The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by PSS INFINITI, 2021-05-10 03:53:24

Help Your Kids with Computer Science

Help Your Kids with Computer Science

249G L O S S A R Y

cookie deep web firmware heuristic
A packet of data sent by a The part of the internet that is A type of program that is Any approach to problem-
website to a user’s computer not listed on search engines. embedded into a device’s solving or learning that uses
that is used to identify the CPU and controls how the a quick and simple approach
user and track their browsing. digital device works. as opposed to a thorough
Involving the use of one. A “rule of thumb” is an
cryptocurrency computer technology, or the function example of a heuristic.
A wholly digital form of use or storage of data as A mathematical formula
currency that operates digital signals. Digital signals that takes input data and hub
without a central bank. are expressed in 0s and 1s. acts upon it to produce The central part of a
output data. Functions network, through which
cybersecurity digital divide are made up of variables, information flows into
The protection of computers The difference between constants, and arrays. and out of the network.
and data from attacks by people who have access
malicious people online. to digital devices and the functional language Hypertext Markup
internet, and those who A programming language Language (HTML)
dark web do not. that defines a program A programming language
The most restricted part of as a series of for creating webpages and
the internet, viewable only by digital identity mathematical functions. web applications. HTML is
using a special web browser. The set of identifiers divided into elements called
used by organizations to geek tags, semantics, and
data authenticate who a user is, An informal term for attributes that each hold a
Information that is processed so the user can access the someone who is obsessive specific type of information.
or stored by a computer. organization’s services. about a certain topic, or
group of related topics. Hypertext Transfer
database digital literacy Protocol (HTTP)
A program that lets The ability to be able to find, gender gap The data transfer protocol
people store and search use, and share accurate The difference in status, used on the world wide web.
data effectively. information online. opportunities, and attitudes
between men and women. imperative language
debugging encoding A programming language
The process of finding The process of turning hacking that operates as a series of
and fixing bugs (errors) information, such as images, Any act that makes a piece commands that are executed
in programs. sounds, or text, into a format of technology do something one by one.
a computer can understand. it wasn’t intended to do.
decomposition Hackers can be grouped input
The process of breaking encryption into white, grey, and black Any information that is put in,
a problem down into The process of making a hat hackers, depending taken in, or operated on by a
smaller sub-problems. message unreadable to on their intentions. process or system.
everyone except the person
decryption or people it was intended for. hardware internet
The process of using a cipher The physical parts of a A massive global
and a key to reveal the file computer that exist as objects network of created from
meaning of encrypted text. A resource for storing in the real world. connections between
information on a computer. billions of computers.

