Information Technology / Study Guide
Which of these situations is most analogous to parallel computing?
When multiple people work on a jigsaw puzzle, they can each work on a different part of the puzzle. Once each person has put together a significant area of the puzzle, they can merge the areas and see the completed puzzle.
WAN
Wide Area Network
Consider these two files:-A 1-minute video of a cat pouncing ferociously on a twisty tie.-A download of "The Lion King", a 1.5-hour animated filmIs it possible for "The Lion King" to have a smaller file size than the shorter cat video?
Yes, if "The Lion King" video is compressed with a lossy compression algorithm.
Byte
a group of 8 bits
Algorithm
a step-by-step procedure for solving a problem
empirical analysis
analysis that involves explaining various aspects of politics, particularly by using careful observation and comparison to develop generalizations and testable theories
Bit
binary digit
lossless data compression
data compression technique where the number of bits needed to store or transmit information is reduced and the original data can be completely reconstructed
IP Packets
hold one unit of information, the destination IP address, and their sequence number
lossy data compression
is a method of encoding that uses approximations, or partial data, for representing the content of the information encoded
Bit rate
(sometimes written bitrate) the number of bits that are conveyed or processed per unit of time. e.g. 8 bits/sec.
What is the binary of 3?
0100
Which of the following best illustrates inequity caused by the digital divide?
A community college student does their homework in the waiting room of a local hospital because they don't have Wi-Fi at home.
binary number
A number composed of just 0s and 1s, also known as a base-2 number.
copyright
A right, allowing the owner to reproduce and sell work
The two algorithms below are both intended to calculate the sum of squares from 1 to n, where n is any positive integer.For example, if n is 333, the algorithms should calculate a sum of 14, from 1^2 + 2^2 + 3^2.Algorithm 1:i ← 1 sum ← 0 REPEAT n TIMES { sum ← sum + (i * i) i ← i + 1 }Algorithm 2:i ← 1 sum ← 0 REPEAT n TIMES { sum ← sum + (i + i) i ← i + 1 }Which statements best describe the behavior of the algorithms?
Algorithm 1 calculates the correct sum, but algorithm 2 does not
Which of these is an accurate description of how the TCP/IP protocols send data around the internet?
Computers split messages into packets and send them through routers to their final destination. The destination computer acknowledges the receipt of each packet, so that the sending computer can ensure every packet is delivered.
Which statement is true about computing devices in a computer network?
Each computing device must be able to send data to the other computing devices.
A programmer wants to present their idea for an algorithm at a company meeting. They're debating whether to express the algorithm in flow charts, pseudocode, or a programming language.Which of these is a good argument for expressing the algorithm in a flow chart at the company meeting?
Flow charts can require less technical knowledge to understand than pseudocode or programming languages.
LAN
Local Area Network
Sequencing
Putting commands in correct order so computers can read the commands.
Why does each IP packet contain a destination address?
Routers use the destination address to decide where to send a packet next.
What is the relationship between the Internet and the World Wide Web?
The World Wide Web is built on top of the Internet.
A security engineer is developing antivirus software that detects when downloaded programs look similar to known viruses. They would like the software to be able to detect viruses that it's never seen before, by predicting whether or not a program will ever execute malicious code.After a bit of research, the engineer realizes that virus detection is an undecidable problem.What are the consequences of the problem being undecidable?
The engineer might come up with an algorithm that correctly predicts the execution of malicious code in some cases, but the algorithm will not be correct all of the time.
A mathematician develops a program to solve systems of linear equations. When they use distributed computing techniques to run the program on two computers in parallel, they find a speedup of 2.
The program completed in half the time with two computers versus one computer.
Parallel Computing
The simultaneous execution of the same task on multiple processors to obtain results faster.
Latency
Time it takes for a bit to travel from its sender to its receiver.
licenses
What allow you to use copyrighted work.
Bandwith
the capacity for transmitting information through an Internet connection