APCSP_Midterm Vocab
Iteration
"loop" by another name - the repetition of a statement, process, or procedure.
code
(slang) to write instructions for a computer
TCP (Transmission Control Protocol)
- provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. _____ is tightly linked with IP and usually seen as ______/IP in writing.
HTTP(HyperText Transfer Protocol )
- the protocol used for transmitting web pages over the Internet
What is the range of values (expressed in decimal) that each color channel can have?
0 to 255
Approximately how much bigger is a megabyte than a kilobyte?
1,000 times bigger
What is the value of 9F16 in binary?
1001 1111
Consider the following numbers: The decimal value 10 base 10 The binary value 1001 base 2 Hexadecimal value C base 16 Which of the following lists the number in order from least to greatest?
1001 base 2, 10 base 10, C base 16
What is the decimal value of 1101 base 2?
13
What is the largest value you can represent using 4 bits?
15
What is the value of F16 in decimal?
15 base 10
How many different symbols can be used for one digit in the Hexadecimal number system?
16
What is the number base of the binary number system?
2
Suppose the ESPN website uses 8-bit unsigned integers to store how many points a team has scored in an NBA game. For example: 0000 0010 represents 2 points 0000 1000 represents 8 points What is the highest possible score (in decimal) the ESPN website could display?
255
A news website uses 32-bit integers to count the number of times an article has been viewed. The website is becoming more popular, and expects some of the articles to exceed the number of views that can be represented with 32 bits. In anticipation of this, the website is planning to change to 64-bit integers for the view counter. Which of the following best describes the result of using 64-bit integers instead of 32-bit integers?
2^32 times as many values can be represented
Alice has 600 MB of data. Bob has 2000 MB of data. What is the smallest size drive in GB that will be able to hold all of Alice's and Bob's data?
3GB
How many possible values can be created with only 2 bits?
4
Ms. Wristers has 150 small images, each of which is 500 KB. How much space do they take up overall in MB?
75MB
How many bits make a byte?
8
How many bits are used to encode a character according to the ASCII encoding scheme?
8 bits
Hexadecimal
A base-16 number system that uses sixteen distinct symbols 0-9 and A-F to represent numbers from 0 to 15.
Aggregation
A computation in which rows from a data set are grouped together and used to compute a single value of more significant meaning or measurement. Common aggregations include: Average, Count, Sum, Max, Median, etc. For example, if some dataset contained information about how many hours of television people watched and included their age, you could "aggregate the data by age" and compute the average hours watched for each age group. You could also "aggregate by hours of TV watched" and compute the average age for each number of hours.
server
A computer that awaits and responds to requests for data. (Example: a DNS server awaits and responds to requests for URLs to be translated to IP addresses)
client
A computer that requests data stored on a server. (Example: When you type an address into your browser, your computer is the client and it sends the request to the DNS server)
Bit
A contraction of "Binary Digit". A bit is the single unit of information in a computer, typically represented as a 0 or 1
Bit
A contraction of "Binary Digit". A bit is the single unit of information in a computer, typically represented as a 0 or 1.
bit
A contraction of "Binary Digit." A bit is the single unit of information in a computer, typically represented as a 0 or 1.
README
A document providing background information about a dataset.
Selection
A generic term for a type of programming statement (usually an if-statement) that uses a Boolean condition to determine, or select, whether or not to run a certain block of statements.
Edge
A line between two nodes
Binary Message
A message that can only be one of two possible values.
Dijkstra's algorithm
A method of finding the shortest route (in terms of total cost) from one node to another.
Innovation
A novel or improved idea, device, product, etc, or the development thereof
IP Address
A number assigned to any item that is connected to the Internet.
IP address
A number assigned to any item that is connected to the internet
Weight
A number associated with an edge that indicates time or economic cost.
For Loop
A particular kind of looping construct provided in many languages. Typically, a for loop defines a counting variable that is checked and incremented on each iteration in order to loop a specific number of times.
