Midterm Review Flashcards

1
Q

A programming language uses 4-bit binary sequences to represent nonnegative integers. A programmer attempts to add the decimal values 14 and 15. What will happen?

A

An overflow error will occur, because the largest binary value that can be represented using 4 bits is 1111, which equals 15.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Lossless vs. Lossy compression

A

Lossless - does not lose any data in the compression process
Lossy - uses approximations and partial data, so the file is not restored to its original form after decompression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an advantage of lossless compression over lossy compression

A

Lossless compression can guarantee reconstruction of the original data, while lossy compression cannot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

There are hundreds of digital photos with data representing the level of red, green, and blue for each pixel, as well as metadata that describes the date, time, and location the photo was taken.
For which goals would analyzing the metadata be more appropriate than analyzing the data?
A) Determining the chronological order of the photos
B) Determining the number of clouds in a photo
C) Determining whether a photo is suitable for printing in black-and-white
D) Determining whether two photos were taken at the same location

A

A and D
Because date and time, as well as location, are considered metadata

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Metadata

A

Data that describes data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In ASCII:
What number corresponds with A and Z

A

A: 65
Z: 90

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What letter is represented by 1001010

A

H (74)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What letter is represented by 1001001

A

I (73)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What letter is represented by 1001000

A

H (72)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What letter is represented by 1001011

A

K (75)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Redundancy

A

A system design with multiple paths for traffic, so that data can keep flowing even if one path fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If you upgrade from 32-bits to 64-bits, how many more items can be stored?

A

232 times more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Overflow error

A

Happens when a program receives a value that exceeds the storage capacity, usually in binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Round-off error

A

The difference between an approximation of a number (9.5) and the exact number (9.51235932)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Floating-point representation

A

Allow computers to represent very large or very small numbers using scientific notation. There can be a loss of precision due to the infinite number of real numbers compared to the finite number of bits used to represent them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the next binary number after: 1001 0011

A

1001 0100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Parameter

A

Input to a function that is named

18
Q

Boolean

A

Can have two values, true or false

19
Q

Undecidable problem

A

A problem that it is impossible to construct an algorithm for that always leads to a correct yes-or-no answer

20
Q

Explain what this will do:
PROCEDURE printNums(max)
{
count ← 1
REPEAT UNTIL(count > max)
{
DISPLAY(count)
count ← count + 2
}
}

A

Starts the count at one, and inside the loop, the value of count is displayed, and then it will increase by two. The loop stops when count exceeds max, so all positive integers less than or equal to max will be displayed

21
Q

Return

A

Will immediately end the function and send back whatever information it is meant to return

22
Q

Generalization

A

Identifies commonalties among a set of entities

23
Q

String

A

A sequence of characters
Example: “Hello”

24
Q

List

A

Data type that represents a number of ordered values, usually strings or numbers
Example:
doglist = [“poodle”, “pug”, “pitbull”]

25
Q

AND (Boolean logic)

A

Will only return the results that contain both the keywords

26
Q

OR (Boolean logic)

A

Will return results if either keyword (or both) is included

27
Q

NOT (Boolean logic)

A

Will return results only if the keyword is not included

28
Q

Web server vs. Web browser

A

Web browser is the software that is used for browsing on the internet, and a web server is the software the provides the users documents upon their request

29
Q

Standard protocols

A

Set of rules used by computers to allow them to interact between themselves

30
Q

Proprietary Communication

A

A communication protocol owned by a single organization or individual

31
Q

Open protocol

A

The ones on the internet, they are not owned by any particular company and allow any computing device to join the global network

32
Q

Encryption protocols

A

Encryption done through encryption algorithms

33
Q

How must digital data be sent?

A

By breaking down data into blocks of bits called packets

34
Q

Relationship between the internet and World Wide Web

A

The internet is a network of connected devices, and the World Wide Web is a system of linked pages that is accessed via the internet

35
Q

IPv6 vs IPv4

A

IPv6 allows for more addresses, which allows for more devices to be connected to the Internet

36
Q

How is fault tolerance achieved

A

By providing multiple paths between devices

37
Q

How are IP addresses assigned?

A

As a new device is connected to the Internet, it is assigned an IP address to enable communication on the network

38
Q

Digital Divide

A

Divide between with access to the internet and those without

39
Q

Crowdsourcing

A

The practice of using input or information obtained from a large number of people via the Internet

40
Q

How to reduce bias

A

Test the system with people of different ages, genders, and ethnicities

41
Q

Multifactor authentication

A

A method in which a user is only granted access after presenting several separate pieces of evidence to an authentication mechanism

42
Q

Cloud Computing

A

A form of computing in which networks, data storage applications, security, and development tools are all enabled via the Internet.