Glossary

B

Bias (in algorithms)

Criticality: 3

Systematic and unfair skewing of results or decisions produced by an algorithm, often due to biased data used in its training.

Example:

A hiring algorithm that disproportionately favors male candidates due to historical data exhibits bias.

Binary

Criticality: 3

A base-2 number system that uses only two symbols, 0 and 1, which is the fundamental language of computers.

Example:

The letter 'A' is represented in a computer using a specific sequence of binary digits, like 01000001.

Browsers

Criticality: 2

Software applications designed to access, retrieve, and display information from the World Wide Web.

Example:

Chrome, Firefox, and Safari are popular browsers used to view websites.

C

Cybersecurity

Criticality: 3

The practice of protecting computer systems, networks, and data from digital attacks, damage, or unauthorized access.

Example:

Using strong passwords and antivirus software are basic steps in practicing good cybersecurity.

D

Data Mining

Criticality: 2

The process of discovering patterns, insights, and useful information from large datasets, often using statistical and machine learning techniques.

Example:

A retail company might use data mining to identify customer purchasing trends and recommend products.

Data Types

Criticality: 3

Classifications that specify the type of data a variable can hold, such as integers, strings, or booleans.

Example:

Declaring a variable as an integer ensures it only stores whole numbers like 10 or -5.

Data Visualization

Criticality: 2

The graphical representation of information and data, using visual elements like charts, graphs, and maps to make complex data understandable.

Example:

A bar chart showing website traffic over time is a form of data visualization.

Denial-of-Service (DoS) Attack

Criticality: 2

A cyberattack that aims to make a machine or network resource unavailable to its intended users by overwhelming it with traffic.

Example:

A website crashing because it's flooded with too many requests at once might be experiencing a Denial-of-Service (DoS) Attack.

E

Encryption

Criticality: 2

The process of converting information or data into a code to prevent unauthorized access, making it unreadable without the correct key.

Example:

When you send a secure message online, encryption scrambles the text so only the intended recipient can read it.

F

Firewalls

Criticality: 2

Network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.

Example:

A firewall acts like a gatekeeper, blocking suspicious connections to your computer.

H

HTML

Criticality: 2

HyperText Markup Language, the standard markup language used to create and structure content on web pages.

Example:

A web developer uses HTML to define headings, paragraphs, and links on a webpage.

Hacking

Criticality: 2

Gaining unauthorized access to a computer system or network, often with malicious intent.

Example:

An individual breaking into a company's server to steal customer data is an act of hacking.

I

Intellectual Property

Criticality: 2

Creations of the mind, such as inventions, literary and artistic works, designs, and symbols, for which exclusive rights are recognized.

Example:

Software code written by a developer is considered their intellectual property and is protected by copyright.

Iteration

Criticality: 3

A control structure that repeatedly executes a block of code until a specific condition is met or for a predetermined number of times.

Example:

A game might use iteration to draw 60 frames per second, repeating the drawing process constantly.

M

Malware

Criticality: 2

Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

Example:

A virus that corrupts files on your computer is a type of malware.

N

Number Systems

Criticality: 2

Different ways of representing numerical values, such as binary (base-2), decimal (base-10), and hexadecimal (base-16).

Example:

Converting a decimal number like 25 to its binary equivalent (11001) is an example of working with different number systems.

P

Parameters

Criticality: 2

Inputs provided to procedures, allowing them to operate on different data each time they are called.

Example:

A draw_circle procedure might take parameters like radius and color to customize the circle.

Phishing

Criticality: 2

A type of cyberattack where attackers attempt to trick individuals into revealing sensitive information, often through deceptive emails or websites.

Example:

An email pretending to be from your bank asking for your login credentials is a phishing attempt.

Pixels

Criticality: 2

The smallest individual unit of an image displayed on a digital screen, typically arranged in a grid.

Example:

A digital photo is made up of thousands or millions of tiny colored pixels.

Privacy

Criticality: 3

The right of individuals to control their personal information and how it is collected, used, and shared.

Example:

Companies collecting your browsing history without consent raises concerns about digital privacy.

Procedures (Functions)

Criticality: 3

Reusable blocks of code designed to perform specific tasks, helping to organize and simplify complex programs.

Example:

A procedure named calculate_total could be called multiple times to sum different sets of numbers.

Protocols

Criticality: 2

Standardized sets of rules that govern how data is formatted, transmitted, and received between devices in a network.

Example:

HTTP is a protocol that defines how web browsers and servers communicate.

Pseudocode

Criticality: 3

An informal high-level description of an algorithm or program logic, intended for human reading rather than machine execution.

Example:

Before writing actual code, a programmer might use pseudocode like IF temperature > 100 THEN DISPLAY "Boiling" to plan logic.

R

Random Number Generation

Criticality: 2

The process of producing a sequence of numbers that appear to be unpredictable, used to simulate real-world events or introduce variability.

Example:

A dice rolling simulator uses random number generation to produce a different outcome each time it's "rolled."

Return Values

Criticality: 2

The result or output that a procedure sends back after it has completed its task.

Example:

A get_random_number procedure might have a return value of 7, which can then be used in another part of the program.

S

Selection

Criticality: 3

A control structure that executes different code blocks based on whether a given condition is true or false.

Example:

An app uses selection to decide if a user is old enough to access content: if age is 18 or more, grant access.

Sequence

Criticality: 2

A control structure where instructions are executed in a linear order, one after the other.

Example:

A recipe follows a sequence of steps: first mix, then bake, then cool.

T

Text Encoding

Criticality: 2

The process of converting characters (letters, numbers, symbols) into a binary representation that computers can store and process.

Example:

ASCII and Unicode are common text encoding standards that map characters to unique binary codes.

The Internet

Criticality: 3

A global network of interconnected computer networks that communicate using standard communication protocols.

Example:

When you send an email to a friend across the world, it travels across the Internet.

The World Wide Web

Criticality: 2

A system of interconnected hypertext documents and other web resources that are accessed via the Internet.

Example:

When you browse websites like Wikipedia, you are using the World Wide Web.

U

URLs

Criticality: 2

Uniform Resource Locators, addresses used to uniquely identify and locate resources, such as web pages, on the World Wide Web.

Example:

https://www.google.com is a URL that points to Google's homepage.

V

Variables

Criticality: 3

Containers that store information, having names and holding values that can change during program execution.

Example:

In a game, a score variable might store the player's current points.