Tree
A path through a set of edges that does not contain any cycles. May contain branches.
Cycle
A path through a set of edges that starts and ends at the same node.
Function
A piece of code that you can easily call over and over again.
Function
A piece of code that you can easily call over and over again. F(x) function (x) Ex. The ellipse function and its parameters: ellipse (200, 300, 350, 275)
Node
A point on a graph
Algorithm
A precise sequence of instructions for processes that can be executed by a computer and are implemented using programming languages. (NOTE: this is the definition from the AP CS Principles framework).
Prototype
A preliminary sketch of an idea or model for something new. It's the original drawing from which something real might be built or created.
prototype
A preliminary sketch of an idea or model for something new. It's the original drawing from which something real might be built or created.
Algorithm
A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
Low level programming language
A programming language that captures only the most primitive operations available to a machine. Anything that a computer can do can be represented with combinations of low level commands.
High level programming language
A programming language with many commands and features designed to make common tasks easier to program. Any high level functionality is encapsulated as combinations of low level commands.
High level programming language:
A programming language with many commands and features designed to make common tasks easier to program. Any high level functionality is encapsulated as combinations of low level commands. Ex. C, C++, Fortran, Pascal, Swift, BASIC, Visual Basic,
Hypothesis:
A proposed explanation for some phenomenon used as the basis for further investigation.
Binary Question
A question to which there are only two possible answers.
Graph
A set of nodes joined by edges
Protocol
A set of rules governing the exchange or transmission of data between devices.
protocol
A set of rules governing the exchange or transmission of data between devices.
What is a pixel?
A single tiny dot, or square, of color in a digital image.
Hexadecimal
A system of numerical notation that has 16 rather than 10 as its base.
Summary table
A table of aggregate information about a dataset (e.g., the average, sum, count of some values).
Summary Table
A table that summarizes information about some larger dataset. It typically consists of performing computations like sums, averages, and counts on higher level groupings of information. The intent is to summarize lots of data into a form that is more useful, and easier to "see".
Router
A type of computer that forwards data across a network a networking device that forwards data packets between computer networks. ______ perform the traffic directing functions on the Internet.
Image
A type of data used for graphics or pictures
DDOS attack
A type of network attack in which many computers send HTTP requests to a server at once, overwhelming the server and drowning out legitimate communications.
Binary
A way of representing information using only two options.
Approximately how much bigger (how many more bytes) is a megabyte than a kilobyte?
A. 1,000 times bigger
Programming languages have some similarities and differences to the "natural" language you use in everyday speech. Select the two true statements about programming languages:
A. Ambiguities in natural language necessitate the creation of programming languages for controlling a computer B. Compared to the number of words in a natural language, the number of defined words in a programming language is very small.
How does a computer resolve a domain name into an IP address?
A. It asks a DNS server for the corresponding IP address
Consider the following incorrect program, which is intended to move the robot around the perimeter of a grid, as indicated by the drawing below. The starting position and direction of the robot is indicated in the diagram. Line 1: REPEAT 4 TIMES Line 2: { Line 3: MOVE_FORWARD() Line 4: ROTATE_RIGHT() Line 5: MOVE_FORWARD() Line 6: MOVE_FORWARD() Line 7: MOVE_FORWARD() Line 8: MOVE_FORWARD() Line 9: ROTATE_RIGHT() Line 10: } Fig: What the robot is supposed to do Given the options below, which lines should be removed so the program will work as intended?
A. Line 3 and Line 4
For this scenario related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions) to handle the task: Drawing 100 tiny dots in a line
A. Loop rather than function
For this scenario related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions) to handle the task: Drawing a hexagon (six-sided shape)
A. Loop rather than function
According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?
A. about.example.com
CSV
Abbreviation of "comma-separated values," this is a widely-used format for storing data
Explain how abstraction allows for the creation of increasingly complex systems. Reference top-down design strategy in your response.
