Computer Science CS 141 Texas

¡Supera tus tareas y exámenes ahora con Quizwiz!

local variables

A local variable is a variable which is either a variable declared within the function or is an argument passed to a function. As you may have encountered in your programming, if we declare variables in a function then we can only use them within that function.

IEEE 802.11

Describes all kinds of wireless network connections

DNS

Domain Name System is the process that converts a web address (www.domain.com) to an IP address.(192.168.2173)

DDR-SDRAM

Double-data rate synchronous dynamic RAM is capable of speeds in the megahertz and is common to PCs and MACs.

DHCP

Dynamic Host Configuration Protocol runs on the server and contains the list of valid IP addresses for the network.

Spiral Development Model

In each cycle, planning, modeling, construction, and deployment occur. Risk analysis at each step.

Rich Text Format

The Rich Text Format (often abbreviated RTF) is a proprietary document file format with published specification developed by Microsoft Corporation from 1987 until 2008 for cross-platform document interchange with Microsoft products. Most word processors are able to read and write some versions of RTF.

object

locations where information is stored, stored in the attributes of the object, the object is an instance of a class

full tree

no empty spaces to the right

ROM

read only memory, Data stored in ROM can only be modified slowly, with difficulty, or not at all, so it is mainly used to store firmware, BIOS lives here

Ctrl - S

saves your document in MS products

contiguous memory

side by side

hyper-threading technology

simulation of two processors

virus

software written to intentionally do damage and is spread and activated by a user's actions

cache

special memory on motherboard used for frequently accessed instructions

coax cable

standard cables for cable tv, solid copper wire

Insertion Sort

start at second card in the list, shifting and inserting into the best position, always looking for best place in list for next card, Best Case O(N) Average Case O(N*N) Worst Case O(N*N)

method call

statement in body of program that activates or executes a procedure, function, or method

microsoft visual basic

teaching programming language

boolean data type

0 or 1, true or false

Huffman encoding

A particular type of optimal prefix code that is commonly used for lossless data compression. Assign binary codes to symbols that reduces the overall number of bits used to encode a typical string of those symbols.

Library of program code

A software library generally consists of pre-written code, classes, procedures, scripts, configuration data and more. Typically, a developer might manually add a software library to a program to achieve more functionality or to automate a process without writing code for it. For example, when developing a mathematical program or application, a developer may add a mathematics software library to the program to eliminate the need for writing complex functions. All of the available functions within a software library can just be called/used within the program body without defining them explicitly. Similarly, a compiler might automatically add a related software library to a program on run time. Libraries are accessed by a method or function using the interface.

Stack

A stack is an abstract data type that serves as a collection of elements, with two principal operations: push, which adds an element to the collection, and pop, which removes the most recently added element that was not yet removed. The order in which elements come off a stack gives rise to its alternative name, LIFO (for last in, first out). Additionally, a peek operation may give access to the top without modifying the stack.

ASCII

ASCII encodes 128 specified characters into seven-bit integers. The characters encoded are numbers 0 to 9, lowercase letters a to z, uppercase letters A to Z, basic punctuation symbols, control codes that originated with teletype machines, and a space. For example, lowercase j would become binary 1101010 and decimal 106. ASCII includes definitions for 128 characters: 33 are non-printing control characters (many now obsolete)[9] that affect how text and space are processed[10] and 95 printable characters, including the space (which is considered an invisible graphic. binary code for microprocessors

ACM

Association of Computing Machinery develops and expands the knowledge in computers.

CSS

Cascading Style Sheets allow the designers to use the HTML tags of the Internet to describe the content of the tags.

parameters passed by value

Changes to the formal parameters inside the method or function call do not affect the actual parameter passed by value or original data

CRA

Computing Research Association that seeks to strengthen research and advance education in computers and related fields.

DRAM

Dynamic RAM must be refreshed regularly by the CPU or it will lose some of its data.

Big-endian

Endianness refers to the order of the bytes comprising a digital word in computer memory. It also describes the order of byte transmission over a digital link. Words may be represented in big-endian or little-endian format. When storing a word in big-endian format the most significant byte, which is the byte containing the most significant bit, is stored first and the following bytes are stored in decreasing significance order with the least significant byte, which is the byte containing the least significant bit, thus being stored at last place.

queue

FIFO data structure similar to a stack, new elements are added to the back of the queue, like a waiting line Enqueue - push a value at the back of the queue Dequeue - remove a value at the front of the queue Peek - look at the value at the front of the queue

SDRAM

Faster than DRAM, controlled by the system clock.

