Overall Questions Pt 2 Flashcards

1
Q

Is there a difference between the binary numbers 11101 and 00011101?

A

The number 11101 is a 5-bit binary number, and the number 00011101 is an 8-bit
binary number. However, both numbers represent the same value. Both binary
numbers correspond to the decimal number 29. In computer science, it is common
to fill a byte with leading zeroes. This is because the smallest unit in memory that
can be accessed is a byte, and the leading bits of a byte have to be set to zero.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between the MDR and the CIR?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a router?

A

A router is a device that forwards data packets from one network to another. It does this by analysing IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a switch?

A

A switch is a network device. It has a connec on for an uplink and mul ple ports for communica on. However, it does do basic filtering on data. Computers send data over a network in data frames with hardware addresses. Some data is sent out with the “broadcast” address; this address means it is for all computers who can receive it. A switch filters these out so they do not get propagated across the en re network (which can cause a flood of data known as a “broadcast storm”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How you can prevent seman cs errors?

A

You can prevent seman cs errors by adding comments to the program code. These are notes to yourself (and other coders) that describe what the code is doing in a certain sec on. It’s especially helpful if you haven’t looked at that sec on of the program for a day or longer, so you know what the code was intended to do instead of trying to figure it out all over again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a hub?

A

A hub is a network device that takes a signal from one cable and splits it out over several cables. If it was spli ng out four signals, it would be called a “four port” hub. A hub does not do any signal processing—everything that comes in is sent out through all of the ports. Communica on is two-way: the ports can also send communica on through the uplink connec on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Ethernet?

A

Ethernet is a set of standards (defined by IEEE 802.3) used for LANs and WANs. The word “Ethernet” is used commonly to refer to parts of a local wired network, such as Ethernet cabling (Cat 5, 5e, 6, 7 and 8), and Ethernet ports, where the cables are connected. The standards of Ethernet include the physical layer, which gives specifica ons for devices and signals, and the data link layer, where it defines how signals are organized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an ethernet cable?

A

Ethernet cable is a type of cable used to connect devices to a computer network. It is the most common type of cabling in use today, and can be found in most homes and offices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the UTP cable categories?

A

UTP cable categories are as follows: - Category 5 up to 100Mbps (Megabits per second) - Category 5e up to 1000Mbps (1Gbps) - Category 6 up to 10Gbps - Category 7 up to 40Gbps - Category 8 25Gbps or 40Gbps These UTP cables appear physically iden cal. You must usually look for a label or prin ng on the wire to see the category if you are not sure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a LAN?

A

LAN = Local Area Network, a network in a home or office. A LAN is a group of computers connected together via a network within a dis nct geographic area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is UTP cable?

A

UTP: This stands for “unshielded twisted pair cable.” The individual wires are twisted together in pairs without extra insula on. UTP cables are used in homes and offices to build up a LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are network devices?

A

Network devices are devices that connect are connected to a network. Important network devices are hubs, switches, routers. A computer itself or an embedded system connected to a network can also be a network device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between wired and wireless networks?

A

Wired and wireless networks are two different types of computer networks. Wired networks use cables to connect devices, while wireless networks use radio waves to connect devices. The advantage of wired is that it is more secure than wireless, but the disadvantage is that it requires a cable connec on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between wired and wireless networks?

A

Wired and wireless networks are two different types of computer networks. Wired networks use cables to connect devices, while wireless networks use radio waves to connect devices. The advantage of wired is that it is more secure than wireless, but the disadvantage is that it requires a cable connec on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a supercomputer?

A

Supercomputer is a computer that is used in scien fic fields to analyze vast amounts of data. For instance, predic ng the weather involves an enormous number of data points; a supercomputer is a good match for these kinds of problems. Scien sts can request me on supercomputers to do research, bringing them the massive power of Earth’s most amazing computers. Supercomputers use parallel processing, where tasks are split up between processors. One such supercomputer is in Germany, the SuperMUC-NG.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a server cluster?

A

A server cluster is a group of iden cal servers that share the workload for a certain task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is parallel processing?

A

Parallel processing is when you take a task and break it down into sub-tasks and assign a separate CPU to complete it. Several CPUs are linked together in parallel to accomplish this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a device driver?

A

A device driver is a piece of so ware that allows the opera ng system to communicate with a hardware device. It is usually wri en by the manufacturer of the hardware. A device driver communicates with the device controller of the connected hardware device to send or receive data or commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an input output system?

