Comp sci rev Flashcards

1
Q

Decomposition

A

Decomposition is where you break the problem

down into sub-problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Abstraction

A

Abstraction is where you remove any
unnecessary details, so you can focus only on
what is important.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Algorithm

A

A sequence of instructions to solve a problem

or achieve a goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pseudocode

A

Pseudocode is a way to design algorithms. It
uses commands which are similar to those in a
computer program, but is not as rigid, as it is
only intended for planning the steps involved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why won’t pseudocode run

on a computer?

A

Pseudocode is a design tool. Just like you can’t
drive the design of a car or live in an architect’s
design of a house.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a trace table?

A

A trace table is used to test if an algorithm

written in pseudocode works properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why do you need trace

tables?

A

Because pseudocode is not a working
computer program, you cannot run it to test it.
Instead you follow the pseudocode, writing
down the values it generates and outputs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is searching?

A

Searching is where the programs checks
through a list looking to find a piece of data.
(E.g. looking for a name in a list.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does a linear search

work?

A

A linear search starts with the first item in the
list and checks each one in turn to see if it
matches the data being searched for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does a binary

search work?

A

A binary search checks the middle value in the
list. If that middle item is higher than the search
value it disregards the top half of the list. Then
it checks the middle of the remaining values.
This process repeats until the value is found, or
no data remains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a bubble sort?

A

This algorithm checks if the first two values are
in order. Then the second and third, then third
and fourth, etc. until it reaches the end of the
list. This process repeats until all data is in
order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

cell reference- replicate

A

copying a formula through multiple series

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Wearable tech advantage

A

track steps

interact with friends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

wearable tech disadvantage

A

addiction
increase landfill and social pressure
personal injury

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Black hat hackers

A

A hacker who attempts to gain access to company’s network for personal gain
they do not have permission from the company to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

White hat hackers

A

A hacker who exploits security flaws in a companies network and brings it to their attention so it can be fixed

17
Q

Grey hat hackers

A

A hacker who attempts to gain access to a network for a good cause but doesn’t have permission by the company to do so.

18
Q

network

A

two or more devices

19
Q

Wide area network

A

Covers large area usually across the country or between countries

20
Q

2 advantages of using a computer network rather than a stand alone machine

A

Easier to communicate

Easier top backup

21
Q

Disadvantage of using network arranged using bus topology.

A

If the backup breaks all will fail.

22
Q

Mac address

A

A mac address is what is used to identify singerly each computer

23
Q

Which search is more efficient – binary

or linear?

A

Binary -especially true when looking for
data in large lists, like big companies do (think
Facebook, Google etc). In fact, in a list of 100 items.

24
Q

What are CBI’s

A

Computer based implants

25
Q

How is pseudo code written?

A

Pseudocode is written in the same style as
program code, but it is more like English, and
therefore easier to read.