CPSC 1105 Final
E-Commerce Categories
Business-to-consumer (B2C): A company (like Amazon) sells goods/services directly to people. B2C is likely the best-known e-commerce category. Consumer-to-consumer (C2C): A company (like eBay and Craigslist) enables people to sell goods/services to each other. C2C is likely the second best-known e-commerce category. Business-to-business (B2B): A business sells goods/services to another business.
If different inputs are given to the same algorithm and both executions take the same amount of time, what is another criteria to better determine efficiency? A. Programming language used B. Operating system (Windows, Mac, Linux) used C. Resources used
C. Resources used
Which cannot be used to represent an algorithm? A. Natural Language B. Flowcharts C. Sorting
C. Sorting
Cc (carbon copy) field
Contains the e-mail address(es) of additional recipient(s) to whom you want to send the message. The address(es) you enter here are displayed in the e-mail message header.
types of computational thinking
Decomposition is the breaking down of a complex problem into a series of smaller or simpler problems. Pattern recognition is the identification of common characteristics among different problems and within the same problem. Recognizing these patterns can further simplify the problem. Algorithms are sequences of instructions used to solve problems or perform tasks in a structured manner. Abstraction is the generalization of a problem so that a solution can be applied to different specific problems.
frame/fps
Each image in video and the number of frames per second (fps)
E-mail (electronic mail)
Email (short for electronic mail) is a message sent via computer from a user to other users, containing mostly text but sometimes containing additional items like images or attached documents.
High level programming languages examples
FORTRAN COBOL Python
A memory stores bits.A. TrueB. False
False
Collaboration is not important when developing a complex software product.A. TrueB. False
False
Switches have gotten larger over the years. T/F got smaller
False
Early Social Networking Sites
Friendster was one of the first largest (2002). Myspace (2003) was inspired by Friendster and was very popular in 2006. Facebook (2004) is the most widely-used. Twitter (2006) with 140 characters used hashtags as labels. Linkedin for professionals background info
CPU
Hardware that runs program instructions and controls other hardware; called the computer's brain. CPU is short for central processing unit. The CPU has two main components:The arithmetic logic unit or ALU performs arithmetic (+, -, *, /) and logic (AND, OR, XOR, NOT) operations on binary integers.The control unit tells computer components, such as memory, the ALU, and input and output devices, how to respond to computer instructions. Do: Runs programs instructions displays items on the screen by copying items from memory.
RAM/Memory
Hardware that stores data
Many programmers today use a(n) ________, which is a software that helps them build their computer programs.
IDE
SDLC (Systems Development Life Cycle)
Process of creating systems and the models used to develop them Ana
Assembly Language
Programming language that has the same structure and set of commands as machine languages but allows programmers to use symbolic representations of numeric machine code. a textual human-understandable representation of a machine language's 0's and 1's, as in: Add M[5] M[6] M[7]. Created: human-readable
How does the internet work?
TCP/IP protocols are used to send/retrieve information from one computer to another. A request is sent over the network, hitting DNS (domain name servers) along the way to find the target server. The DNS points the request in the right direction. Once the target server gets the request, it can send a response back to your computer.
HTML continued
Tags Purpose Headers: h1 is largest.<h2> Puppies are cute </h2> Paragraph<p> Humans seem designed to see puppies as cute. </p> b, i, u: Bold, italic, underline <p> Humans seem <u>designed</u> to see puppies as cute. </p> Link <a href="http://www.arizona.edu"> Univ. of Arizona </a>
bar graph vs. line graph
-Use a bar graph to display numerical data when you want to present distributions of data. -A line graph is useful in displaying data or information that changes continuously over time.
When to use a pie chart
-when you are trying to compare parts of a whole -They do not show changes over time
Early forms of email appeared in the____?
1960s and 1970s
Standard video
720 by 480 uses about 24 frames per second, and each image has 525 pixel rows (known as lines)
NP-complete problem (nondeterministic polynomial time)
A decision problem has a solution that is quickly verifiable, but no known algorithms can quickly find a solution.
Internet
A group of computers and servers that are connected to each other.
machine instructions
A series of 0s and 1s, stored in memory, that tells a processor to carry out a particular operation like a multiplication.