A

Input and output system is a system that allows the user to communicate with the computer hardware. Input and output systems are typically used to transfer data from one device to another, or from one loca on to another. The input and output system of a computer is made up of many different devices, including keyboards, mice, monitors, printers, speakers and network cards. These devices all have their own input/output systems that allow them to communicate with the CPU. Every computer needs some kind of input output system in order to receive informa on for processing and an output system to output the results of the processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is an input output system?

A

Input and output system is a system that allows the user to communicate with the computer hardware. Input and output systems are typically used to transfer data from one device to another, or from one loca on to another. The input and output system of a computer is made up of many different devices, including keyboards, mice, monitors, printers, speakers and network cards. These devices all have their own input/output systems that allow them to communicate with the CPU. Every computer needs some kind of input output system in order to receive informa on for processing and an output system to output the results of the processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are input and output devices?

A

Input and Output Devices are the devices that allow a user to communicate with a computer. Input devices include keyboards, mice, and external data sources such as USB drives. Output devices include monitors, printers, speakers, and network cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are input and output devices?

A

Input and Output Devices are the devices that allow a user to communicate with a computer. Input devices include keyboards, mice, and external data sources such as USB drives. Output devices include monitors, printers, speakers, and network cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is input and output?

A

Input and output are the communica on between a computer and its user. Input is the data that a user enters into a computer, while output is the data that a computer sends to its user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is RAM?

