Overall Questions Pt 2 Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Is there a difference between the binary numbers 11101 and 00011101?

A

The number 11101 is a 5-bit binary number, and the number 00011101 is an 8-bit
binary number. However, both numbers represent the same value. Both binary
numbers correspond to the decimal number 29. In computer science, it is common
to fill a byte with leading zeroes. This is because the smallest unit in memory that
can be accessed is a byte, and the leading bits of a byte have to be set to zero.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between the MDR and the CIR?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a router?

A

A router is a device that forwards data packets from one network to another. It does this by analysing IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a switch?

A

A switch is a network device. It has a connec on for an uplink and mul ple ports for communica on. However, it does do basic filtering on data. Computers send data over a network in data frames with hardware addresses. Some data is sent out with the “broadcast” address; this address means it is for all computers who can receive it. A switch filters these out so they do not get propagated across the en re network (which can cause a flood of data known as a “broadcast storm”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How you can prevent seman cs errors?

A

You can prevent seman cs errors by adding comments to the program code. These are notes to yourself (and other coders) that describe what the code is doing in a certain sec on. It’s especially helpful if you haven’t looked at that sec on of the program for a day or longer, so you know what the code was intended to do instead of trying to figure it out all over again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a hub?

A

A hub is a network device that takes a signal from one cable and splits it out over several cables. If it was spli ng out four signals, it would be called a “four port” hub. A hub does not do any signal processing—everything that comes in is sent out through all of the ports. Communica on is two-way: the ports can also send communica on through the uplink connec on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Ethernet?

A

Ethernet is a set of standards (defined by IEEE 802.3) used for LANs and WANs. The word “Ethernet” is used commonly to refer to parts of a local wired network, such as Ethernet cabling (Cat 5, 5e, 6, 7 and 8), and Ethernet ports, where the cables are connected. The standards of Ethernet include the physical layer, which gives specifica ons for devices and signals, and the data link layer, where it defines how signals are organized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an ethernet cable?

A

Ethernet cable is a type of cable used to connect devices to a computer network. It is the most common type of cabling in use today, and can be found in most homes and offices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the UTP cable categories?

A

UTP cable categories are as follows: - Category 5 up to 100Mbps (Megabits per second) - Category 5e up to 1000Mbps (1Gbps) - Category 6 up to 10Gbps - Category 7 up to 40Gbps - Category 8 25Gbps or 40Gbps These UTP cables appear physically iden cal. You must usually look for a label or prin ng on the wire to see the category if you are not sure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a LAN?

A

LAN = Local Area Network, a network in a home or office. A LAN is a group of computers connected together via a network within a dis nct geographic area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is UTP cable?

A

UTP: This stands for “unshielded twisted pair cable.” The individual wires are twisted together in pairs without extra insula on. UTP cables are used in homes and offices to build up a LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are network devices?

A

Network devices are devices that connect are connected to a network. Important network devices are hubs, switches, routers. A computer itself or an embedded system connected to a network can also be a network device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between wired and wireless networks?

A

Wired and wireless networks are two different types of computer networks. Wired networks use cables to connect devices, while wireless networks use radio waves to connect devices. The advantage of wired is that it is more secure than wireless, but the disadvantage is that it requires a cable connec on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between wired and wireless networks?

A

Wired and wireless networks are two different types of computer networks. Wired networks use cables to connect devices, while wireless networks use radio waves to connect devices. The advantage of wired is that it is more secure than wireless, but the disadvantage is that it requires a cable connec on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a supercomputer?

A

Supercomputer is a computer that is used in scien fic fields to analyze vast amounts of data. For instance, predic ng the weather involves an enormous number of data points; a supercomputer is a good match for these kinds of problems. Scien sts can request me on supercomputers to do research, bringing them the massive power of Earth’s most amazing computers. Supercomputers use parallel processing, where tasks are split up between processors. One such supercomputer is in Germany, the SuperMUC-NG.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a server cluster?

A

A server cluster is a group of iden cal servers that share the workload for a certain task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is parallel processing?

A

Parallel processing is when you take a task and break it down into sub-tasks and assign a separate CPU to complete it. Several CPUs are linked together in parallel to accomplish this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a device driver?

A

A device driver is a piece of so ware that allows the opera ng system to communicate with a hardware device. It is usually wri en by the manufacturer of the hardware. A device driver communicates with the device controller of the connected hardware device to send or receive data or commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an input output system?

A

Input and output system is a system that allows the user to communicate with the computer hardware. Input and output systems are typically used to transfer data from one device to another, or from one loca on to another. The input and output system of a computer is made up of many different devices, including keyboards, mice, monitors, printers, speakers and network cards. These devices all have their own input/output systems that allow them to communicate with the CPU. Every computer needs some kind of input output system in order to receive informa on for processing and an output system to output the results of the processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is an input output system?

A

Input and output system is a system that allows the user to communicate with the computer hardware. Input and output systems are typically used to transfer data from one device to another, or from one loca on to another. The input and output system of a computer is made up of many different devices, including keyboards, mice, monitors, printers, speakers and network cards. These devices all have their own input/output systems that allow them to communicate with the CPU. Every computer needs some kind of input output system in order to receive informa on for processing and an output system to output the results of the processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are input and output devices?

A

Input and Output Devices are the devices that allow a user to communicate with a computer. Input devices include keyboards, mice, and external data sources such as USB drives. Output devices include monitors, printers, speakers, and network cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are input and output devices?

A

Input and Output Devices are the devices that allow a user to communicate with a computer. Input devices include keyboards, mice, and external data sources such as USB drives. Output devices include monitors, printers, speakers, and network cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is input and output?

A

Input and output are the communica on between a computer and its user. Input is the data that a user enters into a computer, while output is the data that a computer sends to its user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is RAM?

A

This stands for Random Access Memory and means that the memory can be read randomly and at any point in the data. RAM is not permanent (short-term memory) but a lot faster than the hard drive in terms of memory accessing speed and reading and wri ng data. Because RAM is more expensive than a hard drive, it has less capacity than a hard drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a processor?

A

A processor is a device that performs calcula ons and commands using data stored in memory. It takes that input from memory and creates unique output, the results of the processing. It is the “brain” of a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a CPU cache?

A

The CPU cache is a small memory that is placed on the CPU chip itself. It is a memory for data and instruc ons that the processor can access very quickly. This allows to speed up memory access mes. There are different levels of cache: some processors have three levels labelled L3, L2, and L1, each smaller and with a faster access me. This provides a way to avoid memory bo lenecks as the CPU does not always have to make a request of system RAM; a small amount of currently used data is located in the cache.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is computer memory system?

A

Computer memory system consists of different memories storing data and instruc ons for the processor. A computer memory system o en comprises a longterm (permanent) memory (hard disk) a RAM and the CPU cache(s).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is computer memory system?

A

Computer memory system consists of different memories storing data and instruc ons for the processor. A computer memory system o en comprises a longterm (permanent) memory (hard disk) a RAM and the CPU cache(s).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is memory?

A

Memory is a computer storage space that holds data and instruc ons for the CPU to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is memory addressing?

A

Each byte of memory has a unique binary address. You could think of them each as li le mailboxes, storing a different binary number and also having a binary address. That means that the number of bits used for addressing will iden fy the number of bytes available. For instance, the Commodore 64 had 64K of addressable memory. This was accomplished by using 16-bit addressing. The total number of bytes that can be addressed with a 16-bit address is 65,536 bytes. This was considered 64K (At the me, a kilobyte was referred to as both 1,024 (2 to the power of 10) and 1,000 bytes). Each 16-bit address points to a mailbox (memory loca on) that contains exactly one byte (inside the box).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a data bus?

A

A data bus in general is a connec on that is used for data transfer between different components of a computer. A data bus is a data path that connects the CPU to memory and I/O devices. It is a collec on of wires that carry data from one device to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are von Neumann registers?

A

There are five registers specific to the Von Neumann design. These are as follows: 1. Program Counter (PC) contains the memory address of the next instruc on to read from memory.2. Memory Address Register (MAR) contains the address of the current instruc on in memory, or the next data transfer address.3. Memory Data Register (MDR) contains the contents of the memory address that the MAR is poin ng to and contains data to be transferred.4. Accumulator (AC) this contains data that have been processed or are about to be processed, including arithme c or logic results.5. Current Instruc on register (CIR) contains the current binary instruc on that is being executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are von Neumann registers?

A

There are five registers specific to the Von Neumann design. These are as follows: 1. Program Counter (PC) contains the memory address of the next instruc on to read from memory.2. Memory Address Register (MAR) contains the address of the current instruc on in memory, or the next data transfer address.3. Memory Data Register (MDR) contains the contents of the memory address that the MAR is poin ng to and contains data to be transferred.4. Accumulator (AC) this contains data that have been processed or are about to be processed, including arithme c or logic results.5. Current Instruc on register (CIR) contains the current binary instruc on that is being executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is von neumann architecture?

A

The von Neumann architecture is a reference model for the architecture of a computer. It consists of - a CPU, - a memory that holds both computer program instruc ons and data, - an input system, - an output system. The CPU consist of an ALU, a control unit and registers, which contain a fixed number of bits. These registers can contain data or instruc ons that have been read from memory. Besides the processor and memory, there also should be some type of input (entering data) and output system (outpu ng data) to be able to communicate with other devices or a human being.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a Central Processing Unit (CPU)?

A

The Central Processing Unit (CPU) is o en referred to as the “brain” of the computer. It does all the processing, which includes doing calcula ons and sending instruc ons to other hardware. It is a square computer chip which is inserted into a motherboard—this is a circuit board designed for computer components to connect to and communicate through. The CPU is o en referred to as the processor, which refers to its ability to process data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the meaning of data messaging?

A

The process of sending data over a network is called data messaging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

How does data messaging work?

A

Data messaging works by breaking down the data to be send over the network into chunks, or segments, that are sent out separately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is a message?

A

A message is a piece of informa on that is sent from one person to another. It can be verbal or wri en, and it can be in the form of a le er, an email, or even a text message. Computers send binary messages to each other through networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is a message?

A

A message is a piece of informa on that is sent from one person to another. It can be verbal or wri en, and it can be in the form of a le er, an email, or even a text message. Computers send binary messages to each other through networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is data?

A

Data consists of raw numbers and symbols that can be arranged into meaningful informa on, which is then used for specific research or analysis purposes. To a computer, data are numerical and the basic data storage system is the binary numbering system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is the meaning of a correct algorithm?

