CPSC 1105 Final

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

E-Commerce Categories

Business-to-consumer (B2C): A company (like Amazon) sells goods/services directly to people. B2C is likely the best-known e-commerce category. Consumer-to-consumer (C2C): A company (like eBay and Craigslist) enables people to sell goods/services to each other. C2C is likely the second best-known e-commerce category. Business-to-business (B2B): A business sells goods/services to another business.

If different inputs are given to the same algorithm and both executions take the same amount of time, what is another criteria to better determine efficiency? A. Programming language used B. Operating system (Windows, Mac, Linux) used C. Resources used

C. Resources used

Which cannot be used to represent an algorithm? A. Natural Language B. Flowcharts C. Sorting

C. Sorting

Cc (carbon copy) field

Contains the e-mail address(es) of additional recipient(s) to whom you want to send the message. The address(es) you enter here are displayed in the e-mail message header.

types of computational thinking

Decomposition is the breaking down of a complex problem into a series of smaller or simpler problems. Pattern recognition is the identification of common characteristics among different problems and within the same problem. Recognizing these patterns can further simplify the problem. Algorithms are sequences of instructions used to solve problems or perform tasks in a structured manner. Abstraction is the generalization of a problem so that a solution can be applied to different specific problems.

frame/fps

Each image in video and the number of frames per second (fps)

E-mail (electronic mail)

Email (short for electronic mail) is a message sent via computer from a user to other users, containing mostly text but sometimes containing additional items like images or attached documents.

High level programming languages examples

FORTRAN COBOL Python

A memory stores bits.A. TrueB. False

False

Collaboration is not important when developing a complex software product.A. TrueB. False

False

Switches have gotten larger over the years. T/F got smaller

False

Early Social Networking Sites

Friendster was one of the first largest (2002). Myspace (2003) was inspired by Friendster and was very popular in 2006. Facebook (2004) is the most widely-used. Twitter (2006) with 140 characters used hashtags as labels. Linkedin for professionals background info

CPU

Hardware that runs program instructions and controls other hardware; called the computer's brain. CPU is short for central processing unit. The CPU has two main components:The arithmetic logic unit or ALU performs arithmetic (+, -, *, /) and logic (AND, OR, XOR, NOT) operations on binary integers.The control unit tells computer components, such as memory, the ALU, and input and output devices, how to respond to computer instructions. Do: Runs programs instructions displays items on the screen by copying items from memory.

RAM/Memory

Hardware that stores data

Many programmers today use a(n) ________, which is a software that helps them build their computer programs.

IDE

SDLC (Systems Development Life Cycle)

Process of creating systems and the models used to develop them Ana

Assembly Language

Programming language that has the same structure and set of commands as machine languages but allows programmers to use symbolic representations of numeric machine code. a textual human-understandable representation of a machine language's 0's and 1's, as in: Add M[5] M[6] M[7]. Created: human-readable

How does the internet work?

TCP/IP protocols are used to send/retrieve information from one computer to another. A request is sent over the network, hitting DNS (domain name servers) along the way to find the target server. The DNS points the request in the right direction. Once the target server gets the request, it can send a response back to your computer.

HTML continued

Tags Purpose Headers: h1 is largest.<h2> Puppies are cute </h2> Paragraph<p> Humans seem designed to see puppies as cute. </p> b, i, u: Bold, italic, underline <p> Humans seem <u>designed</u> to see puppies as cute. </p> Link <a href="http://www.arizona.edu"> Univ. of Arizona </a>

bar graph vs. line graph

-Use a bar graph to display numerical data when you want to present distributions of data. -A line graph is useful in displaying data or information that changes continuously over time.

When to use a pie chart

-when you are trying to compare parts of a whole -They do not show changes over time

Early forms of email appeared in the____?

1960s and 1970s

Standard video

720 by 480 uses about 24 frames per second, and each image has 525 pixel rows (known as lines)

NP-complete problem (nondeterministic polynomial time)

A decision problem has a solution that is quickly verifiable, but no known algorithms can quickly find a solution.

Internet

A group of computers and servers that are connected to each other.

machine instructions

A series of 0s and 1s, stored in memory, that tells a processor to carry out a particular operation like a multiplication.

