CSTA Glossary Dynamic

PK-12 CS Education Glossary

This glossary includes definitions of terms used in the CSTA K-12 Computer Science Standards (2017), CSTA Standards for Computer Science Teachers (2020), and K-12 Computer Science Framework (2016). It also includes other terms relevant from the fields of education and computer science. This is a work in progress.

937 Results

A/B tests

Abstract Data Type

abstraction

access

Access Control

Access Control List

Accessibility

Accountability

Accuracy

Accuracy Metrics

Activation Function

Actuator

adaptive technology

Addressing

Administrative Control

adoption

advanced computing technology

Adversarial Attack

Aesthetics

aggregate

Agile framework

Agile Workflow

AI

AI algorithm

AI model

AI Solution

AI tool

AI-Assisted IDE

AI-Assisted Programming

AI-Assisted Test Case Recommendation

AI-Assisted Workflow

AI-generated output

AI/ML model

AI/ML model confidence

algorithm

Algorithmic Accountability

Algorithmic bias

algorithmic fairness

Algorithmic Governance

Algorithmic Paradigm

algorithmic system

Alignment

analyze

Animation

Annotation

Anomaly

Anonymization

answer

Anticipation

Application Programming Interface

Architecture

ARP Poisoning

Array

Arraylist

Artificial General Intelligence

Artificial Intelligence

asset-based perspective

Assistive Technologies

Asymmetric Key Cryptography

attribute

Attribution

Audience

Audience Adaptation

Audit System Processes

Audited Comparison

Authentication

Authorization

Autocomplete

automation

Availability

backgrounds

bandwidth

Bar chart

bar graph

barrier

Baseline

Basic Animation Principles

Behavior Tree

benefit

bi/multilingual learner

Bias

Bias (Data Bias)

Bias prevention strategies

big data

Binary Search

Bluetooth

Boilerplate Code

boolean

Branch

breach

Breadboard

Breakpoint

bug

Calculate New Variables

Call Stack

capabilities

Carbon Footprint

career

Categorical Data

Causation

Central Processing Unit

certification

chart

Chart types

Children's Online Privacy Protection Act

CIA Triad

Circuit

clarity

Classification

Classification Model

classroom climate

clean

cleaning data

client

client/server model

Closed-Loop Feedback Control

Cloud service

code

Code Analysis

Code Analysis Linter

Code Optimization

Code Refactoring

Code Review

code segment

Code Understanding

Cognitive Bias

Collaborate

Collaborating Around Computing

collect

column

command

Command Injection

Command-Line Programming

comment

Communicating About Computing

community

compare

completeness

complex interaction

Complex Question

Compliance

Compliance Requirement

component

Computational Efficiency

Computational Models

Computational Problem

computational solution

computational system

computational technologies

computational thinking

computational tool

Computational Tools/Libraries

computer

Computer Aided Drafting (CAD)

computing

computing device

computing history

computing skills

computing system

computing technology

computing tools

concept

condition (as in “if…then” logic)

conditional

confidence

Confidentiality

Configuration Weakness

consciousness

consent

Consent mechanisms

consequences

Consistency

constant

Constraint

constructive feedback

Containment

Contrast

Controlled experiment

Copyright

correctness

Correlation

corruption

creative commons

Creator Rights

CSV

culturally relevant / responsive pedagogy (CRP)

culture

cyber attacks

cyber hygiene

Cyber Threat

cybersecurity

Cybersecurity Decision

Cybersecurity Policy

data

Data Acquisition

Data Breach

Data Center

Data Cleaning

Data Collection

data collection strategy

Data dictionary

Data Encryption

Data governance

Data integrity

data interpretation

data investigation

Data Manipulation

data ownership

Data pipeline

data presentation

Data privacy

data processing

Data Provenance

data question

Data Representation

Data Science

Data Security

Data Sheet

data simulation

Data Source

Data Sovereignty

data story

Data storytelling

Data Structure

Data Transformation

data type

Data Unit

data use

data visualization

Data Wrangling

data-driven algorithm

dataset

Dataset composition

Dataset Shift

ddos

Debugging

Decapsulation

decision

Decision Boundary

Decision Point

Decision Rationale

Decision Tree

decomposition

Deepfake

Defense-in-Depth

deficit-based perspective

Denial of Service

design

design document

design specifications

design thinking

designer

deterministic algorithm

Developing & Using Abstraction

Developing & Using Abstraction

Developing & Using Abstraction

Developing & Using Abstraction

Developing & Using Abstraction

Developing & Using Abstraction

Developing & Using Abstraction

Developing & Using Abstraction

development tools

device

Device-to-device communication

Diagnostic Tools

diagram

Dictionary

differentiation

digital artifact

digital citizen

digital device

Digital divide

digital footprint

Dimensionality reduction

Disaggregated Metrics

Discriminative System

Disinformation

Disparate Impact

Distortion

Distributed Denial of Service

Distributed Team Environment

diverse

diverse learners

Diverse Sources

Diverse User

Diverse Viewpoints

Diversity of human identities

Divide and Conquer Debugging

Divide-and-Conquer

Docstring

document

Documentation

Dropping

Dual-Use Technology

e-waste

Edge Case

effectiveness

Efficiency

Electromechanical system

Electronic Waste (E-waste)

