Course:
Sets the color used to fill shapes to a grayscale value.
Rounds the value of a double to the nearest whole number.
Joins items in a print() statement
A method used in Java to compare the contents of two Strings for equality
A 2D Array is an array of arrays, used to represent tables, grids, and matrices.
Arrays that store arrays. The methods associated with these are the same as regular arrays.
A 2d list is a list whose items are also lists.
Allows putting links on a web page. It uses the href attribute to specify what the link should point to.
The `<b>` tag specifies bold text without any extra importance.
This tag inserts a line break.
This tag defines a thematic break in an HTML page (e.g. a shift of topic). The element is most often displayed as a horizontal rule that is used to separate content (or define a change) in an HTML page.
The `<i>` tag defines a part of text in an alternate voice or mood. The content inside is typically displayed in italic.
Allows adding an image to a web page. It is self-closing. The attributes of an `<img>` tag include `src`, which specifies where to get the image from (the url for an image ), and `width` and `height` attributes, which specify the size of the image in pixels.
defines a list item inside an HMTL list.
The <ol> tag defines an ordered list. An ordered list can be numerical or alphabetical.
The `<p>` tag defines a paragraph. Browsers automatically add a single blank line before and after each `<p>` element.
Used to incorporate JavaScript into HTML files
Creates a container for the table data
A single table data element
A single table header element
Creates a container for a single row in a table
Defines an unordered list in HTML.
Java key term used to denote the user intendeds to override a method.
AAA in network security stands for Authentication, Authorization and Accounting. It is used to refer to a family of protocols which mediate network access.
Specifies the complete path from the root directory to the file or directory
A class, usually at the top of a Class Hierarchy, that cannot be instantiated, because not all of its methods are defined.
An art movement in the 1940s and 1950s characterized by creative spontaneous acts, such as Jackson Pollock's dripping paintings.
A method, written in an Abstract Class, that is not defined. The word `abstract` must come right before the method's return type. It is up to the subclass to fill in the definition for the abstract method.
Managing complexity by "abstracting away" information and detail, in order to focus on the relevant concepts.
Simplifying complex systems by breaking them down into manageable parts.
How fast an object gains or loses speed.
Conditions that a software product must satisfy to be accepted by a user, customer or other stakeholder
In network security, access control is the restriction of access to a place or other resource on a network. Permission to access a resource is called authorization.
In network security, access control is the restriction of access to a place or other resource on a network. Permission to access a resource is called authorization.
A network device that allows other Wi-Fi devices to connect to a wired network.
Determines who has access to using the method when writing classes and objects.
The practice of designing things – physical spaces, digital products, information – to be usable by everyone, regardless of their abilities
A model used to design an accessible video game based on access and challenge patterns.
A method that enables user to obtain information about an object’s instance and static variables.
Methods used to access instance variable and object data. Also referred to as getter methods.
The process of measuring what is happening within the system. This is the final process of the AAA framework and ensures that there is a log of all actions within the network or system.
Depends on whether or not the data is correct.
Association for Computing Machinery: organization for computing professionals to provide guidance related to ethics and responsibilities.
Collecting information about a target by actively engaging a system and analyzing responses (network and port scans).
A triangle where all angles are less than 90 degrees.
Has full access and full control to manage other users, set permissions and change computer settings and programs.
A symmetric, block cipher that groups data into 128-bit blocks and uses a 128-, 192- or 256-bit key along with an algorithm and 10, 12, or 14 rounds of encryption.
Step-by-step process that solves a problem.
An algorithm is a set of steps or rules to follow to solve a particular problem.
The systematic and repeatable errors in a computer system that create unfair outcomes
Learning to create step-by-step problem-solving procedures.
A variable that references an existing object. When the alias variable is manipulated, so is the original object, and vice versa.
Two object references are considered aliases when they both reference the same object.
Two object references are considered aliases when they both reference the same object.
The best (highest) maximum score
An optimization technique that compares the current maximum and minimum scores in the game and stops minimax from executing if the minimum score is lower than the maximum
A description that is added to an image on a webpage
to make a part stay in place during gameplay rather than having gravity pull it downward
Logical operator that ANDs two boolean values. Written as `&&`. `a && b` will be true if both `a` and `b` are true.
Logical operator that ANDs two boolean values. Written as `&&`. `a && b` will be true if both `a` and `b` are true.
Showing several still images one after another very quickly, to give the illusion of animated movement.
Creating the illusion of motion using rapidly changing still images.
A form of art that rapidly displays a sequence of still images to create an illusion of movement
Recorded movements of the model that can play under specific conditions that are set by the Animator Controller.
Allows the developer to assign multiple animations to a model and determine under which conditions they execute.
Allows the developer to assign multiple animations to a model and determine under which conditions they execute.
How much can be expected to be lost in a year due to a single threat event which is determined by the formula: SLE * ARO = ALE
How often a threat event per year (typically determined by historical data).
Anonymity describes situations where the acting person's identity is unknown.
An API (application programming interface) is a set of tools for building programs.
The action of adding new data or text to the end of an existing file.
Add a particular item to the end of a list.
An operating system that uses a graphical user interface designed by Apple Inc. for use on desktops and laptops.
Refers to the design of the essential parts of an application and how they are connected to each other.
Used for inspecting all resources that are loaded like databases, storage, cookies, images, etc.
APIs and libraries simplify complex programming tasks by providing sets of clearly defined methods of communication among various computing components.
A combination of numbers, operators, and sometimes variables that computes a value.
Arithmetic operators include + addition, - subtraction, * multiplication, / division, and % modulus. These operators are used to perform basic mathematical tasks.
Exception that is thrown to warn programmers about arithmetic errors in their code.
Advanced Research Projects Agency Network, precursor to the modern internet
Arrays are lists that store many values of the same type
Arrays are lists that store many values of the same type
A fixed container that stores an ordered collection of items.
Also called a list. A data structure that holds a collection of values in a particular order
A data structure that stores a **fixed** number of elements, all of the same type, one after another like a list.
The position of an element in an array. The first element is at index 0, the second element is at index 1, and so on.
The number of elements an array can hold. You can get the length of an array `arr` by typing `arr.length`
Built-in functions that perform various operations on arrays, such as searching, iterating, modifying, and accessing elements.
Returns the length of the array
ArrayList is a Java class that is like an Array with extra powers. It can automatically resize and comes with other helpful methods.
Methods used to alter the state of an ArrayList
A mutable list of object references. We can create ArrayLists by using the constructor new ArrayList<E>().
A mutable list of object references. We can create ArrayLists by using the constructor new ArrayList<E>().
Accesses an element in the array to either update or retrieve.
A computer system able to perform tasks that ordinarily require human intelligence
the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings
ASCII is the standard protocol for encoding text information as bits. The ASCII table assigns a unique binary number to every text character.
A programming language that is very close to machine code and used for a specific type of processor.
How much an asset is worth.
Assigning to a variable is updating the variable's value
One key encrypts, a different key decrypts.
When one key encrypts and a different key decrypts.
When one key encrypts and a different key decrypts.
An object’s characteristics.
Acts as a microphone-like device. It receives input from any given Audio Source in the scene and plays sounds through the computer speakers.
Acts as a microphone-like device. It receives input from any given Audio Source in the scene and plays sounds through the computer speakers.
A component that plays an audio clip in a scene.
The process of identifying a user and granting them access. Authentication is proving that someone is who they say they are.
Proving the identity of the user.
Specifying access rights and permissions for each user.
The process of enforcing policies and user privileges. Once a user is authenticated, they may only be authorized to access specific areas or may only have rights to perform specific tasks.
Automatic conversion between primitive types and their corresponding object wrapper classes
The assurance that systems and data are accessible by authorized users when and where needed.
A visual representation of a character.
Server devices and applications are often referred to as the “back end” - meaning the user doesn’t actually SEE what is happening; it’s hidden from their view and they just see the results on their end.
Server devices and applications are often referred to as the “back end” - meaning the user doesn’t actually SEE what is happening; it’s hidden from their view and they just see the results on their end.
A copy or snapshot of the state of your computer.
Command that lets you tell Tracy to move backward. In between the parentheses you need to put a number to tell Tracy how far to move backward.
Baiting attacks exploit a victim's greed or curiosity. They tempt users into a trap that steals their personal data or infects their computers.
The capacity of data transfer in a system. Measured by bitrate.
The base case is the simplest form of the recursive problem. The base case can be immediately solved without breaking the problem down any further.
The simplest version of our recursive process. This is the point when the problem cannot be reduced any further.
Drum sounds played sequentially in a repetitive pattern
The behavior of an object is what the object is able to do. It is the actions that can be performed by the object.
The actions that can be completed by an object or class.
The best (lowest) minimum score
Prejudice in favor of or against one thing, person, or group compared with another, usually in a way considered to be unfair.
The intercept where the line of best fit intercepts the y-axis
Occurs when a result is more favorable to a certain outcome.
Refers to data that is so large, fast or complex that it's difficult or impossible to process using traditional methods.
A way to represent how long an algorithm will take to execute. It helps to determine how efficient different approaches to solving a problem are.
Notation that describes how complex an algorithm is. A larger number inside of the Big-Oh notation means the algorithm takes longer to complete, a smaller number means the algorithm takes less time to complete.
The binary number system is the Base 2 Number System. It is a number system that only uses 2 digits (0 and 1).
Number system that has 2 digits, 0 and 1. This is how computers represent numbers at the base level.
A number system that only uses two symbols: typically "0" and "1".
A search that starts at the middle of a sorted array or ArrayList and eliminates half of the array or ArrayList in each iteration until the desired value is found or all elements have been eliminated.
Search algorithm that only works on a sorted list. It discards half of the list on each iteration, getting to the solution much faster than Linear Search.
A form of authentication that uses an individual’s physical or behavioral characteristics to verify their identity
A special kind of firmware that runs programs strictly to start up your computer.
A basic unit of information in computing and digital communications.
Bit means "binary digit". A bit is a single digit in a binary number. A bit can either be 0 or 1.
The amount of data (in bits) that can be sent in a fixed amount of time.
Relates two variables or two types of data.
When the tester has no knowledge of the target system (simulates an external attack).
when programs are used and tested without the user necessarily understanding how each part of the program is working, but are able to understand what the final output or product will be.
attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
Often used when error-based and union-based SQLi do not work. It essentially involves asking the database a series of targeting questions and based on the results gives clues as to how to get the DB to give up its contents.
Groups bits into blocks of plaintext before applying the encryption.
A cipher that groups bits into blocks of plaintext before applying the encryption.
A short-range wireless communication technology that uses radio waves to transmit information.
A boolean is a true or false value.
Binary and evaluates to either true or false. true; false
`boolean` is a Java type that can either be true or false
A True or False value
A framework with predefined web page components that respond automatically to window resizing.
Modeling every element on a web page as if it were wrapped in a box
The visible elements of a brand, such as color, design, and logo, that identify and distinguish the brand to consumers
Exits the current loop and resumes execution at the next statement.
Breaks out of a while loop and executes statements that immediately follow while loop.
Breaking down (decomposing) your code is splitting it into more functions.
Breaking down (decomposing) your code is splitting it up into several smaller, simpler methods
The `break;` statement breaks out of the current loop, without executing any more code in the loop.
The `break;` statement breaks out of the current loop, without executing any more code in the loop.
the overall lightness or darkness of the image
A program on your computer that sends requests for webpages and displays them.
Used to navigate the world wide web and view HTML files.
The process of websites creating a unique profile of you based on your computer hardware, software, and system preferences
The process of breaking an encryption by trial and error.
A section of memory set aside to be used for a specific reason.
Occurs when there is more data put into a buffer than it can handle.
A situation when too much data is placed into a fixed-sized buffer that can cause data corruption.
A report that stores all information needed to document, report and fix problems occurred in software or on a website
A byte is 8 bits.
Stores website data such as HTML and CSS to reduce load time.
A collection of data and files used to increase the speed of the browser.
An encryption method in which each letter of the message is shifted by a certain amount, called the key
Calling a function actually gives the command, so the computer will run the code for that function.
A method's call site is the point in the code where the method is called.
A function passed as a parameter to another function in order to be called later.
Calling a method actually gives the command, so the computer will run the code for that method.
objectName.method()
A component that continually displays different content, often with the goal of highlighting particular areas or content of the website
Casting is turning something of one type into another type
Turning something of one type into another type!
The intersection of a row and a column.
Censorship is the suppression of words, images, or ideas that are "offensive."