250 R E F E R E N C E

Internet of Things trojans, rootkits, ransomware, operating system (OS) person to give instructions
The name given to backdoors, and hybrid threats. A piece of software that to a computer. High-level
the network of manages a computer’s languages are closer to human
interconnected devices with microprocessor hardware and software language. Low-level languages
embedded computers. Another name for the central resources, and makes it easier are closer to binary code.
processing unit (CPU). for them to be used. The most
interpreter common examples are Linux, program
A program that translates and motherboard macOS, and Windows. A collection of instructions that
executes the source code of The main circuit board of a performs a specific task when
another computer program computer, which holds the output executed by a computer.
one line at a time. CPU, memory, and connectors Something that is produced
for the hard drive and by a person or machine, or protocol
key optical drives, among the place where information A set of rules that governs
In cryptography, any other connections. The leaves a system. the transmission of data
additional information that is motherboard allows hardware between devices; for
used to encrypt or decrypt components of a computer to pattern recognition example, Hypertext Transfer
a message. communicate with each other. The process of seeing Protocol, which is used for
repetition in a predictable visiting websites.
keylogger net neutrality manner. Pattern recognition
A computer malware The principle that is an important part of random-access
program that tracks what governments or ISPs should computational thinking. memory (RAM)
keyboard keys are pressed not block, discriminate, or A computer system’s
in order to gain access charge users differently to peripheral short-term memory, used
to passwords and access the internet. Any piece of hardware that to store calculation data.
other information. allows users to interact with
network a computer. read-only memory (ROM)
logic gate A group of connected A place where data that is
A device that carries out devices that can share photoresist needed for the computer
computer calculations with resources and data. Networks A substance that is used in to function, such as firmware
binary numbers. can be classified by size or the manufacture of computer and start-up instructions,
topology (layout). chips that protects parts of a is usually stored.
machine code chip in development from
Instructions that a computer node being eroded by the register
can understand and uses to Any device that sends manufacturing process. A place in a CPU where data
send instructions to the or receives data through currently being used can be
computer’s hardware. a network. pixel stored temporarily.
Short for picture element. A
machine learning object-oriented language tiny area of illumination on a relational database
The branch of computer A programming language computer display screen, one The most common type of
science that gives a computer that includes the concept of of many from which an image database, where information
the ability to learn to do objects that model real-world is composed. is stored in tables. The tables
something with data, rather things. An object usually has are made up of rows, called
than explicitly programming it. fields (containing data) and programming records, and columns,
methods (containing code) The process of giving called fields.
malware that represent behaviours. instructions to a computer.
Malicious software that gains resolution
illegal access to a computer online identity programming language A measure of the amount of
or system. Malware includes The self or selves that a user A formalized set of words information in a computer
worms, viruses, spyware, presents to the online world. and symbols that allows a file, such as an image.

251G L O S S A R Y

routing over the internet. Streaming is unicode can be interacted with in a
The process of finding the popular for watching films or The single worldwide seemingly real way.
shortest path between two listening to music online. standard for encoding
devices across the internet. characters used in electronic viruses
syntax communication. Unicode is Tiny pieces of code that
search engine The structure of statements in much larger than ASCII. attach themselves to
A program that looks through a computer language. pre-existing files before
the world wide web for Uniform Resource replicating themselves.
webpages containing transistor Locator (URL) Viruses corrupt data and slow
particular words or phrases A tiny device that is used Also known a web address, down operating systems.
inputted by the user. to amplify or switch URL is a standardized system
electric current. for locating and identifying visual language
server content on the world A programming language
A computer program or translation wide web. that is based on blocks of
device that responds to The process of converting code instructions that the
requests across a computer one programming language universal serial bus (USB) programmer fits together.
network to provide a network into another. Translation A standard developed to Visual languages are ideal
or data service. usually refers to breaking a define cables, connectors, and for children or people new
high-level language down their protocols for connection, to programming.
social media platform into a low-level language. communication, and power
A type of website or supply between computers visualization
application that allows users Transmission Control and peripheral devices. The process of turning
to connect to each other, Protocol / Internet information, such as a
and create and share content. Protocol (TCP/IP) update coordinates or a big dataset,
A set of rules that governs the New code that is released into a model, graphs,
social media bubble connection of computer by a programmer or company or images.
The phenomenon of a user systems to the internet. that fixes bugs or adds
seeing only things they like new features to a website, website
on social media. Users in a troubleshooting application, software, A collection of webpages.
social media bubble may The process of fixing or program.
be isolated from the ideas common problems that arise webpage
and opinions of anyone when using computer upgrade A single destination on the
not in the bubble. hardware or software. Completely new software world wide web.
that is designed to replace an
software truth tables older website, application, Wi-Fi
The operating system, A diagram of inputs and software, or program. A facility allowing computers
programs, and firmware outputs of a logic gate or to connect to the internet
that allow a user to access circuit. In a truth table, the variables or communicate with each
a computer’s hardware. binary value 1 equals the 1 The non-essential details other wirelessly in a
logical value TRUE, and the that alter how a model can particular area.
STEAM binary value 0 equals FALSE. behave or appeal.
An acronym for science, 2 Storage items that can world wide web
technology, engineering, Turing test take on more than one An information system that
arts, and mathematics. A test outlined by English value during the course runs on the internet that
mathematician Alan Turing of a program. allows webpages to be
streaming that centres on the ability of connected to other
The process of allowing a user an evaluator to assess whether virtual reality webpages by hypertext links.
to access information not any particular machine can A computer-generated 3D
stored on their computer be said to be intelligent. image or environment that