Abstractions allow you to represent complex information in a simplified form so it is easier for the programmer to manage their code. The programmer can look at the more relevant information of code while the more complex information is hidden so that the programmer can work more efficiently. In the top-down design strategy, the information is broken down into different levels so that it is easier to visualize. The low level programming contains all the details, smaller functions to make bigger functions and more to create the foundation of the top-down strategy. Than as you get to high level programming the functions become more generalized so that the calls that are going to made will be simplified to an even greater amount.
ASCII
American Standard Code for Information Interchange. ASCII is the universally recognized raw text format that any computer can understand.
Internet censorship
An action by a government or other organization to limit what messages users can send and receive over the internet. the control or suppression of what can be accessed, published, or viewed on the Internet enacted by regulators, or on their own initiative. ... Other areas of censorship include copyrights, defamation, harassment, and obscene material.
URL
An easy-to-remember address for calling a web page (like www.code.org).
Parameter
An extra piece of information that you pass to the function to customize it for a specific need.
A computer program uses 3 bits to represent integers. When the program adds the decimal (base 10) numbers 6 and 2, the result is 0. Which of the following is the best explanation for this result?
An overflow error occurred
API
Application Program Interface. A collection of commands, protocols, tools, made available to a programmer to develop software.
For this scenario related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions) to handle the task: Drawing a circle of any size at any point on the screen
B. Function(s) rather than loop
For this scenario related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions) to handle the task: Drawing out the letters of a word "HELLO"
B. Function(s) rather than loop
The various protocols in use on the internet are said to operate in layers in which the protocol(s) at each layer solve one problem related to networked communication, and higher layers are built on top of, and rely on, the lower layers to do their jobs. From the list provided choose the two (2) answers that correctly describe which internet protocol relies on the other. For example: if protocol A relies on protocol B, it means that A is a higher level protocol than B, and thus protocol B must exist and work properly in order for protocol A to do its job.
B. HTTP relies on TCP/IP C. DNS relies on TCP/IP
A compression scheme for long strings of bits called run-length encoding is described as follows: Rather than record each 0 and 1 individually, instead record "runs" of bits by storing the number of consecutive 1s and 0s that appear. Since it's binary, any run of 0s must be followed by a run of 1s (even if the run is only 1-bit long) and vice versa. Thus, you can store a list of small numbers that represents the alternating runs of 0s and 1s. Here is an example:
B. Lossless compression
Which of the following BEST describes how protocols on the Internet (e.g. IP, TCP, HTTP) make use of abstraction to accomplish their respective purposes?
B. Low level protocols can provide functionality to high level protocols without revealing the details of how this is accomplished.
Why are parameters useful when programming?
B. Parameters allow for more flexible, generalized behaviors in functions.
Amara plans to use the survey data to create a visualization and short write up about students' plans for college, but first she wants to learn more about how the survey was conducted. Of the following things she might learn about the survey, which are the most likely sources of bias in the results based how it was collected?
B. She learns that responses were collected only by mobile app. C. She learns that the survey was only available to students who scored at the top 10% on the PSAT.
Which of the following is NOT true about TCP/IP packets?
B. TCP guarantees that no packets are ever dropped
Which of the following will call the function drawStar?
B. drawStar( );
Which number system is used to store information digitally in a computer?
Binary (base 2)
A video-streaming Web site uses 32-bit integers to count the number of times each video has been played. In anticipation of some videos being played more times than can be represented with 32 bits, the Web site is planning to change to 64-bit integers for the counter. Which of the following best describes the result of using 64-bit integers instead of 32-bit integers?
C. 2^32 times as many values can be represented.
What is one important naming convention of functions?
C. A function name should be as descriptive as possible to indicate what the function does.
The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works. The members of the IETF are:
C. A loosely organized collection of citizens and engineers.
Which of the following statements are true about routers and routing on the Internet. Choose two answers.