embedded

Embedded network

emerging technology

Encapsulation

Encryption

Encryption Handshake

Encryption Method

Endpoints

Energy Consumption

Enforcement/Consequences

engineer

Engineering design process

enterprise-level

environment

environmental impact

environmental implications

Equitably

Equity

Equity and Justice

era

Eradication

error

Error Condition

ethical design

ethical impact

Ethical Implication

ethical innovation

ethics

event

Exclusion

Executive Summary

Existential Risk

Exploit

Exploratory Data Analysis

F1-Score

Fair Use

Fairness

Fairness Metrics

False Positive

Family Educational Rights and Privacy Act

Fan modder

Feasibility

feature

Feature Branch

Feature Scaling

Feed-forward

field

file

file management

file manager

file properties

Filter

Finite-State Machine

Firewall

Firewall Logs

Fit

flow

flowchart

formative assessments

Formatting

Fostering an Inclusive Computing Culture

Full-stack application

function

functionality

Fuzz Testing

Game Assets

Game experiences

Game Interactions

Game Playing Agent

Game Theory

Gameplay

Gateway

gender

General Data Protection Regulation

Generalizability

Generalization

generated code

Generative AI

Generative System

geographic location

gestures

Git

government

Gradient Descent

granularity

Graph

Graphical conventions

Graphics Processing Unit

Group

Hardcoding Credentials

Hardening

hardware

harm

Health Insurance Portability and Accountability Act

heuristic

Hierarchical data

High-dimensional data

Histogram

historical trajectory

Host-based Firewall

human expression

Human Factors

Human Protection

Human Well-being

Human-Centered Design

Human-in-the-Loop

Hyperparameters

Hypothesis

i/o

idea

Ideation

Identification

Immersion

impact

Impact Assessment

Implementation

Imputation

in-service [PD]

Incident

Incident Response Plan

Incident Response Process

inclusion

Inclusive Collaboration

Inclusive Design

Index

Indicator of Compromise

industry

Inequity

Inference

information

infrastructure

initial certification / licensure

Innovation

input

Input data

Input Device

Input Validation

inquiry-based learning

Insecure Device

institutional racism

integer

Integrate

Integrated Development Environment

Integration Test

Integrity

Intellectual Property

intended impact

intent

Interactive Experience

interconnected devices

interface

internalized racism

internet

Internet of Things (IoT)

Interpersonal Communication

interpersonal racism

Interpersonal Skills

Interpretability

Interpretation

intersectionality

Intrusion Detection System (IDS)

investigation

iteration

Iterative Cycle

Iterative Development

Jessica

JSON

Justification

justify

Kanban

Key-Value Pair

Keyframing

label

large-scale data

latency

laws

Layer

Layperson

leak

Legislation

Lessons Learned

library

license

lifelong learning

Light Emitting Diode

Likelihood

limitation

Line graph

Linear Regression

Linear Search

Linked List

list

log in

log off

logic error

logical relationship

Logistic regression

loop

machine

machine learning

Malicious Behavior

malicious code

malware

Mandatory Requirements

Marginalized groups

mastery; mastery learning

Meaningful Human Involvement

measurement

memory

Merge

Merge Conflict

Metadata

Metric

microagressions

Microcontroller

minority groups

Misinformation

misleading conclusions

Misleading interpretations

Misleading scales

Missing Data

Mitigation

Mitigation Strategy

Model

Model appropriateness

Model Card

Model choice

Model Complexity

Model Performance

Model Training

Modeling Techniques

modify

modular program

module

Monitor Network Traffic

Moral Rights

Multi-Agent Systems

Multimodal Input

multivariate

narrative

Narrative Flow

Nash Equilibrium

natural resources

need

Nested data

Netstat

network

Network Architecture

Network Connectivity Issue

Network protocol

Network Segmentation

network structure

Network Topology

Network Traffic Analysis

Networking Hardware

Neural Network

Neuron

node

Non-hierarchical data

non-numeric

Non-Playable Character

Non-Technical Audience

Normalization

numeric

numeric data

object

observation

Offensive Cyber Operations

One-Hot Encoding

online

open source

Open Systems Interconnection Model

open-ended

operating system

Optimization

Optimize

organization

Organizational Asset

Organizational Weakness

organize

organizing data

Outcome

Outlier

Output

Overfitting

overlooked individuals

packet

Packet Sniffing

Parallel Processing

Parameter

Parsing

password

patch

Pattern

pattern recognition

Payment Card Industry Data Security Standard

Payoffs

pedagogical content knowledge

pedagogy

peer review

penetration testing

Peripheral

personal data

personal information

Personally Identifiable Information

Phishing

Physical computing

Physical Control

physical infrastructure

physical security

pictograph

Pie chart

pixel

Player behavior

Player emotion

Player Experience

Player motivation

Players

pluralism

policy

Policy Brief

Policy Change

Potential Impact

Power

practice

pre-service [PD]