252 R E F E R E N C E

Index

3D movies 228 artificial neural networks browser extensions, fake 190 communications, online 184–5
3D printing 224 (ANN) 237 browsing habits 191 comparison websites 21
bubble sort 77 compatibility problems 167
A arts 239 bubbles, social media 206–7 compilers 82, 113
ASCII 84–5 buffering 154 compression 19, 91
A/S/L (age/sex/location) 178 assemblers 112 bugs 114–15, 173, 175 computational thinking
abacuses 30 assembly language 122 bus topology 147
abstraction 68, 72–3, 124 assistive technologies 220, 221 buses 43 66–77, 139
accelerometers 53 attributes 163 business 213 computer engineering 240
accessibility options 221 audio encoding 92 bytecode 128 computer science 28–9, 240
activity trackers 57 augmented reality (AR) 224, 228 bytes 80 confirmation bias 206
adapters 144, 171 autistic spectrum disorders 221 connected appliances 58–9
advertising, targeted 191, 207 automatons 60 C connection speeds 81
Agile development style avatars 178 connections 148–9
C programming language connectivity, global 232–3
169, 175 B 118, 126 connectors 144
AJAX (Asynchronous JavaScript consoles 62–3
Babbage, Charles 98, 99 C++ programming language 127 constants 106, 109
And XML) 135 backdoors 157 calculating devices 30–1 contactless payment 64
al-Jazari, Ismail 31 backing up 15 calendars, online 18 control unit (CU) 42
al-Khwārizmī, Abu Abdullah bandwidth 154, 155 cameras controllers, game 62, 137
BASIC 122, 123 cookies 157, 167, 191
Muhammad ibn Mūsā 31, 77 Bedwel, Farida 221 digital 48, 90–1 Creative Commons 183, 199
Al-Kindi 31 Berners-Lee, Tim 150, 198 see also webcams criminal behaviour 75
algorithms 31, 69, 76–7, 118, 206 bias 211 careers 240–3 criminal websites 159
big data 89, 224, 227 Carrier-Sense Multiple Access cross-site scripting (XSS) 167
ANN 237 bigoted material 186 (CSMA) 149 crowdsourcing 185
applying 102–3 binary adders 87 Cascading Style Sheets (CSS) cryptocurrencies 225, 230–1
machine-learning 236 binary code 30, 40, 80, 82–3, 135, 162, 163, 164–5, 166 cryptography 31, 32, 103
Allen, Paul 33, 55 castle water clock 31 Curiosity rover 119
Amazon 127 118, 119 censorship 212–13 cyberbullying 188–9
analogue computers 100, 101 binary searches 76 central processing unit (CPU) cybercrime 212
analogue programming 100–1 Bing 151 34, 42–3 cybersecurity 22–3
analogue signals 144 biochemical circuits 141 chaining 132
Analytical Engine 99 biological interfaces 234–5 chatrooms 178 D
anonymous browsers 159 biometrics 234 chips 33, 35, 38–9, 42, 48, 80
anti-virus software 23 bitcoin 159, 230–1 manufacturing 38–9 dark web 158, 159, 186
Antikythera mechanism 30 bitmaps 90 ciphertext 94, 95 data 78–95
Apollo missions 81, 218 bits 80 circuit design 104, 105
Apple App Store 200 black hat hackers 22 class blueprints 107 clearing 191
Apple Computers 33 blocks 137 classes 129, 165 collection 63
application programming blogs 18, 185 client-server networks 145 digital vs analogue 100
interface (API) 124–5 “Blue Screen of Death” 24 clock-speed 43 displaying 40
applications 44, 45 Bluetooth 64, 226 closed networks 207 packets 149
apps 16, 19, 41, 53, 64 body movements 53, 62, 137 cloud APIs 125 privacy 65, 190–1, 227
app-based appliances 59 body suits, VR 229 cloud computing 151, 152–3 retrieving 106–7
charity-made 221 Boole, George 104, 105 COBOL 119, 122 storage 15, 81, 106–7, 152–3
social media 200–1 Boolean logic 86, 88, 104–5, 108 cochlear implants 235 theft 22, 23, 65
updates 175 botnets 157, 159 codecs 93 transferring 15
Arduino 54, 55 Bouchon, Basile 98 coding communities 69 what is data? 80
arithmetic logic unit (ALU) 42 boundaries, setting 180 Colossus 32 data protection 65
ARPANET 150, 151 Braille 83 colour 90 data usage 25
arrays 106, 107, 109 branching 108, 169 communication protocols data-processing 76–7
artificial intelligence (AI) 95, breakpoints 115 144, 148 databases 88–9, 105
119, 236–7

