Please enable JavaScript to use CodeHS

NV MS Glossary

Flashcards

Course:

Module:

Search:

Caesar Cipher General

An encryption method in which each letter of the message is shifted by a certain amount, called the key

Enigma General

A physical machine used in WWII that built on the complexity of substitution ciphers.

Vigenère Cipher JavaScript

An encryption method that uses a series of interwoven Caesar ciphers based on the letters of a keyword

Cryptography General

Scrambling digital information into an unreadable form. Only those with verified authority (password, key, etc) can unscramble it to read it.

Cryptanalysis General

The process of decrypting coded messages without being told the key.

Cryptology General

The practice of solving and writing encryptions

Symmetric Encryption General

The same key is used to encrypt and decrypt (e.g., Caesar, Vigenere)

Asymmetric Encryption General

One key encrypts, a different key decrypts.

Public Key Encryption General

Public key encryption is a type of asymmetric key encryption. There’s one key that encrypts the information and there is a different key that decrypts the information.

Digest General

The output from any input that has been processed through a hashing algorithm / function.

Hash Functions or Hashing General

The word hashing literally means to scramble. Hashing changes a message into an unreadable string of text for the purpose of verifying the message’s contents, but not hiding the message itself. It must be easy to compute the output (the digest) for any input, but hard to compute the input for any output. A hash function takes an input string of arbitrary length and produces a fixed- size, short output called a digest . It’s always the same length no matter how big the input is AND the output is always the same hash for any given input. Unlike symmetric and asymmetric algorithms, there are no “keys” in hashing functions.

Collisions General

whenever 2 inputs map to the same output.

Reverse-engineerable General

whenever you can work backwards through an algorithm (like a Caesar cipher)

Modulo Operation General

Finds the remainder after division of one number by another (sometimes called modulus). Example: 14 ➗ 4 = 3 remainder 2 14 mod 4 = 2 14 % 4 = 2

lowerCamelCase General

`lowerCamelCase` is a naming convention where the first letter is lower case, and each subsequent start of a word is upper case.

lowerCamelCase

World General

A "world" or "Karel World" is a grid that karel lives in.

karel World

Karel General

Karel is a dog who listens to your commands.

Karel

Command JavaScript

A command is an instruction you can give to Karel.

Command

Define a Function JavaScript

Defining a function means to teach the computer a new command and explain what it should do when receiving that command.

Define a Function

Call a Function JavaScript

Calling a function actually gives the command, so the computer will run the code for that function.

Call a Function

Indentation JavaScript

Indentation is the visual structure of how your code is laid out. It uses tabs to organize code into a hierarchy.

Indentation

Curly Bracket General

An open curly bracket is { and a close curly bracket is }

Curly Bracket

Parentheses General

( and )

Parentheses

Function body JavaScript

The part of a function that contains the commands

function body

Read Like a Story JavaScript

Programs that "Read like a story" have good decomposition and make the code easy to follow.

Read Like a Story

Programming Style General

The way your code is written is the style. It covers the aspects of the code that goes beyond whether or not it just works.

Programming Style

Start Function JavaScript

This is the function that is called when you click run.

Start Function

Break Down (Decompose) JavaScript

Breaking down (decomposing) your code is splitting it into more functions.

Break Down (Decompose)

Decomposition General

Decomposition is breaking your program into smaller parts.

Decomposition

Top Down Design JavaScript

Top down design is a method for breaking our program down into smaller parts.

Top Down Design

Algorithm General

An algorithm is a set of steps or rules to follow to solve a particular problem.

algorithm, process

Comment JavaScript

A message in your code that explains what is going on.

Comment

Precondition JavaScript

Assumptions we make about what must be true before the function is called.

Precondition

Postcondition JavaScript

What should be true after the function is called

Postcondition

SuperKarel General

SuperKarel is like Karel but already knows how to turnRight() and turnAround()

SuperKarel

Super Karel General

Super Karel is still Karel, but it knows two new commands: `turnAround()` and `turnRight()`

Loop General

A loop is a way to repeat code in your program.

Loop

For Loop JavaScript

A for loop lets us repeat code a **fixed number of times**.

For Loop

Condition General

A condition is code that you put inside an if statement or while-loop.

Condition

Control Structure General

A control structure lets us change the flow of the code.

Control Structure loops if statements

Iterate General

A single run through the instructions contained a loop

Iterate

Boolean JavaScript

A boolean is a true or false value.