A flowchart _____ details from an algorithm. A. Abstracts B. Generalizes C. Executes

A. Abstracts

Which of the following is a decidable problem?A. Counting votes for political officeB. Summing numbers from zero to infinityC. Dividing by zero

A. Counting votes for political office

Machine code is the language read by a computer's hardware.A. TrueB. False

A. True

Salesforce.com was the first commercial cloud computing service. A. True B. False

A. True

Crowdsourcing disadvantages and advantages

A: Lower cost, Scale, and Quality D: Quality

undecidable problem

An undecidable problem is a computational problem for which no algorithm can be found that always leads to a correct answer.

information mesh

Another name for the web that was considered by the web's creator.

Clarity and readability affect how the algorithm executes, potentially causing the algorithm to fail.A. TrueB. false

B False

The general rule is to write the _____ in such a way that any _____ can recreate the _____. A. algorithm, pseudocode, programming language B. pseudocode, programming language, algorithm C. programming language, pseudocode, algorithm

B. pseudocode, programming language, algorithm

Algorithm

a step-by-step procedure for solving a problem

Any algorithm written correctly in a specific programming language can be executed on a computer.A. TrueB. False

a. true

Who can setup a home network

anyone Computer>Router>Modem>ISP>Internet

Humans execute algorithms more quickly than computers.A. TrueB. False

b. false

Bits

binary digits (0 and 1)

Compare and contrast a for loop and a while loop

both repeat a block of code and stop once a condition is false for loop tells Python to repeat an action FOR a certain number of iterations through a set range of values while loop tells Python to repeat an action WHILE a condition is true through Boolean conditions

tangible property

can belong to someone and can be touched, like a car, house, land, or computer.

A 3D-printed toy designed using computer-aided design (CAD) software Computational artifact Not a computational artifact

computational artifact

bcc (Blind carbon Copy)

contains the email address and optional identity of any additional recipients who will receive a message without knowing the identity of the primary sender or any addressees

Data Visualization

describes technologies that allow users to see or visualize data to transform information into a business perspective

Because video files could be large, compression is used. The main idea of compression is to only store the _____ a frame and the previous frame.

difference between

instruction

each calculation

The period when the web was first developed

early 1990s (1991)

e-commerce

electronic business or exchange conducted over the internet

HTML

hyper-text markup language) is a textual language for creating web pages.

Cyberbullying Examples

include posting inappropriate or embarrassing photographs or videos, starting rumors on social media, sending mean direct messages or emails, etc.

intellectual property

intangible creative work that is embodied in physical form and includes copyrights (creator utilize use of of work; copyright law), trademarks (recognizable mark; symbol), and patents (gov't license for objects)

decidable problem

is a computational problem for which an algorithm can be found that can solve the problem for any input

embedded computers

is a computer inside another electrical device

MMS (multimedia messaging service)

is a popular method used to send multimedia-based text messages containing text, pictures, video, and audio

text message (or SMS for short message service)

is a short message sent among cell phone users

Software as a service (Saas)

is a type of business model where users pay for a vendor's apps, which process and store data on the cloud.

An SMSC (or short message service center)

is responsible for storing and delivering text messages. The SMSC forwards the text message to the cell tower nearest to the recipient and delivers the text message to the recipient's cell phone (keeping a copy at the SMSC).

processors

process (aka execute) a list of desired calculations

web browser (Chrome, Firefox, Safari, or IE)

reads an HTML file and displays the page.

Resource

refers to the amount of memory (RAM) on a computer

Crowdsourcing

relies on free contributions by the crowd. Example: Wikipedia and Yelp

Malware

software that is intended to damage or disable computers and computer systems.

Machine Code / Language

the language used by the computer's hardware (physical pieces) that consists of binary or hexadecimal instructions

computational thinking

the process by which a problem is formulated and solved using a computer.

operating system (Windows, Mac, Linux)

the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.

DNS server

translates the domain name into its associated IP address

Java developers can make use of Java's cross platform capabilities to create applications for nearly any device.A. TrueB. False

true

High-definition video

uses more frames per second (like 60) and more lines (like 1080), as well as wider lines.

Types of Malware

virus, worm, trojan horse, rootkit, spyware, adware

Web Standards

what regulates web technologies in order to ensure long-term progress of the web (Jeffrey Zeldman helped start these).

Computational artifact

which are artifacts, physical/digitial, created on a computer (audio, visual, writing, tools, interpersonal connections, images, video, video games)

Cyberbullying

willful use of electronic technology to repeatedly threaten, abuse, or dominate others, often anonymously

collaboration

working jointly rather than independently to accomplish a task

Bytes and Bits

The measurement of storage for a computer1 Byte = 8 bits or 1B = 8b

program/application/app.