A

The correctness of an algorithm is an important requirement for algorithm development. Any algorithm that is used must be mathema cally correct. An algorithm is totally correct if it receives valid input, terminates, and always returns the correct output. We can prove this by formal reasoning or mathema cally, for instance, with a proof by induc on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is algorithm accuracy?

A

The accuracy of an algorithm is the degree to which it approaches the op mal solu on. The more accurate an algorithm, the closer it gets to the op mal solu on. Some algorithms are required to give the op mal solu on. For instance, if we are sor ng data, the algorithm cannot stop un l everything is sorted with 100 percent accuracy. If we are searching for a specific data point, it must be found. However, if we are tryingto find a good solu on to a complex mathema cal problem, a standard of “good enough” is applied by the programmer to the situa on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is quicksort?

A

Quicksort is a sor ng algorithm. Quicksort is regarded as one of the most efficient algorithms overall. Imagine a teacher with a stack of graded papers. The teacher wants to sort all of the papers by grade. The pile is split into all the grades higher than 55 (this number is the pivot and can be chosen by different methods) and those less than 55. Then the two piles are split around another pivot bringing the total number of piles to four. The teacher then sorts each pile separately and when they are done, can simply put all the piles back together in order from lowest pile to highest. It can be thought of as a “divide and conquer” type of method. In this example, the stack was split into four piles but, in reality, the data determines how many stacks it is split into for sor ng.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is quicksort?

A

Quicksort is a sor ng algorithm. Quicksort is regarded as one of the most efficient algorithms overall. Imagine a teacher with a stack of graded papers. The teacher wants to sort all of the papers by grade. The pile is split into all the grades higher than 55 (this number is the pivot and can be chosen by different methods) and those less than 55. Then the two piles are split around another pivot bringing the total number of piles to four. The teacher then sorts each pile separately and when they are done, can simply put all the piles back together in order from lowest pile to highest. It can be thought of as a “divide and conquer” type of method. In this example, the stack was split into four piles but, in reality, the data determines how many stacks it is split into for sor ng.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is binary inser on sort?

A

Binary inser on sort is a sor ng algorithm that uses the same method we used for a binary search—by spli ng the data in half repeatedly. To sort the data, it builds a new output list and takes items from the input list. The input list are items yet to be sorted, and the output are the ones already sorted. For inser ng an element from the input list in the output list the data in the output list is spli ed in half repeatedly un l the correct posi on of the new element is found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is bubble sort?

A

Bubble sort is a sor ng algorithm that works by comparing two elements at a me and swapping them if they are out of order. It is one of the simplest sor ng algorithms, but it is also one of the slowest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is a binary search?

A

Binary search is a search algorithm that searches for data in a sorted list. It works by dividing the list into two halves, and then repea ng this process on each of the halves un l it reaches the desired data. The algorithm can be used to find an element in a sorted array, or to find an element’s posi on if it is known to be in the array.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is jump search?

A

Jump search is a search algorithm that uses a jump size to find the target element in an ordered list. The jump size is the number of elements that are skipped over between each comparison. Let’s say the book is 2,500 pages long. We calculate the square root of n, the number of pages, which gives us 50, which we will use for the jump size, or m. Ken will first jump to page 50 and see if Josh is higher or lower, then keep jumping un l he is past Josh. Then, he will go back to the previous jump and do a linear search (page by page) on the next 50 pages to find him.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is linear search?

A

Linear search is a searching algorithm that starts at the beginning and looks at each element in order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is linear search?

A

Linear search is a searching algorithm that starts at the beginning and looks at each element in order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is a mul dimensional array?

A

A mul -dimensional array is an array that contains one or more arrays as its elements, where each element is also an array. In other words, it is an array of arrays. A two-dimensional array is the most common form of a mul -dimensional array, and it is o en used to represent a matrix or a table. A two-dimensional array is like a grid of rows and columns, where each element is iden fied by its row and column index.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is an array?

A

An array holds a fixed number of values of the same data type. Each value in the array can be accessed by its index, which represents its posi on in the array.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is a linked list?

A

A linked list is a sequen al data storage structure. Each element is linked to the next. In other words, an element in the data structure linked list contains two pieces of informa on, the data and the link. The last element in the linked list structure does not have a pointer to the next value, instead it points to null, which indicates that there are no more elements. Null is o en used to end a series of data. The link in each list is a pointer, which is a memory loca on. It iden fies the part of memory that contains the next element.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is a stack?

A

A stack is a data structure that works under a specific philosophy: Last In, First Out. This is o en abbreviated as LIFO. Imagine you are inpu ng data into a computer program—in this case, we will say it is a card game simulator. It will use a standard deck of 52 cards, and they will be randomized and placed into the stack. Just like in real life, when you are playing cards, you can only draw the card from the top of the deck. That is the last card that was placed on top, so it is the last in, but the first out. Once the game is started, the order cannot be changed, the next card in play is always the one on top of your deck—or in our simula on, your stack. A stack in computer programming allows for two basic opera ons: push and pop. Pop will take the top piece of data from the stack, which removes it. Push will add a new item to the top (and only the top) of the stack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is a stack?

A

A stack is a data structure that works under a specific philosophy: Last In, First Out. This is o en abbreviated as LIFO. Imagine you are inpu ng data into a computer program—in this case, we will say it is a card game simulator. It will use a standard deck of 52 cards, and they will be randomized and placed into the stack. Just like in real life, when you are playing cards, you can only draw the card from the top of the deck. That is the last card that was placed on top, so it is the last in, but the first out. Once the game is started, the order cannot be changed, the next card in play is always the one on top of your deck—or in our simula on, your stack. A stack in computer programming allows for two basic opera ons: push and pop. Pop will take the top piece of data from the stack, which removes it. Push will add a new item to the top (and only the top) of the stack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is a flowchart?

A

Flowcharts (Flow Diagrams): To translate human instruc ons into computer instruc ons, coders have used flowcharts for many years. These charts make it easy to observe the structure of an algorithm and create it with a programming language. They use standard symbols to indicate different types of instruc ons. A terminator symbol (oval or rectangle) is used at the beginning of a flowchart and at all the endings. They represent the external nodes of flowcharts. A rectangle represents a process, for instance, some type of data calcula on or filtering. The diamond is a decision—a decision has mul ple pathways that can be taken. A parallelogram in a flow chart represents input or output, where data are sent into or out of the process. Finally, the arrows represent the flow from beginning to end of the sequence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is the rela on between algorithms and flowcharts?

A

An algorithm is a set of well-defined instruc ons or rules for solving a par cular problem or performing a par cular task. It is a step-by-step procedure that can be followed to perform a computa on, solve a problem, or automate a task. An algorithm can be represented in many forms. On possibility is to use a flowchart to visualize the steps of an algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is a driver?

A

A driver is a piece of so ware that allows the opera ng system to communicate with hardware devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What are the parts of an URL?

A

A URL is composed of several components. The first part is the protocol (HTTP or HTTPS). The second part is the computer name (e.g. www). The third part is the domain name. The fourth part is the folder loca on, and the fi h part is the file name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What are the parts of an URL?

A

A URL is composed of several components. The first part is the protocol (HTTP or HTTPS). The second part is the computer name (e.g. www). The third part is the domain name. The fourth part is the folder loca on, and the fi h part is the file name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is Cyclic Redundancy Check?

A

Cyclic Redundancy Check, or CRC is a type of error-detec on in network communica on. It works with a similar principle to the checksum. A block of data is processed through a mathema cal algorithm and a result is appended to the data. A er the data is sent, a calcula on is repeated to check the integrity. The CRC can be applied to any length of binary data and will always return a code of the exact same length. This makes CRC a “hashing” algorithm, one that returns a value of consistent length in digits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

How does quicksort work?

A

Quicksort is a divide and conquer algorithm. It works by first choosing a pivot element, then par oning the list into two parts: all elements that are less than the pivot element, and all elements that are greater than or equal to the pivot element. The algorithm recursively calls itself on each of these two sub-lists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What is parity?

A

Parity is a method of error-checking for binary data. It is used in telecommunica ons, and was used in the past to check for errors in telegraphs. It works by adding an extra bit to a group of data bits, and then checking that the total number of ones (including the extra bit) is odd or even. If it does not match, then it assumes there was an error and requests retransmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What is transmission data fault tolerance?

A

Transmission data fault tolerance is the ability of a network to detect and recover from errors that occur during the transmission of data. Error detec on techniques such as checksums, CRC or parity bits can be used to detect errors in the transmi ed data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is transmission data fault tolerance?

A

Transmission data fault tolerance is the ability of a network to detect and recover from errors that occur during the transmission of data. Error detec on techniques such as checksums, CRC or parity bits can be used to detect errors in the transmi ed data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What is a checksum?

A

A checksum is a small fixed-length value that is computed from a block of data in order to detect errors that may occur during transmission or storage. It is used to verify the integrity of data and ensure that it has not been corrupted or modified in transit. The checksum is generated by performing a mathema cal calcula on on the data, typically using a hashing algorithm. The checksum is appended to the data itself, a er transmission the receiver performs the same calcula on on the received data and compares the computed checksum with the one that was transmi ed. If the checksums match, it is assumed that the data has been transmi ed correctly, and no errors have occurred. If the checksums do not match, then an error is detected, and the data must be retransmi ed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What is storage error checking?

A

Storage error checking is a method to detect corrupted files in storage. It is done by storing an exact copy somewhere and then comparing it. But because some files are megabytes, or even gigabytes, in size, this would be very inefficient. Instead, since the file is one large binary number, it is placed into an algorithm. This algorithm is like a mathema cal func on—it has a numeric solu on. The checksum is the solu on to this problem; it is calculated and appended to the file when it is saved. The checksum can be calculated again when the file is opened. If the calculated checksum is different from the checksum appended to the file, the file has been corrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What is storage error checking?

A

Storage error checking is a method to detect corrupted files in storage. It is done by storing an exact copy somewhere and then comparing it. But because some files are megabytes, or even gigabytes, in size, this would be very inefficient. Instead, since the file is one large binary number, it is placed into an algorithm. This algorithm is like a mathema cal func on—it has a numeric solu on. The checksum is the solu on to this problem; it is calculated and appended to the file when it is saved. The checksum can be calculated again when the file is opened. If the calculated checksum is different from the checksum appended to the file, the file has been corrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What are non numeric data types?

A

Non numeric data types are data types that are used to represent non numeric or non-mathema cal values, such as text, characters, dates, mes, Boolean values, and other data that cannot be expressed as a number. Examples: String (sequence of characters that represents text), character (a single alphabe c or symbolic character, such as a le er, digit, punctua on mark, or other symbol), date and me (used to represent dates, mes, or both), …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What are non numeric data types?

