CS110 final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

metadata

Data about data. Describes how and when and by whom a particular set of data was collected, and how the data is formatted.

What can be done to minimize or eliminate algorithmic bias?

Equality- make sure that there are equal outcomes for all races and genders, etc.

How many Bytes in a Gigabyte? in a Kilobyte?

GB: 2^30 KB: 2^10

how does GPS function?

GPS satellites circle the Earth twice a day in a precise orbit. Each satellite transmits a unique signal and orbital parameters that allow GPS devices to decode and compute the precise location of the satellite.

What steps can be taken to eliminate the Digital Divide?

Increasing connectivity in all communities.

ChatGPT

It's a computer program, designed to understand and respond to human language, assisting with questions, information, and conversation.

Steganography vs. Encryption

Steganography is used to hide the existence of information within other, seemingly innocuous data, with the primary goal of maintaining secrecy. It is a method of covert communication. Encryption is primarily used for securing the content of data by converting it into an unreadable format, often with the intent of ensuring data confidentiality

UAV/Drone

a remote-controlled flying robot. It's an unmanned aircraft that can be controlled from the ground and used for various purposes, like photography, surveillance, and delivery

open source software

code is accessible to everyone and can be used and reused

Network Adaptors

hardware device enabling communication between network nodes

Sequential Access

refers to reading or writing data records in sequential order , for example to read record 10, you need to read 1-9 first .

4 essential pieces of information contained in a packet

source address, destination address, protocol , packet number

BIOS (basic input/output system)

the built-in software that determines what a computer can do without accessing programs from a disk.

Scalability

the capacity for the system to change in size and scale to meet new demands

Hardware

the physical parts of a computer, Motherboard , CPU, RAM , GPU

software

the programs and other operating information used by a computer. operating systems, Device driver

operating system

the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals. Linux, Microsoft Windows, Apple macOS

Bluetooth

wireless connection between devices

unicode

A character code that enables most of the languages of the world to be symbolized with a special character identification.

List 3 dangers of Deep Fakes

A video of a person in which their face or body has been digitally altered so that they appear to be someone else. dangers: harassment Fake News may be very bad which leads to suicide

Digital divide

A worldwide gap giving advantage to those with access to technology

ASCII

American Standard Code for Information Interchange, a code for representing English characters as numbers, with each letter assigned a number from 0 to 127

Peripherals

An input device, output device, or secondary storage device that is not part of the central processing unit (CPU)

What is meant by IoT? Give 3 examples.

(Internet of Things) refers to a network of physical objects of things that are embedded with electronics, sensors, software, and network creativity. These physical objects can exchange data with each other light switches, refrigerators, doorbells

Week 2 - Computer Basics

...

A school with 20 stand-alone PCs is considering networking them together and adding a file server. Give three possible benefits of doing this.

1. Adminostrators will have more control over what they want students to access 2. It will be better security /restricting stuff they don't want students to see 3. they can access files more efficiently instead of sending It to each computer separately

What did the Snowden files contain?

: The PRISM program involved the collection of user data from major technology companies, such as Google, Apple, Microsoft, and Facebook.

Hybrid Cloud

A cloud managed by user (private) but also managed by provider (public)

DDoS

A distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.

DSL/Cable

A method of sending information using telephone or television cables. high speed internet access

Modem vs. Router

A modem is a box that connects your home network to your internet service provider, or ISP. A router is a box that lets all of your wired and wireless devices use that internet connection at once and allows them to talk to one another directly.

Give one advantage and one disadvantage of automated job screening.

An advantage is automated job screening is efficient and can process many job applications quickly and consistently. A disadvantage is it may be prone to bias if they aren't monitored correctly.

Cloud computing service - Platform as a service (Paas )

Provides platforms and tools for developers to build and manage their applications, ex (Heroku) helps developers build and manage web applications with coding but don't need to worry about infrastructure too much

Abstraction

Pulling out specific differences to make one solution work for multiple problems.

Draw examples of the following LAN configurations: Ring, Star, Mesh, Bus. Give an advantage or disadvantage of each configuration.

Ring: Data travels in one direction, reducing collisions and simplifying network management. Star: Easy to install and manage; if one device fails, it doesn't affect the rest of the network. Mesh:High reliability, as there are redundant paths; can handle heavy traffic loads. Bus : Simple and cost-effective to install.

Social Networking risk and opportunity ?

Risk: may be used as harassment or abuse Oppurtunity: connections

List the necessary components of a wireless network.

Radio waves, hotspot , transceiver

ROM vs RAM

Read-Only Memory (ROM): Nonvolatile: Data cannot be removed unless integrated circuits are damaged or destroyed. Random-Access Memory (RAM): Volatile: data can be erased (this happens when your computer is restarted). Provides greater functionality.

