Comp sci rev Flashcards
Decomposition
Decomposition is where you break the problem
down into sub-problems.
Abstraction
Abstraction is where you remove any
unnecessary details, so you can focus only on
what is important.
Algorithm
A sequence of instructions to solve a problem
or achieve a goal.
Pseudocode
Pseudocode is a way to design algorithms. It
uses commands which are similar to those in a
computer program, but is not as rigid, as it is
only intended for planning the steps involved.
Why won’t pseudocode run
on a computer?
Pseudocode is a design tool. Just like you can’t
drive the design of a car or live in an architect’s
design of a house.
What is a trace table?
A trace table is used to test if an algorithm
written in pseudocode works properly.
Why do you need trace
tables?
Because pseudocode is not a working
computer program, you cannot run it to test it.
Instead you follow the pseudocode, writing
down the values it generates and outputs.
What is searching?
Searching is where the programs checks
through a list looking to find a piece of data.
(E.g. looking for a name in a list.)
How does a linear search
work?
A linear search starts with the first item in the
list and checks each one in turn to see if it
matches the data being searched for.
How does a binary
search work?
A binary search checks the middle value in the
list. If that middle item is higher than the search
value it disregards the top half of the list. Then
it checks the middle of the remaining values.
This process repeats until the value is found, or
no data remains.
What is a bubble sort?
This algorithm checks if the first two values are
in order. Then the second and third, then third
and fourth, etc. until it reaches the end of the
list. This process repeats until all data is in
order.
cell reference- replicate
copying a formula through multiple series
Wearable tech advantage
track steps
interact with friends
wearable tech disadvantage
addiction
increase landfill and social pressure
personal injury
Black hat hackers
A hacker who attempts to gain access to company’s network for personal gain
they do not have permission from the company to do so.