Glossary
Bias (in algorithms)
Systematic and unfair skewing of results or decisions produced by an algorithm, often due to biased data used in its training.
Example:
A hiring algorithm that disproportionately favors male candidates due to historical data exhibits bias.
Binary
A base-2 number system that uses only two symbols, 0 and 1, which is the fundamental language of computers.
Example:
The letter 'A' is represented in a computer using a specific sequence of binary digits, like 01000001.
Browsers
Software applications designed to access, retrieve, and display information from the World Wide Web.
Example:
Chrome, Firefox, and Safari are popular browsers used to view websites.
Cybersecurity
The practice of protecting computer systems, networks, and data from digital attacks, damage, or unauthorized access.
Example:
Using strong passwords and antivirus software are basic steps in practicing good cybersecurity.
Data Mining
The process of discovering patterns, insights, and useful information from large datasets, often using statistical and machine learning techniques.
Example:
A retail company might use data mining to identify customer purchasing trends and recommend products.
Data Types
Classifications that specify the type of data a variable can hold, such as integers, strings, or booleans.
Example:
Declaring a variable as an integer ensures it only stores whole numbers like 10 or -5.
Data Visualization
The graphical representation of information and data, using visual elements like charts, graphs, and maps to make complex data understandable.
Example:
A bar chart showing website traffic over time is a form of data visualization.
Denial-of-Service (DoS) Attack
A cyberattack that aims to make a machine or network resource unavailable to its intended users by overwhelming it with traffic.
Example:
A website crashing because it's flooded with too many requests at once might be experiencing a Denial-of-Service (DoS) Attack.
Encryption
The process of converting information or data into a code to prevent unauthorized access, making it unreadable without the correct key.
Example:
When you send a secure message online, encryption scrambles the text so only the intended recipient can read it.
Firewalls
Network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.
Example:
A firewall acts like a gatekeeper, blocking suspicious connections to your computer.
HTML
HyperText Markup Language, the standard markup language used to create and structure content on web pages.
Example:
A web developer uses HTML to define headings, paragraphs, and links on a webpage.
Hacking
Gaining unauthorized access to a computer system or network, often with malicious intent.
Example:
An individual breaking into a company's server to steal customer data is an act of hacking.
Intellectual Property
Creations of the mind, such as inventions, literary and artistic works, designs, and symbols, for which exclusive rights are recognized.
Example:
Software code written by a developer is considered their intellectual property and is protected by copyright.
Iteration
A control structure that repeatedly executes a block of code until a specific condition is met or for a predetermined number of times.
Example:
A game might use iteration to draw 60 frames per second, repeating the drawing process constantly.
Malware
Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
Example:
A virus that corrupts files on your computer is a type of malware.
Number Systems
Different ways of representing numerical values, such as binary (base-2), decimal (base-10), and hexadecimal (base-16).
Example:
Converting a decimal number like 25 to its binary equivalent (11001) is an example of working with different number systems.
Parameters
Inputs provided to procedures, allowing them to operate on different data each time they are called.
Example:
A draw_circle procedure might take parameters like radius and color to customize the circle.
Phishing
A type of cyberattack where attackers attempt to trick individuals into revealing sensitive information, often through deceptive emails or websites.
Example:
An email pretending to be from your bank asking for your login credentials is a phishing attempt.
Pixels
The smallest individual unit of an image displayed on a digital screen, typically arranged in a grid.
Example:
A digital photo is made up of thousands or millions of tiny colored pixels.
Privacy
The right of individuals to control their personal information and how it is collected, used, and shared.
Example:
Companies collecting your browsing history without consent raises concerns about digital privacy.
Procedures (Functions)
Reusable blocks of code designed to perform specific tasks, helping to organize and simplify complex programs.
Example:
A procedure named calculate_total could be called multiple times to sum different sets of numbers.
Protocols
Standardized sets of rules that govern how data is formatted, transmitted, and received between devices in a network.
Example:
HTTP is a protocol that defines how web browsers and servers communicate.
Pseudocode
An informal high-level description of an algorithm or program logic, intended for human reading rather than machine execution.
Example:
Before writing actual code, a programmer might use pseudocode like IF temperature > 100 THEN DISPLAY "Boiling" to plan logic.
Random Number Generation
The process of producing a sequence of numbers that appear to be unpredictable, used to simulate real-world events or introduce variability.
Example:
A dice rolling simulator uses random number generation to produce a different outcome each time it's "rolled."
Return Values
The result or output that a procedure sends back after it has completed its task.
Example:
A get_random_number procedure might have a return value of 7, which can then be used in another part of the program.
Selection
A control structure that executes different code blocks based on whether a given condition is true or false.
Example:
An app uses selection to decide if a user is old enough to access content: if age is 18 or more, grant access.
Sequence
A control structure where instructions are executed in a linear order, one after the other.
Example:
A recipe follows a sequence of steps: first mix, then bake, then cool.
Text Encoding
The process of converting characters (letters, numbers, symbols) into a binary representation that computers can store and process.
Example:
ASCII and Unicode are common text encoding standards that map characters to unique binary codes.
The Internet
A global network of interconnected computer networks that communicate using standard communication protocols.
Example:
When you send an email to a friend across the world, it travels across the Internet.
The World Wide Web
A system of interconnected hypertext documents and other web resources that are accessed via the Internet.
Example:
When you browse websites like Wikipedia, you are using the World Wide Web.
URLs
Uniform Resource Locators, addresses used to uniquely identify and locate resources, such as web pages, on the World Wide Web.
Example:
https://www.google.com is a URL that points to Google's homepage.
Variables
Containers that store information, having names and holding values that can change during program execution.
Example:
In a game, a score variable might store the player's current points.