A

Non numeric data types are data types that are used to represent non numeric or non-mathema cal values, such as text, characters, dates, mes, Boolean values, and other data that cannot be expressed as a number. Examples: String (sequence of characters that represents text), character (a single alphabe c or symbolic character, such as a le er, digit, punctua on mark, or other symbol), date and me (used to represent dates, mes, or both), …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What are numerical data types?

A

Numerical data types are used to represent numerical or mathema cal values, such as integers, floa ng-point numbers, and decimal numbers. The following numerical data types are used in the programming language Java: - byte: integer from -128 to 127 (8 bits) - int: integer from -2,147,483,648 to 2,147,483,647 (32 bits) - float (smallest value): 1.4E-45 to 1.4E-45 to 3.4E38 (32 bits), float (largest value): 3.4028235E38 (32 bits) - double (smallest value): 4.9E-324 to 49E-324 to 1.7E308 (64 bits), double(largest value): 1.7976931348623157E308(64bits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What is float?

A

Float is a data type that can store numbers with decimal points.The reason a decimal is called a “float” is because the decimal point can float around to different places in the number. This is an important dis nc on for a computer: where is the decimal? That must be stored somewhere in the variable itself. It is something a human would take for granted, but something that has to be specified for a computer. Example: float var = 2.234f; is the Syntax to define a float variable in Java and assign the value 2.234 to this variable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What is a variable?

A

In programming, the coder creates variables to store individual units of data. A variable is a container for informa on. It has three important defining factors: a name, a type, and a memory loca on. The name is what it will be referred to in code, just as if you wrote a label on a box. The memory loca on is where the computer can find this box in RAM. The type describe for example how many bytes in memory are used to store the value of the variable and what is the meaning of the individual bits and bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What is a data type?

A

A data type determines the kind of data that can be stored in a variable, such as integers, floa ng-point numbers, strings, and boolean values. A data type defines the range of values that a variable can take, the amount of memory that must be reserved for a variable, and the meaning (encoding) of the individual bits and bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What is a data type?

A

A data type determines the kind of data that can be stored in a variable, such as integers, floa ng-point numbers, strings, and boolean values. A data type defines the range of values that a variable can take, the amount of memory that must be reserved for a variable, and the meaning (encoding) of the individual bits and bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is data contextualiza on?

A

All informa on is stored in binary format in computers. If you want to store alphabe cal le ers, you can represent each le er with a specific number. To convert the stored binary numbers back into le ers, you need addi onal contextual informa on, such as the code that was used for conversion. Examples of such codes include ASCII or Unicode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What is the meaning of “Everything on a computer is binary”?

A

A computer can only store the values 1 and 0. Therefore, all informa on must be converted into the binary numbering system. When informa on is read from memory and outpu ed to the user, it has to be converted back. For example, the le er ‘A’ is converted to the binary value 01000001. When this binary value is read from memory, it has to be converted back into the le er ‘A’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What is hexadecimal?

A

Hexadecimal is a base-16 numbering system used in compu ng and digital communica ons. In contrast to the familiar base-10 decimal numbering system, which uses 10 digits (0-9), the hexadecimal system uses 16 digits: 0-9 and A-F. The le ers A through F are used to represent the numbers 10 through 15, respec vely. One digit of hexadecimal (or “hex”) can represent four digits of binary. In computer applica ons, hexadecimal numbers are usually wri en in groups of two, since two digits represent eight digits in binary (a byte). You will o en see a leading zero before a hex number to represent this. Hex is o en used to view raw data in a file; it is a sort of shorthand for binary. Hexadecimal is used as a go-between for humans since: a) it has an exact 1:4 ra o of digits with binary, and b) it has more symbols, so it is easier for humans to read. Displaying data in hex takes four mes less space than in binary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What is hexadecimal?

A

Hexadecimal is a base-16 numbering system used in compu ng and digital communica ons. In contrast to the familiar base-10 decimal numbering system, which uses 10 digits (0-9), the hexadecimal system uses 16 digits: 0-9 and A-F. The le ers A through F are used to represent the numbers 10 through 15, respec vely. One digit of hexadecimal (or “hex”) can represent four digits of binary. In computer applica ons, hexadecimal numbers are usually wri en in groups of two, since two digits represent eight digits in binary (a byte). You will o en see a leading zero before a hex number to represent this. Hex is o en used to view raw data in a file; it is a sort of shorthand for binary. Hexadecimal is used as a go-between for humans since: a) it has an exact 1:4 ra o of digits with binary, and b) it has more symbols, so it is easier for humans to read. Displaying data in hex takes four mes less space than in binary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

How can we convert an octal number into a binary number?

A

Octal is a base-8 numbering system (with values from 0 through 7) and binary is a base-2 numbering system (with values of 0 and 1). Each digit’s place value in octal is a mul ple of 8, which is a power of 2, so the conversion between these two numbering systems is straigh orward. Specifically, one digit of octal can represent exactly three digits in binary. For example, if you have an octal number like 730524, you know that each digit represents three digits in binary. 7 is equivalent to 111 in binary, 3 is equivalent to 011 in binary, and so on. Therefore, the octal number 730524 is equivalent to 111011000101010100 in binary. If you’re unsure about the correctness of your conversion between numbering systems, you can use a webpage like the following to check: h ps://www.rapidtables.com/convert/number/binaryto-octal.html.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What is data storage?

A

RAM (Random Access Memory) and hard drives are data storage devices. In RAM, data is stored temporarily while a computer is running. A hard drive stores data permanently and can therefore be used to preserve data even a er the computer is turned off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What are data measures of bytes?

A

Data measures of bytes are units used to express the amount of digital informa on. The most common units used for data measures of bytes, listed from smallest to largest: - Bit (abbrevia on: b) - a single binary digit that can hold a value of either 0 or 1. - Byte (B) - a group of eight bits. A single byte can represent a character of text or a small amount of data. - Kilobyte (KB) - 1,000 Bytes. Used to measure small amounts of data, such as text documents or small images. - Megabyte (MB) - 1,000 Kilobytes. Used to measure larger files, such as high-resolu on images or short videos. - Gigabyte (GB) - 1,000 Megabytes. Used to measure even larger files, such as movies or large so ware programs. - Terabyte (TB) - 1,000 Gigabytes. Used to measure very large amounts of data, such as complex databases or en re

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q
A

collec ons of high-resolu on videos. - Petabyte (PB) - 1,000 Terabytes. All photos on Facebook. The larger unit is always 1,000 mes the previous.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q
A

collec ons of high-resolu on videos. - Petabyte (PB) - 1,000 Terabytes. All photos on Facebook. The larger unit is always 1,000 mes the previous.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

How can we convert a binary number into a decimal number?

A

Assign place values to each digit of the binary number, star ng from the rightmost digit and working le ward. The rightmost digit has a place value of 1, the next digit to the le has a place value of 2, then 4, 8, 16, and so on, with each place value doubling. 8 | 4 | 2 | 1 (place value) 1 | 0 | 0 | 1 (binary number 1011) Mul ply each digit of the binary number by its corresponding place value and add the results: 18+04+02+11 = 8+0+0+1 = 9 Therefore the binary number 1001 is 9 in decimal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

How can we convert a binary number into a decimal number?

A

Assign place values to each digit of the binary number, star ng from the rightmost digit and working le ward. The rightmost digit has a place value of 1, the next digit to the le has a place value of 2, then 4, 8, 16, and so on, with each place value doubling. 8 | 4 | 2 | 1 (place value) 1 | 0 | 0 | 1 (binary number 1011) Mul ply each digit of the binary number by its corresponding place value and add the results: 18+04+02+11 = 8+0+0+1 = 9 Therefore the binary number 1001 is 9 in decimal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

What is the binary numbering system?

A

The binary numbering system is a base-2 numbering system that uses two symbols, 0 and 1, to represent all possible numbers. Computers use the binary numbering system because early computers used switches that could be turned on or off, giving two possibili es, as in the binary numbering system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

What is the decimal numbering system?

A

Human beings have ten fingers. It is a common reason given for why we use a base 10 numbering system: decimal. Decimal uses ten symbols, 0 through 9, to represent all possible numbers. In the decimal numbering system, each digit’s value is based on its posi on rela ve to the decimal point. For example, the number “123” in decimal nota on represents 1 x 10^2 + 2 x 10^1 + 3 x 10^0, or 100 + 20 + 3, which equals 123.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

What are the eras of compu ng?

A

To look at the history of modern compu ng machines, we will break it down into four eras: - Behemoths: Huge machines used mostly by governments. 1940s - 1960s. - Business: Computers that are used by individuals in business. 1960s - 1980s. - Graphical: The dawn of the Graphical User Interface and digital imagery. 1980s - 2000s. - Portable: Miniaturiza on of computers; laptops, tablets, smartphones. 2000s - today.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

What are the eras of compu ng?

A

To look at the history of modern compu ng machines, we will break it down into four eras: - Behemoths: Huge machines used mostly by governments. 1940s - 1960s. - Business: Computers that are used by individuals in business. 1960s - 1980s. - Graphical: The dawn of the Graphical User Interface and digital imagery. 1980s - 2000s. - Portable: Miniaturiza on of computers; laptops, tablets, smartphones. 2000s - today. - Business: Computers that are used by individuals in business. 1960s - 1980s. - Graphical: The dawn of the Graphical User Interface and digital imagery. 1980s - 2000s. - Portable: Miniaturiza on of computers; laptops, tablets, smartphones. 2000s - today.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

What are the eras of compu ng?

A

To look at the history of modern compu ng machines, we will break it down into four eras: - Behemoths: Huge machines used mostly by governments. 1940s - 1960s. - Business: Computers that are used by individuals in business. 1960s - 1980s. - Graphical: The dawn of the Graphical User Interface and digital imagery. 1980s - 2000s. - Portable: Miniaturiza on of computers; laptops, tablets, smartphones. 2000s - today. - Business: Computers that are used by individuals in business. 1960s - 1980s. - Graphical: The dawn of the Graphical User Interface and digital imagery. 1980s - 2000s. - Portable: Miniaturiza on of computers; laptops, tablets, smartphones. 2000s - today.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What is a behemoth?