C. A packet traveling between two computers on the Internet may be rerouted many times along the way or even lost or "dropped". D. Routers act independently and route packets as they see fit.
The figure represents a network of physically linked computers labeled A through F. A line between two computers indicates that the computers can communicate directly with each other. Any information sent between two computers that are not directly connected must go through at least one other computer. The weight or cost of sending information from one computer to another is indicated by the number above the line. For example, information can be sent directly between computers A, and B and will cost 5. Information sent between computers A and D must go through either computer C (with total cost 5), or through computer B (with total cost 8) Computer A sends a packet intended to reach computer F. Along its path it arrives at Computer C. Which computer should Computer C forward the packet to in order to use the most cost effective path?
C. Computer D
Which of the following is NOT true about functions in programming?
C. Functions cannot make calls to other functions within the same program.
When programmers work together, what is an example of how abstraction in programming can promote collaboration?
C. Programmers can use functions created by their partners, relying on the functionality without needing to know the specific details of how the function is implemented.
Under which of the following conditions is it most beneficial to use a heuristic approach to solve a problem?
C. When the problem cannot be solved in a reasonable time and an approximate solution is acceptable
The image below shows an encoding for a black and white pixel image. The first two bytes of the data (circled in red) are used to encode the width and height of the image. What is the best term for this type of "data about the data"?
C. metadata
abstraction
Creating simple concise representations of more complex phenomena so that people can more easily work with, communicate about, and learn about anything.
The world is currently in a transition to using IPv6, a newer version of the IP protocol that uses 128-bit addresses instead of 32-bit addresses used by IPv4. What is the main problem that IPv6 was created to solve?
D. 32-bit addresses could not ensure that every internet-connected device can receive a unique IP address
What is the most likely outcome of running the code shown at right?
D. The program will run without error, but will not draw anything.
Which of the following is a true statement about data compression?
D. There are trade-offs involved in choosing a compression technique for storing and transmitting data.
A school starts tracking which websites each computer in the school is visiting by monitoring the packets leaving the school. A sample of the information they have collected appears below: IP Address Time URL ... ... ... 1.1.1.1 11:05:23.22 example.com 1.5.1.8 11:05:29.71 news.com 1.1.5.1 11:06:13.48 sports.com 1.5.1.8 11:08:09.95 example.com ... ... ... 1.1.5.1 17:04:29.20 news.com Which of the following is MOST likely to be answerable using all the data collected by this monitoring?
D. Which websites are most frequently visited before and after school hours from a school computer
Select the answer that lists the units of bytes in ascending order (from smallest to largest)
D. kilobyte, gigabyte, terabyte
Consider the following numbers given in Binary (BIN), Decimal (DEC), and Hexadecimal (HEX) representations: BIN: 1110 DEC: 13 HEX: F Which of the following lists the numbers in order from least to greatest?
DEC: 13, BIN: 1110, HEX: F
domain name service
DNS stands for...
metadata
Data that describes other data. For example, a digital image my include metadata that describe the size of the image, number of colors, or resolution
A packet traveling between 2 computers on the Internet may be rerouted many times along the way or even lost or "dropped".
Do all Internet Packets make it? How do they travel, do they travel together along the same route? Do they all make it?
Biologists often attach tracking collars to wild animals. For each animal, the following geolocation data is collected at frequent intervals. The time The date The location of the animal Which of the following questions about a particular animal could NOT be answered using only the data collected from the tracking collars?
Do the movement patterns of the animal vary according to the weather?
Hierarchy
Domain names are organized into several levels. For example, studio.code.org is a subdomain of code.org.
Which one of the following statements about functions is TRUE
E. Two functions in a single program can have different names but contain identical code.
An artist makes an RGB raster image in which each pixel color is encoded with 12-bits --- 4 bits each for red, green and blue. Which of the following correctly shows the hexadecimal value for Red as a 12-bit representation.
F00
Which choice below would make the color represented by #F897BD a darker color?
