CS110 final
metadata
Data about data. Describes how and when and by whom a particular set of data was collected, and how the data is formatted.
What can be done to minimize or eliminate algorithmic bias?
Equality- make sure that there are equal outcomes for all races and genders, etc.
How many Bytes in a Gigabyte? in a Kilobyte?
GB: 2^30 KB: 2^10
how does GPS function?
GPS satellites circle the Earth twice a day in a precise orbit. Each satellite transmits a unique signal and orbital parameters that allow GPS devices to decode and compute the precise location of the satellite.
What steps can be taken to eliminate the Digital Divide?
Increasing connectivity in all communities.
ChatGPT
It's a computer program, designed to understand and respond to human language, assisting with questions, information, and conversation.
Steganography vs. Encryption
Steganography is used to hide the existence of information within other, seemingly innocuous data, with the primary goal of maintaining secrecy. It is a method of covert communication. Encryption is primarily used for securing the content of data by converting it into an unreadable format, often with the intent of ensuring data confidentiality
UAV/Drone
a remote-controlled flying robot. It's an unmanned aircraft that can be controlled from the ground and used for various purposes, like photography, surveillance, and delivery
open source software
code is accessible to everyone and can be used and reused
Network Adaptors
hardware device enabling communication between network nodes
Sequential Access
refers to reading or writing data records in sequential order , for example to read record 10, you need to read 1-9 first .
4 essential pieces of information contained in a packet
source address, destination address, protocol , packet number
BIOS (basic input/output system)
the built-in software that determines what a computer can do without accessing programs from a disk.
Scalability
the capacity for the system to change in size and scale to meet new demands
Hardware
the physical parts of a computer, Motherboard , CPU, RAM , GPU
software
the programs and other operating information used by a computer. operating systems, Device driver
operating system
the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals. Linux, Microsoft Windows, Apple macOS
Bluetooth
wireless connection between devices
unicode
A character code that enables most of the languages of the world to be symbolized with a special character identification.
List 3 dangers of Deep Fakes
A video of a person in which their face or body has been digitally altered so that they appear to be someone else. dangers: harassment Fake News may be very bad which leads to suicide
Digital divide
A worldwide gap giving advantage to those with access to technology
ASCII
American Standard Code for Information Interchange, a code for representing English characters as numbers, with each letter assigned a number from 0 to 127
Peripherals
An input device, output device, or secondary storage device that is not part of the central processing unit (CPU)
What is meant by IoT? Give 3 examples.
(Internet of Things) refers to a network of physical objects of things that are embedded with electronics, sensors, software, and network creativity. These physical objects can exchange data with each other light switches, refrigerators, doorbells
Week 2 - Computer Basics
...
A school with 20 stand-alone PCs is considering networking them together and adding a file server. Give three possible benefits of doing this.
1. Adminostrators will have more control over what they want students to access 2. It will be better security /restricting stuff they don't want students to see 3. they can access files more efficiently instead of sending It to each computer separately
What did the Snowden files contain?
: The PRISM program involved the collection of user data from major technology companies, such as Google, Apple, Microsoft, and Facebook.
Hybrid Cloud
A cloud managed by user (private) but also managed by provider (public)
DDoS
A distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.
DSL/Cable
A method of sending information using telephone or television cables. high speed internet access
Modem vs. Router
A modem is a box that connects your home network to your internet service provider, or ISP. A router is a box that lets all of your wired and wireless devices use that internet connection at once and allows them to talk to one another directly.
Give one advantage and one disadvantage of automated job screening.
An advantage is automated job screening is efficient and can process many job applications quickly and consistently. A disadvantage is it may be prone to bias if they aren't monitored correctly.
Cloud computing service - Platform as a service (Paas )
Provides platforms and tools for developers to build and manage their applications, ex (Heroku) helps developers build and manage web applications with coding but don't need to worry about infrastructure too much
Abstraction
Pulling out specific differences to make one solution work for multiple problems.
Draw examples of the following LAN configurations: Ring, Star, Mesh, Bus. Give an advantage or disadvantage of each configuration.
Ring: Data travels in one direction, reducing collisions and simplifying network management. Star: Easy to install and manage; if one device fails, it doesn't affect the rest of the network. Mesh:High reliability, as there are redundant paths; can handle heavy traffic loads. Bus : Simple and cost-effective to install.
Social Networking risk and opportunity ?
Risk: may be used as harassment or abuse Oppurtunity: connections
List the necessary components of a wireless network.
Radio waves, hotspot , transceiver
ROM vs RAM
Read-Only Memory (ROM): Nonvolatile: Data cannot be removed unless integrated circuits are damaged or destroyed. Random-Access Memory (RAM): Volatile: data can be erased (this happens when your computer is restarted). Provides greater functionality.