FTP

File Transfer Protocol a method to move files over any type of network.

binary heap sort

Heap sort is a comparison based sorting technique based on Binary Heap data structure. It is similar to selection sort where we first find the maximum element and place the maximum element at the end. We repeat the same process for remaining element. Every parent is smaller than both of its children.

HTML

Hypertext Markup Language, a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effects on World Wide Web pages, not able to make calculations

Global variablesS

In computer programming, a global variable is a variable with global scope, meaning that it is visible (hence accessible) throughout the program, unless shadowed. The set of all global variables is known as the global environment or global state. Global variables should be used sparingly. They are dangerous because they can be written to from anywhere. Overuse of globals can make isolating bugs

Array

In computer science, an array type is a data type that is meant to describe a collection of elements (values or variables), each selected by one or more indices (identifying keys) that can be computed at run time by the program, memory is static, once an array size is declared it cannot be changed, contiguous memory

Selection Sort

In computer science, selection sort is a sorting algorithm, specifically an in-place comparison sort. It has O(n2) time complexity, making it inefficient on large lists, and generally performs worse than the similar insertion sort. Selection sort is noted for its simplicity, and it has performance advantages over more complicated algorithms in certain situations, particularly where auxiliary memory is limited. The algorithm divides the input list into two parts: the sublist of items already sorted, which is built up from left to right at the front (left) of the list, and the sublist of items remaining to be sorted that occupy the rest of the list. Initially, the sorted sublist is empty and the unsorted sublist is the entire input list. The algorithm proceeds by finding the smallest (or largest, depending on sorting order) element in the unsorted sublist, exchanging (swapping) it with the leftmost unsorted element (putting it in sorted order), and moving the sublist boundaries one element to the right

graph

In fact there are only two, nodes and edges. A node (or vertex) is a discrete position in the graph. An edge (or connection) is a link between two vertices that can be either directed or undirected and may have a cost associated with it. An undirected edge means that there is no restriction on the direction you can travel along the edge. So for example, if there were an undirected edge from A to B you could move from A to B or from B to A. A directed edge only allows travel in one direction, so if there were a directed edge from A to B you could travel from A to B, but not from B to A. An easy way to think about edges and vertices is that edges are a function of two vertices that returns a cost. We will see an example of this methodology in a second.

Sequential file

In order to locate the desired data, sequential files must be read starting at the beginning of the file. Sequential access means that a group of elements (such as data in a memory array or a disk file or on magnetic tape data storage) is accessed in a predetermined, ordered sequence. Sequential access is sometimes the only way of accessing the data, for example if it is on a tape

Array Index

Indicates position in array. 0 index based array[0] is the first element

IEEE

Institute of Electrical and Electronics Engineers

Array length

Integer value that indicates the number of elements in an array. list.length or len(list)

Exception Handling

Intercept events that disrupt the normal flow of a program's execution.

ISP

Internet Service Provider is a company that has access to the Internet backbone and provides a connection to the backbone.

NUXI ordering

Issues with byte order are sometimes called the NUXI problem: UNIX stored on a big-endian machine can show up as NUXI on a little-endian one.

Threaded Discussion group

Messages organized by topic, historical messages available, electronic form of communication

Agile Development Model

Most agile development methods break product development work into small increments that minimize the amount of up-front planning and design. Iterations are short time frames (timeboxes) that typically last from one to four weeks. Each iteration involves a cross-functional team working in all functions: planning, analysis, design, coding, unit testing, and acceptance testing.

NRO

National Reconnaissance Office is a government organization that exists to build and operate satellites for the Department of Defense and CIA

JavaScript

OOL that can be used on web pages to complete calculations and process information

Online chat

Online chat may refer to any kind of communication over the Internet that offers a real-time transmission of text messages from sender to receiver. Chat messages are generally short in order to enable other participants to respond quickly. Thereby, a feeling similar to a spoken conversation is created, which distinguishes chatting from other text-based online communication forms such as Internet forums and email. Online chat may address point-to-point communications as well as multicast communications from one sender to many receivers and voice and video chat, or may be a feature of a web conferencing service

Ctrl-O

Open an existing document

Ctrl-N

Opens a new document

random access file

Random access files permit nonsequential, or random, access to a file's contents. To access a file randomly, you open the file, seek a particular location, and read from or write to that file.

Incremental Development Model

Replaced waterfall, design implemented in pieces, includes development and maintenance

Ctrl-S

Saving a document

Waterfall Development Model

Specs, analysis, design, development, test, final product. Linear and changes are significant and costly. There is no built-in process to make changes. One step completed before the next step starts.