I N D E X 253

dating, online 196 encryption 94–5, 149, 157, 158 G hate, online 205
DDoS (Distributed Denial of End-User License Agreements Hawking, Stephen 37
game developers 243 headphones 25, 36
Service) attacks 157 (EULA) 179 game programming 135, 138 headsets, VR 49, 229
debugging 115 engineering 239 gaming 33, 62–3, 229 healthcare 57, 65, 217, 234, 235
decentralization 231 ENIAC 32, 218 “Hello World” program 121
decimal system 82 Enigma code 32, 95 genres 63 heuristics 236
declaration blocks 165 environment 217 networks 205 hexadecimal system 40
decomposition 68, 70–1 environments, programming and social networks 204–5 hidden computers 64–5
deep web 158–9 systems 155 high-level languages 110,
design patterns 170, 171 169 terms 205
desktop computers 50, 51 equality 218–19 Gates, Bill 33, 34, 55, 194, 217 119, 122
developing countries 214, 216, Ethernet cables 37 Gauss, Karl 102 Hollerith, Herman 99
ethics 65, 217, 237 “geeks” 219 home computers 123
217, 232 expansion slots 35 gems, Ruby 133 home networks 145
Difference Engine 98 extended ASCII 84–5 gender gap 218–19 home security systems 58
digital assistants 58, 225 external hard disk drives 49 general intelligence 237 Hopper, Grace 114, 122
digital citizens 182–3 external hardware 48 gesture control 221 hosts, site 211
digital data 100 eye implants 235 Git 169 household devices 14
digital divide 214–15, 216, 217 glitches 24–5 HTML (Hypertext Markup
digital footprints 202 F global development 216–17, 239
digital formats 144 Go 140 Language) 135, 162–3,
digital identities 178–9 fabs 38 goals, gaming 204 164, 166
digital literacy 210–11 Facebook 19, 127, 146, 167, 179, Golden Shield Project 213 HTTP (Hypertext Transfer
digital property 183 “gone viral” 195 Protocol) 124, 144, 148,
digital toys 60–1 197, 200 Google 41, 127, 146, 151, 149, 198
digital world 28–9, 182 Facetime 184 167, 233 HTTPS (Hypertext Transfer
digitization 80–1, 83 facial recognition 65 Google Drive 15 Protocol Secure) 95, 144, 149
Dijkstra, Edsger 103 fake news 181, 207 Google Glass 57 hunger 216
disabled people 37, 53, 57, 220–1 fake profiles/accounts 187 Google Play 200 hybrid cloud storage 152
disaster relief 216, 221, 233 feedback, integrated user 171 Gosling, James 128 hybrid computers 101
discussion forums 196 Fibonacci 31 GPS (Global Positioning System) hybrid threats 157
Distributed Denial of Service fibre optic cables 144, 151 28, 103, 226 hyperlinks 150, 151
fields 88 graphical user interfaces
(DDoS) 22 File Transfer Protocol (FTP) 148 (GUIs) 173 I
do-it-yourself (DIY) computers files graphics 43
graphics cards 63 IBM
54–5 ASCII 84 graphics processing units punch card 99
DO-WHILE loops 109 compression 19 (GPU) 49 RAMAC 350 91
documentation 174 deleting 15 grey hat hackers 22
Domain Name System (DNS) 148 looking for 15 gyroscopes 53 icons 16, 138
domain-specific languages 140 opening 15 IDE (integrated development
dots per inch (DPI) 91 filtered reality 207 H
drawing 75 firewall software 23 environment) 126
Dropbox 15 fitness trackers 65, 225, 226 hackers 22–3, 103, 149, 157, 175, identities 178–9, 187, 197
drugs 159, 186 flowcharts 77 185, 186, 190–1, 227 IDLE 131
FOR loops 109 Ids, unique 165
E forensic analysts, computer 243 half-adders 87 IF-THEN-ELSE control structure
Fortran 119, 122 Hamilton, Margaret 218
EDSAC 32 frame rate 93 hard drives 35, 37, 44, 49 108
education 229, 232, 239, Free Basics 232 hardware 14, 41, 46–65 illegal content 181
freedom of speech 213 images
240, 242 freezing 24, 115 capacity 81
internet and 215, 216 frequency analysis 94 devices 48–9 ASCII 84
Eich, Brendan 166 friends, online 199, 202 engineers 241 computer screen 40
the elderly 215 functional languages 121 specialized 153 encoding 90–1
electronic tagging 57 functional tests 172 upgrading 49 imperative style of programming
elements 165 functions 109 Haskell 140 120
email 16, 17, 148, 156, 184 future computers 222–43 Hastings, Reed 154 implants 235
embedded systems 119 predicting 224–5 information, evaluating 211
emoji 85 inline styling 165
input data 109