F800BD
Example.com, about.example.com
Find an example of a domain name, and a subdomain name of that same domain.
hypertext transfer protocol
HTTP stands for...
Routers act independently and route packets as they see fit.
How do routers do with Internet packets? Who do they rely on to work?
a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. Cheapest, not the most direct.
How do routers send packets along the Internet? What kind of routes do they rely on to send them?
It asks a DNS server for the corresponding IP address
How does computer figure out what IP Address to send its packets to?
32-bit addresses could not ensure that every Internet-connected device can receive a unique IP address
How many bits is the current IPv4? Why are we transforming to IPv6, and what will that do for us?
novel innovation
Improvement that is new, creative and has not been done before "outside the box thinking."
iterative innovation
Incremental or small improvement to an item
Vint Cerf
Internet pioneer who believed the Internet should be free and available to everyone
Low level programming language:
It deals with the computer's hardware. A programming language that captures only the most primitive operations available to a machine. Anything that a computer can do can be represented with combinations of low level commands. Examples: Machine Language, Assembly Language,
To uncompress the data back into its original binary state, you simply reverse the process. This technique is an example of what type of compression?
Lossless compression
The colors of the pixels in a digital image are often represented by red, green, and blue values between 0 and 255 (an RGB triplet). A photographer is manipulating a digital image to lighten it because all of the RGB values in the image are less than 100, making it very dark. He does this by adding 20 to the R, G, and B values of each pixel, then overwriting the original image. What type of transformation is the photographer using on the digital image?
Lossless transformation
A raw digital sound file samples a sound wave at some interval and measures the height of the wave at each point. Thus, raw sound is recorded as a list of numbers. In very broad terms the MP3 audio compression algorithm identifies frequencies and volume levels - low and high - that are outside the range of human hearing and removes the data representing these frequencies from the original. This technique results in a smaller audio file that sounds exactly the same to the human ear. This technique is an example of what type of compression?
Lossy compression
In very broad terms the MP3 audio compression algorithm identifies frequencies and volume levels - low and high - that are outside the range of human hearing and removes the data representing these frequencies from the original. This technique results in a smaller audio file that sounds exactly the same to the human ear. This technique is an example of what type of compression?
Lossy compression
Which of the following is true about lossy compression?
Lossy compression can compress data down to significantly less bits than lossless compression can. Data compressed with lossy compression cannot be restored back to its original state. Lossy compression throws away a lot of the original data, but humans can't even tell anything is missing.
What is the best term for this type of "data about the data"?
Metadata
Abstraction
Pulling out specific differences to make one solution work for multiple problems
Abstraction
Pulling out specific differences to make one solution work for multiple problems.
Sequencing
Putting commands in correct order so computers can read the commands.
What are the 3 color channels that make up a pixel according to the RGB color scheme?
Red, Green, Blue
abstraction
Reducing information and detail to focus on essential characteristics.
Which of the following are examples of encoding information?
Representing fast food meals as numbers on the menu. For example a number 1 represents a hamburger. Assigning a numeric value to every area of a region, for example zip codes in the United States Assigning a number to every character of the alphabet so we can represent sentences as series of simple digits.
The AP CS Principles framework contains the following statement: 7.1.1G Search trends are predictors. Which of the following is the most accurate statement about using search trends as predictors of future events?
Search trends are imperfect predictors of future events that may not fully represent society at large.
Packets
Small chunks of information that have been carefully formed from larger chunks of information.
IPv6 (Internet Protocol version 6)
System for internet addresses that uses 128 bits.
IPv4 (Internet Protocol version 4)
System for internet addresses that uses 32 bits.
transmission control protocol
TCP stands for...
Which of the following is true about lossless data compression?
The compressed data can be restored back to its original state
A programmer is writing a system that is intended to be able to store large amounts of personal data. As the programmer develops the data system, which of the following is LEAST likely to impact the programmer's choices in designing the structure of the system?
The frequency of a particular item occurring in a data set.