A

A behemoth is an enormous computer that were built with vacuum tubes and wires and took up en re rooms. The input was usually entered by flipping switches and turning dials. The output was o en given via lights or punched holes on paper. They were basically number-crunching machines that were used to perform large mathema cal computa ons, or to work with large amounts of numerical data. The U.S. Census Bureau purchased one of these huge computers, the UNIVAC, in 1951 to help with coun ng the popula on of the United States. The ENIAC (Electronic Numerical Integrator and Computer), the first general-purpose computer, which began opera on in 1946 and was programmed by a team of six female operators, should also be men oned in this context.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Can you tell me something about the first computers?

A

There’s no machine that we can point to and say “here is the first computer.” It was more of an evolu on of advanced machines into something that eventually resembles the computers we have today. In 1801, Joseph Maria Jacquard invented a loom that used punch cards made of wood to create fabric designs automa cally. Technically, this was programming—a pre-made set of instruc ons changed into a “machine language” that tells a machine what to do. However, this machine wasn’t doing any compu ng, simply weaving cloth. Later, during World War II, machines were used to encode secret messages. These machines used gears that would align with symbols to create a coded text from regular or “plaintext” messages. Breaking those codes required actual compu ng power. The Turing machine was able to take in encrypted messages, process them, and output an answer. However, his machine had no keyboard or monitor, let alone a mouse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

What is a language?

A

We can dis nguish between natural languages and programming languages. A natural language is used for communica on between humans, while a programming language is used for communica on between humans and machines. With a programming language, an algorithm can be described in such a way that a computer is able to execute the program/algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

What is a language?

A

We can dis nguish between natural languages and programming languages. A natural language is used for communica on between humans, while a programming language is used for communica on between humans and machines. With a programming language, an algorithm can be described in such a way that a computer is able to execute the program/algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

What is syntax?

A

Syntax is the set of rules that govern how a language is used. In programming, syntax refers to the correct usage and ordering of words and symbols in a program. If they are not in the correct order, the program will not work. Just like the words in an English sentence, programming instruc ons only make sense in the correct order; otherwise, it is just a jumble. If you took the words of this sentence and put them in a random order, it would ignore proper syntax and make li le sense. Syntax also includes rules for when certain symbols can be used, similar to English rules for where punctua on can go in a sentence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

What is an applica on?

A

An applica on (app) is a computer program that performs a specific task. For example, Microso Word is an applica on that allows users to create and edit documents. Applica ons are usually designed for a specific purpose, such as word processing or playing games.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

What is an opera ng system?

A

An opera ng system (OS) is the first so ware loaded into the RAM during the boot process. An OS is essen al for a computer to func on (assuming a standard personal computer). Examples include Windows, Linux, and MacOS. This so ware provides three fundamental func ons for the computer: 1. Provide an interface 2. Control hardware 3. Run applica ons. An interface is required so a human being can interact with a computer. The hardware in a computer system would sit, dormant, without the OS to give it instruc ons. Applica ons need an opera ng system to run. They are a second layer of func onality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

What is so ware?

A

So ware is a set of instruc ons that tell a computer what to do. It takes the form of either an opera ng system or an applica on. The OS provides basic func onality including an interface, while applica ons (apps) are available to perform specific tasks such as word processing, games, or even controlling robots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

What is so ware?

A

So ware is a set of instruc ons that tell a computer what to do. It takes the form of either an opera ng system or an applica on. The OS provides basic func onality including an interface, while applica ons (apps) are available to perform specific tasks such as word processing, games, or even controlling robots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

What does an opera ng system provide to interact with the user?

A

An opera ng system provides an interface to interact with the user. Nowadays an opera ng system typically provides a graphical user interface (GUI): This interface uses graphical elements such as icons, menus, and windows to allow users to interact with the system. Another interface would be a touch interface (users can interact with the system by using their fingers) or a speech interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

What are differences between the opera ng systems Mac and Windows?

A

Two of the differences are: Mac OS is designed to run exclusively on Apple hardware, while Windows can run on a variety of different hardware pla orms. Mac OS uses APFS as file system and Windows uses NTFS as file system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Does an array take more space than a stack?

A

Typically, an array does not take up more space in memory than a stack. A stack can be implemented internally as an array or a linked list. If you want to store 100 elements in an array, and the array size is exactly 100, then a stack that is implemented with a linked list requires more space because every element is linked to the other elements using an addi onal pointer. However, if you have 100 elements, and the array size is 200, for example, then a stack (internally implemented with a linked list) may require less space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Where is a linked list used?

A

A linked list is a flexible data structure. Each element in a linked list is linked via a pointer to the next element. A linked list hasn’t got a fixed size and elements can be inserted easily in the middle of the list. For example, if you were tracking the number of people who have visited your website over me, you could use a linked list to store each visitor’s IP address and mestamp.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Where is a linked list used?

A

A linked list is a flexible data structure. Each element in a linked list is linked via a pointer to the next element. A linked list hasn’t got a fixed size and elements can be inserted easily in the middle of the list. For example, if you were tracking the number of people who have visited your website over me, you could use a linked list to store each visitor’s IP address and mestamp.

106
Q

What is the difference between float and double?

A

Float and double are data types that can store numbers with decimal points. Double is a data type that can store numbers with more precision than float. Double is a 64bit floa ng point number, while float is a 32-bit floa ng point number. The double data type can store numbers with more precision than the float data type. Smallest value of a 32 bit float is -3.4028235E38, largest value of a 32 bit float is

107
Q
A

3.4028235E38, smallest value of a 64 bit double is -1.7976931348623157E308, largest value of a 64 bit double is 1.7976931348623157E308.

108
Q

What is a DDOS?

A

A Distributed Denial of Service (DDoS) a ack is a cyber-a ack where mul ple systems send so many simultaneous requests for data that the server cannot answer them all and either stops working or becomes so slow that it is mostly unusable.

109
Q

What is ASCII?

A

This is a binary code scheme where le ers, numbers, and symbols are represented by exactly one byte of data. ASCII stands for American Standard Code for

110
Q
A

Informa on Interchange. In this code the le er A is represented as 01000001.

111
Q

Describe the network topologies ring and mesh.

A

A ring network consists of computers connected together in a ring, where the signal passes around it. In this design, each computer is required to look at any data passed to it to see if it is required to pass it along. This design is not fault-tolerant and stops working if the ring is disconnected. That is why it has fallen out of use today. A mesh network connects every node (computer or device) to every other node. For each device that is connected, more cabling is required, which is extremely inefficient. However, it has the advantage of being fault-tolerant since there are mul ple paths to each node. Mesh networks are becoming interes ng in wireless networks since there is no need for cabling, and the benefit of fault tolerance is significant.

112
Q

Describe the network topologies ring and mesh.

A

A ring network consists of computers connected together in a ring, where the signal passes around it. In this design, each computer is required to look at any data passed to it to see if it is required to pass it along. This design is not fault-tolerant and stops working if the ring is disconnected. That is why it has fallen out of use today. A mesh network connects every node (computer or device) to every other node. For each device that is connected, more cabling is required, which is extremely inefficient. However, it has the advantage of being fault-tolerant since there are mul ple paths to each node. Mesh networks are becoming interes ng in wireless networks since there is no need for cabling, and the benefit of fault tolerance is significant.

113
Q

What is binary search?

A

Binary search is a search algorithm that searches for data in a sorted list. It works by dividing the list into two halves repeatedly. If the value you are searching for is lower than the value in the middle of the list, you go on searching in the le part of the list (dividing into two halves …). If the value you are searching for is higher than the value in the middle of the list, you go on searching in the right part of the list (dividing into two halves …).

114
Q

What is a hub?

A

A hub is a device that takes a signal from one cable and splits it out over several cables. If it was spli ng out four signals, it would be called a “four port” hub. A hub does not do any signal processing—everything that comes in is sent out through all of the ports. Communica on is two-way: the ports can also send communica on through the uplink connec on.

115
Q

Would the linked list work to order elements?

A

Yes, the linked list would work to order elements.

116
Q

What is the difference between BIOS and Opera ng systems

A

The BIOS is a chip that contains instruc ons for the computer to start up. The opera ng system is so ware that runs on top of the BIOS and provides an interface for applica ons to run.

117
Q

How can an octal number be converted into an decimal number?

A

The octal numbering system is a base-8 numbering system. It uses the digits 0 through 7. Each digit’s place value is a mul ple of 8. Assign place values to each digit of the octal number, star ng from the rightmost digit and working le ward. The rightmost digit has a place value of 1 (8⁰), the next digit to the le has a place value of 8 (8¹), then 64 (8² = 88), 512 (8³ = 888), and so on. For example, the octal number 1702 in decimal nota on represents (1 × 8³) + (7 × 8²) + (0 × 8¹) + (2 × 8⁰), or (1512) + (764) + (08) + (2*1), which equals 962. If you’re unsure about the correctness of your conversion between numbering systems, you can use a webpage like the following to check: h ps://www.rapidtables.com/convert/number/octal-todecimal.html.

118
Q

How can an octal number be converted into an decimal number?

A

The octal numbering system is a base-8 numbering system. It uses the digits 0 through 7. Each digit’s place value is a mul ple of 8. Assign place values to each digit of the octal number, star ng from the rightmost digit and working le ward. The rightmost digit has a place value of 1 (8⁰), the next digit to the le has a place value of 8 (8¹), then 64 (8² = 88), 512 (8³ = 888), and so on. For example, the octal number 1702 in decimal nota on represents (1 × 8³) + (7 × 8²) + (0 × 8¹) + (2 × 8⁰), or (1512) + (764) + (08) + (2*1), which equals 962. If you’re unsure about the correctness of your conversion between numbering systems, you can use a webpage like the following to check: h ps://www.rapidtables.com/convert/number/octal-todecimal.html.

119
Q

Please give some examples of a stack data structure.

A

A stack is a data structure that works under a specific philosophy: Last In, First Out.

120
Q
A

This is o en abbreviated as LIFO. A stack data structure can be used to implement a Undo/Redo func onality in text editors: When you make changes to a document in a text editor, the changes are pushed onto a stack. If you want to undo a change, the editor pops the most recent change off the stack and applies the inverse opera on. To redo a change, the editor pushes the previously undone change back onto the stack. Another example would be the back/forward naviga on in web browsers: When you navigate to a new web page, the URL of the previous page is pushed onto a stack. If you click the “back” bu on, the browser pops the previous URL off the stack and navigates to that page. If you then click the “forward” bu on, the browser pops the next URL off the stack and navigates to that page.

121
Q

How is a stack data structure represented in Java? Remark: This ques on isn’t relevant in the context of the course book.

A

The stack data structure in Java is implemented in the class java.u l.Stack. Internally in this class an array is used the implement the stack func onality.

122
Q

What is CSS?

A

CSS: This stands for Cascading Style Sheets, these are used to create layout and forma ng for web sites.