F7

Spell Checking a document

Flowchart ovals

Start and Stop process

SRAM

Static RAM does not need to be refreshed by the CPU and is faster than DRAM

BMP

The BMP file format, also known as bitmap image file or device independent bitmap (DIB) file format or simply a bitmap, is a raster graphics image file format used to store bitmap digital images, independently of the display device (such as a graphics adapter), especially on Microsoft Windows and OS/2 operating system, used in Microsoft Paint program

GIF

The Graphics Interchange Format (better known by its acronym GIF) is a bitmap image format that was introduced by CompuServe in 1987 and has since come into widespread usage on the World Wide Web due to its wide support and portability, used on web pages and online venues

double data type

The double data type is a double-precision 64-bit IEEE 754 floating point. Its range of values is beyond the scope of this discussion, but is specified in the Floating-Point Types, Formats, and Values section of the Java Language Specification. For decimal values, this data type is generally the default choice.

Flowchart

Used to present the steps needed to solve a problem.

F1

Windows and MS programs allow users to press F1 to obtain help

function

a method or module that performs a calculation and returns a value, called a return method, easily modified one time for all uses.

procedure

a module that performs a task like sorting or printing without returning a value.....void method

method

a process in Java that is either a procedure called a void method that performs and action or a function called a return method that returns a calculated value

complete tree

all nodes to the left are filled

microchips

also known as integrated circuits, they contain electric devices like transistors, capacitors, wires, resistors and logic gates

Linked list

an ordered set of data elements, each containing a link to its successor (and sometimes its predecessor), flexible and able to grow, does not need contiguous memory

BIOS

basic input output system, tells the computer how to start up, located on the ROM, also responsible for accessing the hard drive

class

blueprint of how the object will act, it describes the attributes and methods....

ethernet cable

cable with four twisted pairs, used for networking, the ethernet connects a computer to a modem, another computer, or to a hub.

static memory

cannot grow or shrink

RJ-11

connector four pairs of wires for telephone cords

RJ-45

connector on all 8 wire systems

Flowchart diamonds

decision

kernal

deep down work running the system, hidden and protected from the user, core of the operating system that controls files, devices, and managing memory, lives in RAM

worm

designed to spread from one computer to another, sometimes carrying a virus, sometimes spreading without doing any damage...A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.[1] Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.[2] Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

merge sort

divide in half, then continue to divide and then merge back in sorted order, most efficient, uses twice as much memory as required for array, always O(NlogN) sort (list, lo, midpoint) sort (list, middpoint, high)

quick sort

efficient, uses divide and conquer, left side of pivot and right side of pivot...compares, swap if needed, and then both move in towards pivot Best Case O(NlogN) already sorted Average Case O(NlogN) fairly balanced Worst Case O(N*N) list is off balanced

virtual memory

excess memory on the hard drive when the RAM is full, used to hold files and program parts.

Reading data from a file

first step is to make sure file exists!

document

flowchart rectangle with wavy bottom

binary tree

heap and binary search tree, dynamic memory, linked, not in contiguous memory, parent went left and right children

motherboard

hub of the computer network, enables the electric power that enters the computer to be evenly distributed

Flowchart parallelogram

input data or output data

assembly language

low level language with three letter mnemonics

tree transversals

preorder - output left side, inorder - touch middle, post-order - output right side

Flowchart rectangles

process step

RAM

random access memory, A random-access memory device allows data items to be accessed (read or written) in almost the same amount of time irrespective of the physical location of data inside the memory, contains the kernal

bits

sound waves changed to digital bits, images are digitized to pixels which are stored as a binary number

integer data type

stores integer values positive and negative

TIFF

tagged image file format, creates high resolution printable images, TIFF is a computer file format for storing raster graphics images, popular among graphic artists, the publishing industry,[1] and photographers. The TIFF format is widely supported by image-manipulation applications, by publishing and page layout applications, and by scanning, faxing, word processing, optical character recognition and other applications

formal parameters

temporary variable listed in the header and used during the call but only exists when the method or function is running

piracy

the act of stealing or replicating software without authorized permission

parameters passed by reference

the memory location of the actual parameter is passed to the formal parameter. Changes to the formal parameter inside the method or function, immediately change the actual parameter.

Dual Core Processor

two microprocessors on a single chip

actual parameters

value expression or variable, used in the method call


Conjuntos de estudio relacionados

Racism { SENIOR CYCLE IRISH } { NOT FINISHED }

View Set

Sampling Distribution and Point Estimation of Parameters, Statistical Intervals

View Set

Fluid and Electrolyte from PrepU

View Set

week 6 Patho check your understanding

View Set