The process of reading information from and writing information to files.
A collection of data or information stored on a computer. It can be a document, a picture, or any other type of information.
Any data or information that is received or entered into a computer system, such as typing on a keyboard or reading from a file.
The result or information produced by a computer system, such as displaying text on a screen or saving data to a file.
A type of file that contains plain, readable text without any special formatting.
The specific way in which data is organized and stored within a file. It determines how the file can be read or processed by different software programs.
A set of characters at the end of a file name that indicates the file type or format.
The process of receiving or reading data from a file into a computer program for further processing or use.
The process of sending or writing data from a computer program to a file for storage or future use.
A file access mode ("r") that allows reading the contents of a file but does not permit modifications.
The action of establishing a connection between a file and a program to perform read or write operations on the file.
The action of terminating the connection between a file and a program after completing read or write operations.
A method used to read the contents of a file. It reads the entire file or a specified number of characters and returns them as a string.
A method used to read a single line from a file. It returns the line as a string, including the newline character at the end.
The condition indicating that the end of a file has been reached
A special character that represents the end of a line within a text file. In Python, the newline character is represented as \n.
A method used to read multiple lines from a file and return them as a list, where each line is represented as an element in the list.
The process of writing data or text to a file.
The action of replacing the existing content of a file with new data.
The action of adding new data or text to the end of an existing file.
A parameter used when opening a file to specify the intended operation (e.g., read, write, append).
A marker or reference that indicates the current position within a file.
A method used to move the file pointer to a specified location within a file.
The offset or index that represents the current position of the file pointer within a file.
Actions performed to extract data or content from a file.
Actions performed to modify or add data to a file.
The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
The protection of information from people who are not authorized to view it.
Aims at ensuring that information is protected from unauthorized or unintentional alteration.
The assurance that systems and data are accessible by authorized users when and where needed.
Ensures that one cannot deny having sent or received a message.
A flaw or weakness in a system or device.
The potential for loss when an attack happens.
A potential for a cybercriminal to exploit a vulnerability.
The process of identifying a user and granting them access. Authentication is proving that someone is who they say they are.
The process of enforcing policies and user privileges. Once a user is authenticated, they may only be authorized to access specific areas or may only have rights to perform specific tasks.
The process of measuring what is happening within the system. This is the final process of the AAA framework and ensures that there is a log of all actions within the network or system.
Any type of software that is designed to intentionally harm or damage a computer or network.
A type of malware that attaches itself onto a host program, such as a document. It can cause serious damage to files or an entire device.
A software that prevents users from accessing their files or network until a ransom is paid.
Once downloaded onto a user’s computer, the software secretly gathers information about a person or organization and sends it to the attacker.
A cybercrime in which a person is contacted by email, telephone or text message by someone who is posing as a legitimate company.
A network security device that monitors and filters incoming and outgoing network traffic.
A type of authentication that is similar to a password but longer and is usually a sentence or a series of words
(2FA) A type of multifactor authentication that typically combines something the user knows (like a password) with something the user has (like a mobile phone)
(MFA) An extra layer of authentication that requires two or more factors for authentication. Typically, these factors fall into three categories: something you know (password), something you have (such as a phone), or something you are (such as your fingerprint).
A form of authentication that uses an individual’s physical or behavioral characteristics to verify their identity
Tools that store and manage passwords for various accounts, generating strong passwords and auto-filling login credentials.
A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
The moral principle that governs a person's behavior.
refers to an external mechanism of control
A specific group of hackers who are motivated by their ideological views.
Have political motivations with the intent to harm, typically resulting in violence.
Sponsored by and funded by a government with the goal of giving their country a competitive advantage on a global scale.
The practice of encrypting information so only authorized people can read it.
A process of converting information into an unreadable form to keep it secure from unauthorized access.
The process of breaking an encryption by trial and error.
the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings
The ability to perceive and interpret information, and to retain it as knowledge to be applied in the correct context
A test that determines how realistic, or humanlike a computer system really is. If a human is unable to tell if it is talking to a computer or a human, then the computer is said to have passed the Turing test.
