midterm review Flashcards

1
Q

abstraction

A

one of the key concepts of object-oriented programming (OOP) languages. Its main goal is to handle complexity by hiding unnecessary details from the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

real value

A

data type used in a computer program to represent an approximation of a real number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

event driven

A

a software architecture paradigm promoting the production, detection, consumption of, and reaction to events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

hardware

A

the computer’s tangible components or delivery systems that store and run the written instructions provided by the software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

software

A

a generic term used to refer to applications, scripts and programs that run on a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CPU

A

electronic machinery that carries out instructions from programs that allows a computer or other device to perform its tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

GPU

A

Graphics processing unit, a specialized processor originally designed to accelerate graphics rendering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

storage

A

where you save files permanently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RAM

A

memory that is essentially short term memory where data is stored as the processor needs it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

And gate

A

an electrical circuit that combines two signals so that the output is on if both signals are present.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Or gate

A

digital logic gate that implements logical disjunction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

machine language

A

any low-level programming language, consisting of machine language instructions, which are used to control a computer’s central processing unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

refactoring

A

the process of restructuring existing computer code—changing the factoring—without changing its external behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

cloud computing

A

the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

internet

A

worldwide system of computer networks – a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WWW

A

an information system enabling documents and other web resources to be accessed over the Internet

17
Q

algorithms

A

a finite sequence of rigorous instructions, typically used to solve a class of specific problems or to perform a computation

18
Q

pseudocode

A

plain language description of the steps in an algorithm or another system.

19
Q

sequencing algorithms

A

the specific order in which instructions are performed

20
Q

selection algorithms

A

is used for finding the kth smallest (or largest) number in a list or an array.

21
Q

iterations

A

the repetition of a process

22
Q

Random events

A

An event with a probability of occurrence determined by some probability distribution.

23
Q

Mod

A

The remainder that is left over when a number is divided by another.

24
Q

ascii character

A

a standard data-encoding format for electronic communication between computers

25
Q

lossy

A

reduces file size by permanently removing some of the original data.

26
Q

lossless

A

reduces file size by removing unnecessary metadata.

27
Q

parody

A

cybercrime that happens when someone impersonates a trusted contact or brand, pretending to be someone you trust in order to access sensitive personal information.