1 Flashcards
CS is a … field
social & ethical
Computer Science is difficult to define because of…
the evolving nature of the field, the broad scope covering diverse disciplines and the deep interweaving of theory and applications.
Pólya’s Systematic Approach (4)
Understand the problem
Devise a plan
Execute the plan
Review & extend the solution
Computational Thinking involves
Decomposition (complex problems into simpler parts)
Heuristics (problem-solving techniques yielding good enough answers)
Strategies for solving a problem (4)
Critical Thinking
Solving a concrete instance
Finding related problems
Working backward
What is abstraction?
A way to simplify complex systems by focusing on the high-level overview rather than the nitty-gritty details.
Why abstraction is useful?
It allows us to understand & solve problems more efficiently by removing unnecessary information.
Why are computers called general-purpose machines?
Because they can handle a broad spectrum of computational tasks, thanks to their programmability. This means that with the right software, a computer can switch from being a word processor to a gaming console, or from analysing scientific data to playing music.
Describe specific-purpose machines. Give examples.
Like calculators, they are designed for a single computational task, such as arithmetic operations.
A toaster is built specifically for toasting bread and cannot be reprogrammed to, say, boil water.
A general-purpose machine like a computer can be linked to…
a multitool adaptable to various tasks.
Specific-purpose machines are more like individual tools…
each optimized for a particular function.
Identify 3 advantages of a using a Biometric authentication system in a company.
Convenience: Prevents situations like losing the entry card or similar objects. Users do not have to remember or carry anything, and the process can be quick and easy.
Strong security: Biometric data is unique to each individual, making it difficult to fake or replicate. This can help to prevent unauthorized access to systems and data.
Accountability: Biometric systems can provide a clear audit trail of who accessed what and when. This can help to track activites and ensure individual accountability.
Identify 3 disadvantages of a using a Biometric authentication system in a company.
Privacy concerns: Biometric data is considered to be sensitive personal information. There are concerns that biometric data could be used to track people or discriminate against them.
Irrevocability: Biometric data cannot be changed like passwords. If someone’s biometric data is compromised, they cannot change it, which could lead to security vulnerabilities.
False positives/negatives: No biometric system is 100% accurate. There is always a chance of false rejections (an authorized person being denied access) or false acceptances (an unauthorized person gaining access).
Is CS an Engineering discipline?
CS merges the theoretical underpinnings of computation with their practical applications, so it’s a blend of science and engineering.
So is not exclusively an engineering discipline but a hybrid of engineering and science as we talk about both the theory and its application in CS.
CS delves into…
scientific aspects like algorithms, data structures, and the boundaries of computation.
CS also embodies…
engineering when applying theories to real-world challenges, as seen in software engineering, computer architecture, and networking.
Which are the three disciplines in CS?
Hardware
Software
Theory
Define hardware and name its subfields
Physical components of a computer and its supporting devices.
Subfields: computer architecture, circuit design
Software:
Diverse applications systems, and development tools.
Define applications software and name its subfields.
Programs that perform various tasks for users.
Subfields: web development, mobile app developer
Define systems software and name its subfields.
Programs that directly control computer hardware.
Subfields: operating systems, device drivers.
Define development software and name its subfields.
Programs to create other software applications.
Subfields: Integrated Development Environments (IDEs), version control.
Theory:
Study of algorithms, computability, and cryptography.
Define algorithms in theory and name its subfields.
Study of step-by-step procedures for problem-solving.
Subfields: algorithm analysis, data structures.
Define computability in theory and name its subfields.
Investigates the power and limitations of computation.
Subfields: computational complexity theory, formal languages.
Define cryptography in theory and name its subfields.
Ensures secure communication and data protection.
Subfields: encryption, cryptanalysis.
CS is an extraordinary field because it combines…
logic and creativity, structure and chaos, standardisation and non-standardisation.
CS is an extraordinary field because it builds…
something from nothing and solves previously unsolved problems.
Applying logical thinking to create innovative and creative solutions helps us
Finding logical patterns and principles to drive innovation.
Utilizing principled engineering techniques to design efficient and effective solutions.
CS requires organizing complex systems…
while handling unpredictable events and edge cases.
Standardised concepts are…
Specific, well-defined elements.
Precise and consistent, enabling interoperatibility.
Non-Standardised concepts are…
Generalized ideas and theoretical principles.
They allow flexibility and innovation.
What are standards?
Documents or lists that define the syntax or semantics of a language.
Why do we need standardization in CS?
Because it leads to ensuring having compatible systems that can interoperate safely between each other. It ensures consistency, reliability, and interoperability across various systems and platforms.