Information Technology / Study Guide

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of these situations is most analogous to parallel computing?

When multiple people work on a jigsaw puzzle, they can each work on a different part of the puzzle. Once each person has put together a significant area of the puzzle, they can merge the areas and see the completed puzzle.

WAN

Wide Area Network

Consider these two files:-A 1-minute video of a cat pouncing ferociously on a twisty tie.-A download of "The Lion King", a 1.5-hour animated filmIs it possible for "The Lion King" to have a smaller file size than the shorter cat video?

Yes, if "The Lion King" video is compressed with a lossy compression algorithm.

Byte

a group of 8 bits

Algorithm

a step-by-step procedure for solving a problem

empirical analysis

analysis that involves explaining various aspects of politics, particularly by using careful observation and comparison to develop generalizations and testable theories

Bit

binary digit

lossless data compression

data compression technique where the number of bits needed to store or transmit information is reduced and the original data can be completely reconstructed

IP Packets

hold one unit of information, the destination IP address, and their sequence number

lossy data compression

is a method of encoding that uses approximations, or partial data, for representing the content of the information encoded

Bit rate

(sometimes written bitrate) the number of bits that are conveyed or processed per unit of time. e.g. 8 bits/sec.

What is the binary of 3?

0100

Which of the following best illustrates inequity caused by the digital divide?

A community college student does their homework in the waiting room of a local hospital because they don't have Wi-Fi at home.

binary number

A number composed of just 0s and 1s, also known as a base-2 number.

copyright

A right, allowing the owner to reproduce and sell work

The two algorithms below are both intended to calculate the sum of squares from 1 to n, where n is any positive integer.For example, if n is 333, the algorithms should calculate a sum of 14, from 1^2 + 2^2 + 3^2.Algorithm 1:i ← 1 sum ← 0 REPEAT n TIMES { sum ← sum + (i * i) i ← i + 1 }Algorithm 2:i ← 1 sum ← 0 REPEAT n TIMES { sum ← sum + (i + i) i ← i + 1 }Which statements best describe the behavior of the algorithms?

Algorithm 1 calculates the correct sum, but algorithm 2 does not

Which of these is an accurate description of how the TCP/IP protocols send data around the internet?

Computers split messages into packets and send them through routers to their final destination. The destination computer acknowledges the receipt of each packet, so that the sending computer can ensure every packet is delivered.

Which statement is true about computing devices in a computer network?

Each computing device must be able to send data to the other computing devices.

A programmer wants to present their idea for an algorithm at a company meeting. They're debating whether to express the algorithm in flow charts, pseudocode, or a programming language.Which of these is a good argument for expressing the algorithm in a flow chart at the company meeting?

Flow charts can require less technical knowledge to understand than pseudocode or programming languages.

LAN

Local Area Network

Sequencing

Putting commands in correct order so computers can read the commands.

Why does each IP packet contain a destination address?

Routers use the destination address to decide where to send a packet next.

What is the relationship between the Internet and the World Wide Web?

The World Wide Web is built on top of the Internet.

A security engineer is developing antivirus software that detects when downloaded programs look similar to known viruses. They would like the software to be able to detect viruses that it's never seen before, by predicting whether or not a program will ever execute malicious code.After a bit of research, the engineer realizes that virus detection is an undecidable problem.What are the consequences of the problem being undecidable?

The engineer might come up with an algorithm that correctly predicts the execution of malicious code in some cases, but the algorithm will not be correct all of the time.

A mathematician develops a program to solve systems of linear equations. When they use distributed computing techniques to run the program on two computers in parallel, they find a speedup of 2.

The program completed in half the time with two computers versus one computer.

Parallel Computing

The simultaneous execution of the same task on multiple processors to obtain results faster.

Latency

Time it takes for a bit to travel from its sender to its receiver.

licenses

What allow you to use copyrighted work.

Bandwith

the capacity for transmitting information through an Internet connection


Ensembles d'études connexes

Anatomy & Pathology: Fallopian tubes

View Set

Character and Culture in Literature

View Set

Chapter 8: Care of the Older Adult

View Set

Microbiology Block 4 - we out this bish

View Set