AI that is built for a specific purpose and excels in its limited domain
a more human-like AI; versatile across various cognitive functions and tasks, having broader capabilities
The on-demand delivery of computing services over the internet on a pay-as-you-go basis
Software applications delivered over the internet
Virtualized computing resources over the internet
Platforms that provide tools to develop, test, and deploy applications
The ability to grow or shrink resources to meet demand
A computing model where data is processed near its source rather than in a centralized cloud.
he time delay between a user action and the response from a system.
The amount of data that can be transmitted over a network in a given amount of time.
A localized server or device that processes data close to where it is generated.
A network access point that allows data to be transmitted more quickly and reliably.
A digital currency that uses cryptography for security and operates independently of a central authority.
A decentralized, distributed digital ledger that records transactions in a secure and immutable way.
Money issued and regulated by a central authority like a government or bank.
Currency that operates without a central authority and is maintained by a distributed network.
An operating system such as Windows, Mac OS, Android or iOS.
Software that only works on one platform, such as only on Android phones, or only on Mac computers.
Software that works on multiple platforms.
Used to log in to a computer, comprised of a username, password, personalized settings and set permissions.
Has full access and full control to manage other users, set permissions and change computer settings and programs.
Authorization given to user accounts that grants them certain privileges and enables them to access specific folders and files.
The main, controlling account responsible for providing security updates, antivirus software and setting permissions for anyone on the same network.
An agreed upon set of rules and permissions.
Specifying access rights and permissions for each user.
Proving the identity of the user.
Updates that address and fix security vulnerabilities within a program or product.
A type of computer program that can spread by modifying other computer programs and inserting its own code (rules).
A copy or snapshot of the state of your computer.
Backs up everything on your computer.
Backs up only what has changed since the last backup.
Legally binding guidelines for use and distribution of software.
Software that is available for anyone to access and modify.
Software that is owned by an individual or company.
Refers to the design of the essential parts of an application and how they are connected to each other.
Software installation that is performed on your local computer.
Software installation that is performed on a local area network (LAN).
Software that is installed, hosted and accessed entirely from a remote server or location.
Bit means "binary digit". A bit is a single digit in a binary number. A bit can either be 0 or 1.
A byte is 8 bits.
Number system that has 2 digits, 0 and 1. This is how computers represent numbers at the base level.
A semiconductor device used to amplify or switch electronic signals and electrical power, functioning as an on/off switch in computing
The process of converting information or data into a specific format that can be understood or processed by a computer.
A new 128 bit version of the Internet Protocol.
The protocol that defines the payout of an an Internet address.
An agreed upon set of rules that outlines how to communicate or send information.
The original 32 bit IP protocol that was created in the 1980s.
Stands for Uniform Resource Locator. You are locating a resource that exists somewhere on the internet.
Used to translate domain names into IP addresses.
Protocol that standardizes the language for talking to web servers to send and receive web resources. Defines how computers send and receive hypertext information. (HTTPS: The “S” denotes a secure connection using HTTP.)
The unique address that is assigned to each device connected to the internet. It is part of the Internet Protocol.
A computer that stores web pages and makes them available to users on the internet.
The process of sending data between two computers on the internet. The data is sent through routers that determine the route.
Allows for sending MULTIPLE packets between two computers. TCP checks that all packets arrived and can be put back in the proper order. The metadata must include a destination IP address, a from IP address, the message size and the packet order number.
An access point that allows for network management and security configuration.
a system that will operate with no interruption when one or more of its components fail
When data is passed from one network segment to another.
The number of hops it takes for data to get to its final destination.
Advanced Research Projects Agency Network, precursor to the modern internet
UDP is often used in real-time applications where timely delivery of data is more important than the accuracy of delivery. UDP does not number the packets and it does not retransmit packets that are lost.
ASCII is the standard protocol for encoding text information as bits. The ASCII table assigns a unique binary number to every text character.
Unicode is a system that lets computers show and use all kinds of characters from different languages and writing systems around the world.
A kilobyte (kB) is 2^10 bytes (1024 bytes) of binary data.
A megabyte (MB) is 2^20 bytes (1024 kB) of binary data.
A gigabyte (GB) is 2^30 bytes (1024 MB) of binary data.
Images are made up of pixels, which are essentially a grid of values. Each value, or pixel, encodes the color at that position in the image.
The RGB encoding scheme allows us to encode colors as numeric data. It defines the amount of Red, Green, and Blue light in a pixel. Each color channel can have a value between 0 and 255.