A flowchart _____ details from an algorithm. A. Abstracts B. Generalizes C. Executes
A. Abstracts
Which of the following is a decidable problem?A. Counting votes for political officeB. Summing numbers from zero to infinityC. Dividing by zero
A. Counting votes for political office
Machine code is the language read by a computer's hardware.A. TrueB. False
A. True
Salesforce.com was the first commercial cloud computing service. A. True B. False
A. True
Crowdsourcing disadvantages and advantages
A: Lower cost, Scale, and Quality D: Quality
undecidable problem
An undecidable problem is a computational problem for which no algorithm can be found that always leads to a correct answer.
information mesh
Another name for the web that was considered by the web's creator.
Clarity and readability affect how the algorithm executes, potentially causing the algorithm to fail.A. TrueB. false
B False
The general rule is to write the _____ in such a way that any _____ can recreate the _____. A. algorithm, pseudocode, programming language B. pseudocode, programming language, algorithm C. programming language, pseudocode, algorithm
B. pseudocode, programming language, algorithm
Algorithm
a step-by-step procedure for solving a problem
Any algorithm written correctly in a specific programming language can be executed on a computer.A. TrueB. False
a. true
Who can setup a home network
anyone Computer>Router>Modem>ISP>Internet
Humans execute algorithms more quickly than computers.A. TrueB. False
b. false
Bits
binary digits (0 and 1)
Compare and contrast a for loop and a while loop
both repeat a block of code and stop once a condition is false for loop tells Python to repeat an action FOR a certain number of iterations through a set range of values while loop tells Python to repeat an action WHILE a condition is true through Boolean conditions
tangible property
can belong to someone and can be touched, like a car, house, land, or computer.
A 3D-printed toy designed using computer-aided design (CAD) software Computational artifact Not a computational artifact
computational artifact
bcc (Blind carbon Copy)
contains the email address and optional identity of any additional recipients who will receive a message without knowing the identity of the primary sender or any addressees
Data Visualization
describes technologies that allow users to see or visualize data to transform information into a business perspective
Because video files could be large, compression is used. The main idea of compression is to only store the _____ a frame and the previous frame.
difference between
instruction
each calculation
The period when the web was first developed
early 1990s (1991)
e-commerce
electronic business or exchange conducted over the internet
HTML
hyper-text markup language) is a textual language for creating web pages.
Cyberbullying Examples
include posting inappropriate or embarrassing photographs or videos, starting rumors on social media, sending mean direct messages or emails, etc.
intellectual property
intangible creative work that is embodied in physical form and includes copyrights (creator utilize use of of work; copyright law), trademarks (recognizable mark; symbol), and patents (gov't license for objects)
decidable problem
is a computational problem for which an algorithm can be found that can solve the problem for any input
embedded computers
is a computer inside another electrical device
MMS (multimedia messaging service)
is a popular method used to send multimedia-based text messages containing text, pictures, video, and audio
text message (or SMS for short message service)
is a short message sent among cell phone users
Software as a service (Saas)
is a type of business model where users pay for a vendor's apps, which process and store data on the cloud.
An SMSC (or short message service center)
is responsible for storing and delivering text messages. The SMSC forwards the text message to the cell tower nearest to the recipient and delivers the text message to the recipient's cell phone (keeping a copy at the SMSC).
processors
process (aka execute) a list of desired calculations
web browser (Chrome, Firefox, Safari, or IE)
reads an HTML file and displays the page.
Resource
refers to the amount of memory (RAM) on a computer
Crowdsourcing
relies on free contributions by the crowd. Example: Wikipedia and Yelp
Malware
software that is intended to damage or disable computers and computer systems.
Machine Code / Language
the language used by the computer's hardware (physical pieces) that consists of binary or hexadecimal instructions
computational thinking
the process by which a problem is formulated and solved using a computer.
operating system (Windows, Mac, Linux)
the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.
DNS server
translates the domain name into its associated IP address
Java developers can make use of Java's cross platform capabilities to create applications for nearly any device.A. TrueB. False
true
High-definition video
uses more frames per second (like 60) and more lines (like 1080), as well as wider lines.
Types of Malware
virus, worm, trojan horse, rootkit, spyware, adware
Web Standards
what regulates web technologies in order to ensure long-term progress of the web (Jeffrey Zeldman helped start these).
