CISC 310 Ch 1, 2, 3, 7, 8, 10, 12, 13, 14, 15, 16, 17
Joseph Jacquard (Jacquards loom)
* Jacquards loom was used for weaving a cloth. * The loom used a series of cards with a hole punched into them to specify the use of specific colored threads and indicate the design that was woven into the cloth. * Was the first to make use of an important form of input.
How many bits is a one in a nibble.
1 nibble = 4 bit
How many bits would it take to represent some number of things? List all combinations of these bits.
1. The total number is 2 to the power of the number of bits. 2. So, eight bits has 28 possible values. 3. If you really mean "how to compute it", consider that each bit has two possible values.
first generation
1951-1958; vacuum tubes
second generation
1959-1963; Transistors
Third Generation
1964-1970; Integrated circuits
How many bits are three in a byte
24 bits (1 bite=8 bit)
RLE (Run Length Encoding)
A compression technique that relies on images having long runs of pixels that are the same color
Abstract Data Type (ADT)
A data type whose properties are specified independently of any particular programming language.
ER Diagram
A graphical representation of an ER model
Structured Query Language (SQL)
A language used to create and manipulate databases.
algorithm
A set of directions for solving a problem
open systems interconnection (OSI) reference model
A seven-layer logical breakdown of network interaction to facilitate communication standards
keyword method
A strategy for improving memory by using images to link pairs of items.
World Wide Web
A system for finding information on the Internet through the use of linked documents.
Paged memory technique
A technique in which processes are divided into fixed-size pages and stored in memory frames when loaded
Diferences between Unicode and ASCII
ASCII has its equivalent within Unicode.
Ada Lovelace (1815-1852)
An English mathematician often considered to be the first computer programmer because of her work with Charles Babbage on his mechanical general-purpose computer, the Analytical Engine, including the first machine algorithm.
difference between a concrete step and an abstract step.
An abstract step is one in which further development is needed. A concrete step is one in which all the steps are fully specified
define the concept of abstraction
An abstraction is a mental model that removes complex details. An abstraction lets the viewer see only those details that are relevant to the user's view.
Demand Paging
An extension to paged memory management in which pages are brought into memory only when referenced (on demand)
Pseudocode
An outline of the basic ideas behind how algorithms will work.
Communication Layer
Connects other computers or people through wired and wireless networks.
Programming Layer
Deals with software and the instructions used to manage data.
Charles Babbage (1791-1871)
English mathematician, engineer, philosopher, and inventor. Originated the concept of the programmable computer, and designed one.
Gordon Moore
Founder of Intel
Operating System Layer
Help manage the computer's resources.
John von Neumann (1903-1957)
Hungarian-American mathematician, physicist, and computer scientist. He published over 150 papers in his life: about 60 in pure mathematics, 20 in physics, and 60 in applied mathematics. His First Draft of a Report on the EDVAC described a computer architecture which is the basis of most modern computer designs.
Hypertext Markup Language (HTML)
Language used to compose Web pages.
What-if analysis
Modifying spreadsheet values that represent assumptions to see how changes in those assumptions affect related data
Application Software
Programs that help us solve real-world problems
an image that digitized into RGB values
RGB (red, green, blue) refers to a system for representing the colors to be used on a computer display
Information Layer
Reflects the way we represent information on a computer which is 0 and 1.
Memory Management
The act of keeping track of how and where programs are loaded in the main memory
process control block (pcb)
The data structure used by the operating system to manage information about a process
Internet Protocol (IP)
The network protocol that deals with the routing of packets through interconnected networks to the final destination
Hardware Layer
The physical components of a computer which control the flow of electricity.
Ray tracing
The technique for adding light and shadows to a 3-D image
Multiprogramming
The technique of keeping multiple programs in main memory at the same time, competing for the CPU
decode a Huffman code, given a coded message and a table of Huffman codes.
To decode the encoded string, follow the zeros and ones to a leaf and return the character there. You are given pointer to the root of the Huffman tree and a binary coded string to decode. You need to print the decoded string. Complete the function decode_huff in the editor below.
the Application Layer
Uses the computer to solve real world problems.
Neural networks
computer systems that mimic processing of the human brain
Game Loop
control for the entire game program
Simulation
development of a model of a complex system and experimenting with the model to observe the results
Round Robin Scheduling
distributes the processing time equitably among already processes
Alan Turing (1912-1954)
father of computer science
API
helps developers with how to write a program through key programming tasks
how many bits it takes to create 256 bit patterns
in most cases, one byte is equal to eight bits and has 28 or 256 possible values
Extensible markup language (XML)
language that allows the user to describe the content of a document
Shortest-process-next (SPN) scheduling
looks at all processes in the ready state and dispatches the one with the smallest service time
Virus
malicious, self-replicating program that embeds itself in other code
Worm
malicious, stand-alone program that often targets network resources
Encryption
process of converting plain-text to cipher-text
First-come First-served (FCFS) scheduling
processes are moved to the CPU in the order in which they arrive
system software
programs that manage a computer system and interact with hardware
Unicode
represents most written languages in the world
Man-in-the-Middle
security attack; network connection is intercepted in an attempt to obtain key data
Expert system
software system based on knowledge of human experts to advise the user on how to proceed with the problem
Game Engine
software system within which games can be created
artificial intelligence (AI)
study of computer systems that attempt to model and apply the intelligence of the human mind
Caesar cipher
substitution cipher that shifts letters a certain amount
Operating System (OS)
system software that manages computer resources and provides an interface for system interaction
Huffman encoding
the algorithm measures the frequency of each data item like each letter, and gives the most frequent items a shorter bit encoding (like the letters "a" and "e"), with least frequent items getting a longer encoding (like letters "q" and "z").
Transportation cipher
the cipher that rearranges the order of existing characters in a message
Transmission Control Protocol (TCP)
the network protocol that breaks messages into packets, reassembles them at the destination and takes care of errors
the top-down design process
the process is characterized by successive layers of refinement. The top-level tasks are listed. At each succeeding level, the tasks from the previous one are further developed.
Page-map table (PMT)
the table used by the operating system to keep track of page/frame relationships
ASCII (American Standard Code for Information Interchange)
uses an 8-bit encoding
Phishing
using a web page to trick users into giving personal information
public key
approach to cryptography in which a user has a public & private key already
spread sheet function
a computation provided by the spreadsheet software that can be incorporated into formulas
Local Area Network (LAN)
a computer network that covers a small area
Domain Name System (DNS)
a distributed system for managing hostname resolution
page
a fixed-size portion of a process that is stored in a memory frame
frame
a fixed-size portion of main memory that holds a process page
Markup language
a language that uses tags to annotate the information in a document
spread sheet
a program that allows the user to organize and analyze data using a grid of cells
Continuous simulation
a simulation that treats time as continuous with expressing change from a set of differential equations reflecting relationships among characteristics
Datebase schema
a specification of the logical structure of data in the database
Search tree
a structure that represents alternatives in adversarial situations
Turing Test
a test for intelligence in a computer, requiring that a human being should be unable to distinguish the machine from another human being by using the replies to questions put to both.
Model
abstraction of a real system by a representation of objects within the system and the rules that govern interactions of objects