Random Access
Refers to the ability to access data at random. The opposite of this is sequential access.
Asynchronous transmission
Sending and receiving messages at different times , not real time, like WhatsApp messages
What are the advantages of a multi-core processor?
can operate at lower frequency, often consuming less power, and completing work much faster by running tasks in parallel compared to single core predecessors
De-identified data
data that ensures no one can reasonably identify a patient
input/output devices
input device: keyboard , feeds data into a computer output device: screen or "monitor", represents information from a computer
Crowdsourcing
inviting broad communities of people - customers, employees, independent scientists and researchers, and even the public at large - into the new product innovation process Takes input, ideas, services from users typically from an online community.
What did the USA Patriot's Act authorize?
legislation aimed at expanding the surveillance powers of government agencies to intercept and disrupt terrorism
Data Networks risk and opportunity ?
risk: using it too much may lead to job losses through outsourcing opportunity: it is easier to access work from anywhere because of efficiency
Cloud computing
storing and accessing data and programs (apps) on the web server instead of computer's local drive. ex: google drive, gmail , etc. advantages: allows collaboration access from any internet connection storage online
APRANET
the first wide-area packet-switched network with distributed control and one of the first computer networks to implement the TCP/IP protocol suite.
redundancy
the inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network.
e-buisness / e-commerce
the use of a digital technology primarily the internet to conduct varies business operations and activities
Packet Switching
transmission of data by breaking it up into packets, they go through different paths and end up colliding again at destination.
What is the difference between bandwidth and latency?
Bandwidth Represents the measure of computer network speed Latency Refers to delays / time
List from smallest to largest: kilobyte, megabyte, byte, bit, terabyte, gigabyte
Bit (2^0) Byte (2^3 bits) Kilobyte (2^10 bytes) Megabyte (2^20 bytes) Gigabyte (2^30 bytes) Terabyte (2^40 bytes)
Synchronous Transmission
Both sender and receiver are communicating in real time. Like FaceTime
What is the purpose of Captcha-ReCAPTCHA?
Captcha protects websites from spam Re- CAPTCHA is used to identify robots and humans
What is an EDR? How can its information be used?
Endpoint detection and response refers to a category of tools used to detect and investigate threats on endpoints. EDR tools typically provide detection, investigation, threat hunting, and response capabilities.
hard disk drive vs solid state drive
HDD uses magnetic storage technology while SSD uses NAND-based flash memory which is data stored in memory cells and is accessed electronically.
Network Interface Card
Hardware devices, A card installed in a computer that allows you to connect to a network (can be Ethernet, telephone, or wireless)
List the following in device connection order of their connections to each other? Assume that the modem and router are two separate devices. Modem , ISP , Router, Laptop computer , Internet
ISP → Modem → Router → Laptop Computer → Internet.
Briefly (one sentence) summarize each of the 7 Koans below: its all just bits perfection is normal there is want on the midst of plenty processing is power more of the same can be a whole new thing nothing goes away bits move faster than thoughts
It's all just Bits - Computers, smartphones and devices deal with bits, not what we see on the screen and this idea has consequences which include legal and regulatory issues in the digital world. Perfection is normal - Copies of documents or anything is perfect in the digital world, due to this, there are laws and regulations on who can use and share stuff online. There is Want on the Midst of Plenty - We have information stored on computers, but sometimes it may be only stored on paper or old devices, making it hard to find. Processing is Power- Computer speed used to double every few years because of Moore's Law, but now computers are advancing in different ways making them more capable for robots and smart devices. More of the Same Can be a Whole New Thing- We have to notice and respond to small changes in this rapidly changing digital world because when things grow too fast, they seem unchanged at first but then suddenly become a big problem Nothing Goes Away- We store huge amounts of data daily and we need to know what to keep private and not because once it's out on the internet, it's hard to erase. Bits Move Faster Than Thoughts - The internet has made communication across long distances very instant, which may lead to changes in industries and global interactions, and it also talks about privacy and legal boundaries in the digital world.