Boolean

If Statement General

An if statement lets you ask a question to the program and only run code if the answer is true.

If Statement

If Else Statement General

Control structure that lets us run either one section of code or another depending on a test.

If Else Statement

While Loop General

Lets us repeat code as long as something is true.

While Loop

Fencepost Problem General

A problem when using a while loop where you forget one action at the beginning or the end.

Fencepost Problem

Pseudocode General

Pseudocode is a brief explanation of code in plain English.

Pseudocode

Internet General

A philosophy of making information and knowledge open and accessible to all people. A network of networks built on open, agreed upon protocols.

Protocol General

A widely agreed upon set of rules that standardize communication between machines.

Citizen Science General

Science that harnesses the power of many individuals to solve hard, complex problems.

Data General

Information (numbers, words, measurements, observations, etc) that is in a computer-readable form.

Number System General

Defines how we represent numbers. Which digits we can use, and what each position (place ) in a number means.

Decimal Number System General

The number system we use in out everyday lives. It has 10 digits, 0-9.

Binary Number System General

Number system that has 2 digits, 0 and 1. This is how computers represent numbers at the base level.

Hexadecimal Number System General

Number system that has 16 digits 1 - 9 and A - F.

Number System General

A number system defines how we represent numbers. It defines which digits we can use, and what value each position (place value) in a number has.

Binary General

The binary number system is the Base 2 Number System. It is a number system that only uses 2 digits (0 and 1).

Bit General

Bit means "binary digit". A bit is a single digit in a binary number. A bit can either be 0 or 1.

ASCII General

ASCII is the standard protocol for encoding text information as bits. The ASCII table assigns a unique binary number to every text character.

RGB Encoding General

The RGB encoding scheme allows us to encode colors such as numeric data. It defines the amount of Red, Green, and Blue light in a pixel.

Pixel Image General

An image can be represented as a grid of values. Each value encodes the color at that position in the image.

Number System General

Defines how we represent numbers. Which digits we can use, and what each position (place ) in a number means.

Hexadecimal Number System General

Number system that has 16 digits 1 - 9 and A - F.

Pixel General

Images are made up of pixels, which are essentially a grid of values. Each value, or pixel, encodes the color at that position in the image.

RGB Color Encoding General

The RGB encoding scheme allows us to encode colors as numeric data. It defines the amount of Red, Green, and Blue light in a pixel. Each color channel can have a value between 0 and 255.

Pixel General

Images are made up of pixels, which are essentially a grid of values. Each value, or pixel, encodes the color at that position in the image.

HTML Documentation HTML

Documentation and syntax for HTML

html docs html documentation

CSS CSS

Cascading Style Sheets. The language for designing web pages and adding style.

JavaScript General

an object-oriented computer programming language commonly used to create interactive effects within web browsers.

Minified Code General

in computer programming languages and especially JavaScript, is the process of removing all unnecessary characters from source code without changing its functionality.

OWASP General

Open Web Application Security Project; highly-regarded organization and much used by cybersecurity professionals.

Database General

An organized collection of data (e.g., text, images, videos, audio, geospatial, tabular) An electronic system that allows data to be easily accessed, manipulated and updated via a Database Management System (DBMS).

Table General

A set of data elements (values) using a model of vertical columns (shown by a name) and horizontal rows (fields), the cell (record) being the unit where a row and column intersect. A table has a specified number of columns by design, but can have any number of rows.

Queries General

Let you quickly perform an action on a table in a database like apply changes or retrieve information.

SQL Injection (SQLi) General

refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application's database server (also commonly referred to as a Relational Database Management System – RDBMS).

Cross-site Scripting (XSS) JavaScript

Cross-site scripting (XSS) is a security bug that can affect websites. If present in your website, this bug can allow an attacker to add their own malicious JavaScript code onto the HTML pages displayed to your users. Once executed by the victim's browser, this code could then perform actions such as completely changing the behavior or appearance of the website, stealing private data, or performing actions on behalf of the user.

SQL General

Structured Query Language; Programming language for managing and querying data from a relational database.

Query General

A question (noun) or to ask a question (verb) - often in relation to a database.

Schema General

How we define what is stored in a table.

Column General

Represents a piece of information (or attribute).