The core component of a device that accepts and executes instructions.
A data point at the center of a cluster
A type of clustering that determines the similarity of data points based on their closeness to the centroid, or center, of a cluster
Confirms the identity and authenticity of a website.
The process of associating a host with their expected certificate or public key.
Ensures an unbroken audit trail of collected digital data and media.
Contains a single character or punctuation. a; z; 1; !; #
`char` is a Java type that represents a single character (a single letter)
A special kind of collider component that allows characters to act in specific ways.
charAt(int index) returns the character at the specified index.
A program designed to simulate a human conversation
A Python library that uses machine learning to respond to user input and create dialogue. Chatterbot chatbots start out as untrained and improve their conversational ability after every conversation and user input.
Locations in a game where a player's character can respawn
a group of two or more notes sounded together
a sequence of chords
The CIA Triad is a widely-accepted security measure that should be guaranteed in every secure system. It stands for Confidentiality, Integrity, and Availability.
Information which has been made unintelligible.
Science that harnesses the power of many individuals to solve hard, complex problems.
A class is a template, or a blueprint, from which Java objects are created. All Java programs start with a class.
Classes are the template through which objects are created. It is the formal blueprint for creating objects.
`class` is an attribute we can add to HTML tags in order to style a specific group of elements.
Class hierarchy refers to the arrangement of classes and how they relate to each other.
A predictive modeling problem where a label is predicted for a given input
A CLI, or Command Line Interface, allows users to give instructions to the computer using text commands, such as "open a new file" or "run this program."
When someone else creates a Class (like `String`, or `Randomizer`), and you are using the functionality of that Class in your program, your program is a *client* of the class. You are using the class as a client.
Client-server applications are programs or apps that run on our client devices AND need to access resources from a server. In other words, they need help and can’t do what they need to do alone.
Client-server applications are programs or apps that run on our client devices AND need to access resources from a server. In other words, they need help and can’t do what they need to do alone.
Client devices are typically personal computing devices with network software applications installed that request and receive information over the network or Internet. Mobile devices like your smart phone, tablets, iPads, laptops and also desktop computers can can all function as clients.
Client devices are typically personal computing devices with network software applications installed that request and receive information over the network or Internet. Mobile devices like your smart phone, tablets, iPads, laptops and also desktop computers can can all function as clients.
Clients and servers communicate over a computer network on separate hardware, but both client and server may reside in the same system. A server host runs one or more server programs which share their resources with clients. A client does not share any of its resources, but requests a server's content or service function. Servers store and protect data and process requests from clients. Clients make requests and format data on the device for the end user.
Clients and servers communicate over a computer network on separate hardware, but both client and server may reside in the same system. A server host runs one or more server programs which share their resources with clients. A client does not share any of its resources, but requests a server's content or service function. Servers store and protect data and process requests from clients. Clients make requests and format data on the device for the end user.
Program code, usually written in JavaScript, that is executed on the client's browser.
The action of terminating the connection between a file and a program after completing read or write operations.
Cloud computing is the on demand availability of computer system resources, especially data storage and computing power, without direct active management by the user.
Software that is installed, hosted and accessed entirely from a remote server or location.
A common unsupervised learning technique that takes a data set and divides it into subgroups, or clusters, based on similarities
A term used in programming for the set of instructions that can be run or executed by a computer.
The slope of the linear model, which determines how steep the line is, or how much a dependent variable changes compared to the independent variable
a collection of images
A component that handles an object's collisions with other objects.
whenever 2 inputs map to the same output.
A gradual blend of one color to another.
A collection of colors used together in one medium
A combination of colors used by designers when designing an interface
the intensity of a color, expressed as the degree to which it differs from white
Command to change Tracy's color.
Command to change Tracy's color.
Command to change Tracy’s color.
A condition in which a person has difficulty distinguishing particular colors from each other
A vertical line of cells.
Represents a piece of information (or attribute).
The process of traversing a 2D array by accessing all values at the first column in every row, before moving to the next column
A command is an instruction you can give to Karel.
A text-based interface where users interact with the computer by typing commands and receive text-based responses.
Processes commands to a computer program in the form of lines of text.
Processes commands to a computer program in the form of lines of text.
A message in your code that explains what is going on.
A message in your code that explains what is going on.
Commenting out code makes the computer ignore it, so it does not run.
Phrases entered into code to provide information or direction.
Algorithms that are often used in computer science to do basic analysis on a list. These often include traversing and selection processing.
The Comparable Interface is a standard interface in Java that mandates that all classes implementing the Comparable interface must define a method called `int compareTo(Object o)` that returns a positive int if the parameter `o` passed in is *less than* the current instance, returns 0 if it is equal, and a negative int if it is greater.
Used to make comparisons between values.
An error in the actual Java code. The code will not **compile** into an executable program, because there are errors in the text of the code.
Translates, or “compiles” the entire code into machine code and then runs the program, or sets aside to run later.
A tool that compiles your Java code, it takes the Java code you've written and turns it into an executable program.
A program that translates code from a high-level programming language to a lower-level language to create an executable program.
Colors that create a greyscale color when combined. When placed next to each other, they create the strongest contrast available for those particular colors.
The degree in which all required data is known. It is the absence of missing values.
a way to create complex objects by combining simpler objects together, representing a “has-a” relationship between objects
Allows programmers to shortcut variable assignments that include the variable being assigned a new value: x = x + y; shortcut: x += y;
A Boolean expression that combines two or more conditions using logical operators
A video, a visualization, a graphic, a program, or an audio recording that students submit providing an illustration, representation, or explanation of the computing innovation's intended purpose, its function, or its effect.
A method that uses decomposition, pattern recognition, abstraction, and algorithms in order to reliably solve complex problems.
A person or device that makes calculations, stores data, and executes instructions according to a program.
A computer network is a group of interconnected computing devices capable of sending or receiving data.
An external device that provides input and output for the computer.
The study of computational thinking, the thinking humans need to in order to describe a step by step process to a computer.
A type of computer program that can spread by modifying other computer programs and inserting its own code (rules).
A computing device is a physical artifact that can run a program.
Computing solutions are solutions to problems that involve the use of a computer system. This can be either a hardware, software, or combination of the two.
A computing system is a group of computing devices and programs working together for a common purpose.
Concatenation is another word for combining. Concatenating Strings is when we add Strings together.
Adding two strings together using the "+" operator.
The process of adding two String values together. This creates a new String object. Primitives can be concatenated with String objects.
The process of adding two String values together. This creates a new String object. Primitives can be concatenated with String objects.
A common error that occurs when attempting to modify an ArrayList while using an enhanced for loop.
A common error that occurs when attempting to modify an ArrayList while using an enhanced for loop.
A common error that occurs when attempting to modify an ArrayList while using an enhanced for loop.
A common error that occurs when attempting to modify an ArrayList while using an enhanced for loop.
A statement that evaluates to true or false.
A programming construct that executes code based on whether a condition is true or false
Making decisions in code using if-else statements.
The protection of information from people who are not authorized to view it.
The tendency to seek out, collect and interpret data so that it confirms one’s preexisting beliefs or ideas.
Refers to data values in one data set being collected and stored in the same way as values in another data set.
Used for entering live JavaScript for testing and debugging.
A constant is a variable you define at the top of the program that doesn’t change. The reason to define constants is to store named variables that have relevant values for the program.
An identifier that stores data or information and cannot be changed.
A constructor is a special method of a Class that constructs a new object (a new instance) of the Class and sets the initial values for the instance variables.
Allows for the creation of a new object. Consists of the constructor name and parameter list.
Rejects all the remaining statements in the current iteration of the loop and moves the control back to the top of the loop to continue to the next iteration. Can be used in both while and for loops.
the difference in brightness between objects or regions
A control structure lets us change the flow of the code.
Convolutional Neural Networks are a type of neural network that are commonly used to classify images by using a weighted kernal.
Stores website preferences and personal data.
A coordinate system uses numbers as coordinates to place objects in a geometric space.
A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
A form of protection for intellectual property.
A connection between two things.
The strength of the relationship between numeric values. It determines whether or not independent and dependent variables have a relationship to one another.
Determines the strength of the relationship between numeric values.
A function that measures the performance of a Machine Learning model for given data. An example of a cost function is the least square method.
A method that counts occurrences of specific items in a list.
A variable used to count the number of times an action has been performed
A variable used to count the number of times an action has been performed.
Creates a canvas element in the document and sets the dimensions of it in pixels.
An attack in which malicious scripts are sent to users through a website.
Software that works on multiple platforms.
Cross-site scripting (XSS) is a security bug that can affect websites. If present in your website, this bug can allow an attacker to add their own malicious JavaScript code onto the HTML pages displayed to your users. Once executed by the victim's browser, this code could then perform actions such as completely changing the behavior or appearance of the website, stealing private data, or performing actions on behalf of the user.
The process of decrypting coded messages without being told the key.
Scrambling digital information into an unreadable form. Only those with verified authority (password, key, etc) can unscramble it to read it.
The science of protecting information by encrypting and transforming it into a secure format.
The practice of encrypting information so only authorized people can read it.
The practice of solving and writing encryptions
Cascading Style Sheets. The language for designing web pages and adding style.
The property-value pairs in a CSS rule that define the styling for specific HTML elements.
A CSS apply specific styling to HTML elements. A CSS rule is made of two components, selector and declaration(s).
Career and Technical Student Organization
Used to determine the cumulative probability of a value when data follows a normal distribution.
An electric current is a stream of charged particles, such as electrons or ions, moving through an electrical circuit.
Cyber attacks occur when threat actors exploit, or take advantage of, vulnerabilities to execute a malicious plan to harm a network, computer system, or organization
A cyber threat is the potential harm that could be caused by someone taking advantage of a vulnerability.
the use of electronic communication to bully a person
Identity theft, stealing money, stealing private information, controlling private computers.
Protocols for encrypting/decrypting information. Most cybersecurity breaches happen due to human error, not software bugs.
Protection of computer systems, networks, and data from digital attacks.
Have political motivations with the intent to harm, typically resulting in violence.
An admin-like web page with the functionality to manage the website
Information (numbers, words, measurements, observations, etc) that is in a computer-readable form.
A collection of numbers or data points.
A collection of numbers or data points.
The process of compiling data and presenting it in a organized format.
The process of compiling data and presenting it in an organized format.
This is when data is stored in a specific place that isn’t actively moving to other devices or networks.
The process of fixing or removing incorrect, corrupted, incorrectly formatted, duplicate, or incomplete data within a dataset.
The process of fixing or removing incorrect, corrupted, incorrectly formatted, duplicate, or incomplete data within a dataset.
Methods to gather various data points. Surveys, sensors, transactional data from credit cards, websites storing information about you, crowdsourcing data.
The process of encoding information, using fewer bits than the original representation. We can use algorithms to compress the data to use less bits for storage and then decompress it when we want to view it again.
A sequence of steps for processing and using data.
A symmetric, block cipher that groups data into 65-bit blocks and uses a 56-bit key along with an algorithm and 16 rounds of encryption.
Data extraction is the act or process of retrieving data out of data sources for further data processing or data storage.
Data Flow Diagrams are a visual representation that maps out the flow of information for any process or system.
A data structure that stores and aligns data in a table using rows and columns.
This is when data is actively moving from one location to another.
This is when data is being accessed by a person or program.
Visualizations can be misleading by skewing the axes or labels, or leaving out relevant data.
The appropriate use of data based on circumstances
how company's use your data
how a company uses your data
The process of learning about the world using data and computation.
An iterative set of steps used to analyze and interpret data.
The integrity, confidentiality, and availability of data
protecting your data online
protecting your data online
A story that is created with the intent to explain the data and why it matters.
A particular way of organizing data in our programs.
A way to classify the kind of information you can use in programming, like numbers, words, or true/false values.
Using charts, graphs, or images to visualize complex data.
Using charts, graphs, or images to visualize complex data.
Using charts, graphs, or images to visualize complex data.
Visualizations can be misleading by skewing the axes or labels, or leaving out relevant data.
An organized collection of data (e.g., text, images, videos, audio, geospatial, tabular) An electronic system that allows data to be easily accessed, manipulated and updated via a Database Management System (DBMS).
An organized collection of data (e.g., text, images, videos, audio, geospatial, tabular) An electronic system that allows data to be easily accessed, manipulated and updated via a Database Management System (DBMS).
A collection of data that is organized in a structured way.