Precision

Prediction

Predictive Error Flagging

Predictive Model

Pretexting/Baiting/Tailgating

Privacy

Privacy by Design

Privacy safeguards

private information

privilege and power

probabilistic algorithm

procedure

process

Process Documentation

processing

professional development

professional identity

professional learning community

Professional Protocols

professionals

program

program development

program requirements

project

Project Development

Project Goals

Project Management

Project Management Methodologies

Project Timeline

Project viability

Prompt Engineering

Propaganda

protection

Protocol

Protocol Stack

prototype

Prototyping

Proximity

pseudocode

Public Domain

public information

Pull Request

purpose

Purpose and Scope

Qualitative Analysis

Qualitative Data

quality

Quantitative Analysis

Quantitative Data

question

Queue

race

race condition

racial justice

racial literacy

randomness

Range

ransomware

Rationale

Readability

Readme file

real-world

reassembly

Recall

Recognizing and Defining Computational Problems

Recommendation System

record

redundancy

Refactoring

reference documentation

Refinement

Regression

Regularization (L1/L2)

regulation

Regulatory Framework

relationships

Reliability

remix

Remote control

Remote Debugging

Remote monitoring

Rendering

Repository

representation

Reproducibility

requirements

research

Research question

reshape

resilience

Resistor

respectful

Response Time

responsible

Responsible Design Principles

Responsible Disclosure

responsive classroom practitioner

Responsive Design

Restructure

reusability

risk

Risk Evaluation

Risk Mitigation

Risk Mitigation Strategy

Role-Based Access Control

Roles and Responsibilities

router

routing

row

rule-based algorithm

Rule-based system

rules

runtime error

safe

safeguard

Safeguards (AI)

sampling

scaffold

Scalability

Scan for Vulnerabilities

Scatter plot

Schematic diagram

school culture

screen time

Scripting Language

Scrum

secret

Security

Security Automation

security breach

Security Features

security flaw

Security Implication

Security Measure

Security Operations

Security Policy

Security practices

Security protocols

Security Risk

selection

self-directed learning

self-efficacy

Sensitivity

Sensitivity analysis

Sensor

Sentiment Analysis

sequence

Serial communication

Server

Servo motor

share

simulated device

simulation

Single Point of Failure

Social Engineering

Social Processes

societal impact

societal implications

societal responsibility

societal risks

society

socio-cultural consciousness

Socioeconomic Status

Sociotechnical system

software

Software Development Lifecycle

Software Development Process

Software Engineering Best Practices

sort

source

source code

Source control system

Spoofing

spreadsheet

Squash and Stretch

Stack

Stakeholder

Standardization

standards-aligned

States of Data

Static Analysis

Statistical Methods

stereotype threat

storage

Storyboard

Strategies

Stream Processors

string

structural racism

Structured Data

Summarize

Summary statistics

Supervised Learning

survey

sustainability

Sustainable Computing

switch

symbols

Symmetric Key Cryptography

syntax error

Syntax Highlighting

synthetic data

system failure

System Logs

system requirements

System Vulnerability

Systematic Debugging

systematic equity

systematic racism

Systematic Testing

Systematically Apply

systemic barrier

Systemic Bias

systemic racialization

Systemic Risk

systems thinking

table

tablet

Tabular Data

Tailored Communication

tally chart

task allocation

Team Coordination

Team Environment

Technical Audience

Technical Constraints

Technical Control

Technical Translation

technological pedagogical content knowledge (TPACK)

technology

test case

Test Coverage

test documentation

Test Plan

testing data

Text processing

text-based data

threat

Threat Detection

threat modeling

time periods

Timing

tool

Topology

trace

Trade-off

traditions

training

Training Data

translanguaging

translanguaging pedagogy

transmission

Transparency

Transport Layer Security/Secure Sockets Layer

Tree

Trend

trojan horse

troubleshooting

Truncated axis

Tuning

Types of Control

UI (User Interface) Design

Unauthorized access

unconscious bias

Underrepresented groups

unintended impact

Unit Test

Universal Design

Unstructured data

Unsupervised Learning

update

update/modify

upskilling / reskilling

Usability

Usability Evaluation

user

User Behavior

User engagement

User Experience

user feedback

User Interface

User Journey Map

user needs

User Persona

User-friendly

username

Validity

value

variability

variable

Version Control

Version Control Tools

Video RAM

Visual evidence

Visual Fidelity

visualization

Vulnerability

Watch Window

Web content accessibility guidelines

Weight

well-being

white privilege

white saviorism

white supremacy

whiteness

Wi-Fi

wired

wireless

workflow

Written report

XML