Term
|
Definition
| has all the devices bundled together, labtop |
|
|
Term
|
Definition
| desktop pc's with seperate pieces |
|
|
Term
| what are the two types of monitors |
|
Definition
| CRT's(cathode ray tubes) and LCD(Liquid crystal display) |
|
|
Term
| Display infromation is stored in the computers memory, frame buffers are used. What is this referring to? |
|
Definition
|
|
Term
| what connects the computer t the power source, and are usually labelled by color for easier identification |
|
Definition
|
|
Term
| waht are the primary coor that create all other colors on the screen? |
|
Definition
|
|
Term
| what are the primary printer colors? |
|
Definition
| cyan, magenta, yellow and key/black |
|
|
Term
| Waht is the difference between The way of combining colors on the screeena nd in the printer to get your desired color? |
|
Definition
| when you combine them on th escreen it is called, "additive" meaning you have to add all the colors to get white. The printer is the opposite, which is to say it is "subtractive" |
|
|
Term
|
Definition
| grid of small units, computer draws each pixel inthe designated color, the more pixels the smoother the image looks, bette rthe resolution |
|
|
Term
| Colors of the screen make a believable 3-D button, what is the term that referes to this? |
|
Definition
|
|
Term
| what is the refresh rate of pointer that gives it the illusion of motion? |
|
Definition
|
|
Term
| what is the printed circuit board inside the processor box called? What does it contain? |
|
Definition
| MOtherboard, it contains most of the circuitry for the compter |
|
|
Term
| what are daughter boards? |
|
Definition
| they are the cards that plug into the motherboard for added functionality |
|
|
Term
| What does the event handler do? |
|
Definition
|
|
Term
| Teh CPu and the memory are contained where? |
|
Definition
|
|
Term
| What does the microprocessor/CPU/processor do |
|
Definition
| "smart" part of the system, performs the actual computing, developped the term micro after 1980 |
|
|
Term
|
Definition
| Arithmetic, Logic. It's operations are FETCH, STORE, ADD COMPARE. it acts as a liason between the nard drive and the memory |
|
|
Term
|
Definition
| accelerated graphics port |
|
|
Term
| What does the real time clock chip do? |
|
Definition
| maintain setting that is battery operated |
|
|
Term
|
Definition
| random access memory, volatile, disappears after you shut doen your computer. but items can be retrieved directly, as opposed to sequentially. |
|
|
Term
|
Definition
| random access memory, volatile, disappears after you shut doen your computer. but items can be retrieved directly, as opposed to sequentially. |
|
|
Term
|
Definition
|
|
Term
| high capacity, peripheral storage device, stores programs and data not in use by the computer. what is this and what is it made of? |
|
Definition
| hard disk, made of hard magnetized iron compound, is not volatile but can easily be damaged. information will remain regardless if the PC is on or off. |
|
|
Term
|
Definition
| bit that is added to ensure that the number of bits with a value ina set (byte) is odd or even |
|
|
Term
|
Definition
| basic imput-output system |
|
|
Term
|
Definition
|
|
Term
|
Definition
| domain names private non-profit |
|
|
Term
|
Definition
| architecture and protocols |
|
|
Term
|
Definition
| the ip versio we run on now, we will soon run out and have to switch to ip version 6 |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| how do search engines work? |
|
Definition
| crawler and query process |
|
|
Term
| what does the crawler do? |
|
Definition
| visits sites on the internet and discovers webpages taht are also linked ot it, their index is reviewed and is the database for every search |
|
|
Term
| what does a query process do? |
|
Definition
| look ups imilar useer, submitted keyword in th index and reports back which web page it has found containing those words |
|
|
Term
| what is used to judge a computers likeness to a real human |
|
Definition
|
|
Term
| what re three advance in artificial intelligence in the last half century |
|
Definition
| 1. grammatical structure in natural langugae 2. machine translation of natural language. 3. recognizing semantically meaningful information |