An electronic system that allows data to be easily accessed, updated, and manipulated.
Distributed Denial of Service attack. Spam a web server with so many requests so close together that it crashes. Sometimes spitting out valuable information as it crashes.
Laws that define how we can negate an AND statement and how we can negate an OR statement
Rules that show how we can negate expressions with `and` and `or`.
Rules that show how we can negate expressions with `and` and `or`.
!(A && B) == !A || !B; !(A || B) == !A && !B
Identifying and fixing errors in code.
The decimal number system is the Base 10 number system. It is a number system that only uses 10 digits (0 through 9).
The number system we use in out everyday lives. It has 10 digits, 0-9.
A visual support tool that helps document the possible conditional statements that could be executed in a given algorithm
Declaring a variable is defining it for the first time.
Declaring a variable is defining it for the first time.
Decrease the value of a variable by one. variable--;
The conversion of encrypted data into its original form.
a video or image of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.
The default value given to a parameter when it is initialized if no value is passed in.
Defining a function means to teach the computer a new command and explain what it should do when receiving that command.
Defining a method means to teach the computer a new command and explain what it should do when receiving that command.
A measurement of a plane angle in which one full rotation is 360 degrees
The variables or data points, that are represented on the y-axis, that directly depends on the independent variable
A technique that will limit the minimax algorithm so that it only explores the game tree from the root node to a given depth
Design Thinking is an iterative process in which you seek to understand your users, challenge, assumptions, redefine problems and create innovative solutions which you can prototype and test.
Deletion or removal of a game object, including characters, from a game's world
Browser tools that help programmers diagnose problems, build and maintain secure websites.
A data structure to store key/value pairs.
One of the first asymmetric key implementations and was responsible for securing the exchange of keys.
The output from any input that has been processed through a hashing algorithm / function.
A small data file that digitally binds a public cryptographic key to an organization.
Promoting responsible and ethical online behavior.
The digital divide is a gap between those who have access to digital technology and those who don't.
The information about a particular person that exists on the Internet as a result of their online activity
The use of digital media from a computer, mobile phone, server or network as evidence in a court of law.
Digital information generally comprises data that is created by, or prepared for, electronic systems and devices such as computers, screens, calculators, communication devices and so on, and can be stored on those devices or in the Cloud
Behaving in many ways like the sun, directional lights can be thought of as distant light sources which exist infinitely far away.
How far, and in what direction, the object is from where it started.
How far an object travels.
A tag that creates a new area of content on a web page that can be styled independently of the rest of the site
A problem solving approach where you **divide** the problem into several smaller sub-problems of similar form, and keep doing so until the problems are trivially simple to solve (**conquer**)
Pretending to be a DNS name resolver. Feed your computer the wrong IP address for a given website, and your browser now goes to a false website.
Documentation is the reference for how to use different methods and classes
Written instructions detailing the functions, methods, and variables available and how to use them.
Used to translate domain names into IP addresses.
Translates names to IP addresses.
`double` is a Java type that represents a real number with decimal values
Returns the absolute value of a double value
Returns the value of the first parameter raised to the power of the second parameter
The `"` character
Returns a double value greater than or equal to 0.0 and less than 1.0
Returns the positive square root of a double value
Continuously executes the lines of code contained inside its block until the program is stopped.
The driver’s role is to control the mouse and keyboard and type out the code. They should concentrate on solving the current task while keeping the navigator’s plan-of-action in mind.
A group of files that allows a device to communicate with the computer’s operating system.
Don't repeat yourself: try to simplify your code and avoid repeating code unnecessarily.
Otherwise known as Don’t Repeat Yourself, this principle is designed to help eliminate repeated code and reduce the complexity of a solution
Don't Repeat Yourself: Simplify your HTML by grouping code into classes, stylesheets, or other types of templates
Also called late binding, this refers to Java choosing the proper method to call at run time, as opposed to at compile time.
An edge case is a problem in your code that only occurs in extreme situations.
The ability to achieve an end goal with little to no waste.
An iterative process that calculates the impact that different K values have on the structure of the dataset
The amount of electrical power used over a time period.
The transfer of energy in an electrical circuit.
Used for inspecting and making live-edits of the HTML and CSS.
A control flow tool used as a second condition check after an if statement. It is a contraction of else if.
Draws an ellipse to the screen given the x, y coordinate and the width and height (height is optional).
A statement that executes if the previous statements are false and this statement is true
Executes code only if all conditions are false
In the context of an HTML page, inserting outside content into an HTML page
Will only perform one type of task and are used in machines such as an ATM or a GPS system.
The process of hiding the implementation details of a class from the user
The process of converting information or data into a specific format that can be understood or processed by a computer.
the process of converting information or data, usually to prevent unauthorized access
A process of converting information into an unreadable form to keep it secure from unauthorized access.
An end condition is what determines the end of the game. It could be satisfying a win or loss condition, like defeating an enemy or dying, or something else like a predetermined number of rounds, levels, resources, or minutes.
The condition indicating that the end of a file has been reached
A loop that is an alternate to a for or while loop that accesses each value in an array starting at the first value and proceeding in order.
Variable created in the enhanced for loop header that contains a copy of the array variable.
A physical machine used in WWII that built on the complexity of substitution ciphers.
A triangle where all angles and side lengths are equal.
When two objects have the same properties but are not the same object.
Used by programmers to avoid revealing valuable clues to potential attackers.
An injection risk where the website returns errors that the hacker can use to explore the database more. This is the first clear test that an attacker can use to test to see if a site is vulnerable. It is usually displayed as an unhandled internal exception error. This info is meant for the developer and is not meant to go back and deliver it to a person’s webpage.
Using tools to gain higher levels of privilege.
Escape sequences are characters with special meanings.
Enable users to use special characters and actions within String objects.
The step where the algorithm randomly assigns each data point to a cluster
The moral principle that governs a person's behavior.
An event is an action (such as clicking the mouse or pressing a key on the keyboard) that a program detects and uses as input.
An action in a game that is used as input to a program
determines how the game (or website or app) responds to different events
determines how the game (or website or app) responds to different events
determines how the game (or website or app) responds to different events
user actions or a particular scenario that might trigger an action during a game in video game development (or on a website or app)
user actions or a particular scenario that might trigger an action during a game in video game development (or on a website or app); we say that events are triggered by the user
An exception is thrown by Java when a **runtime error** is encountered. The exception provides information about what kind of error occurred.
Runtime errors in a program. by default, they stop the program.
Manually converting a larger data type to a smaller one using casting syntax.
a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, etc.
The amount of the asset that would be impacted (amount of time, % of data, etc) by a threat event.
Takes a list as an argument and extends the current list with the list given as an argument.
An umbrella term for technologies that create immersive experiences by combining the real world with virtual elements.
An acronym for Free, Libre, Open-Source Software
a computer technology being used in a variety of applications that identifies human faces in digital images
A number that divides another number evenly, leaving no remainder.
a system that will operate with no interruption when one or more of its components fail
A problem when using a while loop where you forget one action at the beginning or the end.
Able to send bits from router to router across long distances, but they are very expensive.
A specific category of data within a record.
a digital container that holds information or data on a computer
A collection of data or information stored on a computer. It can be a document, a picture, or any other type of information.
A set of characters at the end of a file name that indicates the file type or format.
The suffix at the end of a filename that indicates what the type of file.
The specific way in which data is organized and stored within a file. It determines how the file can be read or processed by different software programs.
The process if reading data from a file or writing data to a file
The process of reading information from and writing information to files.
The process of receiving or reading data from a file into a computer program for further processing or use.
Software that manages data and files along with the ability to create, modify, and move these files.
A parameter used when opening a file to specify the intended operation (e.g., read, write, append).
The process of sending or writing data from a computer program to a file for storage or future use.
A string that specifies the location of a file or directory in a file system. There are two types of file paths in Java: absolute and relative.
A marker or reference that indicates the current position within a file.
The offset or index that represents the current position of the file pointer within a file.
Network attached storage that is equipped with powerful network adapters.
A method of organizing files and retrieving them from storage.
The process of writing data or text to a file.
a software routine that changes the appearance of an image or part of an image by altering the shades and colors of the pixels in some manner
Prevents variables from changing value.
Python method that returns the index at which the string is found in another string, returns -1 if not found.
An artificial intelligence model that is commonly used in games to model the behavior of a non-playable character (NPC). It consists of a set of finite states with associated transitions that occur based on certain events, which cause the character between different behaviors.
A device or software that blocks unwanted Internet traffic while allowing legitimate traffic.
A network security device that monitors and filters incoming and outgoing network traffic.
A firewall is a system that provides network security by filtering incoming and outgoing network traffic based on a set of firewall rules. The purpose of a firewall is to reduce or eliminate the occurrence of unwanted network communications while allowing all legitimate communication to flow freely.
An operating system that is permanently etched into a hardware device such as a keyboard or a video card.
Small pieces of code/data that get stored in your browser by a website that you visit
Median of the first half of the data or the 25% point.
A number can be positive, negative, or zero WITH a decimal component. 3.2; 0.0; 4.5652
A float, or floating point value, is a numeric value that can have decimal level precision (ex: 3.14)
A float, or floating point value, is a numeric value that can have decimal level precision (ex: 3.14)
A float, or floating point value, is a numeric value that can have decimal level precision (ex: 3.14)
A variable with a decimal number as the value
Converts a string into a float
Also called floats, floating point numbers represent real numbers and are written with a decimal point dividing the integer and fractional parts.
A diagram made up of shapes and arrows used to display the order of steps in a program or process.
A for loop that is written differently so that it loops through each element in a data structure, as opposed to having a loop counter variable that goes from 0 to length-1.
A for loop lets us repeat code a **fixed number of times**.
A for loop lets us repeat code a **fixed number of times.**
A for loop lets us repeat code a **fixed number of times.**
A for loop lets us repeat code a **fixed number of times**.
A for loop lets us repeat code a **fixed number of times.**
A for loop lets us repeat code a **fixed number of times.**
A for loop repeats code a specific number of times.
A push or pull on an object.
The use of science or technology in the investigation and collection of evidence in a court of law.
The size, shape, and physical specifications of any physical aspect of a computer system.
Formal parameters are the parameters outlined in the parameter list in the constructor, while actual parameters are the parameters that are input when a new instance of a class object is created.
Command that lets you tell Tracy to move forward. In between the parentheses you need to put a number to tell Tracy how far to move forward.
Un comando que te permite decirle a Tracy que avance. Entre paréntesis, debe poner un número para decirle a Tracy cuántos píxeles debe avanzar.
A single image in a sequence of pictures
The rate at which consecutive frames are captured or displayed
A p5.js system variable that contains the number of frames that have been displayed since the program started
Specifies the number of frames to be displayed every second
Client devices and applications are often referred to as the “front end” - meaning what the user actually sees.
Client devices and applications are often referred to as the “front end” - meaning what the user actually sees.
Backs up everything on your computer.
A function is like a command that you get to invent and name. It allows us to break our program into smaller parts, making the program easier to understand.
A function is like a command that you get to invent and name. It allows us to break our program into smaller parts, making the program easier to understand.
A function is like a command that you get to invent and name. It allows us to break our program into smaller parts, making the program easier to understand.
A function is like a command that you get to invent and name. It allows us to break our program into smaller parts, making the program easier to understand.
A block of reusable code that is used to perform a task.
A built-in formula that performs specific calculations.
In Python functions, the function body is the indented block of code that comes after the `def my_function():` line. The function body is what will be executed when the function is called.
In Python functions, the function body is the indented block of code that comes after the `def my_function():` line. The function body is what will be executed when the function is called.
In Python functions, the function body is the indented block of code that comes after the `def my_function():` line. The function body is what will be executed when the function is called.
In Python functions, the function body is the indented block of code that comes after the `def my_function():` line. The function body is what will be executed when the function is called.
In Python functions, the function body is the indented block of code that comes after the `def my_function():` line. The function body is what will be executed when the function is called.
Aesthetics describes the desirable emotional responses evoked in the player when they interact with the game.
The aesthetics, story, audio, information, and interactive game pieces or objects.
Blending of computer programming, graphic design, and a storyline.
A descriptive design document that organizes the design of a video game.
The technical process of converting game objectives into the actual product by writing code
Dynamics describes the run-time behavior of the mechanics acting on player inputs and each others’ outputs during gameplay.
A game's objectives, opportunities for players to make meaningful choices, game changes over the course of play, and defined rules for playing
software tools that allow developers to create video games. It houses the logic, scenes, and components developers use to create games
Video game genres are specific categories of games based on similar gameplay characteristics, story, or mechanics.