Table General

A set of data elements (values) using a model of vertical columns (shown by a name) and horizontal rows (fields), the cell (record) being the unit where a row and column intersect. A table has a specified number of columns by design, but can have any number of rows.

Row General

One entry in a table. Each row has an ID that is unique to the table.

Select General

A statement in SQL that allows you to ask for a row or multiple rows from a table in a database.

Where General

a clause in SQL that allows you to filter results of s SELECT with certain conditions.

Client Device General

Client devices are typically personal computing devices with network software applications installed that request and receive information over the network or Internet. Mobile devices like your smart phone, tablets, iPads, laptops and also desktop computers can can all function as clients.

Server Device General

Examples of servers include web servers, mail servers, and file servers. Each of these servers provide resources to client devices. Most servers have a one-to-many relationship with clients, meaning a single server can provide multiple resources to multiple clients at one time.

Client Application General

Client-server applications are programs or apps that run on our client devices AND need to access resources from a server. In other words, they need help and can’t do what they need to do alone.

Server Application General

A server computer program or application provides functionality for client programs or devices. So a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client.

Front-end General

Client devices and applications are often referred to as the “front end” - meaning what the user actually sees.

Back-end General

Server devices and applications are often referred to as the “back end” - meaning the user doesn’t actually SEE what is happening; it’s hidden from their view and they just see the results on their end.

Client-server model General

Clients and servers communicate over a computer network on separate hardware, but both client and server may reside in the same system. A server host runs one or more server programs which share their resources with clients. A client does not share any of its resources, but requests a server's content or service function. Servers store and protect data and process requests from clients. Clients make requests and format data on the device for the end user.

Error-based SQLi General

An injection risk where the website returns errors that the hacker can use to explore the database more. This is the first clear test that an attacker can use to test to see if a site is vulnerable. It is usually displayed as an unhandled internal exception error. This info is meant for the developer and is not meant to go back and deliver it to a person’s webpage.

Union-based SQLi General

An injection risk where the attacker can add a condition that’s always true, like 1=1, often by appending it to the query to pull up even more in a results set. This fundamentally changes the query and can allow someone to pull the entire contents of the database.

Blind SQLi General

Often used when error-based and union-based SQLi do not work. It essentially involves asking the database a series of targeting questions and based on the results gives clues as to how to get the DB to give up its contents.

forward(a_number) Python

Command that lets you tell Tracy to move forward. In between the parentheses you need to put a number to tell Tracy how far to move forward.

left(angle) Python

turns Tracy left at a specified angle

right(angle) Python

turns Tracy right at a specified angle

speed (number 1-10) Python

determines how quickly Tracy will move through commands

Indentation General

Indentation is the visual structure of how your code is laid out. It uses tabs to organize code into a hierarchy.

color("red") Python

Command to change Tracy’s color.

Function body Python

In Python functions, the function body is the indented block of code that comes after the `def my_function():` line. The function body is what will be executed when the function is called.

Comment Python

A message in your code that explains what is going on.

Variable General

A symbol or container that holds a value.

variable

Parameters Python

Pieces of information you can give to functions when you define them. When the function is called the arguments are the data you pass into the function's parameters. Parameter is the variable in the declaration of the function. Argument is the actual value of this variable that gets passed to the function.

Elif Python

A control flow tool used as a second condition check after an if statement. It is a contraction of else if.

backward(a_number) Python

Command that lets you tell Tracy to move backward. In between the parentheses you need to put a number to tell Tracy how far to move backward.

right(degrees) Python

Command that tells tracy to turn right and in between parentheses, how many degrees to turn right.

left(degrees) Python

Command that tells tracy to turn left and in between parentheses, how many degrees to turn left.

input() Python

A function that prints a prompt and retrieves text from the user.

Function General

A function is like a command that you get to invent and name. It allows us to break our program into smaller parts, making the program easier to understand.

HTML HTML

Hypertext Markup Language

HTML

HTML Tag HTML

Tags are the building blocks of an HTML document

Tag

<img> Tag HTML

Allows adding an image to a web page. It is self-closing. The attributes of an `<img>` tag include `src`, which specifies where to get the image from (the url for an image ), and `width` and `height` attributes, which specify the size of the image in pixels.

HTML Lists HTML

Way to organize information with a simple structure that is easy to read and write on a webpage. There are ordered and unordered HTML lists.

<ul> Tag HTML

Defines an unordered list in HTML.

<li> Tag HTML

defines a list item inside an HMTL list.

