Command that lets you tell Tracy to move forward. In between the parentheses you need to put a number to tell Tracy how far to move forward.
turns Tracy left at a specified angle
turns Tracy right at a specified angle
determines how quickly Tracy will move through commands
Indentation is the visual structure of how your code is laid out. It uses tabs to organize code into a hierarchy.
Command to change Tracy’s color.
In Python functions, the function body is the indented block of code that comes after the `def my_function():` line. The function body is what will be executed when the function is called.
A message in your code that explains what is going on.
Breaking down (decomposing) your code is splitting it into more functions.
Top down design is a method for breaking our program down into smaller parts.
Pieces of information you can give to functions when you define them. When the function is called the arguments are the data you pass into the function's parameters. Parameter is the variable in the declaration of the function. Argument is the actual value of this variable that gets passed to the function.
An if statement lets you ask a question to the program and only run code if the answer is true.
A control flow tool used as a second condition check after an if statement. It is a contraction of else if.
Control structure that lets us run either one section of code or another depending on a test.
Command that lets you tell Tracy to move backward. In between the parentheses you need to put a number to tell Tracy how far to move backward.
Command that tells tracy to turn right and in between parentheses, how many degrees to turn right.
Command that tells tracy to turn left and in between parentheses, how many degrees to turn left.
A function that prints a prompt and retrieves text from the user.
A function is like a command that you get to invent and name. It allows us to break our program into smaller parts, making the program easier to understand.
A control structure lets us change the flow of the code.
Rules, challenges, abilities, and parameters that dictate how a game functions or operates
The process of having potential users test a program to see how well it works
A person or device that makes calculations, stores data, and executes instructions according to a program.
The physical components of a computer
Programs that can be run on a computer
The way your code is written is the style. It covers the aspects of the code that goes beyond whether or not it just works.
how company's use your data
protecting your data online
secure data transfer protocol when on the internet
Legal document outlining how a company can collect and use your data
The information about a particular person that exists on the Internet as a result of their online activity
the use of electronic communication to bully a person
An encryption method in which each letter of the message is shifted by a certain amount, called the key
A physical machine used in WWII that built on the complexity of substitution ciphers.
An encryption method that uses a series of interwoven Caesar ciphers based on the letters of a keyword
Scrambling digital information into an unreadable form. Only those with verified authority (password, key, etc) can unscramble it to read it.
The process of decrypting coded messages without being told the key.
The practice of solving and writing encryptions
Allows adding an image to a web page. It is self-closing. The attributes of an `<img>` tag include `src`, which specifies where to get the image from (the url for an image ), and `width` and `height` attributes, which specify the size of the image in pixels.
Way to organize information with a simple structure that is easy to read and write on a webpage. There are ordered and unordered HTML lists.
Defines an unordered list in HTML.
defines a list item inside an HMTL list.
Tables display information in a grid.
Allows adding several different types of styles to HTML elements.
Cascading Style Sheets. The language for designing web pages and adding style.
Defines which HTML elements a CSS rule applies to.
`class` is an attribute we can add to HTML tags in order to style a specific group of elements.
`id` is an attribute we can add to an HTML tag to style that specific element.
Stands for Uniform Resource Locator. You are locating a resource that exists somewhere on the internet.
A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
A model designed to demonstrate the most basic functionality or basic design of a product, sometimes used as a proof of concept
A particular sequence of actions that a user takes to accomplish a particular task
A can-do attitude in which a person views challenges and setbacks as ways to learn rather than terminal obstacles in their path to their goal
A philosophy of making information and knowledge open and accessible to all people. A network of networks built on open, agreed upon protocols.
A widely agreed upon set of rules that standardize communication between machines.
Science that harnesses the power of many individuals to solve hard, complex problems.
Information (numbers, words, measurements, observations, etc) that is in a computer-readable form.
Defines how we represent numbers. Which digits we can use, and what each position (place ) in a number means.
The number system we use in out everyday lives. It has 10 digits, 0-9.
Number system that has 2 digits, 0 and 1. This is how computers represent numbers at the base level.
Number system that has 16 digits 1 - 9 and A - F.
A number system defines how we represent numbers. It defines which digits we can use, and what value each position (place value) in a number has.
The binary number system is the Base 2 Number System. It is a number system that only uses 2 digits (0 and 1).
Bit means "binary digit". A bit is a single digit in a binary number. A bit can either be 0 or 1.
ASCII is the standard protocol for encoding text information as bits. The ASCII table assigns a unique binary number to every text character.
The RGB encoding scheme allows us to encode colors such as numeric data. It defines the amount of Red, Green, and Blue light in a pixel.
An image can be represented as a grid of values. Each value encodes the color at that position in the image.
Defines how we represent numbers. Which digits we can use, and what each position (place ) in a number means.
Number system that has 16 digits 1 - 9 and A - F.
Images are made up of pixels, which are essentially a grid of values. Each value, or pixel, encodes the color at that position in the image.
The RGB encoding scheme allows us to encode colors as numeric data. It defines the amount of Red, Green, and Blue light in a pixel. Each color channel can have a value between 0 and 255.
A group of two or more computer systems linked together.
Able to send bits from router to router across long distances, but they are very expensive.
The amount of data (in bits) that can be sent in a fixed amount of time.
The capacity of data transfer in a system. Measured by bitrate.
The latency of a system is the time it takes for a bit to travel from sender to receiver. Fiber optic cables have low latency.
A protocol that defines the structure of an Internet address and assigns a unique address to every device on the Internet.
Used to translate domain names into IP addresses.
The process of sending data between two computers on the internet. The data is sent through routers that determine the route.
When multiple paths exist between two points. This improves reliability and makes the internet fault tolerable. Makes the routing system scalable.
Packets are the units of data that are sent over the network.
HyperText Transfer Protocol is a protocol that standardizes the language for talking to web servers to send and receive web pages, or HyperText information (HTML pages).
`lowerCamelCase` is a naming convention where the first letter is lower case, and each subsequent start of a word is upper case.
Defining a function means to teach the computer a new command and explain what it should do when receiving that command.
Calling a function actually gives the command, so the computer will run the code for that function.
Indentation is the visual structure of how your code is laid out. It uses tabs to organize code into a hierarchy.
Programs that "Read like a story" have good decomposition and make the code easy to follow.
An algorithm is a set of steps or rules to follow to solve a particular problem.
Assumptions we make about what must be true before the function is called.
SuperKarel is like Karel but already knows how to turnRight() and turnAround()
Super Karel is still Karel, but it knows two new commands: `turnAround()` and `turnRight()`
A problem when using a while loop where you forget one action at the beginning or the end.
Identity theft, stealing money, stealing private information, controlling private computers.
Ransomware is a type cyber attack that threatens to publish the victim's data or block access to it unless a ransom is paid.
The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
Protection of computer systems, networks, and data from digital attacks.
Protocols for encrypting/decrypting information. Most cybersecurity breaches happen due to human error, not software bugs.
The study of computational thinking, the thinking humans need to in order to describe a step by step process to a computer.
The usage of deceptive emails and websites to maliciously gather personal information
The CIA Triad is a widely-accepted security measure that should be guaranteed in every secure system. It stands for Confidentiality, Integrity, and Availability.
The protection of information from people who are not authorized to view it.
Aims at ensuring that information is protected from unauthorized or unintentional alteration.
The assurance that systems and data are accessible by authorized users when and where needed.