Csp Review Flashcards
Define Sequencing
The sequential execution of steps in an algorithm or code in a program (like steps in a recipe).
Meta data
Data about the data
Define syntax error
A mistake in typed code that violates the rules of the programming language. Typically, code with syntax errors will not run.
Define Logic error
A mistake in an algorithm or program that causes it to behave unexpectedly or return the incorrect value.
Define run time error
A mistake in a program that happens only when the program is actually run, such as a program attempting to access memory that does not exist.
Define overflow error
Error that results when the number of bits is not enough to represent the number
Analog data vs digital data
Analog technology uses data that is continuous and the goal is to capture a likeness of reality.
Digital technology uses sampling to encode the data and then reproduces it as closely as needed.
Lossless vs lossy compression
lossless: Compressing data in a way that preserves all data away and allows full recovery of the original.
Doesn’t lose image quality
lossy: Compressing data in a way that discards some data and makes it impossible to recover the original.
Define selection
A Boolean condition to determine which of two paths are taken in an algorithm or program.
Define iteration
The repetition of steps in an algorithm or program for a certain amount of times or until a certain condition is met.
Define linear search
An algorithm that iterates through each item in a list until it finds the target value. Ends when all elements have been eliminated or target is found
Can be performed on unsorted lists
Define binary search
An algorithm that searches a sorted list for a value by repeatedly splitting the list in half. Ends when all elements are eliminated or target is found.
Although faster than linear search, binary search cannot be performed on unsorted lists
Explain reasonable vs unreasonable times
A run time for an algorithm that doesn’t increase faster than a polynomial function of the input size or less (linear, constant etc.).
Algorithms with exponential or factorial efficiencies are examples of algorithms that run in an unreasonable amount of time.
Define heuristic
A technique that helps an algorithm find a good solution in a hard problem (like always walking toward the north star when you are stuck in a forest).
Define computing device
A physical device that can run a program, such as a computer, smart phone, or smart sensor.
Define computer network
A group of interconnected computing devices capable of sending or receiving data.
Define bandwidth
The maximum amount of data that can be sent in a fixed period of time over a network connection, typically measured in bits per second.
Define protocol
An agreed upon set of rules that specify the behavior of a system.
Define scalability
The ability of a system to adjust in scale to meet new demands.
Define IP (Internet Protocol)
The protocol that determines how to address nodes on the network (with IP addresses) and how to route data from one node to a destination node (using routers).
Define TCP (Transmission Control Protocol)
A protocol for sending packets that does error-checking to ensure all packets are received and properly ordered
Define UDP (User Datagram Protocol)
A protocol for sending packets quickly with minimal error-checking and no resending of dropped packets
Define World Wide Web
A system of linked pages, media, and files, browsable over the HTTP.
Define HTTP (Hypertext Transfer Protocol)
a protocol for computers to request and share the pages that make up the world wide web on the Internet
Explain series vs parallel computing
Sequential Computing: programs run in order, one command at a time.
Parallel Computing: programs are broken into small pieces, some of which are run simultaneously
Define speedup
the time used to complete a task sequentially divided by the time to complete a task in parallel
Define distributed computing
A computational model which uses multiple devices to run different parts of a program.
Explain the digital divide
The idea that some communities or populations have less access to computing than others, typically due to limitations of Internet speed or computer hardware access.
Define crowd sourcing
A model in which many online users combine efforts to help fund projects, generate ideas, or create goods or services (like Wikipedia).
Explain citizen science
The participation of volunteers from the public in a scientific research project (like collecting rain samples or counting butterflies).
Explain Creative Commons
An alternative to copyright that allows people to declare how they want their artistic creations to be shared, remixed, used in noncommercial contexts, and how the policy should propagate with remixed versions.
Explain open access vs open source
Open source allows everyone to edit the program
Open access allows everyone to see the program
Define PII (Personally identifiable information):
Information about an individual that can be used to uniquely identify them (directly or indirectly).
Define multi favor authentication
A method of user authentication which requires the user to present multiple pieces of evidence in multiple categories (such as knowledge and possession).
Explain encryption vs decryption
Encryption is The process of scrambling data to prevent unauthorized access.
Decryption is unscrambling the data
Define symmetric encryption
A technique for encrypting data where the same key is used to both encrypt and decrypt data.
Define public key encryption
Pairs a public key for encryption and a private key for decryption.
The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message.
Define phishing
An attack where a user is tricked into revealing private information, often via a deceptive email.
Define key logging
When the the inputs of the keyboard are being keep track.
May be used to infringe on personal data or passwords
Define rogue access point
A wireless access point that provides an attacker with unauthorized access to the traffic going over the network.
Define dns (domain name system)
the system responsible for translating domain names like example.com into IP addresses
Define IP address
A unique set of numbers given to a computing device
Define cipher
the generic term for a technique that performs encryption
Define ceasers cipher
a technique for encryption that shifts the alphabet by some number of characters.
Define algorithm
Invented by Al Gore, an algorithm a finite set of instructions that accomplish a task.
Define Cracking Encryption
When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption.
Sequential vs Event Driven Programming
Sequential Programming: program statements run in order, from top to bottom.
- No user interaction
- Code runs the same way every time
Event Driven Programming: some program statements run when triggered by an event, like a mouse click or a key press
- Programs run differently each time depending on user interactions
Define Sampling
A process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples.
Define Cookies
A small amount of text that tracks information about a user visiting a website.
What is a major disadvantage of the internets model of trust (trusted websites)
A trusted website can still download malicious code even if it is blocked by a firewall.
Why does updating a file require more memory than reading a file?
A read file requires the entire file to be loaded to memory but updating a file requires both the original version and the updated version to be in memory.
Why do computing innovations tend to lead to legal concerns?
Laws involved in these concerns were often created before the advent of the computers, meaning that these laws may not cover certain aspects of new technology.
How bits in one byte
8 bits per byte