Computational artifact
which are artifacts, physical/digitial, created on a computer (audio, visual, writing, tools, interpersonal connections, images, video, video games)
Cyberbullying
willful use of electronic technology to repeatedly threaten, abuse, or dominate others, often anonymously
collaboration
working jointly rather than independently to accomplish a task
Bytes and Bits
The measurement of storage for a computer1 Byte = 8 bits or 1B = 8b
program/application/app.
The programmer-created sequence of instructions
digital divide
The relative lack of access to the latest technologies among low-income groups, racial and ethnic minorities, rural residents, and the citizens of developing countries lower access to digital technology
Algorithm types examples
Longest common substring Do two student essays share a common phrase consisting of a sequence of more than 100 letters? If the longest common substring between the two essays is greater than 100, then the two essays share a common phrase consisting of more than 100 letters. Correct Shortest path algorithm Given the airports at which an airline operates and distances between those airports, what is the shortest total flight distance between two airports? Many computational problems use graphs to represent connections between different items, such as airports, computers, intersections, train stations, etc. If the connection between airports represents flight distance, than the shortest path found will be the path with the shortest flight distance. Correct Binary search Given a list of a company's employee records and an employee's first and last name, what is a specific employee's phone number? If employee records are stored in sorted order, sorted by their name, binary search can be used to efficiently search for a specific employee's record. The found employee record can then be accessed to determine their phone number.
Algorithm types
Longest common substring determines the longest common substring that exists in two inputs strings.DNA sequences can be represented using strings consisting of the letters A, C, G, and T to represent the four different nucleotides., Binary Search an efficient algorithm for searching a list. The list's elements must be sorted and directly accessible (such as an array)., and Djkstra's shortest path determines the shortest path from a start vertex to each vertex in a graph.
Obstacles that people in developing nations must overcome the digital divide include:
Physical access: No computers in the home or nearby, no access to broadband Internet in town, low Internet bandwidth Financial access: Technology is too expensive to own Computer literacy: Lack of training on how to use technology
memory
a circuit that can store 0s and 1s in each of a series of thousands of addressed locations, like a series of addressed mailboxes that each can store an envelope (the 0s and 1s). Where data is stored
Hard Drive/Disk
a computer device that reads, writes, and stores digital data When electricity is turned off
The Web Standards Project
a group of professional web developers dedicated to disseminating and encouraging the use of the web standards recommended by the World Wide Web Consortium, along with other groups and standards bodies.
Programming Language
a language with grammar and syntax that humans can understand and computers can interpret into machine language (binary)
How do today's programmers tell a computer how to perform certain tasks?
They write code that translates commands to binary code
Email Fields
To, Subject, Carbon Copy (CC), Blind Carbon Copy (BCC)
body of an email
To: Main recipients Subject: Summarizes Email topic Body: Main concept of email Auto-signature: Usually name, contact information, position
A bit can only have the value of 0 or 1.A. TrueB. False
True
A processor executes instructions like, Add 200, #9, 201, represented as 0s and 1s. (t/F)
True
An undecidable problem may have a small number of solutions, but is generally unsolvable.A. TrueB. False
True
Collaboration to develop a software product employs a team of people with expertise in different areas.A. TrueB. False
True
Dividing by zero is an example of an undecidable problem.A. TrueB. False
True
Many computers have a fan that blows room air over a computer's CPU chip to keep the chip cool. (TF)
True
The CPU is an example of a computer resource.A. TrueB. False
True
Definitions of types of malware
Virus- is malware that spreads itself via attachment to a host file, like a biological virus attaches to a human. Worm- is malware that spreads itself without using a host file. Trojan- is malware that a user installs believing the software to be legitimate, but the software actually has a malicious purpose. Adware- is malware that displays advertisements to the user, commonly in a web browser. Spyware- is malware that collects information from a computer without the user's knowledge.
When to use a bar graph
When the Independent Variable is qualitative To show data that are not continuous To compare data like amounts, frequency, or categories To make generalizations about data To help see differences in data
When to use a line graph
When the Independent Variable is quantitative For continuous data For showing trends over time
Crowdsourcing Examples
Wikipedia, Yelp / Trip Advisor, Kickstarter, Waze, reCaptcha, Netflix Prize, Khan Academy, Mechanical Turk, Airbnb, Uber / Lyft, and Bleacher Report
Are all solvable problems also decidable problems?A. YesB. No
Yes
social networking site
a Web site where users list information about themselves and talk with friends online