|
|
Term
| what is the doctor program that was meant to mimic a psychotherapist that was made in the 1990's? |
|
Definition
|
|
Term
|
Definition
| program designed to stimulate a paranoid schizophrenic. designed to simulate an intelligent conversation via auditory or textile methods |
|
|
Term
| what is the loebner prize awarded to every year? |
|
Definition
| any chatter bots or anything that passes the turing test |
|
|
Term
| what are the two approaches considered when programming a chess program in the 1970's? |
|
Definition
| Brute force(this was the one they ended up using) and Imitation of chess players thoughts |
|
|
Term
|
Definition
| this is what they created for chess programming, for any given board position, a 'tree' of possible moves is created. the computer also computes anumber that indicats how good of a move it is, a more positive number indicats a better move, a more negative one indicates a bad move. |
|
|
Term
| what is the static evaluation function? |
|
Definition
| uses a formula to assign a number to each position, then judge them based on that. |
|
|
Term
| minimax strategy is what? |
|
Definition
| it is used by backing up the tree to see what position is actual attainable and which is strategically the best move. |
|
|
Term
| what is alpha.beta pruning? |
|
Definition
| it allows us to chop off big chunks of the game tree tos peed up the decision making process. |
|
|
Term
| what is the evaluation function? |
|
Definition
| the intelligent part of the operation is the static evaluation function, very complicated formula that considers a single board position at some level and computes a score foe that board with no look ahead allowed. |
|
|
Term
| small chunks of text stored by the browser on the client, the server is sent the cookies on subsequent visits, the cookies are stored on the consumers hard drive. what are they? |
|
Definition
| cookies, each browser supports about 20 cookie for each website |
|
|
Term
|
Definition
| they usually have a deletion date |
|
|
Term
| what can a cookie bu used for? |
|
Definition
| shopping cart records, personalized web pages, authentication(weak loggin)tracking and product usage. |
|
|
Term
| what are some problems with cookies |
|
Definition
| privacy concerns, third party cookies(third party enters the client-server relationship while the page, loads) advertisers can set up cookies and thae them load whien a perosn clicks a certain website. cookies hijacking, intercepting packets via sniffing, cookie poisoning, changing the value of a cookie |
|
|
Term
| what is a phishing scheme |
|
Definition
| used ot get peoples personal information through false email and webpages aiming at coning the user into entering banking information, credit card numbers, etc... |
|
|
Term
| what is open source software? |
|
Definition
| program that is publicly available. |
|
|
Term
| public domains mean what? |
|
Definition
| the informtion is free for anyone to use at any time. |
|
|
Term
| when copyrighted material is allowed used without permission, what is this called? |
|
Definition
| this called the fair-use concept. |
|
|
Term
| Hardware failures are defined as what? |
|
Definition
| when one aspect of the prgram fails to work, is usually resolved by redundancy, or the 'burn it' technique |
|
|
Term
| how is intellectual property protected over the internet? |
|
Definition
| through the licensing of software. you don't actuall ybuy software you lease it. |
|
|
Term
|
Definition
| it conceals a set of programs that are running, |
|
|
Term
| the goal of software licensing it to what? |
|
Definition
|
|
Term
|
Definition
| digital rights management |
|
|
Term
| what does fail-soft mean? |
|
Definition
| the program continues to operate, providing a possible degraded level of functionality |
|
|
Term
| what does fail-safe mean? |
|
Definition
| the system will stop functioning to avoid causing harm, |
|
|
Term
|
Definition
| a program that infects another by embedding in a copy of itself within the infected program so that when it runs, the virus duplicates and infects other programs. |
|
|
Term
| This an independent program that makes copies of itself form machine to machine, across network connections. |
