CSCI Final Review Flashcards

1
Q

What are html tags?

A

Tags are the bracket parts ex : <p> </p>, <img></img>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are attributes?

A

Parts that describe html tags. Things like width=400 or height=500, src=someimg.jpg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is CSS?

A

Styles that make things look pretty. Ex.: style=”float:right”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do you center an image to a webpage that is able to pass HTML 4.01 validation?

A

text-align:center attribute or style=”float:center”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If we have”n” bits, where n≥0 is an integer, what is the maximum number of different symbols we can encode?

A

2^n buts where n=0 to infinity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If we need to encode 37 different symbols using binary, what is the minimum number of bits needed?

A

2^6 bits=64 bits. (guess and check)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(100111)2=(___)10

A

79

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(97)10=(____)2

A

1100001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the TOIBE index?

A

A list of the most popular programming languages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Most typical life cycle of a program?

A
  1. Describing the Problem (problem statement)
  2. Making a Plan (algorithm development-can be represented using pseudocode)
  3. Coding (Speaking the language of the computer)
  4. Debugging (getting rid of errors)
  5. Testing and documentation (finishing the project)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between an algorithm and a program?

A

Algorithm: step by step descriptions of such paths which a problem solver needs to follow to achieve the outcome. A good algorithm will have the ability to solve the problem with high efficiency (minimum time and computing effort)

Program: a way to explain the algorithm to a computer in different programming languages that a computer can understand, so that the algorithm steps can be actually executed by the computer, hence to achieve the desired outcome and solve the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a program?

A

A way to explain the algorithm to a computer in different programming languages that a computer can understand, so that the algorithm steps can be actually executed by the computer, hence to achieve the desired outcome and solve the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an algorithm?

A

Step by step descriptions of such paths which a problem solver needs to follow to achieve the outcome. A good algorithm will have the ability to solve the problem with high efficiency (minimum time and computing effort)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is pseudocode?

A

A loose framework of steps that help map out how a problem is to be solved and the steps that need to be taken; not syntactically correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is compiling?

A

Translating from a higher level of programming language to a lower level one that is closer to binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is debugging?

A

Looking for, finding, and correcting errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a logical error?

A

A program runs but does not execute properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a compilation error?

A

Improper usage of syntax that prevents the compiling process and doesn’t allow a program to run

19
Q

What is an IDE?

A

Integrated Development Environment: software that is used to assist in the creation of other software

20
Q

What is a popular free IDE that was discussed in class?

A

Eclipse: has an interpreter function and a compiler

21
Q

What are the 5 layers of the protocol stack used for network communication?

A
  1. Application: url turned into a get HTTP request to get IP address
  2. Transport: TCP or UDP requests are broken into packets
  3. Network: each packed is given a source IP, a destination IP, and a data psrt
  4. Link Layer: each part gets a hardware address or MAC address which is found using the ARP (Address Resolution Protocol)
  5. Physical layer (bits on a wire)
22
Q

What are the 3 typical layers of a computing system?

A

Application Layer
Operating System Layer
Hardware Layer

23
Q

What is the CPU fetch-execute cycle?

A

Fetches instruction from RAM or Registers (initially fetched by Control Unit) then instructions are interpreted by Control Unit (decoded), and then transferred to the ALU for computation, then transferred to the accumulator, and thens end off to either the register to back to the RAM depending on what the instructions dictate. (This last step is determined by the control unit)

24
Q

What are the main parts of the CPU?

A

Control Unit
ALU
Registers

25
Q

What is the control unit?

A

Responsible for inputs and outputs of instructions

26
Q

What are registers?

A

Storage of commonly used instructions; very small memory (also called cache)

27
Q

What does the ALU do?

A

Controls computation and logic work within the CPU; math

28
Q

How is CPU clock speed measured?

A

Measured in Hertz: each tick in the clock cycle tells the system to move one step forward in the instruction pipeline

29
Q

How many clock cycles per second are in Megahertz?

A

1 million

30
Q

How many clock cycles per second are in Gigahertz?

A

1 billion

31
Q

What is parallelism?

A

Type of computation in which many calculations are carried out simultaneously; large problems can be divided into smaller ones, which are then solved at the same time

32
Q

Put the following types of memory in order from fastest to slowest: mechanical hard drive, RAM, SSD, registers, level 1 cache, and level 2 cache.

A
Registers
Level 1 cache
Level 2 cache
RAM
SSD
Hard drive
33
Q

Put the following types of memory in order from largest capacity to smallest capacity: mechanical hard drive, RAM, SSD, registers, level 1 cache, and level 2 cache.

A
Hard drive
SSD
RAM
Level 2 cache
Level 1 cache
Registers
34
Q

What is a syntax error?

A

A violation of the strict, precise set of rules that define the language

35
Q

What kind of programs are useful for finding the syntax errors?

A

Can be found in programming language (such SQL)

Validator?

36
Q

What are the major categories of viruses and malware?

A

Boot sector viruses: execute when a computer boots up
Logic bombs/time bombs: execute when certain condition or dates are reached
Worms: spread on their own with no human interaction needed
Script and macro viruses: spread as attachments to email, often using address books
Encryption viruses: hold files “hostage” by encrypting them; ask for ransom to unlock them

37
Q

Main security threats and concepts covered in “Nova: Rise of the Hackers”

A
  1. Stuxnet: overall largest hack that had multiple functions that wanted to prevent possible enemies from releasing deadly weapons
  2. Classic Hack: when the digital device is taken over and the cracking of the set password is achieved
  3. You don’t have to do a classic hack where a physical break is required, there can be loopholes left open where encryption isn’t even needed.
  4. Social engineering all accounts: conning where the hacker make companies they are associated with that they provided information to think the attacker is a customer and gets basic info to build off of
  5. RSA encryption explained with prime numbers
  6. Quantum mechanics: a newer form of computation where smaller numbers are used. Billions of atoms are assessed. Smallest scales. No fixed location
  7. Extreme quantum theory: using quantum cryptography can tell you when someone is on the network is listening in. Can alert someone susceptible of attack
  8. A thumb drive can be a potential threat to your computer
  9. Between the 3 players in the complex network (people, process, actions), people are the weak link
38
Q

Main algorithms and concepts covered in “The Secret Rules of Modern Living: Algorithms”?

A
  1. Box around photo algorithm
  2. Greatest common divisor (oldest problem)
  3. Pagerank
  4. Sorting algorithm: puts things in order (so you know order of messages you receive); merge sort is faster than bubble sort
  5. Decision Tree Algorithm: “kinect skeletal tracking algorithm”: used in the kinect XBOX hardware. Tracks movement pixel by pixel. Machine learning. Different poses learned by example.
    Also used by netflix
39
Q

What is Pagerank?

A

Google’s famous algorithm, made them rise to fame; allowed searches to be based on rank of importance and factors in the most likely to be interested in. Ranks pages importance on many factors including the amount of link associated with it

40
Q

What are some limits to computation?

A
  1. Well defined problems whose answers can never be computed
  2. Problems that could theoretically be computed, but in a ridiculously long time
  3. Could a computer ever think like a human?
41
Q

What is the difference between strong and weak Al?

A

Weak Al: ability to solves tasks in a specific problem domain that appears to need intelligence
Strong Al: general intelligence at human level or greater

42
Q

What is Turing Test?

A

A test in which a computer becomes indistinguishable from a human being
CAPTCHA: Completely automated public turing test to tell computers and humans apart

43
Q

What is the application of the Turing Test?

A

Used to prevent programs from automatically creating accounts on social media websites, email servers, etc.
Humans can read this but most computer programs cannot; some Al can trick CAPTCHA