254 R E F E R E N C E

input devices 42, 48, 53 linkers 113 motherboards 34–5, 48 pareidolia 74
input validation 171 Lisp 119 motion-capture technology 228 parental advice 191
Instagram 19 location tracking 201 mouse 37, 41, 44, 210 parsing 113
instant messaging 184 logging in, difficulty with 24 MSB (most significant bit) 82 passports, biometric 234
instructions, precise 69 logic errors 114–15 Multicast 154 password grabbing 190
integrated circuits 38, 39 logic expressions 105 multiple data centres 153 password managers 23
integration testing 172 logic gates 86–7 music 92, 133, 154, 155 passwords 22, 23, 24
interaction, online 183 loops 109 muting 202 patterns
interest-based networks 197 Lovelace, Ada 31, 99, 218 Muzak 155
internal hardware 48 low-level languages 110, 119 altering 75
internet 144, 150–1, 194, 196 LSB (least significant bit) 82 N recognizing 68, 74, 75
lurkers 197 using 74
digital divide 214–15 Nakamoto, Satoshi 230 peer-to-peer (P2P) networks 145
and global development M Napier, John 31 peripheral devices 36–7
216–17 NASA 41, 45, 131, 218 personal computers 33
net neutrality 212–13 machine code 110, 111, 113, natural language 121 personal information, sharing
Internet Protocol (IP) address 118, 122 net neutrality 212–13 186
148, 149, 191 Netflix 213 phishing 22, 190
Internet Service Provider (ISP) machine learning 236 networks 142–59 photo editing applications 17
148, 212, 213 machine learning languages 141 photo sharing 185
Internet of Things (IoT) 89, 125, Macs 51 closed and open 206–7 physical computing 55
129, 226–7 magnetic tape 81 hidden 73 physics 138
Internet.org 232 maintenance, software 175 types of 146–7 PIN numbers 23
interpreters 82, 112, 132, 133 maker movement 55 what is a network? 144–5 pixels 40, 90, 91
issue tracking software 173, 175 makerspaces 224 neural networks 237 plant monitors, smart 59
malware 23, 156–7, 159 news, and social networks 203 PlayStation Network 205
J MAN (metropolitan area newsfeeds 195, 197 plugboards 100
noise 101 plug-ins 167
Java 128–9, 134 network) 146 NoiseSocket 148 pop-ups 134
Java Virtual Machine (JVM) manuals 174 non-functional tests 172 pornography 186
markup languages 163 NoSQL databases 88 ports 34
128, 140 mathematics 77, 95, 100, power units 35
JavaScript 134–5, 162, 166–7 O presentation software 18
Jobs, Steve 33, 123, 152 104, 239 printers 25, 36, 44, 49
Johnson, Katherine 32 Matsumoto, Yukihiro 132 object-oriented programming privacy 65, 190–1, 227
Maya animation tool 127 (OOP) 107, 120, 128–9, 133, settings 187, 191
K media sharing 195 134, 138 private-key encryption 95
problem solving 68, 238
Kemeny, John G 123 networks 197 objects 107, 133 processing devices 48
keyboards 37, 41, 44, 48, 62, 210 memory 43 One Laptop Per Child (OLPC) 232 profiles 178–9, 195, 202
keyloggers 22, 23, 156, 190 merge sort 77 onion router 158–9 program structures 108–9
keywords 21, 105 mesh topology 147 online identities 178–9, 182 programming 29
Kilby, Jack 38, 39 micro:bit 54, 55 opcodes 111 early methods 98–9
Kodu 138–9 microblogging 185 open networks 207 techniques 96–115
Kurtz, Thomas E 123 microphones 25, 92 operands 111 programming languages 29, 73,
Microsoft 33, 55, 146 operating systems (OS) 16, 116–41
L breakthroughs 122–3
Kinect controller 62, 137, 139 44–5, 51 function of 118–19
LAN (local area network) 146 MS-DOS 33 operators, Boolean 104, 105 future 140–1
laptops 50, 51, 232 Store 200 optical discs 81 translation 110–11
law, breaking the 182 Windows 51 optimization 113 types of 120–1
LED 54, 55 Xbox 360 138 output data 109 Project Aquila 232
Leibniz, Gottfried 82 microtransactions 204 output devices 36, 42, 49, 53 Project Loon 233
lexing 113 Minecraft 129 oversharing 199 prosthetics 57, 234, 235
libraries 113, 124, 129, 130, 135 minority groups 213 protocols 144, 148, 149
light 90 model-view-controller design P proxy servers 191
LilyPad microcontrollers 54 patterns 171 pseudocode 77
linear searches 76 models 73 pacemakers 235
modular code 70 packets 149
monitors 37, 44, 48
Moore, Gordon 39