Random Access

Refers to the ability to access data at random. The opposite of this is sequential access.

Asynchronous transmission

Sending and receiving messages at different times , not real time, like WhatsApp messages

What are the advantages of a multi-core processor?

can operate at lower frequency, often consuming less power, and completing work much faster by running tasks in parallel compared to single core predecessors

De-identified data

data that ensures no one can reasonably identify a patient

input/output devices

input device: keyboard , feeds data into a computer output device: screen or "monitor", represents information from a computer

Crowdsourcing

inviting broad communities of people - customers, employees, independent scientists and researchers, and even the public at large - into the new product innovation process Takes input, ideas, services from users typically from an online community.

What did the USA Patriot's Act authorize?

legislation aimed at expanding the surveillance powers of government agencies to intercept and disrupt terrorism

Data Networks risk and opportunity ?

risk: using it too much may lead to job losses through outsourcing opportunity: it is easier to access work from anywhere because of efficiency

Cloud computing

storing and accessing data and programs (apps) on the web server instead of computer's local drive. ex: google drive, gmail , etc. advantages: allows collaboration access from any internet connection storage online

APRANET

the first wide-area packet-switched network with distributed control and one of the first computer networks to implement the TCP/IP protocol suite.

redundancy

the inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network.

e-buisness / e-commerce

the use of a digital technology primarily the internet to conduct varies business operations and activities

Packet Switching

transmission of data by breaking it up into packets, they go through different paths and end up colliding again at destination.

What is the difference between bandwidth and latency?

Bandwidth Represents the measure of computer network speed Latency Refers to delays / time

List from smallest to largest: kilobyte, megabyte, byte, bit, terabyte, gigabyte

Bit (2^0) Byte (2^3 bits) Kilobyte (2^10 bytes) Megabyte (2^20 bytes) Gigabyte (2^30 bytes) Terabyte (2^40 bytes)

Synchronous Transmission

Both sender and receiver are communicating in real time. Like FaceTime

What is the purpose of Captcha-ReCAPTCHA?

Captcha protects websites from spam Re- CAPTCHA is used to identify robots and humans

What is an EDR? How can its information be used?

Endpoint detection and response refers to a category of tools used to detect and investigate threats on endpoints. EDR tools typically provide detection, investigation, threat hunting, and response capabilities.

hard disk drive vs solid state drive

HDD uses magnetic storage technology while SSD uses NAND-based flash memory which is data stored in memory cells and is accessed electronically.

Network Interface Card

Hardware devices, A card installed in a computer that allows you to connect to a network (can be Ethernet, telephone, or wireless)

List the following in device connection order of their connections to each other? Assume that the modem and router are two separate devices. Modem , ISP , Router, Laptop computer , Internet

ISP → Modem → Router → Laptop Computer → Internet.

Briefly (one sentence) summarize each of the 7 Koans below: its all just bits perfection is normal there is want on the midst of plenty processing is power more of the same can be a whole new thing nothing goes away bits move faster than thoughts

It's all just Bits - Computers, smartphones and devices deal with bits, not what we see on the screen and this idea has consequences which include legal and regulatory issues in the digital world. Perfection is normal - Copies of documents or anything is perfect in the digital world, due to this, there are laws and regulations on who can use and share stuff online. There is Want on the Midst of Plenty - We have information stored on computers, but sometimes it may be only stored on paper or old devices, making it hard to find. Processing is Power- Computer speed used to double every few years because of Moore's Law, but now computers are advancing in different ways making them more capable for robots and smart devices. More of the Same Can be a Whole New Thing- We have to notice and respond to small changes in this rapidly changing digital world because when things grow too fast, they seem unchanged at first but then suddenly become a big problem Nothing Goes Away- We store huge amounts of data daily and we need to know what to keep private and not because once it's out on the internet, it's hard to erase. Bits Move Faster Than Thoughts - The internet has made communication across long distances very instant, which may lead to changes in industries and global interactions, and it also talks about privacy and legal boundaries in the digital world.

LAN WAN MAN PAN

LAN - Local area network which covers small areas , such as a building or campus.WAN - Wide area network covers a wider area such as a state or country , the Internet is the largest WANMAN - Metropolitan area network, covers a town or city PAN - Personal area network - interconnection of personal digital devices

3 internet gatekeepers and what they control

Links gatekeepers - control the data pipes thru which bits flow Search gatekeepers - control the tools we use to find things on web social gartekeerps- control social connections

Classify each of the following file types as lossy compression, lossless compression, or not compressed: JPEG, GIF, BMP, MP3, WAV, and PNG

Lossy Compression: JPEG, MP3 Lossless Compression: GIF, PNG Not Compressed (Uncompressed): BMP, WAV

Lossy vs Lossless

Lossy Compression: Results in a reduction of file size by discarding some data. Common in multimedia applications where a certain degree of quality loss is acceptable. Lossless Compression: Achieves smaller file sizes without any loss of data. Suitable for scenarios where maintaining the original data integrity is crucial, zip files

Citizen Science

Lots of people to help with a scientific project, like asking everyone around the world to count the butterflies they see one day

How does the computer distinguish between a photo and a text file if everything is stored as bits?