An event where game designers, artists, developers, etc. create a game around a central idea or topic
Rules, challenges, abilities, and parameters that dictate how a game functions or operates
Mechanics describes the systems, algorithms, and data representation that allow a game to function.
A company that develops video games.
Gameplay is a term to describe players interacting with a video or computer game.
a more human-like AI; versatile across various cognitive functions and tasks, having broader capabilities
A form of artificial intelligence that generates new content such as text or art
JavaScript function that returns the height of the graphics canvas
An instance method that allows the client to **get** the value of an instance variable on an object.
JavaScript function that returns the width of the graphics canvas
A Chatterbot method that takes user input as a parameter, and returns a chatbot string response
Graphics Interchange Format; an image format that allows animations
A gigabyte (GB) is 2^30 bytes (1024 MB) of binary data.
A software used to track changes during the development of code and software
A variable that can be used throughout a program, in every scope
A component designed to speed up the creation of images and output them to a display device, like a monitor.
The force caused by the attraction of one mass to another.
When the tester is limited knowledge of the target system.
The largest positive integer that divides evenly into a set of numbers.
One of Bootstrap's layout options that allows the developer to segment the web page into a table of rows and columns in which to place content
A can-do attitude in which a person views challenges and setbacks as ways to learn rather than terminal obstacles in their path to their goal
A GUI, or Graphical User Interface, allows users to interact with computers by using a mouse or touchpad to click on things like buttons, icons, and menus.
A type of interface that uses interactive graphical elements such as windows, buttons, and icons.
A specific group of hackers who are motivated by their ideological views.
False information provided by an AI
A data storage device that uses magnetic storage and rapidly rotating disks to store and retrieve digital information.
The physical components of a computer
A relationship between two items that represents an instance variable relationship.
An algorithm used to change a message into an unreadable string of text for the purpose of verifying the information.
The word hashing literally means to scramble. Hashing changes a message into an unreadable string of text for the purpose of verifying the message’s contents, but not hiding the message itself. It must be easy to compute the output (the digest) for any input, but hard to compute the input for any output. A hash function takes an input string of arbitrary length and produces a fixed- size, short output called a digest . It’s always the same length no matter how big the input is AND the output is always the same hash for any given input. Unlike symmetric and asymmetric algorithms, there are no “keys” in hashing functions.
A data structure that stores key -> value mappings.
A display device worn on your head, like a visor or goggles, that projects images directly in front of your eyes, for uses like virtual reality, and gathers input from the user.
A display that presents information to the user without requiring them to look away.
Traditionally the very first program you write when learning a programming language, a program that prints "Hello world" to the user.
The items stored can be of any type: numeric, string, boolean, etc.
A technique used to find an approximate solution, rather than trying all possible search paths
A way of representing a color from various color models using hexadecimal values
The hexadecimal number system is the Base 16 number system. It is a number system that only uses 16 digits (0 1 2 3 4 5 6 7 8 9 A B C D E F)
Number system that has 16 digits 1 - 9 and A - F.
Number system that has 16 digits 1 - 9 and A - F.
A number system that uses 16 symbols: 0-9 and A-F
A programming language has a significant abstraction from the details of computer operation.
Historical Bias is when the data is collected when the world was in a different state.
When data is passed from one network segment to another.
The number of hops it takes for data to get to its final destination.
The main, controlling account responsible for providing security updates, antivirus software and setting permissions for anyone on the same network.
Tags can have attributes that tell us more information about the tag.
HTML provides several tags for formatting text on web pages.
HTML headings are titles or subtitles that you want to display on a webpage. HTML headings are defined with the `<h1>` to `<h6>` tags. `<h1>` defines the most important heading. `<h6>` defines the least important heading.
Way to organize information with a simple structure that is easy to read and write on a webpage. There are ordered and unordered HTML lists.
Tables display information in a grid.
HyperText Transfer Protocol is a protocol that standardizes the language for talking to web servers to send and receive web pages, or HyperText information (HTML pages).
Protocol that standardizes the language for talking to web servers to send and receive web resources. Defines how computers send and receive hypertext information. (HTTPS: The “S” denotes a secure connection using HTTP.)
Protocol that standardizes the language for talking to web servers to send and receive web resources. Defines how computers send and receive hypertext information. (HTTPS: The “S” denotes a secure connection using HTTP.)
An HTTP request is made by a client, to a named host, which is located on a server. The aim of the request is to access a resource on the server.
An HTTP response is made by a server to a client. The aim of the response is to provide the client with the resource it requested.
secure data transfer protocol when on the internet
secure data transfer protocol when on the internet
The ability to perceive and interpret information, and to retain it as knowledge to be applied in the correct context
The connection between one HTML page to another HTML page
Text displayed on a computer that has links to other hypertext documents.
Operating systems that are most commonly used to run multiple operating systems on a computer system at the same time.
`id` is an attribute we can add to an HTML tag to style that specific element.
IDE Consists of a combination of tools used for software development.
An Integrated Development Environment (IDE) is a software application that provides tools for writing, running, and debugging code.
When two variables refer to the same object in memory.
Control structure that lets us run either one section of code or another depending on a test.
An if statement lets you ask a question to the program and only run code if the answer is true.
An if statement lets you ask a question to the program and only run code if the answer is true.
Executes code only if condition is true
if (boolean expression) { //execute statements if condition is true }
if (boolean expression) { //execute statements if condition is true }
An HTML page embedded inside of another HTML page
A procedure that applies a particular function to an image's pixels to change its appearance
Unable to change. Strings in Java are immutable, meaning you can't change it once you make it. If you take a substring of a String, or concatenate something to a String, the result is a *brand new* String, rather than a modification of the original.
Unable to be changed or manipulated. String are immutable.
When Java automatically casts the value correctly without the programmer needing to do so
The automatic process of transforming a variables data type. This occurs when a primitive and String object are concatenated by changing the primitive value to a String object type.
Imports the python math module functions
The process of replacing missing data with substituted values.
Keyword that helps in iteration in loops (`for letter in "hello": ...`) or to identify if an iterable (like a list or a long string) contains something (`"h" in "hello"` would evaluate to True).
Increase the value of a variable by one. variable++;
Backs up only what has changed since the last backup.
Indentation is the visual structure of how your code is laid out. It uses tabs to organize code into a hierarchy.
Indentation is the visual structure of how your code is laid out. It uses tabs to organize code into a hierarchy.
The variables or data points that shape and impact the outcome of a model, that are represented on the x-axis
Array values are stored at a particular index and we access elements in the array by referencing this index value. Index values in Arrays start a 0.
Selects rows and columns by their index location or address in the table. iloc selects exclusively.
Getting a value at a particular index in an array.
A String object has index values from 0 to length – 1. Attempting to access indices outside this range will result in this error.
A loop that has no way of stopping, and will keep looping forever.
Occurs when the expression in a while loop never evaluates to false. The program continues to run infinitely.
Infinite recursion occurs when the base case can never be reached.
Created when a collection of data is organized or structured.
Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.
When a subclass extends a superclass, the subclass inherits all of the static methods, static variables, and public instance methods of the superclass. This is called inheritance.
When the tester is first able to gain access into the target system.
Initializing a variable is giving it an initial value.
Initializing a variable is giving it an initial value, or a starting value.
Searches through the specific column and keeps ONLY the rows that have a matching value.
Any data or information that is received or entered into a computer system, such as typing on a keyboard or reading from a file.
A device used to give commands or send information to a computer
Input devices are computing devices that are used to take in information from a user or another device.
A general term in programming that refers to the flow of information into and out of a program
A programming technique used to validate the input from the user. The code will check the data that the user inputs and make sure it fits certain criteria. This ensures that only the correct type of value is used within the input field.
A function that prints a prompt and retrieves text from the user.
Sorting algorithm that sorts an array of values. The idea behind insertion sort is to have a sorted part of the list and an unsorted part. On each iteration of the algorithm, we grab the next unsorted element and place it in its proper position in the sorted section.
A sorting algorithm that shifts the already sorted section of an array to place the current array value in the correct index.
A browser's built in functionality that allows the programmer to look at and temporarily modify the code that defines the website
Instance is what you call a specific object constructed from a class. Instance and object generally refer to the same thing. An object is a specific instance of a class.
A created object with defined attributes.
An instance method is a method that defines the behavior of an object. It defines an action that the object can perform.
A variable defined in a Class, for which each object of the class has its own copy.
Used to store the state, or data of the object instances.
Create an instance of a class object.
`int` is a Java type that represents an integer (a whole number)
Returns the absolute value of an int value
Returns a value < 0 if this is less than other; returns zero if this is equal to other; returns a value > 0 if this is greater than other
Returns the index of the first occurrence of str; returns -1 if not found
Returns the value of this Integer as an int and this Double as a double
Returns the number of characters in a String object
Converts a string into an integer
A number can be positive, negative, or zero WITHOUT a decimal component. -50; 0; 5
A positive or negative whole number.
These classes are part of the java.lang package and Object class and have a number of useful methods.
These classes are part of the java.lang package and Object class and have a number of useful methods.
When two integers are divided, the decimal values are truncated, or chopped off.
When a value higher than the maximum or lower than the minimum is used which can result in logic errors.
An error that occurs when the result of an integer operation does not fit within the allocated memory space.
A variable with a whole number as the value
Constructs a new Integer object or a new Double Object that represents the specified int or double value
The highest value Java is able to access. 2147483647
The lowest value Java is able to access. -2147483648
The minimum/maximum value represented by an int or Integer, which are -2147483648 and 2147483647
A positive or negative whole number.
Aims at ensuring that information is protected from unauthorized or unintentional alteration.
The ability to make adjustments and assumptions in order to inform future decisions
An interactable object is a special game object specifically designed to respond to VR controller input. These objects go beyond just visuals and have programmed behaviors that trigger when a player uses their VR controllers to perform actions like grabbing, selecting, or activating them.
An interface provides a list of methods that *must* be defined if a class chooses to implement the interface.
Acts as a “middle-man” between the root certificate and the server certificate.
A philosophy of making information and knowledge open and accessible to all people. A network of networks built on open, agreed upon protocols.
The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
A protocol that defines the structure of an Internet address and assigns a unique address to every device on the Internet.
Standardizes the layout of all packets. All packets must have a destination IP address, a from IP address, and the actual data being sent. Defines the layout of a SINGLE packet.
A temporary job or position with a company or organization that allows you to gain practical skills and knowledge in a particular field.
The tendency to interpret situations and analysis in a positive or negative fashion.
Translates and executes program code line by line into machine code.
A program that directly executes the instructions in a high-level programming language without requiring them to have been compiled into machine language.
The difference between the first and third quartiles. Indicates how spread out the middle 50% of the set of data is. Helps to avoid outliers affecting the data.
Intrusion detection systems (IDSs) are available in two different types: host-based intrusion system (HBIS) and network-based intrusion system (NBIS). An IDS tries to detect malicious activity such as denial-of-service attacks, port scans and attacks by monitoring the network traffic.
the act of switching colors along the color wheel
the act of switching colors along the color wheel (red to green, blue to orange, etc.)
With respect to images, a filter that replaces pixels' color, hue, or brightness with their inverse. The result is light areas become dark and/or colors are replaced with their complementary color
The protocol that defines the payout of an an Internet address.
The protocol that defines the payout of an an Internet address.
The unique address that is assigned to each device connected to the internet. It is part of the Internet Protocol.
The original IP protocol that was created in the 1980s.
The original 32 bit IP protocol that was created in the 1980s.
A new 128 bit version of the Internet Protocol.
A relationship between two items that represent a superclass / subclass relationship
`islower()` method returns `True` is a string is all lowercase letters and `False` if otherwise.
`isupper()` method returns `True` is a string is all uppercase letters and `False` if otherwise.
Looping through all of the elements of an array
Repetition of instructions a specified number of times, or until a condition is met.
Documentation showing the syntax and examples for how to use the various features of Java.
Includes the class and main method arguments. Must include both in order to run successfully.
A specific standard for commenting Java programs. Javadoc is a format to follow when commenting in order to clearly explain your code.
/** 1. One sentence description of code’s function. 2. Preconditions 3. Postconditions 4. Block tags */
A computer programming language
a computer programming language
a computer programming language
an object-oriented computer programming language commonly used to create interactive effects within web browsers.