I N D E X 255

public-key encryption 95 S apps 200–1 stylesheets 164
public/private chat 203 bubbles 206–7 sub-problems 70, 71
publishing, on social networks satellites 29, 144, 151 hackers 23 substitution ciphers 94
saving work 15 platforms 196–7 supercomputers 33
203 scaling 170 safety 187 support desks 174
punch cards 81, 98, 99, 122 scams 159 shared content 198–9 switches 80, 83
Python 118, 130–1 scanners 48 social networks 19, 73, 194, 197 switching pages (Kodu) 139
Schickard, William 31 gaming and 204–5 syntax 166
Q Schrems, Max 179 using 202–3
science 238 social publishing platforms 196 errors 114
Quality Assurance (QA) testers Scratch 119, 136–7 software 14, 41 system administrators 242
243 ScratchJr 136 application 16–17
screen breaks 180 developing and designing T
Quantum Computing Language scripting languages 133 168–9, 241
(QCL) 141 scripts 134, 137, 166 errors 114-15 tablets 52–3, 180, 200
SD memory cards 15 maintenance and support Tabulating Machine 99
qubits 141 search engines 20–1, 151, 211 174–5 tags 163
planning ahead 170–1 TCP 154
R setting a default 20 rental 153 technical writers 243
search terms 21, 105 system 16 technology 238
R 140 searching, effective 21 testing 172–3 televisions 28
railway maps 72 Searle, John 237 Software Development Life testing, software 168, 172–3
RAM (random-access memory) Secure Socket Layer (SSL) 95 Cycle (SDLC) 168, 169 text, display 40
security software engineering 240 texting 184
34, 43, 49, 63, 81 solid-state devices (SSDs) 81 thinking skills 69
ransomware 157 APIs 125 solutions, multiple 69 tongue, seeing with 235
Raspberry Pi 54, 55, 123 cloud storage 153 Sonic Pi 133 topology 147
rasterization 90 cyber 22–3 sound 25, 40 Tor network 158–9
Real-time Streaming Protocol cyberbullying 188–9 sound waves 92 Torpedo Data Computer
data packets 149 source code 111
(RTSP) 148 hacking and privacy 190–1 sources 211 (TDC) 100
Real-time Transport Protocol JavaScript 167 space probes 45, 218 touchscreen 52–3, 210
malware 156–7 spaghetti code 170 toys, digital 60–1
(RTP) 148 networks 145 spam 156 traffic control 64, 227
recycling 49, 164, 217 online 185, 186–7 speakers 49 transgender people 219
regression tests 173 selectors 165 spell-checkers 221 transistors 38, 80, 83
remixing 69 self-driving cars 102 spreadsheets 17 translation 110–11, 118
removable hard drives 37 self-harm 186 sprints 169 Transmission Control Protocol
REPL (Read-Evaluate-Print Loop) selfies 195 spying devices 65
semantics 163 spyware 156 (TCP) 149
133 sensors 57, 61, 64, 65, 224, 226 SQL (Standard Query Language) transposition ciphers 94
representational state transfer servers 145 88, 140 trees 140