|
Definition
|
|
Term
| what is a trojan program? |
|
Definition
| it hides within another useful porgram then performs operations, unkowingly operating on the users machine. they can record sensitive data and other malicious software. |
|
|
Term
| what is the bias free universal medium principle? |
|
Definition
| bits can represent all discrete information, but have no inherent principle |
|
|
Term
| what is the bias free universal medium principle? |
|
Definition
| bits can represent all discrete information, but have no inherent principle |
|
|
Term
| In what way are bits the universal medium? |
|
Definition
| everything that can be represented in a sensible way can be manipulated |
|
|
Term
| IN what way are bits bias-free? |
|
Definition
| the meaning of the tis comes entire ly from the interpretation place don them by the program. |
|
|
Term
| Bits are not necessarily binary numbers? |
|
Definition
| they can be interpreted as them , or the can be interepreted as something else. |
|
|
Term
| what are 5 problems with email? |
|
Definition
| 1. conveying emotion 2. emphasis 3. conversational pace 4. ambiguity 5. flame-a-thons |
|
|
Term
| Why are subtle emotions so difficult to convey over email? |
|
Definition
| Medium is too informal, impersonal and casually written. Conversational cues are missing. |
|
|
Term
| email is sent mainly in what base? |
|
Definition
|
|
Term
| how does software limit the ability to hack into password protected accounts? |
|
Definition
| it pputs alimit onthe amount of tries you get to access your account, eliminating the use of a password algorithm |
|
|
Term
| HOw are passwords stored? |
|
Definition
| they are encrypted and stored, this is why a system demonstrator can't explicitly tell you your password. |
|
|
Term
| What is the sequence of formats when converting sound into sounds that can be played from a speaker? |
|
Definition
| microphone--> ADC-->.mp3, /wpa, .wma--> DAC-->speakers |
|
|
Term
| How do we store pictures on the internet in an effort to save space and loading time? |
|
Definition
| pictures digitized at 199 PPI saves a factor of 9 in memory, also using the JPEG compression scheme helps. |
|
|
Term
| What is JPEG used for and how does it's compression scheme work? |
|
Definition
| it is used as the format for storing images. OUr eyes aren't very sensitive to change in hue, only changes in brightness . Hnece we suse a less accurate description of hue and get a 20:1 compression ratio without our eyes being able to tell the difference. |
|
|
Term
| What is the MPEG compression scheme? |
|
Definition
| it is similar to the JPEG compression scheme, using a lessa ccurate description of hue as for birghtness. but MPEG only has to record and transmit the differences between each frame. |
|
|
Term
|
Definition
| time it takes for information to be delivered over the internet. if the latency is too long, it riuns the illusion for motion. |
|
|
Term
| How does latency translate with bandwidth? |
|
Definition
| higher bandwidth= lower latency. |
|
|
Term
| what is the RGB bit assignment for black? |
|
Definition
| 0000 0000(red) 0000 0000(green) 0000 0000(blue) |
|
|
Term
| what is teh RGB bit assignement for White? |
|
Definition
| 1111 1111(red) 1111 1111(green) 1111 1111(blue) |
|
|
Term
| what does it mean if all the bit values are the same for RGB bit assignement? |
|
Definition
| this means that the color is some shade of grey. |
|
|
Term
| How is sound digitized into analog? |
|
Definition
| Using an analog to digital converter. THIS SAMPLES THE SOUND , determines the frequency, and stores it. the sampling rate should be twice that of the waves frequency. |
|
|
Term
| What does compression mean in computer science terms? |
|
Definition
| means to change the representation of to use fewer bits to store the information. |
|
|
Term
| What does run-length encoding do? |
|
Definition
| uses binary numbers to specify how lonf teh the first sequence of 0's is. then how the log the following sequence of 1's is. |
|
|
Term
| Run-length encoding is a from of what compression scheme? |
|
Definition
| lossless cpmression scheme. |
|
|
Term
|
Definition
| technology that allows compters to read printed characters. |