123
Q

Mangement and understading of development stages

A

Development stages are the process of crea ng a so ware applica on. The development stages are: requirements analysis, design, implementa on, tes ng and maintenance. The first stage is requirements analysis where the needs of the users are iden fied and documented in a so ware requirements specifica on (SRS). This is followed by design where the SRS is analyzed to produce a high-level design document that describes how the system will work. Next comes implementa on where all of this informa on is used to create working so ware. Tes ng then follows to ensure that everything works as expected before moving on to maintenance which includes fixing bugs and adding new features.

124
Q

Mangement and understading of development stages

A

Development stages are the process of crea ng a so ware applica on. The development stages are: requirements analysis, design, implementa on, tes ng and maintenance. The first stage is requirements analysis where the needs of the users are iden fied and documented in a so ware requirements specifica on (SRS). This is followed by design where the SRS is analyzed to produce a high-level design document that describes how the system will work. Next comes implementa on where all of this informa on is used to create working so ware. Tes ng then follows to ensure that everything works as expected before moving on to maintenance which includes fixing bugs and adding new features.

125
Q

What is a datagram?

A

A datagram is a unit of data sent over a network. A datagram may contain one or more packets, depending on the protocol used to send it.

126
Q

What is TCP/IP?

A

TCP/IP stands for Transmission Control Protocol/Internet Protocol. The transmission control protocol works at the transport layer, while the internet protocol works at the network layer of the OSI model. However, TCP has its own four-layer model of opera ng. TCP/IP is the protocol of the internet. That means that to access the internet, it must be installed on a device. Since it is also usable for LAN communica on, most computers use TCP/IP as their primary and only network protocol.

127
Q

What is TCP/IP?

A

TCP/IP stands for Transmission Control Protocol/Internet Protocol. The transmission control protocol works at the transport layer, while the internet protocol works at the network layer of the OSI model. However, TCP has its own four-layer model of opera ng. TCP/IP is the protocol of the internet. That means that to access the internet, it must be installed on a device. Since it is also usable for LAN communica on, most computers use TCP/IP as their primary and only network protocol.

128
Q

What is a device controller?

A

A device controller is a piece of so ware that controls the binary input and output to a device. The device controller can also signal the CPU with an interrupt. A device driver has to be designed specifically to talk with both the opera ng system that is in use and the hardware device’s controller.

129
Q

What is a driver?

A

A driver is a piece of so ware that allows the opera ng system to communicate with hardware devices.

130
Q

What does TCP mean?

A

Transmission Control Protocol

131
Q

Compu ng power of supercomputers is o en measured in WHAT?

A

FLOPS: floa ng point opera ons per second

132
Q

What is ALU?

A

The ALU is the part of a computer that performs arithme c and logic opera ons. It is responsible for performing basic arithme c calcula ons on data, such as adding and subtrac ng, but also performs logic opera ons such as AND and OR.

133
Q

What is a computer interface?

A

A computer interface is the combina on of all of the methods designed for a user to interact with a computer, input and output.

134
Q

What does GUI stand for?

A

Graphical User Interface (GUI) is a type of user interface that allows users to interact with electronic devices using graphics and text rather than just text. It is used in computers, smartphones, tablets, video game consoles and other devices.

135
Q

What is a hard drive?

A

A hard drive is a storage device that stores data in a non-vola le manner. It is used to store the opera ng system and other programs on your computer.

136
Q

Where is the firmware usually stored on?

A

The firmware is stored in the BIOS chip.

137
Q

Which network device does not filter network traffic?

A

A hub.

138
Q

Who is Von Neumann?

A

Von Neumann was a Hungarian-American mathema cian, physicist, inventor, computer scien st and polymath. He made major contribu ons to a number of fields, including mathema cs (founda ons of mathema cs), physics (quantum theory, solid state physics and the theory of games), compu ng (Von Neumann architecture), sta s cs (theory of games and the Monte Carlo method) and technology (cellular automata). He published over 150 papers in his life. Von Neumann was one of the most influen al mathema cians of the 20th century. He introduced the concept of cellular automata, which are self-replica ng machines. Von Neumann’s mathema cal analysis of the structure of self-replica on preceded the discovery by biologists in 1953 that DNA carries gene c informa on using a code largely based on binary numbers.

139
Q

Who is Russell Kirsch?

A

In the 1950s, Russell Kirsch invented the pixel. He decided that the simplest way to divide up the data in a photo or image was to demarcate it into discrete squares— that is what we have used to this day. It was a simple solu on and worked well enough that humans could recognize photographs on a computer screen.

140
Q

Who is Russell Kirsch?

A

In the 1950s, Russell Kirsch invented the pixel. He decided that the simplest way to divide up the data in a photo or image was to demarcate it into discrete squares— that is what we have used to this day. It was a simple solu on and worked well enough that humans could recognize photographs on a computer screen.

141
Q

Who created JavaScript? Remark: This ques on is not relevant in the context of the course book.

A

JavaScript was created by Brendan Eich in 1995. Eich is an American computer programmer and technology execu ve.

142
Q

Where are pixels used?

A

Pixels are used in all types of images including fonts, icons, and graphics, along with photos.

143
Q

When should I use JavaScript?

A

When you want to create a interac ve website.

144
Q

What’s the difference between a switch and a router?

A

A switch has a connec on for an uplink and mul ple ports for communica on. However, it does do basic filtering on data. Computers send data over a network in data frames with hardware addresses. Some data is sent out with the broadcast address; this address means it is for all computers who can receive it. A switch filters these out so they do not get propagated across the en re network (which can cause a flood of data known as a “broadcast storm”). A router is more intelligent connec on device than a switch. It examines the IP address of each packet of data sent over a network and only sends the signal through the connec on that will reach the address. A packet is similar to a frame, this is a unit of network data that is iden fied by an IP Address (instead of a hardware address). Since a router filters data, it can also block data from entering a network that does not belong there; this func on is called a firewall.

145
Q

What process analyzes large amounts of data from different sources to produce useful informa on?

A

Data mining.

146
Q

What is XOR?

A

XOR (exclusive OR, exclusive disjunc on) is a logic gate that indicates that only one out of two proposi ons is true. If both inputs (proposi ons) are true or both are false the output is false. If only one of the inputs (proposi ons) is true and the other false, the output is true.

147
Q

What is XOR?

A

XOR (exclusive OR, exclusive disjunc on) is a logic gate that indicates that only one out of two proposi ons is true. If both inputs (proposi ons) are true or both are false the output is false. If only one of the inputs (proposi ons) is true and the other false, the output is true.

148
Q

What is von neumann architecture

A

Von Neumann architecture is a basic design for computer systems that is s ll in use today. The von Neumann architecture is a reference model for the architecture of a computer. It consists of - a CPU, - a memory that holds both computer program instruc ons and data, - an input system, - an output system. The CPU consist of an ALU, a control unit and registers, which contain a fixed number of bits. These registers can contain data or instruc ons that have been read from memory. Besides the processor and memory, there also should be some type of input (entering data) and output system (outpu ng data) to be able to communicate with other devices or a human being.

149
Q

Explain the star network topology.

A

In a star network topology, a central network device such as a hub, switch, or router is used to connect all the devices in the network. The central node in a star network is responsible for sending traffic to the outer nodes. This network is fault-tolerant to a point, but if the central hub, switch or router fails the network will not func on. Star networks are by far the most commonly-used type of network today.

150
Q

Explain the star network topology.

A

In a star network topology, a central network device such as a hub, switch, or router is used to connect all the devices in the network. The central node in a star network is responsible for sending traffic to the outer nodes. This network is fault-tolerant to a point, but if the central hub, switch or router fails the network will not func on. Star networks are by far the most commonly-used type of network today.

151
Q

What is UNIX? Remark: This ques on isn’t relevant in the context of the course book.

A

UNIX is a computer opera ng system originally developed in the 1970s by AT&T Bell Labs. It was designed to be used in me-sharing and mul -user environments, and is intended to be used interac vely by mul ple users simultaneously. Today, UNIX is used on a wide range of devices, including personal computers, servers, smartphones, and other embedded systems. Some of the most popular UNIX-based opera ng systems include Linux and macOS.

152
Q

What is UNIX? Remark: This ques on isn’t relevant in the context of the course book.

A

UNIX is a computer opera ng system originally developed in the 1970s by AT&T Bell Labs. It was designed to be used in me-sharing and mul -user environments, and is intended to be used interac vely by mul ple users simultaneously. Today, UNIX is used on a wide range of devices, including personal computers, servers, smartphones, and other embedded systems. Some of the most popular UNIX-based opera ng systems include Linux and macOS.

153
Q

What is the meaning of transoceanic?

A

The term transoceanic refers to something that occurs across or involves mul ple oceans. It is used to describe things that span across large distances of water, typically in reference to travel, transporta on, or communica on. Transoceanic communica on cables refer to undersea communica on cables that connect con nents and countries across oceans.

154
Q

What is the meaning of transoceanic?

A

The term transoceanic refers to something that occurs across or involves mul ple oceans. It is used to describe things that span across large distances of water, typically in reference to travel, transporta on, or communica on. Transoceanic communica on cables refer to undersea communica on cables that connect con nents and countries across oceans.

155
Q

What is the second layer of the OSI model?

A

The second layer of the OSI model is the data link layer. It exists to provide specifica ons for devices—such as Ethernet—that determine the way signals are sent electronically over the network, as well as standards for devices; this is where the hardware (MAC) address is used. It includes local network error checking, including collisions. Collisions occur when two network devices send out a signal simultaneously, and they collide over physical media. Most networks use collision detec on. This means a er a collision is detected both devices are instructed to wait a random amount of me before sending again.

156
Q

What is the purpose of an opera ng system?

A

The purpose of an opera ng system is to provide an interface, control hardware, and run applica ons.

157
Q

What are the tasks of the presenta on layer?

A

The presenta on layer prepares the data for being transferred. Encoding happens here. For instance, if you are sending an email in Unicode, it will translate the symbols at this layer. Encryp on occurs at this level. In other words, a plaintext or other unencrypted message is brought through a mathema cal algorithm that created encryp on. Without knowing the encryp on key, the code is nearly unbreakable (though no code is perfect). The sending and receiving network devices share a key at the beginning of communica on that allows for the algorithm to be reversed and the message to be turned back into the original.

158
Q

What is the physical layer?

A

The physical layer is the lowest layer of the OSI model. It is responsible for sending and receiving data over a network. The physical layer defines how signals are sent and received, as well as how they are converted into binary data. The physical layer includes specifica ons for cabling and connectors. It consists of hardware specifica ons.

