Final Flashcards
What is crowdsourcing?
Using contributions from volunteers in online communities to solve a problem.
The goal is to produce a gigantic knowledge base
What is static information?
The information is just there, added statically, modified every so often
What is dynamic information?
real time q&a, technical code contributions, markets knowledge
you ask a question and get an answer
eg. Reddit
What is netiquette?
How people should behave on the internet
What is trolling?
being deliberately offensive just because
What are flame wars?
Online arguing via postings and email
What is spam?
unsolicited commercial emails
spam emails share properties which are analyzed by the computer; if an email shares those properties, it is sent to the spam box
What is phishing?
refers to sites that try to look like other well known sites in order to get people to provide their information
What is intellectual property?
The act of creation; ives the author the ownership of the results
Copyright includes the following rights:
Copy your own work
Use it for derivative works
Distribute your work
Display/perform your work
What is fair use?
Allows he use of copyrighted material for educational or scholarly purposes
What is public domain-no rights reserved?
It is free for anyone to use in any form
What is creative commons?
Some rights are reserved
What is privacy?
The right of people to choose freely under what circumstances and to what extent they will reveal themselves
What is the OECD?
Organization of economic cooperation and development
What are cookies?
Tokens of information that the server sends to a client as an identity card
What is encryption?
the safest way to ensure data privacy
only another party with the right data can decipher an encrypted message
What are symmetric keys?
The same key is used to encrypt and decrypt the message
What is asymmetric encryption?
Different keys are used, one for encrypting and another one for decrypting the message
What is the public key crypto system?
The public key is known to everyone to encrypt a message. Then it can only be decrypted with a special PRIVATE key only known to the owner of the public key
What is a database?
a system which keeps a logically related collection of data organized and searchable
What is XML?
Extensible Markup Language
What is XML used for?
besides representing data, it is often used for transferring data between applications and on the network
What is a database entity?
It describes a thing, being, or object which has a name and properties
An entity is represented by a..
table
an instance of an entity is kept as a ..
record within a table
Each column in a table is known as an …
attribute of the entity
What are 3 properties of entities?
- Each instance of an entity must be uniquely identifiable
- Tables flatten hierarchical information as opposed to XML
- Table attributes MUST have data types
What is database schema?
the metadata of the DB
the formal definition and description of entities and their relations in a database system
What is a relational database system?
one which exploits design relations among entities
What are database queries used for ?
Select
Insert
Delete
Update
What is the software stack and explain an advantage of it?
layers of software that allow for specialization. each part of the software stack helps in completing the next part of the software stack
If one part of the software stack has a bug, you only have to look at that part
What are metaphors and how are they useful in the IT world?
icons or images or concepts used to represent something
They are useful because it lets people intuitively know who to use a machine
How do you increase a pictures brightness?
You increase each color number by the same amount
What is a web crawler and what are the items it generates that enable searching?
software that is used to crawl websites
crawlers main jobs is to create an index of URLs associated to the queries
- visit every web page on its to do list
- query processing, looks up token the user has entered in the index and returns hit pages associated with the tokens
Which component is considered to be the brain of the computer?
The CPU
What are the 2 subcomponents of the CPU?
- the control unit fetches instructions from memory and sends data to the ALU
- the ALU does the math
What are the 5 steps of the Fetch/Execute cycle?
- Instruction Fetch
- Instruction Decode
- Data Fetch
- Instruction Execution
- Return Result
Who invented the mouse?
Stanford Research Institute
According to OECD standards, the person in charge of privacy policies and interacting with individuals regarding their privacy is the..
data controller
SQL
Tables
Tags
Relation
Tuple
Row
XML is a ?
programming language
Hierarchical DB
inverted trees
The concept of fair use allows the user to..
lease a work already in the public domain