May look at file extensions. file headers which contain metadata about the file, or magic numbers , some JPEG files have hexadecimal value.

Compare and contrast peer-to-peer networks with client-server networks.

Peer-to-Peer: Everyone is equal, and computers share resources directly. No file sever. lient-Server: There's a dedicated server that provides services/resources to other computers (clients). there is a file server

We accept our loss of privacy in exchange for what?

Time saved

Cloud computing service - Software as a Service (Saas)

Top of heirahcy, don't use any infrastructure, the software applications are provided and hosted online (google docs, Dropbox, gmail)

nonvolatile

Types of memory that retain their contents when power is turned off. ROM is nonvolatile, whereas RAM is volatile.

USB

Universal Serial Bus; an external bus standard that supports data transfer rates of 12 Mbps.

Device Drivers

Utility software used by the operating system to communicate with peripheral devices.

Bit, Bytes,

a bit is the smallest piece of information that computers use. For simplicity, a PC uses bits in groups of 8 called bytes (8 bits = 1 byte).

Network 3 advantages

a collection of computer equipment that are connected with wires or wireless links. Various separate devices can communicate with each other and exchange information. advantages- allows for sharing files which reduces cost , communication , storage of data online cloud computing.

Algorithmic bias

a computer making unfair decisions. It occurs when computer programs or algorithms treat certain groups of people unfairly due to biases in the data used to train them

Circuit Switching

a dedicated connection is formed between two points and the connection remains active for the duration of the transmission

Computer malware (virus, trojan horse)

a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker want viruses are a executable code attached to another executable file which can harm or delete data a Trojan horse can capture important information about a computer system

Internet protocols

a set of rules which govern the way in which data is transmitted between computers on a network.

AI

a smart computer that can learn and make decisions. It's technology that enables machines to perform tasks that typically require human intelligence, like understanding speech, recognizing images, and making predictions.

Ethernet

a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.

Give one advantage and one disadvantage of an RFID-enabled device in your car.

advantage: people can go through tolls without having to stop or slow down disadvantage : they might get tracked and information may be accessed without permission (credit card)

peer-to-peer network

any network without a central file server and in which all computers in the network have access to the public files located on all other workstations

Warren and Brandeis claimed that privacy is the right to ______________.

be let alone

Application Software

computer software created to allow the user to perform a specific job or task

digital footprints vs digital fingerprints

digital footprints : traces people leave on the internet, like web history or likes on pictures, etc digital fingerprints: unique identifiers for example a IP address

data

distinct information that is formatted in a special way

Broadaband

high speed internet connection and provides faster data transmissions

volatile

memory that loses its contents when the power is turned off. All RAM except the CMOS RAM used for BIOS is volatile .

In the United States, _______________________ stood in tension with privacy rights.

national security

Cloud computing service - Infrastructure as a service (Iaas)

offers virtualized computing resources over the internet. Provides virtual machines, storage and networking infrastructure which users control and manage. Cloud provider handles physical hardware

algorithmic transparency

principle that we should know how computers are making decisions about us

Crowdfunding

raising money for a project or venture by obtaining many small amounts of money from many people

storage media risk and opportunity ?

risk: anyone with access may jeopardize security opportunity : able to access many things and store large amounts of data

Encryption risk and opportunity ?

risk: terrorists can plot plans undercover opportunity: being able to text friends confident there is privacy

Elasticity

the ability of a system to automatically adjust resources up or down as demand changes, ensuring optimal performance and cost efficiency.

Carboon Footprint

the amount of carbon dioxide released into the atmosphere as a result of the activities of a particular individual, organization, or community.

BPS - bits per second

units of measure for data transfer rates

Private cloud

used by a single organization, doesn't utilize shared infrastructure. Used for high security and sensitive information

Public Cloud

used by multiple organizations , shared infrastructure, information that isn't sensitive

How does RAM affect a computer's performance?

The more RAM in a computer the faster it will take to profess something.


Ensembles d'études connexes

Chapter 30: Atraumatic Care of Children and Families

View Set

Financial Accounting & Reporting

View Set

11.1 - Apply Trigonometric Functions to solve problems involving distance and angles

View Set

Verbal Reasoning DOST-SEI Practice Test

View Set

Nursing care of children ATI quiz bank

View Set

Chapter 10 - Manipulating Variables

View Set