159
Q

What is the physical layer?

A

The physical layer is the lowest layer of the OSI model. It is responsible for sending and receiving data over a network. The physical layer defines how signals are sent and received, as well as how they are converted into binary data. The physical layer includes specifica ons for cabling and connectors. It consists of hardware specifica ons.

160
Q

What is the most common programming language?

A

Programming languages are context- and applica on domain-specific. Therefore, this ques on cannot be answered in general. However, some of the most popular programming languages include Python, Java, C, and C++. You can find a ranking of the popularity of programming languages over me on this webpage: h ps://www. obe.com/ obe-index/

161
Q

What is the most common programming language?

A

Programming languages are context- and applica on domain-specific. Therefore, this ques on cannot be answered in general. However, some of the most popular programming languages include Python, Java, C, and C++. You can find a ranking of the popularity of programming languages over me on this webpage: h ps://www. obe.com/ obe-index/

162
Q

What is the first layer of the osi model?

A

The first layer of the OSI model is the Physical Layer.

163
Q

What is the difference between h p and h ps?

A

Both protocols exist to transfer data for a web page. The difference between h p and h ps is that the secure version (h ps) uses encryp on to protect private data. Many sites use encryp on—you should never type in personal data on any site that is not using HTTPS (this is o en indicated on a browser by a small padlock icon).

164
Q

What is the difference between direct and indirect proof? Remark: This ques on isn’t relevant in the context of the course book.

A

Direct and indirect proofs are two methods used in mathema cs to prove the truth of a statement. A direct proof is a method of proving a statement by using a series of valid arguments to show that the statement is true. An indirect proof, on the other hand, is a proof method that proves a statement by assuming the opposite of the statement (nega on) and showing that it leads to a contradic on or an impossible scenario. Indirect proofs are o en used to prove statements that are difficult to prove directly, or for cases where a direct proof is not possible.

165
Q

What is the difference between direct and indirect proof? Remark: This ques on isn’t relevant in the context of the course book.

A

Direct and indirect proofs are two methods used in mathema cs to prove the truth of a statement. A direct proof is a method of proving a statement by using a series of valid arguments to show that the statement is true. An indirect proof, on the other hand, is a proof method that proves a statement by assuming the opposite of the statement (nega on) and showing that it leads to a contradic on or an impossible scenario. Indirect proofs are o en used to prove statements that are difficult to prove directly, or for cases where a direct proof is not possible.

166
Q

What is the concept behind pixel images?

A

The concept behind pixel images is to break any image up into small squares, so that each square would then have one (and only one) color. If the squares are small enough, the human eye cannot dis nguish them individually, and so our brain will see a photographic image. An image is stored as a binary sequence of “color values”. You start at the top le for the first pixel, and then go across the first row in that order un l comple ng it and then jumping down to the next row of pixels. Since the order is implicit, there is no need to number the pixels. Each pixel has a color as its basic data, so we must represent each separate color as a binary number. If we use eight bits (a byte), then there are 256 different colors we can represent uniquely. This is called 8-bit color.

167
Q

What is seman cs?

A

Seman cs is the study of meaning. Computer scien sts use the term seman c to describe a type of error in so ware. It’s possible to create perfectly readable code for a computer, yet have it do something different than your inten on. When a program compiles and runs without producing any syntax errors or run me errors, but it does not produce the expected output or produces incorrect output due to a mistake in the logic of the program. For instance, suppose you write a program to calculate the average of a list of numbers, but you forget dividing the sum by the number of elements in the list. The program would compile and run without any errors, but the output would be incorrect, resul ng in a seman c error.

168
Q

What is Python?

A

Python is a programming language used for web development, data analysis, ar ficial intelligence, scien fic compu ng, and more.

169
Q

What is logic?

A

In computer science, logic is a fundamental branch of mathema cs that deals with the study of reasoning and argumenta on. It involves the use of symbols and rules to express and manipulate statements and arguments, with the goal of determining their validity or truth. Proposi onal logic is a specific area relevant to computer science.

170
Q

What is Linux?

A

Linux is a computer opera ng system. It is a free and open source so ware opera ng system for computers, meaning that the code can be modified and redistributed freely. Linux was originally created by Linus Torvalds in 1991, and has since been developed by thousands of programmers worldwide.

171
Q

What is HTTP?

A

HTTP (Hypertext Transfer Protocol) is part of the TCP/IP protocol suite—it exists specifically to transfer data for a web page. HTTP is the founda on of the World Wide Web and enables the transfer of informa on between clients and servers over the internet.

172
Q

What is Fortran?

A

Fortran is a programming language. Addi onal informa on: Fortran was developed in the 1950s. It is used to write programs for scien fic and engineering applica ons. It is s ll used today, but has been largely replaced by other languages like C++ and Java.

173
Q

What is DNS?

A

Domain Name System (DNS) is a service that translates domain names into IP addresses. It is used to access websites and other resources on the Internet. Every internet device requires a 32-bit IP address to transmit and receive data. Imagine if human users had to memorize and type in 32 zeroes and ones just to access a website? This would prove quite cumbersome. Fortunately, DNS is a transla on service that maps domain names to IP addresses every me you access a web page.

174
Q

What is the difference between syntax and seman cs?

A

Syntax is the rules of how to write a program. Seman cs is the meaning of what you are wri ng.

175
Q

What are data structures?

A

Data structures are the way in which data is stored and organized. They are used to make it easier to access and manipulate data. There are many different types of data structures, including arrays, linked lists, stacks, queues, trees and graphs.

176
Q

What are data structures?

A

Data structures are the way in which data is stored and organized. They are used to make it easier to access and manipulate data. There are many different types of data structures, including arrays, linked lists, stacks, queues, trees and graphs.

177
Q

What is data mining?

A

Data mining is the process of producing useful informa on from large amounts of data, o en from mul ple sources.

178
Q

What is data contextualiza on?

A

What is the meaning of the binary byte 01000001? We don’t know if it represents a number, a le er, or if it has to be connected with other bytes to represent a larger number. When somebody tells you that each byte contains an ASCII symbol, you know the meaning of the binary byte 01000001 is the capital le er A. We give binary data context by using codes (like the ASCII code).

179
Q

What is a Wi-Fi access point?

A

A Wi-Fi access point is a device that allows wireless devices to connect to the Internet.

180
Q

What is a terminator in a flowchart?

A

A terminator symbol (oval or rectangle) is used at the beginning of a flowchart and at all the endings. A terminator symbol represents the start or end of a process or program. Terminator symbols are used to make flowcharts more readable and easier to follow, as they provide a clear indica on of where a process begins and ends.

181
Q

What is a syntax error?

A

A syntax error is a mistake in the syntax of a programming language such as - missing punctua on, - wrong ordering of symbols and words, - misspelled keywords or iden fiers, - incorrect capitaliza on, - incorrect nes ng of brackets or parentheses, … Syntax errors prevent the code from being compiled or executed properly, and typically result in an error message that indicates the loca on and nature of the syntax error.

182
Q

What is a syntax error?

A

A syntax error is a mistake in the syntax of a programming language such as - missing punctua on, - wrong ordering of symbols and words, - misspelled keywords or iden fiers, - incorrect capitaliza on, - incorrect nes ng of brackets or parentheses, … Syntax errors prevent the code from being compiled or executed properly, and typically result in an error message that indicates the loca on and nature of the syntax error.

183
Q

What is a proposi on?

A

A proposi on is the idea behind a statement. For instance, saying ‘It is more than 27 degrees Celsius’ is a logical statement, but the proposi on behind it is that the condi ons of the environment include that the temperature is more than 27 degrees Celsius at the current moment outdoors. There can be many logical statements used to express a proposi on. For instance, if the proposi on is ‘It is hot outside’, you can use the logical statement ‘It is more than 27 degrees outside’ or ‘It is not less than 28 degrees outside’, among others.

184
Q

What is an UI?

A

UI stands for “User Interface”. It refers to the graphical or interac ve elements that allow users to interact with a so ware.

185
Q

What is a firmware?

A

Firmware is a type of so ware that is required by the hardware for essen al func onality. It is programmed into a stable chip that retains the data even without electrical power (a non-vola le chip). A modern computer first runs the instruc ons on the BIOS chip for boo ng up, which includes iden fying all of the hardware a ached to the machine (hard drives, amount of RAM, graphics card, etc.). Once that is done, it finds the opera ng system (OS) on the hard drive or other long-term storage device and begins the process of copying it into RAM. That is what you are wai ng for when a computer is “boo ng” up. You stare at the logo for your computer un l this process is finished and you can interact with it. Firmware can also be used in electronic devices that always perform the same task, such as your smart refrigerator or a child’s toy. A single-task device does not need RAM to run different applica ons. Advanced personal computers can perform many tasks and need the RAM and extra hard drive storage to do so.

186
Q

What is a discrete unit of data?

A

A discrete unit of data is a single, dis nct piece of informa on that can be stored, manipulated, or transmi ed by a computer or other digital device. In the context of this course book a discrete unit of data is a file.

187
Q

What is a discrete unit of data?

A

A discrete unit of data is a single, dis nct piece of informa on that can be stored, manipulated, or transmi ed by a computer or other digital device. In the context of this course book a discrete unit of data is a file.

188
Q

What happened in the Business era of computer

A

The Business era of computer is the period from the 1960s to the 1980s. Computers was used by individual experts in business. No graphical user interfaces was available to interact with computers.

189
Q

What happened in 1801?

A

Joseph Maria Jacquard invented a loom that used punch cards made of wood to create fabric designs automa cally. Technically, this was programming—a pre-made set of instruc ons changed into a “machine language” that tells a machine what to do. However, this machine wasn’t doing any compu ng, simply weaving cloth.

190
Q

What does TCP/IP stand for?

A

Transmission Control Protocol/Internet Protocol

191
Q

What can be represented in binary?

A

Any type of informa on can be represented in binary. This includes numeric values, text, images, audio, and video. All of this informa on can be converted into a binary representa on.

192
Q

What is a programming language?

A

Programming languages are languages that can be used by humans to give instruc ons to a computer without having to write everything in binary. Programming languages define a set of allowed words and have rules, including syntax, which dictate how to use the words and symbols of that language.

193
Q

What is a programming language?

A

Programming languages are languages that can be used by humans to give instruc ons to a computer without having to write everything in binary. Programming languages define a set of allowed words and have rules, including syntax, which dictate how to use the words and symbols of that language.

194
Q

What is a parity bit?

