Computer Science Flashcards
Network protocol that allow computers to interact wirelessly with the internet
Wi-Fi
Sequence of instructions used to complete a computation, or a process or set of rules to be followed in calculations or other problem-solving operations.
Algorithm
An instruction set that tells a computer how to perform tasks
Computer programming language
Component which interprets and executes instructions on a computer
Central processing unit
Standard language used to create webpages on the World Wide Web
HTML
Practice of mass-sending unwanted messages via email or text
Spamming
A form of digital decentralized currency, examples of which include Ethereum and Bitcoin.
Cryptocurrency
An English mathematician and computer scientist, who named a test that can determine whether a computer can imitate human intelligence. He is also the namesake of a test used to determine whether an Artificial Intelligence can pass as human.
Alan Turing
The programming language developed by James Gosling in 1990 at Sun Microsystems.
Java
A system that serves as storage space for data and instructions on a device.
Computer memory
Type of malware that is capable of self-replicating and spreading to other computer systems.
Computer worm
An algorithmic problem tasked with finding the shortest route between a set of points and locations that must be visited.
Traveling salesman problem
A naming convention for different websites on the Internet.
URL (also called Uniform Resource Locator, or web address
A unit of memory involved in computing that can be prefaced with kilo-, mega-, giga-, and others depending on their number.
Bytes
This allows users to store their data on off-site locations.
Cloud storage
What base-2 numeral system of 1s and 0s is used by most modern computers?
Binary
Sir Tim Berners-Lee and Alan Turing are best known for their pioneering work in what
scientific field?
Computer science
What daughter of the British poet Lord Byron is considered to be one of the first-ever
computer programmers due to her work on algorithms?
Ada Lovelace
The strong form of this concept is refuted in the Chinese room argument. A test for
this concept evaluating indistinguishability from human conversation is named for Alan Turing. For the point, name this concept that refers to a computer’s ability to think like a human brain.
Artificial Intelligence
Predecessors of these entities included Wingdings. A set of these entities would later be introduced and constantly added using the Unicode standard, and a face with tears of joy is the most popular one of these entities. For the point, name these pictograms often used in text messages that include a host of facial expressions and objects.
Emoji
The largest unit of this measurement is a yotta, although a bronto has been proposed. This computer component is supported by secondary forms, including cards, external hard drives, and the Cloud. For the point, identify this computer component that comes in Random
Access and Read-Only types.
Memory
A company that runs one of these software systems named Ecosia claims to be environmentally friendly and plants trees with its profits. Information will no longer be displayed by these programs following de-listing. These programs identify potential matches for queries using web crawling. For the point, name these web programs used to find information on the internet, the most popular of which are Bing and Google.
search engine
The singularity is a hypothesis that the invention of the super form of this technology will trigger growth that may lead to human extinction. Advances in this technology include the creation
of AlphaZero, by DeepMind, that defeated Stockfish in a match of one thousand rounds of chess. Elon Musk frequently warns about the danger of this technology. IBMs Watson is an example of, for the point, what technology of thinking machines?
Artificial Intelligence
One of these products invented by Alexey Pajitnov is sometimes used to disrupt visual memory. Congressional hearings concerning these objects questioned whether they cause children to engage in violence, and these products are given ratings based on their content by the ESRB. For the point, name these entertainment products produced by companies such as EA and Nintendo.
Video Games
Stephen Kleene [[KLAY-nee]] names a type of this symbol that returns a set of
strings closed under concatenation. A forward slash and this symbol are used to
delimit block comments in (+) JavaScript and CSS. In languages like C++, this symbol
is used to de-reference a pointer variable. This symbol denotes required fields in web
forms written in (*) HTML. For the points, name this computer programming symbol that also typically represents multiplication.
Asterix (also accept star)
The term for this computing technique was coined by David Michie in 1968.
Related to caching [[“CASH”-ing]], this technique is often used in compilers (+) for
functional programming languages, where a “call by name” strategy is employed.
With the goal of “turning a function into something to be (*) remembered,” for the
points, what is this computing technique that stores the results of function calls to be returned from a cache at a later time, also called tabling?
Memoization
To use this method on larger problems, it is often useful to implement a “tail
call” to optimize memory use and avoid stack (+) overflows. Common
implementations of this concept in programming are calculating factorials, greatest common divisor, binary search, and the Towers of (*) Hanoi problem. For the points, what is this non-iterative method of solving computational problems, where functions call
themselves from within their own code.
Recursion
One of the first references to this term for a type of computer program was in
the first UNIX manual in 1971. This term was popularized by Ken (+) Thompson in his 1983 Turing Award lecture “Reflections on Trusting Trust”. These entities
differentiate themselves from a virus by not injecting themselves into other (*) files.
For the points, name this type of malware that misleads users of its purpose, whose name derives from an Ancient Greek story of deception.
Trojan
In quantum computers, this task can be accomplished by using Grover’s algorithm.
This task follows “pruning” in a notable solution to optimization problems. This task can be performed in depth-first or breadth-first ways in graphs, and a common demonstration of divide-and-conquer is the “binary” form of this task. For the point, name this task of finding
a certain value in a given input.
Searching
A super variant of this entity created by Samy Kankar could track even anonymous
TOR users, and their risk is mitigated by the Public Suffix List. Lou Montoulli coined this term to describe entities that can record browsing histories of users and store passwords and usernames on their devices. For the point, name these small blocks of data created by a web server while browsing the web, named after a popular baked snack.
Cookie
The malloc function in C and C++ allocates this resource, and Java uses automatic
garbage collection to reclaim this resource, which is stored near the main processor in a CPU cache. The non-volatile type of this resource retains data even without a power source. For the point, name this computer resource used to store information that comes in a random access type abbreviated RAM.
Memory