Documentation for the syntax and objects in Javascript that we use on CodeHS.
The `join()` method takes all items in a collection and joins them into one string
Typically a very large container at the top of a web page that showcases the most important information
An iterative clustering algorithm that uses an expectation-maximization approach to separate the data into clusters
Documentation for all Karel Commands and Syntax.
Documentation for all Karel Commands and Syntax
A key is the value used to look something up in a HashMap
A shared secret that allows the recipient to convert ciphertext into plaintext.
Numeric values that correspond to physical keys on the keyboard
A key event is when the user does presses any of the keyboard keys.
A method in cryptography by which keys (public or private) are exchanged between two parties.
A method in cryptography by which keys (public or private) are exchanged between two parties.
A kilobyte (kB) is 2^10 bytes (1024 bytes) of binary data.
Pulls meaning from information by analyzing the organized data and generating insights.
Selects rows and columns by their label or name in the table. loc selects inclusively.
are machine learning models that can comprehend and generate human language text.
The latency of a system is the time it takes for a bit to travel from sender to receiver. Fiber optic cables have low latency.
refers to an external mechanism of control
A distinct level in a networking framework that carries out specific functions.
A statistical formula that is able to determine the total distance between all data points and their respective place on the predicted line
Keeps all of the left data frame, searches through the specific column and adds in the data that have matching values in the right data frame.
turns Tracy left at a specified angle
Command that tells tracy to turn left and in between parentheses, how many degrees to turn left.
The laws and regulations that govern the use of a resource or activity.
A collection of commands and functions that are used to extend the base language.
A collection of modules and packages.
The line, or linear equation that best expresses the relationships between all data points. A line is considered to be the best fit if it has the smallest total distance from each data point.
The line that best expresses the relationship between all data points.
Draws a line (direct path between two points) to the screen. The first two parameters x1, y1 control the position of the first point and the last two parameters x2, y2 control the position of the second point.
An attempt to create a linear relationship between two correlating variables.
A machine learning model that attempts to create a linear relationship between the inputs in an algorithm to the expected output
An algorithm that searches data sets in a sequential order, checking each value from the 0th index to the end of the data set to see what index a specific element can be located at.
Also called sequential search, a search algorithm that searches for a given value in a list of values. Linear search is less efficient than binary search.
An open-source and community-developed operating system.
Also called an array. A data structure that holds a collection of values in a particular order
A heterogenous, **mutable** data type that stores an ordered sequence of things.
Python concept used to construct lists in a concise manner.
Accessing certain elements in a list
A Java Interface that represents a general List. The interface provides a list of methods that classes should implement if they want to be used as a List.
A Chatterbot module that can be used to train a chatbot to respond to conversations
The fixed value being assigned to a variable. Often primitive data types.
a network of devices that all exist within a single building or group of adjacent buildings
Software installation that is performed on a local area network (LAN).
Persistent storage; should be encrypted.
A variable that is defined in a method or constructor. It only exists in the context of the method that it belongs to.
A variable that is restricted to use in a certain scope of a program
Software installation that is performed on your local computer.
The property that controls whether or not you can select an item in the main game area
A file that records events that occur in an operating system (or other software) and/or messages between different users of a communication software.
The science of reasoning - it studies the formal thought processes of making decisions and developing arguments
errors where the expected result does not match the actual result; these errors are due to mistakes in coding logic and will not be detected by the compiler
A logical operator that returns true if both conditions are true
Compares the data of the objects instead of the value of the references. Uses the .equals() method.
Logical gates are physical circuits that implement logical operators.
A logical operator that negates a Boolean value, turning true into false and vice versa
Used to make logical associations between boolean values
Used to make logical associations between boolean values.
Used to make logical associations between boolean values.
Can be used to connect boolean expressions to make more complex expression. NOT ! AND && OR ||
A logical operator that returns true if at least one condition is true
Used to make logical associations between boolean values.
A supervised learning classification algorithm used to predict the probability of a target variable
Variables used to control the execution of the loop, typically defining the start, end, and step of the loop
A loop, most often set with while(true), that has a break in the loop body.
A loop, most often set with `while(true)`, that has a `break` statement in the loop body.
Looping through an array is the process to loop through an array and access each of the elements. Caution must be taken to avoid looping beyond the valid index values.
Learning how to automate repetitive tasks with loops
A loss condition is a state that determines when a player loses the game.
Lossless Compression involves no loss of information. If data have been "losslessly" compressed, the original data can be recovered exactly from the compressed data after a compress/expand cycle.
Throwing away some of the data to save space. We can throw away a lot of data without any noticeable difference from the original.
A programming language, generally machine code or assembly language, that provides little or no abstraction from a computer's instruction set architecture
Python method that changes letters to lowercase.
`lowerCamelCase` is a naming convention where the first letter is lower case, and each subsequent start of a word is upper case.
the programming language used for scripting on Roblox
a computer programming language consisting of binary instructions
The lowest-level programming language, consisting of binary code that is directly executed by a computer's CPU.
A branch of artificial intelligence focused on building applications that learn from data.
Machine learning is a field of Artificial Intelligence that uses inputs and outputs to create computer models that teaches a computer to have intelligence.
A number in your code that appears arbitrary. These should all be replaced with calculations or constants.
Any type of software that is designed to intentionally harm or damage a computer or network.
Occurs when someone secretly intercepts communications between two parties by impersonating one or both parties.
Occurs when someone secretly intercepts communications between two parties by impersonating one or both parties.
Uses tags to format and define elements within a document. The tags are not shown when the document is displayed.
The amount of matter an object has.
The Math class is part of the java.lang package and contains only static methods.
Can be manipulated to produce a random int or double in a defined range.
Math function that takes the square root of the inputted parameters
Reduce the image by selecting a maximum value for a smaller grid
The step where the algorithm calculates the centroids by finding the center between all of its cluster data points
In minimax, maximizing refers to a player who is looking for their own optimal move.
the "average" of a range of numbers, where you add up all the numbers and then divide by the number of numbers.
The central value between numbers.
Used to describe how data is spread. It also describes the variability of the dataset.
Measurement Bias is when measurement accuracy varies across the data, usually from when it is collected from multiple sources.
the middle value in a range of numbers.
The middle value in an ordered list.
Accounts for a relationship between two other variables.
A megabyte (MB) is 2^20 bytes (1024 kB) of binary data.
a humorous image or video that is copied and spread; usually consists of an image and witty caption
A snapshot of all information captured in a system’s Random Access Memory (RAM).
Merge sort is a recursive sorting algorithm that can be used to sort elements in an array or ArrayList.
A recursive sorting algorithm that sorts an array of values more efficiently than Selection Sort and Insertion Sort using a Divide and Conquer approach.
a set of data that describes and gives information about other data.
Data about data.
Procedures that allow us to control and define the behavior of an object.
A method is a way to teach the computer a new command
The part of the method that contains the commands
The process of breaking down large problems into smaller problems, each with a method that defines a subproblem in the larger problem.
Methods can have multiple signatures. Java will use the correct signature based on the actual parameters used in a program.
Classes can have multiple methods with the same name, as long as the parameters to those methods are different. Doing this is called "overloading" a method.
If a subclass defines a new method body for a method defined in the superclass, then the subclass has **overridden** the method of the superclass.
A method's **method signature** is the name of the method and the parameter list.
Defines what an object can do.
An operating system that uses a graphical user interface designed by Microsoft for use on desktops and laptops.
a technical standard that allows electronic musical instruments, computers, and other devices to communicate and synchronize with each other
Multipurpose Internet Mail Extensions (MIME) is a standard for formatting files of different types.
in computer programming languages and especially JavaScript, is the process of removing all unnecessary characters from source code without changing its functionality.
A decision method designed to minimize potential losses and maximize potential gains for a given player
In minimax, minimizing refers to an opponent who is looking for their optimal move.
The simplest form of a program or game that has just enough features to make it usable.
false or inaccurate information, especially that which is deliberately intended to deceive.
An operating system used on mobile devices, such as a mobile phone or tablet.
The value that occurs the most.
the number that is repeated more often than any other.
A set of rules for how things interact within a simulation.
A network device that allows a device to connect to the Internet.
A third variable that affects the strength (or direction) of a relationship between an independent and a dependent variable.
The process of varying a signal to transmit data.
A file containing Python definitions and statements.
Finds the remainder after division of one number by another (sometimes called modulus). Example: 14 ➗ 4 = 3 remainder 2 14 mod 4 = 2 14 % 4 = 2
Represented with "%" it returns the remainder of the division between two numbers. For example, `14%5` would return 4.
The modulus operator (written as % in most programming languages) divides two numbers and returns the remainder.
An observation that the processing speed of computers is doubling every year. This is *exponential* growth. Computers are getting smaller and faster at an exponential rate.
A circuit board with ports and sockets used to connect the main devices of a computer.
A mouse event is when the user does something with the mouse, like clicking or moving.
A system variable that tracks of which mouse button is pressed. Its value can be either LEFT, RIGHT, or CENTER depending on which button was pressed last
A system variable that contains the current horizontal position of the mouse
A system variable that contains the current vertical position of the mouse
Will secure multiple domains.
/* This is a multi- Line comment*/
(MFA) An extra layer of authentication that requires two or more factors for authentication. Typically, these factors fall into three categories: something you know (password), something you have (such as a phone), or something you are (such as your fingerprint).
an instrument designed to measure electric current, voltage, and usually resistance, typically over several ranges of value.
a model that is capable of processing information from multiple types of data, including images, videos, and text
A machine learning model for predicting the value of one dependent variable based on two or more independent variables
generated animated imagery based on a piece of music.
When something is changeable or has the ability to change.
A method that enables user to change the value of an object’s instance and static variables.
Methods used to change or manipulate instance variable or object data. Also referred to as setter methods.
a namespace is the collection of variable names that exist at a certain point in your code.
AI that is built for a specific purpose and excels in its limited domain
Sponsored by and funded by a government with the goal of giving their country a competitive advantage on a global scale.
The way humans communicate with each other, like English, Spanish, or Mandarin.
A model that is designed to understand and process human language.
An algorithm that takes voice input and translates it into text
Short for `navigation bar`, it contains a series of links that the user can use to visit the main parts of a website
The navigator’s role is to read the problem and narrate the plan-of-action. The navigator should be checking for typos or other errors as the driver produces code to catch them as soon as they arise and before they cause further errors. They should also be actively thinking of alternative, more efficient ways to solve the problem.
Subtractive modeling tool used to remove a portion of one model using the shape of another
To flip a boolean value, or take the opposite of a boolean value. If you negate true, you get false. If you negate false, you get true.
As one variable increases, the other variable decreases.
It is possible to combine more than one of Python's control structures to create more complex programs with various conditions. For example, combining iteration tools like a for loop with conditional statements inside the for loop.
A for loop written, or "nested", inside of another for loop.
A for loop written, or “nested”, inside of another for loop. For example:
A nested function is a function that is defined inside another function. This should be avoided.
The process of placing if statements within if statements.
When a loop is placed within another loop. The total number of runs for a nested loop will be the outer loop * inner loop.
A group of two or more computer systems linked together.
An internal component of a computer that is used for communicating over a network.
An electronic device which is required for communication between devices.
A component with a built in wired network port that allows the computer to connect to a network.
A location where information is sent from one computer to another.
Protocols for data sharing on the internet that define rules and conventions for communication between network devices.
Storage that contains one or more drives that can be accessed over a network.
A type of machine learning that uses a computational model that uses nodes inspired by the structure and functioning of the human brain and learns by trial and error.
Necessary keyword for instantiating a new class object.
A character used to represent the end of a line of text and the beginning of a new line
A special character that represents the end of a line within a text file. In Python, the newline character is represented as \n.
Enables short-range communication between compatible devices.
Nmap (Network Mapper) is a free and open source tool that scans systems over a network and provides a wealth of information about them, such as their open ports.
A character in a game that is controlled by an artificial intelligence (AI) agent rather than a player.
Ensures that one cannot deny having sent or received a message.
Non-sequential Programming refers to a programming paradigm where programs can have multiple tasks being completed at once or out of sequential order.
Storage that is saved and available even when the system is shut down.
A frequency distribution that fits a bell-shaped curve symmetrical about its mean.
Logical operator that negates a single boolean value. Written as `!`. `!a` will be true if `a` is false, and false if `a` is true.
Logical operator that negates a single boolean value. Written as `!`. `!a` will be true if `a` is false, and false if `a` is true.