Decentralization
The internet has no "middle" router; every router is simply connected to several other router.
hexadecimal
The number system is base 16, using only digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F.
octal
The octal number system is base 8, using only digits 0 through 7.
Raw data
The original data as it was collected.
What is data abstraction?
The process of simplifying complicated data into manageable chunks
Open design
The protocols that define the internet are public, so anyone can build a device that connects to the internet.
A student is transferring photos from her camera to her computer. The student notices that the saved photos on her computer are lower quality than the original raw photo on her camera. Which of the following could be a possible explanation for the difference in image quality?
The saved image files were compressed with a lossy compression technique.
DNS
The service that translates URL's to IP addresses
DNS
The service that translates URLs to IP addresses.
Minimal spanning tree
The shortest path (in terms of total cost) that reaches every node.
pivot table
The tool used by most spreadsheet programs to create a summary table
ASCIII
The universally recognized raw text format that any computer can understand
Latency
Time it takes for a bit to travel from its sender to its receiver.
A certain social media Web site allows users to post messages and to comment on other messages that have been posted. When a user posts a message, the message itself is considered data. In addition to the data, the site stores the following meta data. The time the message was posted The name of the user who posted the message The names of any users who comment on the message and the times the comments were made For which of the following goals would it be more useful to analyze the data instead of the metadata?
To determine the topics that many users are posting about
Iterate
To repeat in order to achieve, or get closer to, a desired goal.
Why do we compress data?
To save memory space on devices. To speed up the time it takes to send a file over the internet. The computation it takes to decompress data is cheaper than the storage space required to store uncompressed data.
decimal
Traditional number system using digits 0-9.
Bandwidth
Transmission capacity measure by bit rate
uniform resource locator
URL stands for...
American Standard Code for Information Interchange
What does ASCII stand for? (cap first letter)
Low level protocols can provide functionality to high level protocols without revealing the details of how this is accomplished.
What is the abstraction of the Internet that allows people to use it without understanding it?
TCP
What makes sure that packets are never dropped?
TCP/IP
Which Internet protocols rely on others to work? HTTP relies on _______, and DNS relies on __________________
A bakery collects data on sales. Each sales record includes the date of the sale and some metadata about the items that were part of the sale. The data includes: the names of the items sold, the types of items sold, the number of each item sold, and the price of each item sold. Which of the following CANNOT be determined from the bakery's data set?
Which customer most frequently purchases bread.
A loosely organized collection of citizens and engineers.
Who makes up the IEFT?
lower higher
_________ level protocols guarantee __________ level protocols will function without stating specifically how this will be accomplished.
higher lower
__________ level protocols use _______ levels without needing to understand precisely how they work. (space between each term)
Turtle Programming
a classic method for learning programming with commands to control movement and drawing of an on-screen robot called a "turtle". The turtle hearkens back to early implementations in which children programmed a physical robot whose dome-like shape was reminiscent of a turtle.
Library
a collection of commands / functions, typically with a shared purpose
API
a collection of commands made available to a programmer
Lossy
a compression scheme in which "useless" or less-than-totally-necessary information is thrown out in order to reduce the size of the data. The eliminated data is unrecoverable.
Lossless
a compression scheme in which every bit of the original data can be recovered from the compressed file.
router
a computer which receives messages traveling across a network and redirects them towards their intended destination based on the addressing information included with the message.
Lossless Compression
a data compression algorithm that allows the original data to be perfectly reconstructed from the compressed data.
Lossy Compression
a data compression method that uses inexact approximations, discarding some data to represent the content. Most commonly seen in image formats like .jpg.
Documentation
a description of the behavior of a command, function, library, API, etc.
binary message
a message that can have only one of two values
Hexadecimal Number System
a number system consisting of 16 distinct symbols -- 0-9 and A-F -- which can occur in each place value.
Heuristic
a problem solving approach (algorithm) to find a satisfactory solution where finding an optimal or exact solution is impractical or impossible.