A terabyte (TB) is 1024 GB of binary data.
A philosophy of making information and knowledge open and accessible to all people. A network of networks built on open, agreed upon protocols.
A network where devices are connected via physical cables.
A network where devices connect without physical cables, typically using radio waves.
The process of varying a signal to transmit data.
Undersea cables used for transmitting telecommunications signals across oceans.
A computer scientist known as one of the "fathers of the internet."
A widely agreed upon set of rules that standardize communication between machines.
A conceptual framework used to understand and standardize the functions of a telecommunication or computing system without regard to its underlying internal structure and technology.
A distinct level in a networking framework that carries out specific functions.
A circuit board with ports and sockets used to connect the main devices of a computer.
A special kind of firmware that runs programs strictly to start up your computer.
The core component of a device that accepts and executes instructions.
A fast type of computer memory which temporarily stores all the information your device needs right away.
A fast access storage device used in computers.
A component designed to speed up the creation of images and output them to a display device, like a monitor.
A component with a built in wired network port that allows the computer to connect to a network.
A device that will be recognized by your computer and install on its own.
A group of files that allows a device to communicate with the computer’s operating system.
A short-range wireless communication technology that uses radio waves to transmit information.
Enables short-range communication between compatible devices.
Storage that is available only while the system is on and disappears when the system is turned off.
Storage that is saved and available even when the system is shut down.
Storage that contains one or more drives that can be accessed over a network.
Network attached storage that is equipped with powerful network adapters.
A wireless LAN that uses radio frequency technology to send and receive data.
A virtual LAN that allows for the setup of separate networks by configuring a network device.
A set of protocols that specify how your Wi-Fi network and other data transmissions work.
An electronic device which is required for communication between devices.
An internal component of a computer that is used for communicating over a network.
A network device that allows a device to connect to the Internet.
Enables wired connections between more than one computer or device.
A network device that allows other Wi-Fi devices to connect to a wired network.
Translates and executes program code line by line into machine code.
Translates, or “compiles” the entire code into machine code and then runs the program, or sets aside to run later.
A programming language is any set of rules that converts strings, or graphical program elements in the case of visual programming languages, to various kinds of machine code output.
a computer programming language consisting of binary instructions
A language where variable types are determined at runtime, not in advance.
A language where variable types are explicitly declared and checked at compile time.
The process of verifying and enforcing the constraints of types in a programming language.
The period when a program is running, after it has been compiled or interpreted.
Identifying and fixing errors in code.
The process of learning about the world using data and computation.
A question that could have a variety of different answers.
A computer program that helps us organize, manipulate, and analyze data.
An iterative set of steps used to analyze and interpret data.
the "average" of a range of numbers, where you add up all the numbers and then divide by the number of numbers.
the middle value in a range of numbers.
the number that is repeated more often than any other.
A statistical measure of the strength and direction of a relationship between two variables
A graph used to visualize the relationship between two quantitative variables
A value between -1 and +1 that quantifies the correlation between two variables
The act of one variable causing a change in another
A third variable that explains the connection between two others
A third variable that affects the strength or direction of the relationship
Refers to data that is so large, fast or complex that it's difficult or impossible to process using traditional methods.
Occurs when a result is more favorable to a certain outcome.
A branch of artificial intelligence focused on building applications that learn from data.
The tendency to seek out, collect and interpret data so that it confirms one’s preexisting beliefs or ideas.
Used to describe how data is spread. It also describes the variability of the dataset.
A story that is created with the intent to explain the data and why it matters.
A question that could have variability within its answers.
A document that summarizes a person’s education, work experience, skills, and accomplishments
Personal attributes such as teamwork, communication, and time management
Technical or learned abilities like programming, software use, or typing speed
A curated collection of work samples that demonstrate knowledge, skills, and growth
A digital space used to store, organize, and share documents and code
Command that lets you tell Tracy to move forward. In between the parentheses you need to put a number to tell Tracy how far to move forward.
turns Tracy left at a specified angle
turns Tracy right at a specified angle
determines how quickly Tracy will move through commands
Indentation is the visual structure of how your code is laid out. It uses tabs to organize code into a hierarchy.
Command to change Tracy’s color.
In Python functions, the function body is the indented block of code that comes after the `def my_function():` line. The function body is what will be executed when the function is called.
A message in your code that explains what is going on.
