access consistently.

164
Q

Input

A

any part of a computer that can take information from the outside world and input it into the computer (i.e., keyboard, mouse, camera).

165
Q

Output

A

parts of a computer that can output information to the outside world (i.e., display screen, printer, speakers).

166
Q

Hardware

A

The physical parts of a computer

167
Q

Software

A

set of instructions or commands that tell the computer what to do.

168
Q

System Software

A

low-level software that interacts directly with the computer hardware, often called Operating System (OS) software (i.e., Windows, MacOS, Linux).

169
Q

Application Software

A

higher-level software usually specialized in doing a particular task (i.e., Minecraft, Microsoft Word, banking website).

170
Q

Computing Innovation

A

something that includes a program as an integral part of its function; it can be physical (e.g., self-driving car), nonphysical computing software (e.g., picture editing software), or a nonphysical computing concept (e.g., e-commerce

171
Q

Decomposition

A

the ability to break a larger problem down into smaller parts.

172
Q

Pattern Recognition

A

when you observe similarities and patterns within problems.

173
Q

Abstraction

A

when you identify what defines the patterns you see, focus on the important information, and derive general rules and concepts that can be applied in other areas (carving out the relevant from the irrelevant).

174
Q

Variable

A

An abstraction inside a program that can hold a value. It has associated data storage that represents one value at a time, but it can be a list or other collection that in turn contains multiple values.

175
Q

Algorithm

A

a finite set of instructions that accomplish a specific task.

176
Q

Algorithmic Thinking

A

when you develop a step-by-step plan, or the rules to follow, to solve a problem.

177
Q

Program

A
  • a collection of computer commands that perform a specific task when run by a computer; often referred to as software.
178
Q

Code Segment

A

a group of programming statements that is part of a program.

179
Q

Behavior

A

how a program functions during execution; often described by how a user interacts with it.

180
Q

Program Inputs

A

data sent to a computer for processing by a program; it can come in a variety of forms, such as tactile, audio, visual, or text inputs.

181
Q

Program Outputs

A
  • any data sent from a program to a device; can come in a variety of forms, such as tactile, audio, visual, or text.
182
Q

Sprite

A

any object in a game that has properties (i.e., position, velocity) and behaviors (i.e., it can move, it has effects).

183
Q

Event

A

an occurrence; things that happen, usually associated with an action (i.e., mouse click, button pressed).

184
Q

Event Handler

A
  • a part of code that ‘handles’ or listens for a specific type of event; when that event occurs, the code inside the event handler is run.
185
Q

Analog

A

change is smooth over time like a wave vs Digital an analog signal broken into steps or pieces.

186
Q

Lossy Compression

A

decreases file size and resolution.

187
Q

Lossless Compression

A

decreases file size while retaining the original resolution.

188
Q

Algorithm

A

a finite set of instructions that accomplish a specific task.

189
Q

Code Statement

A

a part of program code that expresses an action to be carried out.

190
Q

Expression

A

can consist of a value, a variable, an operator, or a procedure call that returns a value; expressions are evaluated to produce a single value.

191
Q

Execute

A

the process of running a computer software program, script, or command.

192
Q

Behavior

A

how a program functions during execution; often described by how a user interacts with it.

193
Q

Program Inputs

A

data sent to a computer for processing by a program; it can come in a variety of forms, such as tactile, audio, visual, or text.

194
Q

Program Outputs

A

any data sent from a program to a device; can come in a variety of forms, such as tactile, audio, visual, or text.

195
Q

Event

A
  • an occurrence; things that happen; usually associated with an action (i.e., mouse click, button pressed).
196
Q

Event Handler

A
  • a part of code that ‘handles’ or listens for a specific type of event; when that event occurs, the code inside the event handler is run.
197
Q

Program Documentation

A
  • a written description of the function of a code segment, event, procedure, or program and how it was developed.
198
Q

Comments

A
  • a form of program documentation written into the program that helps explain what the code is doing. Comments in a program do not affect how a program runs.
199
Q

Logic Error

A

a mistake in the algorithm or program that causes it to behave incorrectly or unexpectedly.

200
Q

Syntax Error

A

a mistake in the program where the rules of the programming language are not followed.

201
Q

Run-time error

A

a mistake in the program that occurs during the execution of a program; programming languages define their own run-time errors.

202
Q

Overflow Error

A

an error that occurs when a computer attempts to handle a number that is outside of the defined range of values.

203
Q

Roundoff Error

A
  • Decimals are rounded inconsistently.
204
Q

Testing

A

using defined inputs to ensure that an algorithm or program is producing the expected outcomes, in the development process.

205
Q

Sequencing

A

the application of each step of an algorithm in the order in which the code statements are given.

206
Q

Selection

A

determines which part of an algorithm are executed based on a condition being true or false.

207
Q

Nested Conditional Statement

A

consist of conditional statements within conditional statements.

208
Q

Iteration

A

a repeating portion of an algorithm; iteration repeats a specified number of times or until a given condition is met.

209
Q

Variable

A

an abstraction inside a program that can hold a value. Each variable has associated data storage that represents one value at a time, but that value can be an array/list or other collection that in turn contains multiple values.

210
Q

Variable Types

A

some programming languages provide types to represent data. These types include numbers, Booleans, arrays/lists, and strings.

211
Q

Element

A

an individual value in an array/list that is assigned a unique index.

212
Q

Index

A

a common method for referencing the elements in a list or string using natural numbers.

213
Q

String

A

An ordered sequence of characters

214
Q

String Concatenation

A
  • joins together two or more strings end-to-end to make a new string.
215
Q

Substring

A

part of an existing string.

216
Q

Boolean Value

A

a variable that is either true or false.

217
Q

Data Abstraction

A

provides a separation between the abstract properties of a data type and the concrete details of its representation; manages complexity in programs by giving a collection of data a name without referencing the specific details of the representation.

218
Q

Big Data

A

Broad term for datasets so large or complex that traditional data processing applications are inadequate. Spatial-temporal pattern recognition. patterns that occur in a wide range of natural phenomena and are characterized by a spatial and a temporal patterning.

219
Q

Whaling

A

Whaling is a type of phishing attack which targets high-profile individuals rather than everyday people. An example of a high-profile person would be a CEO of a company. The goal of this type of attack is to gain access to high-level data or classified information.

220
Q

Spear Phishing

A

With spear phishing, an attacker must have prior information about their victim such as their full name, phone number, address and so on. Spear phishing can take place through email, text messages or phone calls. During this type of attack, the victim is easily convinced because the attacker has information about them that makes them sound legitimate and trustworthy.

221
Q

Angler Phishing

A

Angler phishing is when an attacker poses as a Customer Service Representative (CSR) in an attempt to convince the victim to disclose their personal information. Since the victim believes it’s a legitimate CSR, they give out their information with no hesitation.