Csp Review Flashcards

1
Q

Define Sequencing

A

The sequential execution of steps in an algorithm or code in a program (like steps in a recipe).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Meta data

A

Data about the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define syntax error

A

A mistake in typed code that violates the rules of the programming language. Typically, code with syntax errors will not run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Logic error

A

A mistake in an algorithm or program that causes it to behave unexpectedly or return the incorrect value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define run time error

A

A mistake in a program that happens only when the program is actually run, such as a program attempting to access memory that does not exist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define overflow error

A

Error that results when the number of bits is not enough to represent the number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Analog data vs digital data

A

Analog technology uses data that is continuous and the goal is to capture a likeness of reality.

Digital technology uses sampling to encode the data and then reproduces it as closely as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lossless vs lossy compression

A

lossless: Compressing data in a way that preserves all data away and allows full recovery of the original.

Doesn’t lose image quality

lossy: Compressing data in a way that discards some data and makes it impossible to recover the original.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define selection

A

A Boolean condition to determine which of two paths are taken in an algorithm or program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define iteration

A

The repetition of steps in an algorithm or program for a certain amount of times or until a certain condition is met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define linear search

A

An algorithm that iterates through each item in a list until it finds the target value. Ends when all elements have been eliminated or target is found

Can be performed on unsorted lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define binary search

A

An algorithm that searches a sorted list for a value by repeatedly splitting the list in half. Ends when all elements are eliminated or target is found.

Although faster than linear search, binary search cannot be performed on unsorted lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain reasonable vs unreasonable times

A

A run time for an algorithm that doesn’t increase faster than a polynomial function of the input size or less (linear, constant etc.).

Algorithms with exponential or factorial efficiencies are examples of algorithms that run in an unreasonable amount of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define heuristic

A

A technique that helps an algorithm find a good solution in a hard problem (like always walking toward the north star when you are stuck in a forest).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define computing device

A

A physical device that can run a program, such as a computer, smart phone, or smart sensor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define computer network

A

A group of interconnected computing devices capable of sending or receiving data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define bandwidth

A

The maximum amount of data that can be sent in a fixed period of time over a network connection, typically measured in bits per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define protocol

A

An agreed upon set of rules that specify the behavior of a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define scalability

A

The ability of a system to adjust in scale to meet new demands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define IP (Internet Protocol)

A

The protocol that determines how to address nodes on the network (with IP addresses) and how to route data from one node to a destination node (using routers).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define TCP (Transmission Control Protocol)

A

A protocol for sending packets that does error-checking to ensure all packets are received and properly ordered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define UDP (User Datagram Protocol)

A

A protocol for sending packets quickly with minimal error-checking and no resending of dropped packets

23
Q

Define World Wide Web

A

A system of linked pages, media, and files, browsable over the HTTP.

24
Q

Define HTTP (Hypertext Transfer Protocol)

A

a protocol for computers to request and share the pages that make up the world wide web on the Internet

25
Q

Explain series vs parallel computing

A

Sequential Computing: programs run in order, one command at a time.

Parallel Computing: programs are broken into small pieces, some of which are run simultaneously

26
Q

Define speedup

A

the time used to complete a task sequentially divided by the time to complete a task in parallel

27
Q

Define distributed computing

A

A computational model which uses multiple devices to run different parts of a program.

28
Q

Explain the digital divide

A

The idea that some communities or populations have less access to computing than others, typically due to limitations of Internet speed or computer hardware access.

29
Q

Define crowd sourcing

A

A model in which many online users combine efforts to help fund projects, generate ideas, or create goods or services (like Wikipedia).

30
Q

Explain citizen science

A

The participation of volunteers from the public in a scientific research project (like collecting rain samples or counting butterflies).

31
Q

Explain Creative Commons

A

An alternative to copyright that allows people to declare how they want their artistic creations to be shared, remixed, used in noncommercial contexts, and how the policy should propagate with remixed versions.

32
Q

Explain open access vs open source

A

Open source allows everyone to edit the program

Open access allows everyone to see the program

33
Q

Define PII (Personally identifiable information):

A

Information about an individual that can be used to uniquely identify them (directly or indirectly).

34
Q

Define multi favor authentication

A

A method of user authentication which requires the user to present multiple pieces of evidence in multiple categories (such as knowledge and possession).

35
Q

Explain encryption vs decryption

A

Encryption is The process of scrambling data to prevent unauthorized access.

Decryption is unscrambling the data

36
Q

Define symmetric encryption

A

A technique for encrypting data where the same key is used to both encrypt and decrypt data.

37
Q

Define public key encryption

A

Pairs a public key for encryption and a private key for decryption.

The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message.

38
Q

Define phishing

A

An attack where a user is tricked into revealing private information, often via a deceptive email.

39
Q

Define key logging

A

When the the inputs of the keyboard are being keep track.

May be used to infringe on personal data or passwords

40
Q

Define rogue access point

A

A wireless access point that provides an attacker with unauthorized access to the traffic going over the network.

41
Q

Define dns (domain name system)

A

the system responsible for translating domain names like example.com into IP addresses

42
Q

Define IP address

A

A unique set of numbers given to a computing device

43
Q

Define cipher

A

the generic term for a technique that performs encryption

44
Q

Define ceasers cipher

A

a technique for encryption that shifts the alphabet by some number of characters.

45
Q

Define algorithm

A

Invented by Al Gore, an algorithm a finite set of instructions that accomplish a task.

46
Q

Define Cracking Encryption

A

When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption.

47
Q

Sequential vs Event Driven Programming

A

Sequential Programming: program statements run in order, from top to bottom.

  • No user interaction
  • Code runs the same way every time

Event Driven Programming: some program statements run when triggered by an event, like a mouse click or a key press
- Programs run differently each time depending on user interactions

48
Q

Define Sampling

A

A process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples.

49
Q

Define Cookies

A

A small amount of text that tracks information about a user visiting a website.

50
Q

What is a major disadvantage of the internets model of trust (trusted websites)

A

A trusted website can still download malicious code even if it is blocked by a firewall.

51
Q

Why does updating a file require more memory than reading a file?

A

A read file requires the entire file to be loaded to memory but updating a file requires both the original version and the updated version to be in memory.

52
Q

Why do computing innovations tend to lead to legal concerns?

A

Laws involved in these concerns were often created before the advent of the computers, meaning that these laws may not cover certain aspects of new technology.

53
Q

How bits in one byte

A

8 bits per byte