A

Parity is a method of error-checking for binary data. It works by adding an extra bit (the so-called parity bit) to a group of data bits and then checking that the total number of ones (including the extra bit) is odd or even. If an odd parity bit is used, the parity bit makes the total number of ones in the group of data odd. For example, if you have the following data 1010111, you count 5 ones. Because 5 is odd, the parity bit to add is 0. Then we have the byte 01010111. On the other hand, if you have the following data 1010101, you count 4 ones. To make the total number of ones odd, the parity bit to add has to be 1. Then we have the byte 11010101.

195
Q

What is a parity bit?

A

Parity is a method of error-checking for binary data. It works by adding an extra bit (the so-called parity bit) to a group of data bits and then checking that the total number of ones (including the extra bit) is odd or even. If an odd parity bit is used, the parity bit makes the total number of ones in the group of data odd. For example, if you have the following data 1010111, you count 5 ones. Because 5 is odd, the parity bit to add is 0. Then we have the byte 01010111. On the other hand, if you have the following data 1010101, you count 4 ones. To make the total number of ones odd, the parity bit to add has to be 1. Then we have the byte 11010101.

196
Q

What are formats in number representa on?

A

In compu ng, there are several different formats that are commonly used for number representa on, including decimal, binary, hexadecimal and octal.

197
Q

What is proposi onal logic?

A

Proposi onal logic deals with the logical rela onships between proposi ons that are represented as simple statements or symbols. In proposi onal logic, proposi ons are considered to be either true or false, and logical connec ves such as and, or, not, implies are used to combine them into more complex proposi ons.

198
Q

The rules for the order and usage of words and symbols in programming is called what?

A

syntax

199
Q

Which is the fastest cache L1, L2 or L3?

A

L1 cache is the fastest, L2 cache is slower than L1 and L3 cache is slower than L2.

200
Q

What is the memory size of the L1 cache?

A

The memory size of L1 cache varies depending on the architecture and design of the processor. For example, in the Intel Core i7 processor, the L1 cache has a size of 32 kilobytes (KB).

201
Q

What is the big O nota on?

A

The big O nota on is used to describe the complexity of an algorithm. It is based on the data size of n elements. For instance, bubble sort takes approximately n^2 steps to be completed, so we write it as: O ( n^2 ). If you would like to sort a list of 100 elements using bubble sort you approximately need 10,000 steps to complete.

202
Q

Conver on between numbering systems: 1: Convert the decimal number 57 to binary. 2: Convert the binary number 10110110 to decimal. 3: Convert the hexadecimal number 2C to binary.

A

1: The decimal number 57 is in binary 00111001. 2: The binary number 10110110 is in decimal 182. 3: The hexadecimal number 2C is in binary 00101100.

203
Q

How many different numbers can you represent with 16 bits?

A

With 16 bits, you can represent 2^16 = 65,536 different numbers.

204
Q

How many different numbers can you represent with 16 bits?

A

With 16 bits, you can represent 2^16 = 65,536 different numbers.

205
Q

Which non-numerical informa on needs to be converted to binary?

A

Non-numerical informa on, such as text, images, audio, and video, needs to be converted to binary. For text, you can use the ASCII code, images can be represented by a sequence of pixels, etc.

206
Q

What is the difference between microprocessor and microcontroller?

A

Microprocessors are the brains of a computer. They are the central processing unit (CPU) and they control all of the other components in a computer. A microprocessor is a single-chip CPU. It requires addi onal components, such as memory and input/output interfaces, to be integrated into a complete system. A microcontroller, on the other hand, is a complete compu ng system that integrates a CPU, memory, and input/output interfaces all on a single chip.

207
Q

How can one behave ethically?

A

You can behave ethically for example by not stealing intellectual property, not lying about your product, and keeping user informa on private.

208
Q

How to convert binary to octal?

A

Conver ng binary to octal involves grouping the binary digits into sets of three, star ng from the rightmost digit, and then conver ng each group of three binary digits into its corresponding octal digit. The binary number 110 010 111 011 001 010 can be converted into octal as follows: 010 = 2, 001 = 1, 011 = 3, 111 = 7, 010 = 2, 110 = 6. The number in octal is: 627312. If you’re unsure about the correctness of your conversion between numbering systems, you can use a webpage like the following to check: h ps://www.rapidtables.com/convert/number/binary-tooctal.html.

209
Q

How can we convert the binary number 11111111 to a decimal number?

A

Assign place values to each digit of the binary number, star ng from the rightmost digit and working le ward. The rightmost digit has a place value of 1, the next digit to the le has a place value of 2, then 4, 8, 16, 32, 64, 128 and so on, with each place value doubling. Mul ply each digit of the binary number by its corresponding place value and add the results: 1128+164+132+116+18+14+12+11 = 255 Therefore the binary number 11111111 is 255 in decimal.

210
Q

How can we convert the binary number 11111111 to a decimal number?

A

Assign place values to each digit of the binary number, star ng from the rightmost digit and working le ward. The rightmost digit has a place value of 1, the next digit to the le has a place value of 2, then 4, 8, 16, 32, 64, 128 and so on, with each place value doubling. Mul ply each digit of the binary number by its corresponding place value and add the results: 1128+164+132+116+18+14+12+11 = 255 Therefore the binary number 11111111 is 255 in decimal.

211
Q

How many bytes is a mega byte?

A

A mega byte (1MB) is 1,000,000 bytes.

212
Q

How can humans ‘think like a computer’?

A

A computer needs clear and unambiguous instruc ons. If we want to solve a problem in the real world using a computer, we must be able to break down the problem into easy, step-by-step instruc ons that we can formulate in a programming language.

213
Q

How does an algorithm work?

A

An algorithm is a set of rules or instruc ons for comple ng a task. This applies to human beings as well as computers. The algorithm takes input data, processes it, and produces an output based on the instruc ons provided. If you want to assemble ons to other hardware. The CPU consists of mul ple components, including the control unit, arithme c and logic unit, registers, and cache. The control unit manages the flow of data between the CPU and memory, while the arithme c and logic unit performs arithme c and logical opera ons. Registers and cache are highspeed memory units that are used to store data that is frequently accessed by the CPU.

214
Q

How does an algorithm work?

A

An algorithm is a set of rules or instruc ons for comple ng a task. This applies to human beings as well as computers. The algorithm takes input data, processes it, and produces an output based on the instruc ons provided. If you want to assemble ons to other hardware. The CPU consists of mul ple components, including the control unit, arithme c and logic unit, registers, and cache. The control unit manages the flow of data between the CPU and memory, while the arithme c and logic unit performs arithme c and logical opera ons. Registers and cache are highspeed memory units that are used to store data that is frequently accessed by the CPU.

215
Q

How does a cpu work?

A

The Central Processing Unit (CPU) is o en referred to as the “brain” of the computer. It does all the processing, which includes doing calcula ons and sending instruc ons to other hardware. The CPU consists of mul ple components, including the control unit, arithme c and logic unit, registers, and cache. The control unit manages the flow of data between the CPU and memory, while the arithme c and logic unit performs arithme c and logical opera ons. Registers and cache are highspeed memory units that are used to store data that is frequently accessed by the CPU.

216
Q

How can I sort informa on alphabe cally?

A

You can sort informa on alphabe cally by using the ASCII value of each character. The ASCII value is a number that represents the character. For example, the le er A has an ASCII value of 65, and the le er B has an ASCII value of 66.

217
Q

How can I sort informa on alphabe cally?

A

You can sort informa on alphabe cally by using the ASCII value of each character. The ASCII value is a number that represents the character. For example, the le er A has an ASCII value of 65, and the le er B has an ASCII value of 66.

218
Q

What is a DSS?

A

A Decision Support System (DSS), is primarily designed to look to the future and help make informed decisions. A key of a good DSS is that the informa on is presented in an easily understandable way. These systems o en have mul ple ways to present data including in graphs and charts. DSS systems provide informa on such as: revenue predic ons, hiring needs, inventory analysis, and future sales. This system is most o en used at the middle management level and above.

219
Q

Do I have to watch lectures only or I have to study course book as well?

A

You have to study book as well. The course book content is essen al to pass the exam.

220
Q

Describe the communica on process in layers between applica on, opera ng system, BIOS and hardware.

A

The applica on interacts directly with the user, it makes requests to access hardware through the opera ng system. The opera ng system uses a driver to talk to the BIOS chip, which handles things like hardware adressing. The BIOS passes commands along to hardware, and then passes the results back up to the applica on.

221
Q

Describe the communica on process in layers between applica on, opera ng system, BIOS and hardware.

A

The applica on interacts directly with the user, it makes requests to access hardware through the opera ng system. The opera ng system uses a driver to talk to the BIOS chip, which handles things like hardware adressing. The BIOS passes commands along to hardware, and then passes the results back up to the applica on.

222
Q

Describe the boot process.

A

The boot process is the startup sequence of a computer. The term comes from the phrase “pull yourself up by your bootstraps.” When a computer first starts up (the boot process), the RAM is empty and the computer is wai ng for instruc ons on what to do. It finds those instruc ons (so ware) in a special chip called a BIOS, which stands for Basic Input Output System. These instruc ons are what the computer follows when first it starts up. They are always the same, so they are programmed into a stable chip that retains the data even without electrical power (a non-vola le chip). A modern computer first runs the instruc ons on the BIOS chip for boo ng up, which includes iden fying all of the hardware a ached to the machine (hard drives, amount of RAM, graphics card, etc.). Once that is done, it finds the opera ng system (OS) on the hard drive or other long-term storage device and begins the process of copying it into RAM. That is what you are wai ng for when a computer is “boo ng” up. You stare at the logo for your computer un l this process is finished and you can interact with it.

223
Q

What is a firewall?

A

A firewall is a device that filters data from entering or leaving a network. It can also block data from entering a network that does not belong there; this func on is called a firewall.

224
Q

What is sampling?

A

Sampling is the representa on of analog data by taking samples of the wave values over small me intervals. In the real world sound exist in waves. Informa on represented in waves is referred to as analog. When we store it on a computer it must be converted into digital data. Does this mean that some of the informa on is lost? Definitely. Analog waves have an infinite con nuum of values, whereas digital representa ons of waves must simulate them with sampling. Analog data are sliced into very small me samples and a digital value is assigned for that me slice. The smaller the slices, the more accurate a representa on. However, we cannot have infinitely small samples. If we cut up an audio wave into small enough slices and reassemble it, the human ear cannot tell the difference.

225
Q

What is sampling?