A

This stands for Random Access Memory and means that the memory can be read randomly and at any point in the data. RAM is not permanent (short-term memory) but a lot faster than the hard drive in terms of memory accessing speed and reading and wri ng data. Because RAM is more expensive than a hard drive, it has less capacity than a hard drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is a processor?
A processor is a device that performs calcula ons and commands using data stored in memory. It takes that input from memory and creates unique output, the results of the processing. It is the "brain" of a computer.
26
What is a CPU cache?
The CPU cache is a small memory that is placed on the CPU chip itself. It is a memory for data and instruc ons that the processor can access very quickly. This allows to speed up memory access mes. There are different levels of cache: some processors have three levels labelled L3, L2, and L1, each smaller and with a faster access me. This provides a way to avoid memory bo lenecks as the CPU does not always have to make a request of system RAM; a small amount of currently used data is located in the cache.
27
What is computer memory system?
Computer memory system consists of different memories storing data and instruc ons for the processor. A computer memory system o en comprises a longterm (permanent) memory (hard disk) a RAM and the CPU cache(s).
28
What is computer memory system?
Computer memory system consists of different memories storing data and instruc ons for the processor. A computer memory system o en comprises a longterm (permanent) memory (hard disk) a RAM and the CPU cache(s).
29
What is memory?
Memory is a computer storage space that holds data and instruc ons for the CPU to access.
30
What is memory addressing?
Each byte of memory has a unique binary address. You could think of them each as li le mailboxes, storing a different binary number and also having a binary address. That means that the number of bits used for addressing will iden fy the number of bytes available. For instance, the Commodore 64 had 64K of addressable memory. This was accomplished by using 16-bit addressing. The total number of bytes that can be addressed with a 16-bit address is 65,536 bytes. This was considered 64K (At the me, a kilobyte was referred to as both 1,024 (2 to the power of 10) and 1,000 bytes). Each 16-bit address points to a mailbox (memory loca on) that contains exactly one byte (inside the box).
31
What is a data bus?
A data bus in general is a connec on that is used for data transfer between different components of a computer. A data bus is a data path that connects the CPU to memory and I/O devices. It is a collec on of wires that carry data from one device to another.
32
What are von Neumann registers?
There are five registers specific to the Von Neumann design. These are as follows: 1. Program Counter (PC) contains the memory address of the next instruc on to read from memory.2. Memory Address Register (MAR) contains the address of the current instruc on in memory, or the next data transfer address.3. Memory Data Register (MDR) contains the contents of the memory address that the MAR is poin ng to and contains data to be transferred.4. Accumulator (AC) this contains data that have been processed or are about to be processed, including arithme c or logic results.5. Current Instruc on register (CIR) contains the current binary instruc on that is being executed.
33
What are von Neumann registers?
There are five registers specific to the Von Neumann design. These are as follows: 1. Program Counter (PC) contains the memory address of the next instruc on to read from memory.2. Memory Address Register (MAR) contains the address of the current instruc on in memory, or the next data transfer address.3. Memory Data Register (MDR) contains the contents of the memory address that the MAR is poin ng to and contains data to be transferred.4. Accumulator (AC) this contains data that have been processed or are about to be processed, including arithme c or logic results.5. Current Instruc on register (CIR) contains the current binary instruc on that is being executed.
34
What is von neumann architecture?
The von Neumann architecture is a reference model for the architecture of a computer. It consists of - a CPU, - a memory that holds both computer program instruc ons and data, - an input system, - an output system. The CPU consist of an ALU, a control unit and registers, which contain a fixed number of bits. These registers can contain data or instruc ons that have been read from memory. Besides the processor and memory, there also should be some type of input (entering data) and output system (outpu ng data) to be able to communicate with other devices or a human being.
35
What is a Central Processing Unit (CPU)?
The Central Processing Unit (CPU) is o en referred to as the “brain” of the computer. It does all the processing, which includes doing calcula ons and sending instruc ons to other hardware. It is a square computer chip which is inserted into a motherboard—this is a circuit board designed for computer components to connect to and communicate through. The CPU is o en referred to as the processor, which refers to its ability to process data.
36
What is the meaning of data messaging?
The process of sending data over a network is called data messaging.
37
How does data messaging work?
Data messaging works by breaking down the data to be send over the network into chunks, or segments, that are sent out separately.
38
What is a message?
A message is a piece of informa on that is sent from one person to another. It can be verbal or wri en, and it can be in the form of a le er, an email, or even a text message. Computers send binary messages to each other through networking.
39
What is a message?
A message is a piece of informa on that is sent from one person to another. It can be verbal or wri en, and it can be in the form of a le er, an email, or even a text message. Computers send binary messages to each other through networking.
40
What is data?
Data consists of raw numbers and symbols that can be arranged into meaningful informa on, which is then used for specific research or analysis purposes. To a computer, data are numerical and the basic data storage system is the binary numbering system.
41
What is the meaning of a correct algorithm?
The correctness of an algorithm is an important requirement for algorithm development. Any algorithm that is used must be mathema cally correct. An algorithm is totally correct if it receives valid input, terminates, and always returns the correct output. We can prove this by formal reasoning or mathema cally, for instance, with a proof by induc on.
42
What is algorithm accuracy?
The accuracy of an algorithm is the degree to which it approaches the op mal solu on. The more accurate an algorithm, the closer it gets to the op mal solu on. Some algorithms are required to give the op mal solu on. For instance, if we are sor ng data, the algorithm cannot stop un l everything is sorted with 100 percent accuracy. If we are searching for a specific data point, it must be found. However, if we are tryingto find a good solu on to a complex mathema cal problem, a standard of “good enough” is applied by the programmer to the situa on.
43
What is quicksort?
Quicksort is a sor ng algorithm. Quicksort is regarded as one of the most efficient algorithms overall. Imagine a teacher with a stack of graded papers. The teacher wants to sort all of the papers by grade. The pile is split into all the grades higher than 55 (this number is the pivot and can be chosen by different methods) and those less than 55. Then the two piles are split around another pivot bringing the total number of piles to four. The teacher then sorts each pile separately and when they are done, can simply put all the piles back together in order from lowest pile to highest. It can be thought of as a “divide and conquer” type of method. In this example, the stack was split into four piles but, in reality, the data determines how many stacks it is split into for sor ng.