A keyword that indicates a reference object doesn’t point to any object data.
Before an object variable is initialized, it doesn't point to any memory. It holds a **null pointer**.
The number base of a number system defines how many digits are in the number system, and the base of the exponent for each place value in a number.
A number system defines how we represent numbers. It defines which digits we can use, and what value each position (place value) in a number has.
Defines how we represent numbers. Which digits we can use, and what each position (place ) in a number means.
Defines how we represent numbers. Which digits we can use, and what each position (place ) in a number means.
Defines how numbers are represented, which digits are used, and what each position (place) in a number means.
Python library that provides a collection of mathematical functions and arrays.
A video game where players navigate a character through a series of obstacles
An object is a variable of a data type that is user defined. Every object has a state and a behavior.
An object is a variable of a data type that is user defined. Every object has a state and a behavior.
Can store combinations of keys and values where the value can be accessed by its associated key.
Also called a dictionary or map. Lets us store pairs of keys that are matched with a specific value.
An object is a single instance of a Java class. An object has both state and behavior.
Programming model that focuses on **objects** and the data and actions associated with the objects.
The use of object and class types in programming.
The Object class is the superclass of all other classes in Java.
Instance variables can be accessed directly by using the reference variable name + . + the instance variable name. This only works within the class file if the instance variables are set to private.
A triangle where one angle is greater than 90 degrees.
The octal number system is the Base 8 number system. It is a number system that only uses 8 digits (0 through 7).
When a for loop iteration is off by one too many or one too few.
Current is directly proportional to voltage.
Software that is available for anyone to access and modify.
A function that reads in a file into a program
The action of establishing a connection between a file and a program to perform read or write operations on the file.
The primary software that runs applications and manages all the hardware, memory and other software on a computer.
The primary software that runs applications and manages all the hardware, memory and other software on a computer.
Logical operator that ORs two boolean values. Written as `||`. `a || b` will be true if `a` or `b` is true.
Logical operator that ORs two boolean values. Written as `||`. `a || b` will be true if `a` or `b` is true.
The order in which mathematical expressions should be evaluated. Starts with Parentheses, Exponents, Multiplications and Division, Addition and Subtraction.
A conceptual framework used to understand and standardize the functions of a telecommunication or computing system without regard to its underlying internal structure and technology.
Searches through the specific column and keeps ALL of the rows in each data frame while merging matching rows.
Data points that stray away from the given pattern can impact the line of best fit, causing the accuracy of the model to decrease
The result or information produced by a computer system, such as displaying text on a screen or saving data to a file.
A device a computer uses to show or present information to a user
Output devices are computing devices that are used to send computer data to the user.
When a calculation relies on a number outside the acceptable number range, Java will wrap back to the MIN or MAX value depending on the value.
When a class has more than one constructor with the same name, but different parameter lists.
When a class has more than one constructor with the same name, but different parameter lists.
Override a method occurs when a subclass has the same method signature as a superclass. When a method is overridden, Java uses the method from the subclass.,
The action of replacing the existing content of a file with new data.
Open Web Application Security Project; highly-regarded organization and much used by cybersecurity professionals.
A free and open-source JavaScript library for creative coding, with a focus on making coding accessible and inclusive for everyone
A collection of, and blueprint for, sprites with similar traits and behaviors.
A JavaScript library for creating interactive art and games with a 2D physics engine.
A structure that allows you to easily create sprites on a grid-like layout of the canvas.
Related classes are grouped together into packages.
Packages are used to group code into a folder for easy use.
Packages are used to group code into a folder for easy use.
A collection of related modules.
The practice of gathering, collecting, and logging some or all packets that pass through a computer network.
Packets are the units of data that are sent over the network.
Taking some variables and packing them into a list.
Pair programming is a collaborative programming practice where two programmers work together at one computer on the same piece of code.
Completes multiple tasks at a time, simultaneously.
A variable passed into a method from outside the method.
piece of data provided as input to change the specifics of a program
Pieces of information you can give to functions when you define them. When the function is called the arguments are the data you pass into the function's parameters. Parameter is the variable in the declaration of the function. Argument is the actual value of this variable that gets passed to the function.
The rules of order used to keep meetings running smoothly and efficiently
A component system in Unity that allows you to simulate moving particles in your scene.
Collecting information about a target without directly accessing the system (social media, news, website, etc).
A type of authentication that is similar to a password but longer and is usually a sentence or a series of words
Tools that store and manage passwords for various accounts, generating strong passwords and auto-filling login credentials.
Updates that address and fix security vulnerabilities within a program or product.
Chatbots that are able to analyze user text and respond to users based on a set of established responses
A statistical equation that seeks to determine the variability of a variable, or how standard its change is, compared to the product of their standard deviations.
When a company hires a white hat hacker to assess the security of a system by finding and exploiting vulnerabilities.
As one variable changes, 100% of the time the other will change the exact same amount
As one variable changes, 100% of the time the other will change the exact same amount.
any data that can be used to identify an individual, such as their name, address, or social security number
A cybercrime in which a person is contacted by email, telephone or text message by someone who is posing as a legitimate company.
The usage of deceptive emails and websites to maliciously gather personal information
A special part of a computer program or a tool that makes objects in a virtual world act like they would in the real world.
Using a compromised trusted system to gain access to a target system within the same network.
Images are made up of pixels, which are essentially a grid of values. Each value, or pixel, encodes the color at that position in the image.
Images are made up of pixels, which are essentially a grid of values. Each value, or pixel, encodes the color at that position in the image.
An image can be represented as a grid of values. Each value encodes the color at that position in the image.
Clear images or graphics that are generated by HTML on a website or email that are used to track users
Ordinary, readable information.
An operating system such as Windows, Mac OS, Android or iOS.
A device that will be recognized by your computer and install on its own.
A point light is located at a point in space and sends light out in all directions equally.
When an object is assigned to a variable, the variable doesn't hold all of the object's data, it only holds a *pointer* to the object's data. The variable holds a memory location (think of it as a pointer to that memory location), and the object data is stored at that memory location.
Polymorphism is the capability of a method to do different things depending on which object it is acting upon.
An object can take on different forms depending on its implementation. Java can call the correct method even when an object is disguised as a more generic reference type
An object can take on different forms depending on its implementation. Java can call the correct method even when an object is disguised as a more generic reference type
An art movement in the 1950s that is characterized by pop culture imagery such as celebrities and advertisements.
Checks to see which ports on a network are open.
A collection of your best work, such as projects, artwork, or writing samples.
What should be true after a method is called
Conditions that must be true after the code segment is executed.
As one variable increases, the other variable increases.
the science of improving crop yields and assisting management decisions using high technology sensors and analysis tools
Assumptions we make about what must be true before the function is called.
Assumptions we make about what must be true before a method is called.
Conditions that must be true prior to execution in order for that code segment to behave as expected.
A form of artificial intelligence that uses what it has learned to predict an outcome
Pretending to be someone else to gather sensitive information. Involves researching the victim's background and gaining their trust.
Primitive types are the basic, simple data types that are inherent to Java (int, double, char, and boolean)
Displaying text on the screen
Print Displaying text on the screen.
Prints values in the console
Prints values in the console
JavaScript function that prints out a line to the user
Legal document outlining how a company can collect and use your data
Legal document outlining how a company can collect and use your data
Restricts access to data and methods to the declaring class.
Used to determine the probability of a value when data follows a normal distribution.
Applying computational thinking to real-world challenges.
The ability to use methods and programs that we do not fully understand, or are unable to write.
A flexible software sketchbook and a language for learning how to code within the context of the visual arts
The organization that supports Processing and p5.js
The amount of time a computer spends processing program instructions.
The electronic part of a computer that executes the instructions that are passed to it by the operating system. It’s also called a CPU, or central processing unit.
Introduction to coding and creating simple programs.
A programming language is any set of rules that converts strings, or graphical program elements in the case of visual programming languages, to various kinds of machine code output.
A set of instructions (commands) and rules used to communicate with computers. Examples include Python, JavaScript, and HTML.
The way your code is written is the style. It covers the aspects of the code that goes beyond whether or not it just works.
A professional responsible for planning, organizing, and overseeing the successful completion of a project within a specific timeframe and budget.
the practice of designing inputs for AI tools that will produce optimal outputs.
the practice of designing inputs for AI tools that will produce optimal outputs
a method used to trick an AI tool, such as ChatGPT or Bard, into bypassing its normal restrictions
An attack where hackers manipulate generative AI systems by feeding them malicious inputs disguised as legitimate user prompts.
The variables that are attached to the object.
Software that is owned by an individual or company.
An agreed upon set of rules that outlines how to communicate or send information.
A widely agreed upon set of rules that standardize communication between machines.
A set of rules or procedures for transmitting data between electronic devices. In order for computers to exchange information, there must be an agreement as to how the information will be structured and how each side will send and receive it.
A set of rules or procedures for transmitting data between electronic devices. In order for computers to exchange information, there must be an agreement as to how the information will be structured and how each side will send and receive it.
A set of rules or procedures for transmitting data between electronic devices. In order for computers to exchange information, there must be an agreement as to how the information will be structured and how each side will send and receive it.
A model designed to demonstrate the most basic functionality or basic design of a product, sometimes used as a proof of concept
An intermediary between the user and the Internet that takes requests from the user and returns a response.
A set of steps that uses the structural conventions of programming but is intended for human reading.
Not actually random, but appears to be random
Allows access to data and methods from classes outside the declaring class.
Class. The name of MyProgram must match the name of the file.
A work that has been dedicated to the public.
Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
Public key encryption is a type of asymmetric key encryption. There’s one key that encrypts the information and there is a different key that decrypts the information.
Main method. Code to be run must be placed within the main method.
To prepare software or a video game for public release or sale.
The square of the hypotenuse equals the sum of the squares of the other two sides on a right triangle.
Relationship between three sides of a right triangle: a^2 + b^2 = c^2
Popular programming language
Popular programming language
A widely used programming language that is beginner friendly. Google, YouTube, and CodeHS are among the many companies that use Python to build their products.
Data that can be divided into different categories.
Risk assessment that gives a numerical (typically monetary) value to the impact of a threat occuring.
Risk assessment that defines an event’s level of risk in words rather than numbers which is determined by the potential level of impact and the likelihood of occurrence.
A professional who finds and fixes bugs in a product or program before its launch, collaborating with developers on fixes to those problems when necessary.
Numerical data that can be counted or measured.
Let you quickly perform an action on a table in a database like apply changes or retrieve information.
A question (noun) or to ask a question (verb) - often in relation to a database.
A request for information from a database.
Used to make queries, or searches, in databases and information systems.
A value that indicates how well the model fits the data, where 1 is a model that perfectly fits the data and 0 represents a model that doesn’t fit the data at all.
A situation when a device or system has two or more operations running at the same time that must be completed in proper sequence.
the SI unit for measuring angles
The SI unit for measuring angles
Remote Authentication Dial-In User Service (RADIUS) is a client / server protocol and software that enables remote access servers to communicate with a central server to authenticate users and authorize their access to the requested system or service.
The length between the center and edge of a circle
A fast type of computer memory which temporarily stores all the information your device needs right away.
The difference between the largest number and the smallest number. The larger the range, the larger the spread or dispersion.
Ransomware is a type cyber attack that threatens to publish the victim's data or block access to it unless a ransom is paid.
A software that prevents users from accessing their files or network until a ransom is paid.
A ray refers to an invisible line extending from a VR controller, typically in the direction the player is pointing.
Programs that "Read like a story" have good decomposition and make the code easy to follow.
Programs that “Read like a story” have good decomposition and make the code easy to follow.
A file access mode ("r") that allows reading the contents of a file but does not permit modifications.
A file access mode (“r”) that allows reading the contents of a file but does not permit modifications.
non-volatile memory; this information lasts even after you turn off your computer. The data is coded to not be overwritten.
A method used to read the contents of a file. It reads the entire file or a specified number of characters and returns them as a string.
Java method that lets us read in a true or false value input from the user
Java method that lets us read in a decimal value input from the user
Actions performed to extract data or content from a file.
Java method that lets us read in an integer input from the user
Java method that lets us read in a line of input from the user as a String
A method used to read a single line from a file. It returns the line as a string, including the newline character at the end.
A method used to read multiple lines from a file and return them as a list, where each line is represented as an element in the list.
A single entry in a database table.
Draws a rectangle to the screen given the x, y coordinate and the width and height (height is optional).