Breaking down (decomposing) your code is splitting it into more functions.
Top down design is a method for breaking our program down into smaller parts.
Pieces of information you can give to functions when you define them. When the function is called the arguments are the data you pass into the function's parameters. Parameter is the variable in the declaration of the function. Argument is the actual value of this variable that gets passed to the function.
An if statement lets you ask a question to the program and only run code if the answer is true.
A control flow tool used as a second condition check after an if statement. It is a contraction of else if.
Control structure that lets us run either one section of code or another depending on a test.
Command that lets you tell Tracy to move backward. In between the parentheses you need to put a number to tell Tracy how far to move backward.
Command that tells tracy to turn right and in between parentheses, how many degrees to turn right.
Command that tells tracy to turn left and in between parentheses, how many degrees to turn left.
A function that prints a prompt and retrieves text from the user.
A function is like a command that you get to invent and name. It allows us to break our program into smaller parts, making the program easier to understand.
Documentation for all Karel Commands and Syntax.
Calling a function actually gives the command, so the computer will run the code for that function.
A function is like a command that you get to invent and name. It allows us to break our program into smaller parts, making the program easier to understand.
Defining a function means to teach the computer a new command and explain what it should do when receiving that command.
In Python functions, the function body is the indented block of code that comes after the `def my_function():` line. The function body is what will be executed when the function is called.
`snake case` refers to the style of writing in which each space is replaced by an underscore `_` character and the first letter of each word is lowercase.
Assumptions we make about what must be true before the function is called.
Managing complexity by "abstracting away" information and detail, in order to focus on the relevant concepts.
The ability to use methods and programs that we do not fully understand, or are unable to write.
SuperKarel is like Karel but already knows how to turnRight() and turnAround()
APIs and libraries simplify complex programming tasks by providing sets of clearly defined methods of communication among various computing components.
Written instructions detailing the functions, methods, and variables available and how to use them.
A for loop lets us repeat code a **fixed number of times.**
Executes code only if condition is true
Lets us repeat code as long as something is true.
A control structure lets us change the flow of the code.
An algorithm is a set of steps or rules to follow to solve a particular problem.
Sequencing, or sequential execution, is step by step execution of instructions in the order they are given.
Repetition of instructions a specified number of times, or until a condition is met.
Using a condition to determine which part of an algorithm is executed.
Ultra Karel is the same as Super Karel, except Ultra Karel has the ability to paint the grid world!
A file containing Python definitions and statements.
A collection of related modules.
A collection of modules and packages.
A data structure that stores and aligns data in a table using rows and columns.
Lists the data types used in each column in the DataFrame
Prints the number of rows and columns in the format (rows, columns)
Lists the data types used in each column, non-null values, and memory usage info
Lists the descriptive statistics for each column.
Lists the first num rows
Lists the last num rows
Lists the rows from index a to index b, exclusively (not including b).
A sequence of steps for processing and using data.
Numerical data that can be counted or measured.
Data that can be divided into different categories.
A one-dimensional, labeled array (or list) that is formatted like a single column of a data table.
A measure of how spread out a group of numbers are, calculated by taking the square root of the variance.
Used to describe how far each number in the dataset is from the mean and calculated by determining the average of the squared differences from the mean.
The difference between the largest number and the smallest number. The larger the range, the larger the spread or dispersion.
The difference between the first and third quartiles. Indicates how spread out the middle 50% of the set of data is. Helps to avoid outliers affecting the data.
Median of the first half of the data or the 25% point.
Median of the second half of the data or the 75% point.
The process of replacing missing data with substituted values.
The process of fixing or removing incorrect, corrupted, incorrectly formatted, duplicate, or incomplete data within a dataset.
Focuses on one variable or one type of data.
Relates two variables or two types of data.
A frequency distribution that fits a bell-shaped curve symmetrical about its mean.
Used to determine the probability of a value when data follows a normal distribution.
Used to determine the cumulative probability of a value when data follows a normal distribution.
Determines the strength of the relationship between numeric values.
As one variable changes, 100% of the time the other will change the exact same amount.
Accounts for a relationship between two other variables.
A third variable that affects the strength (or direction) of a relationship between an independent and a dependent variable.
An attempt to create a linear relationship between two correlating variables.
The line that best expresses the relationship between all data points.