CISC 310 Ch 1, 2, 3, 7, 8, 10, 12, 13, 14, 15, 16, 17

Ace your homework & exams now with Quizwiz!

Joseph Jacquard (Jacquards loom)

* Jacquards loom was used for weaving a cloth. * The loom used a series of cards with a hole punched into them to specify the use of specific colored threads and indicate the design that was woven into the cloth. * Was the first to make use of an important form of input.

How many bits is a one in a nibble.

1 nibble = 4 bit

How many bits would it take to represent some number of things? List all combinations of these bits.

1. The total number is 2 to the power of the number of bits. 2. So, eight bits has 28 possible values. 3. If you really mean "how to compute it", consider that each bit has two possible values.

first generation

1951-1958; vacuum tubes

second generation

1959-1963; Transistors

Third Generation

1964-1970; Integrated circuits

How many bits are three in a byte

24 bits (1 bite=8 bit)

RLE (Run Length Encoding)

A compression technique that relies on images having long runs of pixels that are the same color

Abstract Data Type (ADT)

A data type whose properties are specified independently of any particular programming language.

ER Diagram

A graphical representation of an ER model

Structured Query Language (SQL)

A language used to create and manipulate databases.

algorithm

A set of directions for solving a problem

open systems interconnection (OSI) reference model

A seven-layer logical breakdown of network interaction to facilitate communication standards

keyword method

A strategy for improving memory by using images to link pairs of items.

World Wide Web

A system for finding information on the Internet through the use of linked documents.

Paged memory technique

A technique in which processes are divided into fixed-size pages and stored in memory frames when loaded

Diferences between Unicode and ASCII

ASCII has its equivalent within Unicode.

Ada Lovelace (1815-1852)

An English mathematician often considered to be the first computer programmer because of her work with Charles Babbage on his mechanical general-purpose computer, the Analytical Engine, including the first machine algorithm.

difference between a concrete step and an abstract step.

An abstract step is one in which further development is needed. A concrete step is one in which all the steps are fully specified

define the concept of abstraction

An abstraction is a mental model that removes complex details. An abstraction lets the viewer see only those details that are relevant to the user's view.

Demand Paging

An extension to paged memory management in which pages are brought into memory only when referenced (on demand)

Pseudocode

An outline of the basic ideas behind how algorithms will work.

Communication Layer

Connects other computers or people through wired and wireless networks.

Programming Layer

Deals with software and the instructions used to manage data.

Charles Babbage (1791-1871)

English mathematician, engineer, philosopher, and inventor. Originated the concept of the programmable computer, and designed one.

Gordon Moore

Founder of Intel

Operating System Layer

Help manage the computer's resources.

John von Neumann (1903-1957)

Hungarian-American mathematician, physicist, and computer scientist. He published over 150 papers in his life: about 60 in pure mathematics, 20 in physics, and 60 in applied mathematics. His First Draft of a Report on the EDVAC described a computer architecture which is the basis of most modern computer designs.

Hypertext Markup Language (HTML)

Language used to compose Web pages.

What-if analysis

Modifying spreadsheet values that represent assumptions to see how changes in those assumptions affect related data

Application Software

Programs that help us solve real-world problems

an image that digitized into RGB values

RGB (red, green, blue) refers to a system for representing the colors to be used on a computer display

Information Layer

Reflects the way we represent information on a computer which is 0 and 1.

Memory Management

The act of keeping track of how and where programs are loaded in the main memory

process control block (pcb)

The data structure used by the operating system to manage information about a process

Internet Protocol (IP)

The network protocol that deals with the routing of packets through interconnected networks to the final destination

Hardware Layer

The physical components of a computer which control the flow of electricity.

Ray tracing

The technique for adding light and shadows to a 3-D image

Multiprogramming

The technique of keeping multiple programs in main memory at the same time, competing for the CPU

decode a Huffman code, given a coded message and a table of Huffman codes.

