Computer Science Flashcards

(36 cards)

1
Q

Network protocol that allow computers to interact wirelessly with the internet

A

Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Sequence of instructions used to complete a computation, or a process or set of rules to be followed in calculations or other problem-solving operations.

A

Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An instruction set that tells a computer how to perform tasks

A

Computer programming language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Component which interprets and executes instructions on a computer

A

Central processing unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Standard language used to create webpages on the World Wide Web

A

HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Practice of mass-sending unwanted messages via email or text

A

Spamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A form of digital decentralized currency, examples of which include Ethereum and Bitcoin.

A

Cryptocurrency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An English mathematician and computer scientist, who named a test that can determine whether a computer can imitate human intelligence. He is also the namesake of a test used to determine whether an Artificial Intelligence can pass as human.

A

Alan Turing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The programming language developed by James Gosling in 1990 at Sun Microsystems.

A

Java

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A system that serves as storage space for data and instructions on a device.

A

Computer memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Type of malware that is capable of self-replicating and spreading to other computer systems.

A

Computer worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An algorithmic problem tasked with finding the shortest route between a set of points and locations that must be visited.

A

Traveling salesman problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A naming convention for different websites on the Internet.

A

URL (also called Uniform Resource Locator, or web address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A unit of memory involved in computing that can be prefaced with kilo-, mega-, giga-, and others depending on their number.

A

Bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This allows users to store their data on off-site locations.

A

Cloud storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What base-2 numeral system of 1s and 0s is used by most modern computers?

17
Q

Sir Tim Berners-Lee and Alan Turing are best known for their pioneering work in what scientific field?

A

Computer science

18
Q

What daughter of the British poet Lord Byron is considered to be one of the first-ever computer programmers due to her work on algorithms?

19
Q

The strong form of this concept is refuted in the Chinese room argument. A test for
this concept evaluating indistinguishability from human conversation is named for Alan Turing. For the point, name this concept that refers to a computer’s ability to think like a human brain.

A

Artificial Intelligence

20
Q

Predecessors of these entities included Wingdings. A set of these entities would later be introduced and constantly added using the Unicode standard, and a face with tears of joy is the most popular one of these entities. For the point, name these pictograms often used in text messages that include a host of facial expressions and objects.

21
Q

The largest unit of this measurement is a yotta, although a bronto has been proposed. This computer component is supported by secondary forms, including cards, external hard drives, and the Cloud. For the point, identify this computer component that comes in Random
Access and Read-Only types.

22
Q

A company that runs one of these software systems named Ecosia claims to be environmentally friendly and plants trees with its profits. Information will no longer be displayed by these programs following de-listing. These programs identify potential matches for queries using web crawling. For the point, name these web programs used to find information on the internet, the most popular of which are Bing and Google.

A

search engine

23
Q

The singularity is a hypothesis that the invention of the super form of this technology will trigger growth that may lead to human extinction. Advances in this technology include the creation of AlphaZero, by DeepMind, that defeated Stockfish in a match of one thousand rounds of chess. Elon Musk frequently warns about the danger of this technology. IBMs Watson is an example of, for the point, what technology of thinking machines?

A

Artificial Intelligence

24
Q

One of these products invented by Alexey Pajitnov is sometimes used to disrupt visual memory. Congressional hearings concerning these objects questioned whether they cause children to engage in violence, and these products are given ratings based on their content by the ESRB. For the point, name these entertainment products produced by companies such as EA and Nintendo.

25
Stephen Kleene [[KLAY-nee]] names a type of this symbol that returns a set of strings closed under concatenation. A forward slash and this symbol are used to delimit block comments in JavaScript and CSS. In languages like C++, this symbol is used to de-reference a pointer variable. This symbol denotes required fields in web forms written in HTML. For the points, name this computer programming symbol that also typically represents multiplication.
Asterix (also accept star)
26
The term for this computing technique was coined by David Michie in 1968. Related to caching [["CASH"-ing]], this technique is often used in compilers (+) for functional programming languages, where a “call by name” strategy is employed. With the goal of "turning a function into something to be remembered," for the points, what is this computing technique that stores the results of function calls to be returned from a cache at a later time, also called tabling?
Memoization
27
To use this method on larger problems, it is often useful to implement a "tail call" to optimize memory use and avoid stack overflows. Common implementations of this concept in programming are calculating factorials, greatest common divisor, binary search, and the Towers of Hanoi problem. For the points, what is this non-iterative method of solving computational problems, where functions call themselves from within their own code.
Recursion
28
One of the first references to this term for a type of computer program was in the first UNIX manual in 1971. This term was popularized by Ken Thompson in his 1983 Turing Award lecture “Reflections on Trusting Trust”. These entities differentiate themselves from a virus by not injecting themselves into other files. For the points, name this type of malware that misleads users of its purpose, whose name derives from an Ancient Greek story of deception.
Trojan
29
In quantum computers, this task can be accomplished by using Grover’s algorithm. This task follows “pruning” in a notable solution to optimization problems. This task can be performed in depth-first or breadth-first ways in graphs, and a common demonstration of divide-and-conquer is the “binary” form of this task. For the point, name this task of finding a certain value in a given input.
Searching
30
A super variant of this entity created by Samy Kankar could track even anonymous TOR users, and their risk is mitigated by the Public Suffix List. Lou Montoulli coined this term to describe entities that can record browsing histories of users and store passwords and usernames on their devices. For the point, name these small blocks of data created by a web server while browsing the web, named after a popular baked snack.
Cookie
31
The malloc function in C and C++ allocates this resource, and Java uses automatic garbage collection to reclaim this resource, which is stored near the main processor in a CPU cache. The non-volatile type of this resource retains data even without a power source. For the point, name this computer resource used to store information that comes in a random access type abbreviated RAM.
Memory
32
These data structures connect all vertices of a graph with minimum edge weights. The red-black variety of this data structure is self-balancing, differentiating it from the binary search variety, and the first node of this structure is known as the root node. With terminal nodes referred to as leaf nodes rather than branches, for the point, what is this type of data structure?
tree
33
Extended use of this technology without rest can lead to a repetitive motion injury commonly known as "gorilla arm." Mobile devices often employ haptics to improve user experience with this technology. Pinches and multi-finger swipes are common gestures used with this technology. For the point, name this technology used to give inputs when using smartphones.
Touch screen
34
BlueMaxima's Flashpoint is a project dedicated to saving these programs made on Adobe Flash. One of the most popular frameworks for making 3D types of these programs is the Unreal Engine owned by Epic, used to make popular examples such as Rocket League and Fortnite. For the point, name these computer entertainment programs, early examples of which include Pong and Pac-Man.
Video Games
35
This language handles input by grouping letters into hboxes which are then put into a vbox with the goal of minimizing badness between lines. Leslie Lamport designed an extension to this language with more user-friendly macros and packages. Donald Knuth designed this language to make beautiful textbooks and has said the X should be pronounced like a Scottish person pronounces "Loch." For the point, name this markup language whose extension shares its spelling with the name for natural raw rubber.
TeX
36
Containers allow for this task to be done on the heap using pointers in a single operation. Bubble sort works by checking two items and performing this task if the larger item is more to the left in the series. The simplest algorithm for performing this task requires moving one of the two values into a temporary address while assigning the other to the previously assigned address. For the point, name this process of switching two items in memory.
swapping