Shannon, Claude 86 star topology 147 trending tools 89
(REST) 125 sharing 198–9 steam 205 trojans 156, 157
research and development 242 shopping 64 STEAM 238 trolling 187, 205
resolution 91 Simple Mail Transfer Protocol steganography 90 truth tables 86, 87
resource sharing 145, 153 (SMTP) 148 STEM 238 Turing, Alan 95, 237
reviews, online 196 Skype 184 stereoscopic vision 228 Turing test 237
“Right to be Forgotten” law 199 sleep patterns 180, 226 storage tutorials 174
ring topology 147 slide rules 100 cloud 152–3 Twitter 19, 125, 207
Ritchie, Dennis 110, 126 slideshows 18 devices 49 two-factor authentication (2FA)
robots 41, 224 smart devices 58–9, 129 stored program computers 32
smartphones 19, 52–3, 58, 151, strategy design pattern 171 191, 201
home 59 180, 184, 200, 225, 226 streaming 154–5 TypeScript 140
toys 61 smartwatches 56, 57 strong ties 206, 207
ROM (read-only memory) 43 social engineering 22, 190 Stroustrup, Bjarne 127 U
rootkits 156 social media 29, 73, 89, 180,
routers 37, 151 182, 194–5 UDP 154
routing 144, 149 unfriending 202
RTOS (real-time operating Unicast 154
systems) 45
Ruby 118, 132–3
runtime errors 115
Rust 140

256 R E F E R E N C E

Unicode 85 cameras 64 wearable tech 54, 56–7, 61, 225 X–Z
unit tests 172 cards 43 web apps 135
universal language 141 chatting 184 webcams 25, 36, 93, 137, Xbox Live 205
updates 175 encoding 92, 93 Yahoo 151
upgrades 175 sharing 185 184, 186 zero, concept of 30
Upton, Eben 123 streaming 154, 155 webpages 151, 158, 162–3 zero-day vulnerabilities 175
URL (Uniform Resource Locator) virtual reality (VR) 49, 221, websites 124, 151 zip programs 19
224, 228–9 Zuckerberg, Mark 197, 232
148 virus protection 186 construction 18, 133, 134, 135
USB (universal serial bus) 15, 34 viruses 22, 156, 159 deep web 158–9
user acceptance testing 173 visual aids 18 updates 175
user guides 174 visual programming languages WhatsApp 148
user stories 175 138–9 WHILE loops 109
user-generated content 194 visual style of programming 120 white hat hackers 22
utilities 45 visualization 89 Wi-Fi connections 25, 37, 52, 226,
voice commands 53 232
V von Neumann architecture 42 Wi-Fi mirroring devices 23
von Neumann, John 42 Windows PC 51
values, fixed 106 VR sickness 229 wireless networks 144
valves 83 women 215, 218–19
variables 73, 106, 107, 109 W word processors 17
vectors 90 workplace, internet in 215
Venn diagrams 104, 108 WAN (wide area network) 146 World War II 32
Verilog 140 Waterfall development style 169 world wide web 150–1, 162, 198
video Wayne, Ronald 33 World Wide Web Consortium
weak ties 206, 207 (WC3) 162
applications 17 worms 156, 157
calls 18, 61 Wozniak, Steve 33