The programmer-created sequence of instructions

digital divide

The relative lack of access to the latest technologies among low-income groups, racial and ethnic minorities, rural residents, and the citizens of developing countries lower access to digital technology

Algorithm types examples

Longest common substring Do two student essays share a common phrase consisting of a sequence of more than 100 letters? If the longest common substring between the two essays is greater than 100, then the two essays share a common phrase consisting of more than 100 letters. Correct Shortest path algorithm Given the airports at which an airline operates and distances between those airports, what is the shortest total flight distance between two airports? Many computational problems use graphs to represent connections between different items, such as airports, computers, intersections, train stations, etc. If the connection between airports represents flight distance, than the shortest path found will be the path with the shortest flight distance. Correct Binary search Given a list of a company's employee records and an employee's first and last name, what is a specific employee's phone number? If employee records are stored in sorted order, sorted by their name, binary search can be used to efficiently search for a specific employee's record. The found employee record can then be accessed to determine their phone number.

Algorithm types

Longest common substring determines the longest common substring that exists in two inputs strings.DNA sequences can be represented using strings consisting of the letters A, C, G, and T to represent the four different nucleotides., Binary Search an efficient algorithm for searching a list. The list's elements must be sorted and directly accessible (such as an array)., and Djkstra's shortest path determines the shortest path from a start vertex to each vertex in a graph.

Obstacles that people in developing nations must overcome the digital divide include:

Physical access: No computers in the home or nearby, no access to broadband Internet in town, low Internet bandwidth Financial access: Technology is too expensive to own Computer literacy: Lack of training on how to use technology

memory

a circuit that can store 0s and 1s in each of a series of thousands of addressed locations, like a series of addressed mailboxes that each can store an envelope (the 0s and 1s). Where data is stored

Hard Drive/Disk

a computer device that reads, writes, and stores digital data When electricity is turned off

The Web Standards Project

a group of professional web developers dedicated to disseminating and encouraging the use of the web standards recommended by the World Wide Web Consortium, along with other groups and standards bodies.

Programming Language

a language with grammar and syntax that humans can understand and computers can interpret into machine language (binary)

How do today's programmers tell a computer how to perform certain tasks?

They write code that translates commands to binary code

Email Fields

To, Subject, Carbon Copy (CC), Blind Carbon Copy (BCC)

body of an email

To: Main recipients Subject: Summarizes Email topic Body: Main concept of email Auto-signature: Usually name, contact information, position

A bit can only have the value of 0 or 1.A. TrueB. False

True

A processor executes instructions like, Add 200, #9, 201, represented as 0s and 1s. (t/F)

True

An undecidable problem may have a small number of solutions, but is generally unsolvable.A. TrueB. False

True

Collaboration to develop a software product employs a team of people with expertise in different areas.A. TrueB. False

True

Dividing by zero is an example of an undecidable problem.A. TrueB. False

True

Many computers have a fan that blows room air over a computer's CPU chip to keep the chip cool. (TF)

True

The CPU is an example of a computer resource.A. TrueB. False

True

Definitions of types of malware

Virus- is malware that spreads itself via attachment to a host file, like a biological virus attaches to a human. Worm- is malware that spreads itself without using a host file. Trojan- is malware that a user installs believing the software to be legitimate, but the software actually has a malicious purpose. Adware- is malware that displays advertisements to the user, commonly in a web browser. Spyware- is malware that collects information from a computer without the user's knowledge.

When to use a bar graph

When the Independent Variable is qualitative To show data that are not continuous To compare data like amounts, frequency, or categories To make generalizations about data To help see differences in data

When to use a line graph

When the Independent Variable is quantitative For continuous data For showing trends over time

Crowdsourcing Examples

Wikipedia, Yelp / Trip Advisor, Kickstarter, Waze, reCaptcha, Netflix Prize, Khan Academy, Mechanical Turk, Airbnb, Uber / Lyft, and Bleacher Report

Are all solvable problems also decidable problems?A. YesB. No

Yes

social networking site

a Web site where users list information about themselves and talk with friends online


Kaugnay na mga set ng pag-aaral

Cardiovascular System, Blood, and Lymphatic Systems

View Set

Fundamental Principles of Taxation - CH1

View Set