A recurrent neural network is a form of a neural network that uses a feedback loop to help "memorize" previous inputs to provide context for additional inputs.
At a high level, recursion is when a function (or method) calls itself.
An iterative process where a method calls itself.
The recursive case is the general form of the recursive problem. In this case the problem needs to be broken down by one step toward the base case, and the algorithm makes a recursive call to itself to solve this slightly smaller problem. This process repeats until the base case is reached.
When multiple paths exist between two points. This improves reliability and makes the internet fault tolerable. Makes the routing system scalable.
Equality operator (==) compares the references (addresses in memory) of 2 objects
Reference variables store the address of the value
A form of machine learning where a computer agent learns to make decisions by interacting with its environment and receiving feedback.
== , !=. <. > , <=, >= These allow for the comparison or primitive type values. The result of these expressions can be stored as a Boolean value.
Specifies the path relative to the current working directory
removes the first occurrence of the element with the specified value.
This function removes an element from the given index position.
Representation Bias is when the data used for training doesn't represent the population that the model will serve.
Resistance is a measure of the opposition to current flow in an electrical circuit
Recreation of a game object or character after its death or destruction
A website in which the parts of the webpage react and possibly reorder or hide when the window changes size
The final solution vector when doing vector arithmetic.
A document that lists your experiences, skills, and achievements.
Keyword used in methods to return a value back to the initial program that called the method.
Exits a function, optionally passing back an expression to the caller. A `return` statement with no arguments is the same as `return None`.
Used to return a value back to the main program from a method.
The `return` statement exits a method and returns a value.
A method's return type is the type of value returned from that method.
Indicates what type value is being returned from the method
The value returned from a function when the function is called.
The value returned from a method.
The value returned from a function.
Working backwards through an encryption to unveil the input, or the key.
reverses the sorting order of the elements.
whenever you can work backwards through an algorithm (like a Caesar cipher)
The RGB encoding scheme allows us to encode colors as numeric data. It defines the amount of Red, Green, and Blue light in a pixel. Each color channel can have a value between 0 and 255.
A color model in which red, green, and blue light are added together in various ways to reproduce a color
The RGB encoding scheme allows us to encode colors such as numeric data. It defines the amount of Red, Green, and Blue light in a pixel.
The bone structure of a 3D model.
Keeps all of the right data frame, searches through the specific column and adds in the data that have matching values in the left data frame.
A triangle that includes one 90 degree angle.
turns Tracy right at a specified angle
Command that tells tracy to turn right and in between parentheses, how many degrees to turn right.
A component that allows the object to be affected by simulated gravity and other forces.
The potential for loss when an attack happens.
Risk response that accepts the risk as is.
The process of identifying, assessing and prioritizing potential risks for an organization or company.
Risk response that removes the risk by avoiding the behavior completely.
Risk management is the process of identifying, evaluating, and addressing an organization's cybersecurity threats.
Risk response that takes steps to avoid the risk or minimize the impact or likelihood.
Risk response that shares the responsibility of the risk with someone else.
an online platform where millions of people gather to imagine, create, and share experiences with each other in immersive, user-generated 3D worlds
A cross-platform hub for playing, creating, and sharing video games and experiences online.
a website, hub, and app where users access games and experiences
a game engine and developer tool used to create and code games, worlds, and experiences for the Roblox Client
Belongs to the Certificate Authority.
Rotates or turns the pre-image around an axis
Rotates or turns the shape around an axis
The difference between the calculated approximation of a number and its exact mathematical value due to rounding.
Reducing the number of decimal places in a number, sometimes involving casting.
A wireless access point that allows for network management and security configuration.
The process of sending data between two computers on the internet. The data is sent through routers that determine the route.
A list of specific routing destinations; essentially a map for the router.
One entry in a table. Each row has an ID that is unique to the table.
One entry in a table. Each row has an ID that is unique to the table.
A horizontal line of cells.
The process of traversing a 2D array by accessing all elements in a row before moving on to the next row.
The ordering of 2D arrays is row-major order, meaning the first index is the row, and the second index is the col. `arr[2][0]` would access the element on the third row and first column.
The first widely used asymmetric algorithm used for both signing and encryption.
A chatbot that provides users with a series of limited options that they can choose from to get more information from the chatbot. Rather than support a true conversation, rule-based chatbots tend to provide information and services that follow strict rules.
An error that happens while the program is running. Even if the code is written with the proper syntax, there are things that can go wrong while the program is running.
A measurement that has only a magnitude (no direction).
Expands or contracts the shape
The process of normalizing the range between different variables in a dataset
A class within java.util. It contains code specifically designed to help with user input.
A class within java.util. It contains code specifically designed to help with user input.
one image in a series of images that make up a GIF
How we define what is stored in a table.
Defines which part of the program a variable can be accessed from.
Lines of code
A program that is interpreted or run by another program rather than the computer processor.
A script is a program that is interpreted or executed by another program rather than by the computer processor.
Uses a series of commands within a file that is capable of being executed without being compiled.
An algorithm that starts at the root of a search tree and explores its nodes to find a node that satisfies the conditions mentioned in a search problem
An agreed upon set of rules and permissions.
Used for debugging issues and checking the website’s digital certificate.
A statement in SQL that allows you to ask for a row or multiple rows from a table in a database. SELECT * FROM House; (SELECT and FROM are key words, meaning they can’t be used for anything else like table names, column attributes, etc.) * chooses every column in the table; House is the name of the table SELECT name FROM House (returns the House table with only the name column) SELECT name, id FROM House (returns the House table with the name and id columns)
A statement in SQL that allows you to ask for a row or multiple rows from a table in a database.
Using a condition to determine which part of an algorithm is executed.
Sorting algorithm that takes an array of values and sorts it. The idea is to have a sorted part of the list and an unsorted part. On each iteration, selection sort finds the lowest value in the unsorted section of the list and adds it to the end of the sorted part.
A sorting algorithm that swaps the minimum value left in an array with the current array index.
Defines which HTML elements a CSS rule applies to.
An HTML5 tag that defines the content and structure of a web page
A constant that has the specific purpose of being the value that breaks out of a loop.
A constant that has the specific purpose of being the value that breaks out of a loop.
Sequencing, or sequential execution, is step by step execution of instructions in the order they are given.
Understanding the importance of step-by-step instructions in programming
A search technique that starts at the first element and goes through each element until it finds the target value.
sequential programming refers to programs that are executed sequentially – once through, from start to finish, without other processing executing.
A one-dimensional, labeled array (or list) that is formatted like a single column of a data table.
A server computer program or application provides functionality for client programs or devices. So a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client.
A server computer program or application provides functionality for client programs or devices. So a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client.
Issued to the domain.
Examples of servers include web servers, mail servers, and file servers. Each of these servers provide resources to client devices. Most servers have a one-to-many relationship with clients, meaning a single server can provide multiple resources to multiple clients at one time.
Examples of servers include web servers, mail servers, and file servers. Each of these servers provide resources to client devices. Most servers have a one-to-many relationship with clients, meaning a single server can provide multiple resources to multiple clients at one time.
Used on specialized computers that take in requests and send back a response (mail server, web server, etc).
Temporary storage that is emptied when the browser is closed.
A data structure that stores values in no particular order. Each value can only appear once in the set.
An instance method that allows the client to **set** the value of an instance variable on an object.
Called once when the program starts and is used to define the initial environment properties.
If two variables within the same scope have the same name, the variable with the more specific scope will be called.
The changes done in the shapes on a coordinate plane by scaling, translating, or rotating.
When the result of a logical expression using && or || can be determined by evaluating only the first Boolean operand, the second is not evaluated.
A short cut when evaluating boolean expressions. If the result can be determined solely by the first part of a boolean expression, the second part is not evaluated, it is skipped.
A animated model that represents a real-life thing, process, or situation.
Traversing two lists at the same time using the same index often to compare.
//This is a single line comment
How much money could be lost at any one time which is determined by the formula: AV * EF + SLE
Will secure one domain or subdomain.
Software that only works on one platform, such as only on Android phones, or only on Mac computers.
Refers to how an object can move in three dimensions (up/down, left/right, forward/backward) and rotate on three axes (yaw, pitch, roll).
A machine learning library that provides public access to machine learning algorithms
Accessing specific chunks of a string.
`snake case` refers to the style of writing in which each space is replaced by an underscore `_` character and the first letter of each word is lowercase.
Social Engineering is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
Programs that can be run on a computer
A set of computer instructions that tells the computer how to work.
A set of computer instructions that tells the computer how to work.
A methodology that outlines a series of steps that divide the software development process into tasks you can assign, complete, and measure.
A computer science professionals who use knowledge of engineering principles and programming languages to build software products
Legally binding guidelines for use and distribution of software.
A fast access storage device used in computers.
To arrange a list of values in order from least to greatest (or greatest to least).
sorts the list in ascending order by default.
A tag that creates an inline area of content on a webpage that can be manipulated separately from the block it is enclosed in
Live or initial creation of a game's player character, object, or non-playing character
determines how quickly Tracy will move through commands
The `splice()` method changes the contents of an array by removing or replacing existing elements and/or adding new elements.
A Python method that returns a list of strings after breaking the given string by the specified separator
A light that is located at a point in a game scene and emits light in a cone-shape direction.
A computer program that helps us organize, manipulate, and analyze data.
A graphical object with properties that determine how it looks and behaves on the canvas.
Sprites are two-dimensional bitmap images that act as independent objects within a game's larger scene.
A sprite sheet is a single image file containing multiple smaller images (sprites) arranged in a grid, typically used for animation or dynamic game elements.
Once downloaded onto a user’s computer, the software secretly gathers information about a person or organization and sends it to the attacker.
Structured Query Language; Programming language for managing and querying data from a relational database.
Structured Query Language; Programming language for managing and querying data from a relational database.
Structured Query Language; Programming language for managing and querying data from a relational database.
Refers to an attack where a cybercriminal attempts to use an input field to write and run malicious SQL statements.
refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application's database server (also commonly referred to as a Relational Database Management System – RDBMS).
A small data file that digitally binds a public cryptographic key to an organization.
A measure of how spread out a group of numbers are, calculated by taking the square root of the variance.
The Standard Library is the baseline, plain version of the programming language. It has the built-in functions that you use.
The result of standardization is the features will be rescaled to ensure the mean and the standard deviation to be 0 and 1
Allows a server to validate their own SSL certificate by bundling a time-stamped response signed by the certificate authority.
The state of an object is all of the object's associated data. It is the *state* that the object is in.
The data that is associated with an object or class.
The number of times a statement is executed by the program.
A method called on the Class, rather than on a specific object of the Class.
Static methods are the methods in Java that can be called without creating an object of class. Static methods are called using the dot operator along with the class name unless they are defined in the enclosing class.
Static methods are the methods in Java that can be called without creating an object of class. Static methods are called using the dot operator along with the class name unless they are defined in the enclosing class.
Methods that can be used directly by the class name. They cannot access instance variables or non-static methods.
A variable or attribute of a class that is shared between **all** instance of a class. Each instance **does not** get their own copy.
Variables that can be accessed by all objects of a class. They are called using the class name, and can be used in static and non-static methods.
Variables that can be accessed by all objects of a class. They are called using the class name, and can be used in static and non-static methods.
A question that could have a variety of different answers.
A question that could have variability within its answers.
A weight given to a data point to determine how “important” a specific input is in relation to a given output
The practice or science of collecting and analyzing numerical data.
The art and science of concealing secret messages in such a way that no one apart from the intended recipient knows about the existence of the message. In digital information, Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video.
Storage devices are computing devices that remember information.
A design technique used to quickly develop a story with visual cards.
Converts number to text
Contains text or a sequence of letters, numbers, punctuation, spaces, etc. "Hello, world!"; "abc123"
A sequence of characters surrounded by quotation marks.
String is a Java type that represents a string of characters (text)
The process of checking if two strings are equal using `.equals()` or `.equalsIgnoreCase()`
Strings cannot be mutated or changed.
Accessing certain characters in a string.
A sequence of characters enclosed in double quotations “ “.
Accessing specific chunks of a string.
Returns substring(from, length())
Returns the substring beginning at index from and ending at index to − 1
A variable with text as the value
Constructs a new String object that represents the same sequence of characters as str
Constructs a new String object that represents the same sequence of characters as str
A sequence of characters surrounded by quotation marks.
Python method that returns a copy of the string you call it on, without any whitespace at the beginning or end.
A machine that is able to apply intelligence to any problem and could act and behave like humans
Allows adding several different types of styles to HTML elements.