To decode the encoded string, follow the zeros and ones to a leaf and return the character there. You are given pointer to the root of the Huffman tree and a binary coded string to decode. You need to print the decoded string. Complete the function decode_huff in the editor below.

the Application Layer

Uses the computer to solve real world problems.

Neural networks

computer systems that mimic processing of the human brain

Game Loop

control for the entire game program

Simulation

development of a model of a complex system and experimenting with the model to observe the results

Round Robin Scheduling

distributes the processing time equitably among already processes

Alan Turing (1912-1954)

father of computer science

API

helps developers with how to write a program through key programming tasks

how many bits it takes to create 256 bit patterns

in most cases, one byte is equal to eight bits and has 28 or 256 possible values

Extensible markup language (XML)

language that allows the user to describe the content of a document

Shortest-process-next (SPN) scheduling

looks at all processes in the ready state and dispatches the one with the smallest service time

Virus

malicious, self-replicating program that embeds itself in other code

Worm

malicious, stand-alone program that often targets network resources

Encryption

process of converting plain-text to cipher-text

First-come First-served (FCFS) scheduling

processes are moved to the CPU in the order in which they arrive

system software

programs that manage a computer system and interact with hardware

Unicode

represents most written languages in the world

Man-in-the-Middle

security attack; network connection is intercepted in an attempt to obtain key data

Expert system

software system based on knowledge of human experts to advise the user on how to proceed with the problem

Game Engine

software system within which games can be created

artificial intelligence (AI)

study of computer systems that attempt to model and apply the intelligence of the human mind

Caesar cipher

substitution cipher that shifts letters a certain amount

Operating System (OS)

system software that manages computer resources and provides an interface for system interaction

Huffman encoding

the algorithm measures the frequency of each data item like each letter, and gives the most frequent items a shorter bit encoding (like the letters "a" and "e"), with least frequent items getting a longer encoding (like letters "q" and "z").

Transportation cipher

the cipher that rearranges the order of existing characters in a message

Transmission Control Protocol (TCP)

the network protocol that breaks messages into packets, reassembles them at the destination and takes care of errors

the top-down design process

the process is characterized by successive layers of refinement. The top-level tasks are listed. At each succeeding level, the tasks from the previous one are further developed.

Page-map table (PMT)

the table used by the operating system to keep track of page/frame relationships

ASCII (American Standard Code for Information Interchange)

uses an 8-bit encoding

Phishing

using a web page to trick users into giving personal information

public key

approach to cryptography in which a user has a public & private key already

spread sheet function

a computation provided by the spreadsheet software that can be incorporated into formulas

Local Area Network (LAN)

a computer network that covers a small area

Domain Name System (DNS)

a distributed system for managing hostname resolution

page

a fixed-size portion of a process that is stored in a memory frame

frame

a fixed-size portion of main memory that holds a process page

Markup language

a language that uses tags to annotate the information in a document

spread sheet

a program that allows the user to organize and analyze data using a grid of cells

Continuous simulation

a simulation that treats time as continuous with expressing change from a set of differential equations reflecting relationships among characteristics

Datebase schema

a specification of the logical structure of data in the database

Search tree

a structure that represents alternatives in adversarial situations

Turing Test

a test for intelligence in a computer, requiring that a human being should be unable to distinguish the machine from another human being by using the replies to questions put to both.

Model

abstraction of a real system by a representation of objects within the system and the rules that govern interactions of objects


Related study sets

Le nouveau quartier français 1 - Rallye 1 - Circuit rouge 1

View Set

Fundamentals of Nursing Chapter 15

View Set

Oklahoma - Basic II Post License Course - Study Tests - Barnes Real Estate

View Set

ITN 261 CHAP 1-7 Pratice Question

View Set

Chinese Dynasty and Chinese Revolution

View Set

NU 273 PrepU Collecting Subjective Data: The Interview and Health History

View Set

Chapter 37: Assessment and Management of Patients With Allergic Disorders Prep-U

View Set