A

Sampling is the representa on of analog data by taking samples of the wave values over small me intervals. In the real world sound exist in waves. Informa on represented in waves is referred to as analog. When we store it on a computer it must be converted into digital data. Does this mean that some of the informa on is lost? Definitely. Analog waves have an infinite con nuum of values, whereas digital representa ons of waves must simulate them with sampling. Analog data are sliced into very small me samples and a digital value is assigned for that me slice. The smaller the slices, the more accurate a representa on. However, we cannot have infinitely small samples. If we cut up an audio wave into small enough slices and reassemble it, the human ear cannot tell the difference.

226
Q

What is an API?

A

Applica ons use an Applica on Programming Interface (API) that is provided by another applica on (for example the opera ng system) to use specific func onality. The opera ng system for example is responsible for accessing hardware devices. The func onality to access hardware devices is also important for other applica ons. Therefore the opera ng system provides this func onality via an API to other applica ons.

227
Q

What is an algorithm?

A

An algorithm is a sequence of instruc ons that can be used to solve a problem. The most common algorithms are sor ng algorithms, which sort data into an order that is more useful for the user. Algorithms can also be used to find pa erns in data, such as finding the highest value in a list or finding all possible combina ons of numbers from 1-100.

228
Q

What is algorithm complexity?

A

Algorithm complexity is the number of steps that an algorithm takes to complete its task. The less complex an algorithm is, the more efficient it tends to be. When we are evalua ng the usefulness of algorithms, one thing we ask is: which one requires more opera ons to complete its task? That algorithm is the most complex. Of course, we want to use the least complex algorithm that will take fewer calcula ons and therefore less me and energy.

229
Q

What is a binary digit?

A

A binary digit is the smallest unit of data in a computer. They are represented by two symbols, 0 and 1. A byte is eight binary digits together, which can represent 256 combina ons or 0 to 255.

230
Q

What is 802.11?

A

802.11 is an IEEE standard for wireless communica on, set in 1997. New, updated standards were then introduced by adding addi onal le ers a er the name. The 802.11g protocol is the oldest widely used protocol, for example.

231
Q

What is a computer program?

A

A computer program is a set of instruc ons that tell the computer what to do. It is wri en in a programming language that the computer can understand.

232
Q

What is a computer program?

A

A computer program is a set of instruc ons that tell the computer what to do. It is wri en in a programming language that the computer can understand.

233
Q

What is RGB?

A

RGB is a color model in which red, green, and blue are added together in various ways to reproduce a broad array of colors. The name of the scheme comes from the ini als of the three addi ve primary colors, red, green and blue.

234
Q

What is the VGA graphics system?

A

The VGA graphics system is a computer display standard introduced by IBM in 1987. It was the first standard to use a digital RGB color model, instead of the analog RGB model used previously. The VGA supports up to 640×480 pixels with 16 colors at once from a pale e of 262,144 colors.

235
Q

What is a pixel?

A

A pixel is a single square which is assigned a color and used to assemble a larger image.

236
Q

What does CPU stand for?

A

Central Processing Unit

237
Q

What is a byte and how does it compare to a bit?

A

A byte is a unit of digital informa on that consists of eight bits. A bit is a single binary digit, either 0 or 1.

238
Q

What is a bit?

A

A bit is the smallest unit of data in a computer. A bit can either store the value 1 or the value 0.

239
Q

What are binary digits?

A

Binary digits are the two symbols used in binary, 0 and 1.

240
Q

What is JavaScript?

A

JavaScript is a programming language that is used to create interac ve effects on websites. It is also used to create programs for web browsers.

241
Q

What does RAM stand for?

A

Random Access Memory

242
Q

What does RAM stand for?

A

Random Access Memory

243
Q

Which considera ons do you see regarding ethics in computer science?

A

There are many considera ons regarding ethics in computer science. One considera on is that a company or government should not steal intellectual property. Another considera on is that a company or government should not lie about their product—claiming that it is be er than is actually is, or promising features that are not delivered. A third considera on would be to maintain proper ethics by being direct about product expecta ons, specifica ons, budgets, and deadlines.

244
Q

What is the difference between bubble sort and quick sort?

A

Both are sor ng algorithms. Bubble sort has a me complexity of O(n2), while quick sort has a me complexity of O(n*log(n)). Therefore, quick sort can order the elements of a list on average faster than bubble sort.

245
Q

What is the binary representa on of A?

A

If we use the ASCII code the le er A is represented by 01000001.

246
Q

Explain the bubble sort algorithm.

A

The rules for bubble sor ng are this: star ng at the beginning, compare the first two values. If the first one is larger, swap the two values. If it is not, there is nothing to do. Then compare the next two values and do the same un l you reach the end. Once this is done, do it again for every element except the last one, since it will be in order now. Each pass you complete will guarantee one more element is in order. Others may happen to be in order, but the bubble sort will check them all regardless. If there are no swaps in a pass, this indicates that the list is s ll sorted.

247
Q

Explain the bubble sort algorithm.

A

The rules for bubble sor ng are this: star ng at the beginning, compare the first two values. If the first one is larger, swap the two values. If it is not, there is nothing to do. Then compare the next two values and do the same un l you reach the end. Once this is done, do it again for every element except the last one, since it will be in order now. Each pass you complete will guarantee one more element is in order. Others may happen to be in order, but the bubble sort will check them all regardless. If there are no swaps in a pass, this indicates that the list is s ll sorted.

248
Q

Explain odd an even parity bits.

A

Parity is a method of error-checking for binary data. It works by adding an extra bit (the so-called parity bit) to a group of data bits and then checking that the total number of ones is odd or even. If an odd parity bit is used, the parity bit makes the total number of ones odd. For example, if you have the following data 1010111, you count 5 ones. Because 5 is odd, the parity bit that has to be added is 0. The data including the parity bit then looks like: 01010111. On the other hand, if you have the following data 1010101, you count 4 ones. To make the total number of ones odd, the parity bit that has to be added is 1. The data including the parity bit then looks like: 11010101. If an even parity bit is used, the parity bit makes the total number of ones even. For example, if you have the following data 1010111, you count 5 ones. Because 5 is not even, the parity bit that has to be added is 1. The data including the parity bit then looks like: 11010111. On the other hand, if you have the following data 1010101, you count 4 ones. The total number of ones is s ll even, therefore the parity bit that has to be added is 0. The data including the parity bit then looks like: 01010101.

249
Q

Does a rela onal database scale well horizontally? Remark: This ques on isn’t relevant in the context of the course book.

A

Whether a rela onal database scales well horizontally depends on the data stored in it. If it is possible to break up the database into smaller pieces and distribute them across mul ple servers, with each server responsible for a subset of the data, then a rela onal database can scale horizontally.

250
Q

What is Web3? Remark: This ques on isn’t relevant in the context of the course book.

A

Web3 is an idea for a new genera on of the World Wide Web that is based on blockchain technology and emphasizes decentraliza on, user privacy, and increased security.

251
Q

What is ALGOL? Remark: This ques on isn’t relevant in the context of the course book.

A

ALGOL (“Algorithmic Language”) is the name of a family of programming languages that were used from the late 1950s to the 1980s. All Algol variants have had a significant influence on the further development of programming languages. For example, languages such as C and Pascal are derived from Algol 60.

252
Q

What is ALGOL? Remark: This ques on isn’t relevant in the context of the course book.

A

ALGOL (“Algorithmic Language”) is the name of a family of programming languages that were used from the late 1950s to the 1980s. All Algol variants have had a significant influence on the further development of programming languages. For example, languages such as C and Pascal are derived from Algol 60.

253
Q

Summarize some facts about the history of computers.

A

It is difficult to pinpoint the exact moment when the first computer was created. It was more of an evolu on of advanced machines into something that eventually resembles the computers we have today. In 1801, Joseph Maria Jacquard invented a loom that used punch cards made of wood to create fabric designs automa cally. Technically, this was programming—a pre-made set of instruc ons changed into a “machine language” that tells a machine what to do. However, this machine wasn’t doing any compu ng, simply weaving cloth. Later, during World War II, machines were used to encode secret messages. These machines used gears that would align with symbols to create a coded text from regular or “plaintext” messages. Breaking those codes, however, required actual compu ng power. The 2014 film The Imita on Game tells the story of Alan Turing; his Turing machine was able to take in encrypted messages, process them, and output an answer. However, his machine had no keyboard or monitor, let alone a mouse. To look at the history of modern compu ng machines, we will break it down into four eras: - Behemoths: Huge machines used mostly by governments. 1940s - 1960s. - Business: Computers that are used by individuals in business. 1960s - 1980s. - Graphical: The dawn of the Graphical User Interface and digital imagery. 1980s - 2000s. - Portable: Miniaturiza on of computers; laptops, tablets, smartphones. 2000s - today.

254
Q

What programming language should I use to create interac ve websites?

A

You can use Python.

255
Q

Why should I learn JavaScript?

A

Because it is a programming language that is used to create interac ve websites.

256
Q

How does a queue data structure work? Remark: Queues aren’t part of the course book and therefore this ques on is not relevant for the exam.

A

A queue is a data structure that stores elements in the order they are inserted. It is called a FIFO (First In First Out) data structure. The first element added to the queue will be the first one removed from it. A queue can be implemented using an array or linked list.

257
Q

What is base 8?

A

Base 8 refers to a numbering system that uses the digits 0 through 7. It is also known as octal numbering system.

258
Q

Which numbering system is base 8?

A

The octal numbering system.

259
Q

What is a BIOS chip?

A

Within the BIOS chip a special kind of so ware (firmware) is stored typically in a ROM (read only memory). The firmware of a BIOS chip provides a star ng line for a computer every me it is turned on. One of the very first things a BIOS chip will instruct the computer to do is detect and test hardware that is connected to it. It performs a POST, or power on self-test to check that the required hardware is there and that it is func oning properly. Then it starts loading the opera ng system.

260
Q

Where is firmware usually stored?

A

Firmware is usually stored in the BIOS chip.

261
Q

Which are the most important concepts for embedded systems?

A

An embedded system is a computer system that is designed to perform one specific task over and over again. It includes a CPU, memory, and an input/ output system. Most of these systems use a microcontroller and are embedded into small devices. Since an embedded system typically performs the same func on over and over again, the so ware can be placed on a computer chip, making it firmware. As these devices are hard to upgrade (and upgrading is not part of the regular use of the device), they must have an extremely high degree of reliability. This means that much more rigorous tes ng must be done of any so ware created to be placed on the device. Embedded systems typically have a very limited amount of RAM— programmers must be as efficient as possible to get the maximum amount of instruc ons into the smallest amount of memory.