LAN WAN MAN PAN
LAN - Local area network which covers small areas , such as a building or campus.WAN - Wide area network covers a wider area such as a state or country , the Internet is the largest WANMAN - Metropolitan area network, covers a town or city PAN - Personal area network - interconnection of personal digital devices
3 internet gatekeepers and what they control
Links gatekeepers - control the data pipes thru which bits flow Search gatekeepers - control the tools we use to find things on web social gartekeerps- control social connections
Classify each of the following file types as lossy compression, lossless compression, or not compressed: JPEG, GIF, BMP, MP3, WAV, and PNG
Lossy Compression: JPEG, MP3 Lossless Compression: GIF, PNG Not Compressed (Uncompressed): BMP, WAV
Lossy vs Lossless
Lossy Compression: Results in a reduction of file size by discarding some data. Common in multimedia applications where a certain degree of quality loss is acceptable. Lossless Compression: Achieves smaller file sizes without any loss of data. Suitable for scenarios where maintaining the original data integrity is crucial, zip files
Citizen Science
Lots of people to help with a scientific project, like asking everyone around the world to count the butterflies they see one day
How does the computer distinguish between a photo and a text file if everything is stored as bits?
May look at file extensions. file headers which contain metadata about the file, or magic numbers , some JPEG files have hexadecimal value.
Compare and contrast peer-to-peer networks with client-server networks.
Peer-to-Peer: Everyone is equal, and computers share resources directly. No file sever. lient-Server: There's a dedicated server that provides services/resources to other computers (clients). there is a file server
We accept our loss of privacy in exchange for what?
Time saved
Cloud computing service - Software as a Service (Saas)
Top of heirahcy, don't use any infrastructure, the software applications are provided and hosted online (google docs, Dropbox, gmail)
nonvolatile
Types of memory that retain their contents when power is turned off. ROM is nonvolatile, whereas RAM is volatile.
USB
Universal Serial Bus; an external bus standard that supports data transfer rates of 12 Mbps.
Device Drivers
Utility software used by the operating system to communicate with peripheral devices.
Bit, Bytes,
a bit is the smallest piece of information that computers use. For simplicity, a PC uses bits in groups of 8 called bytes (8 bits = 1 byte).
Network 3 advantages
a collection of computer equipment that are connected with wires or wireless links. Various separate devices can communicate with each other and exchange information. advantages- allows for sharing files which reduces cost , communication , storage of data online cloud computing.
Algorithmic bias
a computer making unfair decisions. It occurs when computer programs or algorithms treat certain groups of people unfairly due to biases in the data used to train them
Circuit Switching
a dedicated connection is formed between two points and the connection remains active for the duration of the transmission
Computer malware (virus, trojan horse)
a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker want viruses are a executable code attached to another executable file which can harm or delete data a Trojan horse can capture important information about a computer system
Internet protocols
a set of rules which govern the way in which data is transmitted between computers on a network.
AI
a smart computer that can learn and make decisions. It's technology that enables machines to perform tasks that typically require human intelligence, like understanding speech, recognizing images, and making predictions.
Ethernet
a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
Give one advantage and one disadvantage of an RFID-enabled device in your car.
advantage: people can go through tolls without having to stop or slow down disadvantage : they might get tracked and information may be accessed without permission (credit card)
peer-to-peer network
any network without a central file server and in which all computers in the network have access to the public files located on all other workstations
Warren and Brandeis claimed that privacy is the right to ______________.
be let alone
Application Software
computer software created to allow the user to perform a specific job or task
digital footprints vs digital fingerprints
digital footprints : traces people leave on the internet, like web history or likes on pictures, etc digital fingerprints: unique identifiers for example a IP address
data
distinct information that is formatted in a special way
Broadaband
high speed internet connection and provides faster data transmissions
volatile
memory that loses its contents when the power is turned off. All RAM except the CMOS RAM used for BIOS is volatile .
In the United States, _______________________ stood in tension with privacy rights.
national security
Cloud computing service - Infrastructure as a service (Iaas)
offers virtualized computing resources over the internet. Provides virtual machines, storage and networking infrastructure which users control and manage. Cloud provider handles physical hardware
algorithmic transparency
principle that we should know how computers are making decisions about us
Crowdfunding
raising money for a project or venture by obtaining many small amounts of money from many people
storage media risk and opportunity ?
risk: anyone with access may jeopardize security opportunity : able to access many things and store large amounts of data
Encryption risk and opportunity ?
risk: terrorists can plot plans undercover opportunity: being able to text friends confident there is privacy
Elasticity
the ability of a system to automatically adjust resources up or down as demand changes, ensuring optimal performance and cost efficiency.
Carboon Footprint
the amount of carbon dioxide released into the atmosphere as a result of the activities of a particular individual, organization, or community.
BPS - bits per second
units of measure for data transfer rates
Private cloud
used by a single organization, doesn't utilize shared infrastructure. Used for high security and sensitive information
Public Cloud
used by multiple organizations , shared infrastructure, information that isn't sensitive
How does RAM affect a computer's performance?
The more RAM in a computer the faster it will take to profess something.