If a class A extends the class B, then A is a subclass of B.
A child class that inherits attributes and behaviors from a superclass (parent).
Undersea cables used for transmitting telecommunications signals across oceans.
A cipher that changes one character or symbol into another.
Changes one character or symbol into another.
A substring is a smaller sequence of characters in a larger String.
The `super` keyword lets us reference the superclass when writing code inside of a subclass.
A Java keyword used to refer to the superclass object. In this lesson we saw it used to call the superclass constructor.
A Java keyword used to refer to the superclass object. In this lesson we saw it used to call the superclass constructor and other methods from the superclass.
Super Karel is still Karel, but it knows two new commands: `turnAround()` and `turnRight()`
If a class A extends the class B, then B is the superclass of A.
A parent class that contains common attributes and behaviors used by subclasses (children).
SuperKarel is like Karel but already knows how to turnRight() and turnAround()
A form of machine learning where algorithms are trained to make predictions using testing data, where the outcome of a specific event is already determined
Enables wired connections between more than one computer or device.
When the same key is used to both encrypt and decrypt.
The same key is used to encrypt and decrypt (e.g., Caesar, Vigenere)
The same key is used to encrypt and decrypt (e.g., Caesar, Vigenere)
When the same key is used to both encrypt and decrypt.
The rules for writing code in a specific programming language
The set of rules that define how commands and instructions are written.
An error in the sequence of words or rules in a program that prevents the program from running.
The process of securing a system’s settings and configurations to reduce vulnerabilities.
When all programs and code will work as intended.
type of computer program that is designed to run a computer's hardware and application programs
A built-in variable provided by p5.js
Java method that lets us print output to the user, without ending the line printed.
Displays output on the computer monitor.
Displays output on the computer monitor and moves cursor to next line.
Java method that lets us print out a line of output to the user
A set of data elements (values) using a model of vertical columns (shown by a name) and horizontal rows (fields), the cell (record) being the unit where a row and column intersect. A table has a specified number of columns by design, but can have any number of rows.
A category of information.
A set of data elements (values) using a model of vertical columns (shown by a name) and horizontal rows (fields), the cell (record) being the unit where a row and column intersect. A table has a specified number of columns by design, but can have any number of rows.
Lists the descriptive statistics for each column.
Lists the data types used in each column in the DataFrame
Lists the first num rows
Lists the data types used in each column in the DataFrame
Lists the data types used in each column, non-null values, and memory usage info
Prints the number of rows and columns in the format (rows, columns)
Lists the last num rows
Lists the rows from index a to index b, exclusively (not including b).
A terabyte (TB) is 1024 GB of binary data.
definition
The tool that allows users to access and interact with the command line. Different operating systems have their own built-in terminals (e.g., Terminal on macOS, Command Prompt on Windows, and Bash on Linux).
Legal contract between a software company and the customer/user that specifies how a product can be used.
A chance to get feedback on your solutions, refine them, and make them better.
a set of actions that test a program's functionality
a program that evaluates a program's functionality
asdf asdfsadf
A smaller subset of a dataset that is used test a trained machine learning model
A type of file that contains plain, readable text without any special formatting.
An AI model that can generate images based on text.
The run method is where a Java program begins.
Small pieces of code/data that get stored in your browser by websites you haven't visited
Median of the second half of the data or the 75% point.
The `this` keyword is a reference to the current object (the current instance).
Makes a call to the current object in a class file. Allows programmers to specify which objects and instance variables should be called.
A potential for a cybercriminal to exploit a vulnerability.
A tilemap is a data structure and visual representation used to build levels and environments, particularly in 2D games.
A tileset is a collection of individual tiles or images arranged in a grid, typically used to build static game elements.
The amount of time taken by an algorithm to run, as a function of the length of the input.
Method for adding vectors.
To switch between two states, such as turning a light on and off
A small box with extra information about an element that appears when the cursor hovers over the element.
Top down design is a method for breaking our program down into smaller parts.
Top down design is a method for breaking a problem down into smaller parts.
toString is a special method you write in your class that returns a String representation of the object.
A specific accessor method that returns a String value with information about an object’s instance values. This overrides the object’s inherit toString method when an object is printed using System.out.print or System.out.println
A large percent of a dataset that is used to teach a machine learning model
changing a geometric object's position or orientation within a space
A semiconductor device used to amplify or switch electronic signals and electrical power, functioning as an on/off switch in computing
Slides or moves the shape
Allows for sending MULTIPLE packets between two computers. TCP checks that all packets arrived and can be put back in the proper order. The metadata must include a destination IP address, a from IP address, the message size and the packet order number.
A cipher that shifts the positions of plaintext character (or groups of characters) according to a regular system.
Shifts the positions of plaintext character (or groups of characters) according to a regular system.
Traversing a vector is the process to loop through a vector and access each of the elements. Caution must be taken to avoid looping beyond the valid index values.
Traversing an array is the process to loop through an array and access each of the elements. Caution must be taken to avoid looping beyond the valid index values.
Traversing an ArrayList is the process to loop through an ArrayList and access each of the elements. Caution must be taken to avoid looping beyond the valid index values.
The structure of an HTML document
A systematic approach to solving a problem.
Not starting the y-axis at zero.
To trim some digits of a float or double-type number or some characters of a string from the right.
A truth table is a table used in logic for comparing Boolean expressions.
A truth table is a table used in logic for comparing Boolean expressions.
Programming constructs that can be used to gracefully handle exceptions so that a program can continue in spite of them.
A heterogenous, immutable data type that stores an ordered sequence of things.
A test that determines how realistic, or humanlike a computer system really is. If a human is unable to tell if it is talking to a computer or a human, then the computer is said to have passed the Turing test.
(2FA) A type of multifactor authentication that typically combines something the user knows (like a password) with something the user has (like a mobile phone)
The type of a variable defines what kinds of values the variable can hold
The process of converting one data type into another.
The process of converting the value of one data type (integer, string, float, etc.) to another data type is called type conversion.
The art of arranging letters and text in a way that makes the copy legible, clear, and visually appealing to the reader.
Stands for "user interface." The way the user interacts with a game or application.
Someone who designs the graphical user interface of an app, website, or device that a human interacts with
Ultra Karel is the same as Super Karel, except Ultra Karel has the ability to paint the grid world!
Reverse of autoboxing; automatic conversion from the wrapper class to the primitive type
Unicode is a system that lets computers show and use all kinds of characters from different languages and writing systems around the world.
Solid modeling tool that combines or joins two models together
An injection risk where the attacker can add a condition that’s always true, like 1=1, often by appending it to the query to pull up even more in a results set. This fundamentally changes the query and can allow someone to pull the entire contents of the database.
A metric used to ensure that a piece of data has only been recorded once and is not duplicated in the dataset.
Focuses on one variable or one type of data.
Unpack some variables from a list.
A form of machine learning where algorithms are able to group data and find patterns in the data on their own
Python method that changes letters to uppercase.
Stands for Uniform Resource Locator. You are locating a resource that exists somewhere on the internet.
A particular sequence of actions that a user takes to accomplish a particular task
Used to log in to a computer, comprised of a username, password, personalized settings and set permissions.
UDP is often used in real-time applications where timely delivery of data is more important than the accuracy of delivery. UDP does not number the packets and it does not retransmit packets that are lost.
Data provided by the user to a program via input commands.
The tools, visual aids, and other components available to a user in order to interact with a web page or other digital or mechanical device
Authorization given to user accounts that grants them certain privileges and enables them to access specific folders and files.
The process of having potential users test a program to see how well it works
An adjective that generally is used to describe a UI that is intuitive to use, easy to navigate, and allows the user to quickly and efficiently complete the desired task
Stands for "User Experience". Describes all aspects of a user's experience with the product.
Depends on whether the data matches the type of data that was expected.
The value is the result you get when you look up a key in a HashMap. It is the value paired with a key.
A symbol or container that holds a value.
An identifier that stores data or information and can be changed at any time.
Stores the response as a float
Stores the response as an integer
Assigns the value to the variable
If two variables have the same name, and exist inside of the same scope, the variable with the *more specific* scope takes precedence. This is called shadowing. Local variables and parameters shadow the more general global variables (instance variables).
Allows users to input double values.
Allows users to input int values.
Allows users to input String values.
Understanding how data is stored and manipulated in programs.
Used to describe how far each number in the dataset is from the mean and calculated by determining the average of the squared differences from the mean.
A resizable container that stores an ordered collection of items.
A measurement that has a magnitude and direction.
The X and Y pieces of a vector.
How fast, and in what direction, an object is moving.
Displays the HTML, CSS, and JavaScript code of a website.
An encryption method that uses a series of interwoven Caesar ciphers based on the letters of a keyword
A computer scientist known as one of the "fathers of the internet."
A computer-generated world you can explore and interact with through special equipment like headsets, head-mounted displays (HMDs), and hand controllers.
A type of malware that attaches itself onto a host program, such as a document. It can cause serious damage to files or an entire device.
Visibility (usually `public` or `private`) defines who has access to something (usually a variable or method). Public means code outside of the class can access, private means only code inside the class can access.
An attribute that determines if a particular element can be seen by the viewer of the web page
A virtual LAN that allows for the setup of separate networks by configuring a network device.
Storage that is available only while the system is on and disappears when the system is turned off.
quantitative expression of the potential difference in charge between two points in an electrical field
A flaw or weakness in a system or device.
a weakness which can be exploited by a malicious actor / attacker to perform unauthorized actions within a computer system.
Designed and used to assess computers, networks or applications for known weaknesses.
A machine that is able to apply intelligence to a single problem
Standardized widgets on a website that bundle the actual implementation details into reusable elements
Designing web page to make it appealing and easy to use for viewers
Writing the HTML, CSS, and other code to actually generate a web page
A document that can be viewed by a web browser, usually written in HTML
Web Scraping is the extraction of data from a website.
A computer that stores web pages and makes them available to users on the internet.
A collection of software required for developing a web project
The process of collecting and sharing of information about a user's activity on the internet
A JavaScript interface for rendering interactive 2D and 3D graphics within any compatible web browser.
`WebImage` provides a JavaScript API that lets us add images to our programs and manipulate their pixels.
A collection of related webpages, usually registered under the same domain name
A special collider component for grounded vehicles. It has built-in collision detection, wheel physics, and tire friction model.
a clause in SQL that allows you to filter results of s SELECT with certain conditions.
a clause in SQL that allows you to filter results of s SELECT with certain conditions.
Lets us repeat code as long as something is true.
When the tester has intimate knowledge of the target system (simulates an internal attack).
a computer security specialist who breaks into protected systems and networks to test and assess their security
a computer security specialist who breaks into protected systems and networks to test and asses their security
connects offices, data centers, cloud applications, and cloud storage together; spans beyond a single building or large campus to include multiple locations spread across a specific geographic area, or even the world
Will secure one domain and an unlimited number of its subdomains.
A win condition is a state that, when reached, determines if a player has won the game.
A network where devices are connected via physical cables.
a layout of an application (e.g. web page) that demonstrates what interface elements will exist on key pages.
A network where devices connect without physical cables, typically using radio waves.
A set of protocols that specify how your Wi-Fi network and other data transmissions work.
A wireless LAN that uses radio frequency technology to send and receive data.
defin
Most commonly used on a desktop or laptop computer and can perform many tasks without an internet connection.
Actions performed to modify or add data to a file.
Sets the color used to fill shapes.
Sets the color used to fill shapes to a grayscale value.
Sets the color used to fill shapes using RGB values.
System variable that stores the height of the drawing canvas. This value is set by the second parameter of the `createCanvas()` function.
Checks if a given key is currently down
A system variable that returns `true` if any key is pressed and `false` is no keys are pressed
A system variable that contains the value of the most recent key on the keyboard that was typed
Disables drawing the stroke (outline)
Rotates a shape by the amount specified by the angle parameter
Increases or decreases the size of a shape by expanding or contracting vertices.
A method used to move the file pointer to a specified location within a file.
Sets the color used to draw lines and borders around shapes.
Sets the color used to draw lines and borders around shapes to a grayscale value
Sets the color used to draw lines and borders around shapes using RGB values
Sets the amount to shift the origin of the canvas. The x parameter specifies left/right translation, the y parameter specifies up/down translation.
System variable that stores the width of the drawing canvas. This value is set by the first parameter of the `createCanvas()` function.
Objects are defined by having the attributes, or instance variables that they are assigned.