Top Down Design
a problem-solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.
Loop
a programming construct that repeats a group of commands
Loop
a programming construct that repeats a group of commands.
binary question
a question where there are only two possible answers
Which of the following pixels has a color value of #ff0000 (expressed in hexadecimal)
a red pixel
Abstraction
a simplified representation of something more complex. Abstractions allow you to hide details to help you manage complexity, focus on relevant concepts, and reason about problems at a higher level.
URL
an easy to remember address for calling a web page
ZIP
compressed files - lossless
ZIP
compressed files - lossless.
PNG
compressed image - lossless
GIF
compressed image - lossless (256 color limit)
PNG
compressed image - lossless.
JPEG
compressed image - lossy
JPEG
compressed image - lossy.
MP3
compressed sound - lossy
MP3
compressed sound - lossy.
Metadata
data that describes other data.
IETF (Internet Engineering Task Force )
develops and promotes voluntary Internet standards and protocols, in particular the standards that comprise the Internet protocol suite (TCP/IP). a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet. It is open to any interested individual.
Request for Comments (RFC)
documents are how standards and protocols are defined and published for all to see on the IETF website.
request for comments
documents how standards and protocols are defined -- Published for all to see
The salesperson in a cell phone store is telling me that the phone I'm considering has 8GB of memory, which means I can save 10,000 photos taken with the phone's camera. Is this true or false?
false
Network Redundancy
having multiple backups to ensure reliability during cases of high usage or failure If a section of the internet goes down, routers can re-direct traffic through parts that are still working.
TCP
provides reliable, ordered and error checked delivery of a stream of packets in the internet
Point-to-Point Communication
refers to a communications connection between only two endpoints. (Example: a telephone call, in which one telephone is connected with one other, and what is said by one caller can only be heard by the other)
Abstraction
removing unnecessary details to focus on the essential characteristics. To break problems up into separate parts which can then be solved separately and recombined to form a complete solution. To focus on and use something based only on what it does and without concern for how that functionality is accomplished.
iteration
repeating a process - in computer science this term often implies each repetition comes closer to an end point or final answer.
redundancy
repetition of information or the inclusion of additional information to reduce errors in transmission.
pixel
short for "picture element" it is the fundamental unit of a digital image, typically a tiny square or dot which contains a single point of color of a larger image
Pixel
short for "picture element" it is the fundamental unit of a digital image, typically a tiny square or dot which contains a single point of color of a larger image.
RGB
the RGB color model uses varying intensities of (R)ed, (G)reen, and (B)lue light are added together in to reproduce a broad array of colors
Sequencing
the application of each step of an algorithm in the order in which the statements are given.
Network Surveillance
the monitoring of computer activity and data stored on a hard drive, or data being transferred over computer networks such as the Internet. The monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals.
bit rate
the number of bits that are conveyed or processed per unit of time.
Bit Rate
the number of bits that are conveyed or processed per unit of time. e.g. 8 bits/sec.
net neutrality
the principle that all Internet traffic should be treated equally by Internet Service Providers
Internet
the principle that all Internet traffic should be treated equally by Internet Service Providers.
Net Neutrality
the principle that all Internet traffic should be treated equally by Internet Service Providers. the principle that Internet service providers and governments regulating the Internet must treat all data on the Internet the same, not discriminating or charging differentially by user, content, website, platform, application, type of attached equipment, or method of communication.
HTTP
the protocol used for transmitting web pages over the internet
Iteration
the repetition of part of an algorithm until a condition is met or for a specified number of times. "loop" by another name - the repetition of a statement, process, or procedure.
Compress
to decrease the number of bits used to represent a piece of information.
code
to write code, or to write instructions for a computer.
BMP
uncompressed image
BMP
uncompressed image.
WAV
uncompressed sound
WAV
uncompressed sound.
Selection
uses a Boolean condition (a TRUE/FALSE condition) to determine which of two parts of an algorithm is used.