HTML Tables HTML

Tables display information in a grid.

Style Attribute HTML

Allows adding several different types of styles to HTML elements.

Selector CSS

Defines which HTML elements a CSS rule applies to.

Class Attribute HTML

`class` is an attribute we can add to HTML tags in order to style a specific group of elements.

id Attribute HTML

`id` is an attribute we can add to an HTML tag to style that specific element.

URL General

Stands for Uniform Resource Locator. You are locating a resource that exists somewhere on the internet.

Data privacy General

how company's use your data

Data security General

protecting your data online

https General

secure data transfer protocol when on the internet

Privacy Policy General

Legal document outlining how a company can collect and use your data

Black Hat Hacking General

attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons

White Hat Hacking General

a computer security specialist who breaks into protected systems and networks to test and assess their security

Digital Footprint General

The information about a particular person that exists on the Internet as a result of their online activity

Cyberbullying General

the use of electronic communication to bully a person

Information Literacy General

Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.

Copyright General

A law that grants the creator of an original work exclusive rights to its use, distribution, and sale

Public domain General

Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.

Protocol General

A set of rules or procedures for transmitting data between electronic devices. In order for computers to exchange information, there must be an agreement as to how the information will be structured and how each side will send and receive it.

Network General

A group of two or more computer systems linked together.

Bitrate General

The amount of data (in bits) that can be sent in a fixed amount of time.

Bandwidth General

The capacity of data transfer in a system. Measured by bitrate.

Latency General

The latency of a system is the time it takes for a bit to travel from sender to receiver. Fiber optic cables have low latency.

IPv6 General

A new 128 bit version of the Internet Protocol.

IP (Internet Protocol) General

The protocol that defines the payout of an an Internet address.

DDoS Attack General

Distributed Denial of Service attack. Spam a web server with so many requests so close together that it crashes. Sometimes spitting out valuable information as it crashes.

vulnerability General

a weakness which can be exploited by a malicious actor / attacker to perform unauthorized actions within a computer system.

exploit General

a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, etc.

AAA General

AAA in network security stands for Authentication, Authorization and Accounting. It is used to refer to a family of protocols which mediate network access.

RADIUS General

Remote Authentication Dial-In User Service (RADIUS) is a client / server protocol and software that enables remote access servers to communicate with a central server to authenticate users and authorize their access to the requested system or service.

Firewall Rule General

A firewall is a system that provides network security by filtering incoming and outgoing network traffic based on a set of firewall rules. The purpose of a firewall is to reduce or eliminate the occurrence of unwanted network communications while allowing all legitimate communication to flow freely.

Intrusion Detection System (IDS) General

Intrusion detection systems (IDSs) are available in two different types: host-based intrusion system (HBIS) and network-based intrusion system (NBIS). An IDS tries to detect malicious activity such as denial-of-service attacks, port scans and attacks by monitoring the network traffic.

Access control General

In network security, access control is the restriction of access to a place or other resource on a network. Permission to access a resource is called authorization.

Domain Name System (DNS) General

Used to translate domain names into IP addresses.

Routing General

The process of sending data between two computers on the internet. The data is sent through routers that determine the route.

Redundancy General

When multiple paths exist between two points. This improves reliability and makes the internet fault tolerable. Makes the routing system scalable.

Packets General

Packets are the units of data that are sent over the network.

Metadata General

a set of data that describes and gives information about other data.

Internet Protocol (IP) General

Standardizes the layout of all packets. All packets must have a destination IP address, a from IP address, and the actual data being sent. Defines the layout of a SINGLE packet.

Transmission Control Protocol (TCP) General

Allows for sending MULTIPLE packets between two computers. TCP checks that all packets arrived and can be put back in the proper order. The metadata must include a destination IP address, a from IP address, the message size and the packet order number.

HTTP (HyperText Transfer Protocol) General

Protocol that standardizes the language for talking to web servers to send and receive web resources. Defines how computers send and receive hypertext information. (HTTPS: The “S” denotes a secure connection using HTTP.)

Fiber Optic Cables General

Able to send bits from router to router across long distances, but they are very expensive.

Internet Protocol (IP) General

A protocol that defines the structure of an Internet address and assigns a unique address to every device on the Internet.

HTTP General

HyperText Transfer Protocol is a protocol that standardizes the language for talking to web servers to send and receive web pages, or HyperText information (HTML pages).