Acknowledgments

DORLING KINDERSLEY would like to thank: Charvi Arora, Bharti Bedi, Collection (cra). 91 Alamy Stock Photo: Interfoto (br).
and Emma Grundy Haigh for editorial assistance; Revati Anand for 92 Dreamstime.com: Choneschones (cr). 95 Alamy Stock Photo:
design assistance; Surya Sarangi for picture research assistance; Fine Art Images / Heritage Image Partnership Ltd (cr). 101 123RF.
Victoria Pyke for proofreading; and Helen Peters for the index. com: Andrija Markovic (br). 102 Getty Images: Noah Berger / AFP
(br). 105 Getty Images: Photo 12 / Universal Images Group (cr).
The publisher would like to thank the following for their kind 114 Naval History and Heritage Command: (cra). 119 NASA: (bc).
permission to reproduce their photographs: 122 Getty Images: Bettmann (crb). 123 Alamy Stock Photo: Keith
Morris (br). 125 123RF.com: Balein (cr). 129 Alamy Stock Photo:
(Key: a-above; b-below/bottom; c-centre; f-far; l-left; r-right; t-top) Veryan Dale (br). 140 123RF.com: Alexmit (crb). 141 123RF.com:
Ximagination (cra). 155 Dreamstime.com: Thiradech (tr). 166 Getty
31 Getty Images: Science & Society Picture Library / SSPL (br). Images: Bloomberg (c). 179 Getty Images: Joe Klamar / AFP (br).
32 NASA: (bc). 37 Alamy Stock Photo: JEP Celebrity Photos (tr). 195 123RF.com: Ferli (cra). 197 123RF.com: Panom Bounak (cla).
38 Getty Images: Andrew Burton / Getty Images News (bl). 198 123RF.com: Drserg (cra). 201 123RF.com: Hkeita (br).
40 123RF.com: Kornilov14 (cr). 42 Alamy Stock Photo: Photo 204 123RF.com: Macrovector (cl). 215 Alamy Stock Photo: Joerg
Researchers / Science History Images (bl). 45 NASA: JHUAPL / SwRI Boethling (crb). 218 Alamy Stock Photo: NASA Image Collection
(cr/New Horizons spacecraft, fcr). 55 Getty Images: Jamie McCarthy (cr). 221 Image courtesy Farida Bedwei: (crb). 229 123RF.com:
/ Getty Images Entertainment (cr). 57 Alamy Stock Photo: DPA Victor Zastolskiy (tl)
Picture Alliance (br). 60 akg-images: Fototeca Gilardi (br). 69 123RF.
com: Wavebreak Media Ltd (tl). 71 NASA: (bc). 73 123RF.com: All other images © Dorling Kindersley
Rawpixel (bl); Balint Sebestyen (bc). 74 Alamy Stock Photo: Paul For further information see: www.dkimages.com
Weston (cr). 77 Getty Images: SVF2 / Universal Images Group (tr).
81 NASA: (cr). 83 123RF.com: Rangizzz (cra). 84 Dreamstime.com:
Artaniss8 (br). 86 Getty Images: Alfred Eisenstaedt / The LIFE Picture


Click to View FlipBook Version