|
|
Term
| What are 4 properties of the Beta sweep Abstraction? |
|
Definition
| 1. exhaustive(no cds are left out) 2. nonredundant(considers each slot only once) 3. Progressive(at any given spot, the alphabetically earliest cd is always in the alpha position.) 4. Goal-AChieving (the earliest (alpghabetically) cd is always int he alpha position at the end of the sweep.) |
|
|
Term
| What are the properties of the Alpha sweep abstraction? |
|
Definition
| 1. exhaustive(it considers all cd's from first to last)2. nonredundant(no slot is assigned to alpha more than once) 3. Progressive )at the end of each beta sweep, the alphabetically earliest cd is in alpha) 4. COmplete. 5. Goal_Achieving(th alpabetically earliest cd is in the first slot at the end of the first beta sweep. |
|
|
Term
|
Definition
| sytematic process that can formulate for a specific situation. a program is an algorithm that has been specifically designed to solve a specific task under a specific set of circumstances. |
|
|
Term
| what is another word fro a transducer? |
|
Definition
|
|
Term
| What is it called when a compter does not have enough bits to represent the correct results of a binary addition? |
|
Definition
| called overflow exceptions |
|
|
Term
| what is the difference between natural language and programming language. |
|
Definition
| natural language would be equivalent to English, while programming language would be relatively equivalent to formal languages used to express algorithms |
|
|
Term
| the context of the program is crucial, why? |
|
Definition
| because the five properties of algorthims, i.e. the algorithm itself will not work if it is not in the proper context. |
|
|
Term
| what are five essential properties of an algorithm? |
|
Definition
| 1. imput specified 2. Output specified 3. Definiteness 4. Effectiveness 5. Finiteness |
|
|
Term
| HOw many bits are there in an ASCII code |
|
Definition
|
|
Term
| what are three very comon types of algorithms? |
|
Definition
| rcognition of a butto click, placeholder technique and hex to bits. |
|
|
Term
| waht three thing do we need to pay attention to to create a precise algorithm? |
|
Definition
| capability( does the computer know what or how to do the operations) language ( ensure the description is unambiguous ) context ( make few assumptions about the input or execution setting) |
|
|
Term
| what is descirptive information called? |
|
Definition
|
|
Term
| how does the NATO broadcast alphabet encode its letter. |
|
Definition
| it encode letters as words. |
|
|
Term
| What does AScII stand for? |
|
Definition
| American Standard Code for Information INterchange, it is a 7 bit code |
|
|
Term
| What is the difference between standard ASCII and extended ASCII? |
|
Definition
ASCII- 7 bit code ASCII extended - 8 bit code |
|
|
Term
| how is memory arranged inside a computer? |
|
Definition
| its arranged in a very long sequence of bits |
|
|
Term
| what is a pandA unit know as ? |
|
Definition
|
|
Term
| what is the collating sequence |
|
Definition
| the ordering sequence usedto place information in order by using symbols. |
|
|
Term
| what are 6 key points of debugging? |
|
Definition
| 1. make sure you can reproduce the error 2. determine exactly what the problem is 3. eliminate the obvious causes 4, divide the process up 5. when you reac |
|
|
Term
| What are 5 characteristics of legitimate sites? |
|
Definition
| 1. physical existance(street address, etc...) 2. Expertise(references citations, credentials, etc...) 3. Clarity( well organised, easy to use, etc...) 4. CUrrency(the site was recently updated) 5. professionalism the sited grammar, punctuation, etc... are correct) |
|
|
Term
| what are 5 tips for an efficient search? |
|
Definition
| 1. be clear about what kind of page your looking for 2. think about hat kind of information you might be looking for 3. list the terms likely to appear on the page 4. asses the results 5. consider a two-pass strategy |
|
|
Term
| what is a search engine defined as? |
|
Definition
| a collection of conputer programs designed ot help us find information on the web using a crawler and query process. |
|
|
Term
| How are websites organized? |
|
Definition
|
|