44
What is quicksort?
Quicksort is a sor ng algorithm. Quicksort is regarded as one of the most efficient algorithms overall. Imagine a teacher with a stack of graded papers. The teacher wants to sort all of the papers by grade. The pile is split into all the grades higher than 55 (this number is the pivot and can be chosen by different methods) and those less than 55. Then the two piles are split around another pivot bringing the total number of piles to four. The teacher then sorts each pile separately and when they are done, can simply put all the piles back together in order from lowest pile to highest. It can be thought of as a “divide and conquer” type of method. In this example, the stack was split into four piles but, in reality, the data determines how many stacks it is split into for sor ng.
45
What is binary inser on sort?
Binary inser on sort is a sor ng algorithm that uses the same method we used for a binary search—by spli ng the data in half repeatedly. To sort the data, it builds a new output list and takes items from the input list. The input list are items yet to be sorted, and the output are the ones already sorted. For inser ng an element from the input list in the output list the data in the output list is spli ed in half repeatedly un l the correct posi on of the new element is found.
46
What is bubble sort?
Bubble sort is a sor ng algorithm that works by comparing two elements at a me and swapping them if they are out of order. It is one of the simplest sor ng algorithms, but it is also one of the slowest.
47
What is a binary search?
Binary search is a search algorithm that searches for data in a sorted list. It works by dividing the list into two halves, and then repea ng this process on each of the halves un l it reaches the desired data. The algorithm can be used to find an element in a sorted array, or to find an element's posi on if it is known to be in the array.
48
What is jump search?
Jump search is a search algorithm that uses a jump size to find the target element in an ordered list. The jump size is the number of elements that are skipped over between each comparison. Let’s say the book is 2,500 pages long. We calculate the square root of n, the number of pages, which gives us 50, which we will use for the jump size, or m. Ken will first jump to page 50 and see if Josh is higher or lower, then keep jumping un l he is past Josh. Then, he will go back to the previous jump and do a linear search (page by page) on the next 50 pages to find him.
49
What is linear search?
Linear search is a searching algorithm that starts at the beginning and looks at each element in order.
50
What is linear search?
Linear search is a searching algorithm that starts at the beginning and looks at each element in order.
51
What is a mul dimensional array?
A mul -dimensional array is an array that contains one or more arrays as its elements, where each element is also an array. In other words, it is an array of arrays. A two-dimensional array is the most common form of a mul -dimensional array, and it is o en used to represent a matrix or a table. A two-dimensional array is like a grid of rows and columns, where each element is iden fied by its row and column index.
52
What is an array?
An array holds a fixed number of values of the same data type. Each value in the array can be accessed by its index, which represents its posi on in the array.
53
What is a linked list?
A linked list is a sequen al data storage structure. Each element is linked to the next. In other words, an element in the data structure linked list contains two pieces of informa on, the data and the link. The last element in the linked list structure does not have a pointer to the next value, instead it points to null, which indicates that there are no more elements. Null is o en used to end a series of data. The link in each list is a pointer, which is a memory loca on. It iden fies the part of memory that contains the next element.
54
What is a stack?
A stack is a data structure that works under a specific philosophy: Last In, First Out. This is o en abbreviated as LIFO. Imagine you are inpu ng data into a computer program—in this case, we will say it is a card game simulator. It will use a standard deck of 52 cards, and they will be randomized and placed into the stack. Just like in real life, when you are playing cards, you can only draw the card from the top of the deck. That is the last card that was placed on top, so it is the last in, but the first out. Once the game is started, the order cannot be changed, the next card in play is always the one on top of your deck—or in our simula on, your stack. A stack in computer programming allows for two basic opera ons: push and pop. Pop will take the top piece of data from the stack, which removes it. Push will add a new item to the top (and only the top) of the stack.
55
What is a stack?
A stack is a data structure that works under a specific philosophy: Last In, First Out. This is o en abbreviated as LIFO. Imagine you are inpu ng data into a computer program—in this case, we will say it is a card game simulator. It will use a standard deck of 52 cards, and they will be randomized and placed into the stack. Just like in real life, when you are playing cards, you can only draw the card from the top of the deck. That is the last card that was placed on top, so it is the last in, but the first out. Once the game is started, the order cannot be changed, the next card in play is always the one on top of your deck—or in our simula on, your stack. A stack in computer programming allows for two basic opera ons: push and pop. Pop will take the top piece of data from the stack, which removes it. Push will add a new item to the top (and only the top) of the stack.
56
What is a flowchart?
Flowcharts (Flow Diagrams): To translate human instruc ons into computer instruc ons, coders have used flowcharts for many years. These charts make it easy to observe the structure of an algorithm and create it with a programming language. They use standard symbols to indicate different types of instruc ons. A terminator symbol (oval or rectangle) is used at the beginning of a flowchart and at all the endings. They represent the external nodes of flowcharts. A rectangle represents a process, for instance, some type of data calcula on or filtering. The diamond is a decision—a decision has mul ple pathways that can be taken. A parallelogram in a flow chart represents input or output, where data are sent into or out of the process. Finally, the arrows represent the flow from beginning to end of the sequence.
57
What is the rela on between algorithms and flowcharts?
An algorithm is a set of well-defined instruc ons or rules for solving a par cular problem or performing a par cular task. It is a step-by-step procedure that can be followed to perform a computa on, solve a problem, or automate a task. An algorithm can be represented in many forms. On possibility is to use a flowchart to visualize the steps of an algorithm.
58
What is a driver?
A driver is a piece of so ware that allows the opera ng system to communicate with hardware devices.
59
What are the parts of an URL?
A URL is composed of several components. The first part is the protocol (HTTP or HTTPS). The second part is the computer name (e.g. www). The third part is the domain name. The fourth part is the folder loca on, and the fi h part is the file name.
60
What are the parts of an URL?
A URL is composed of several components. The first part is the protocol (HTTP or HTTPS). The second part is the computer name (e.g. www). The third part is the domain name. The fourth part is the folder loca on, and the fi h part is the file name.
61
What is Cyclic Redundancy Check?
Cyclic Redundancy Check, or CRC is a type of error-detec on in network communica on. It works with a similar principle to the checksum. A block of data is processed through a mathema cal algorithm and a result is appended to the data. A er the data is sent, a calcula on is repeated to check the integrity. The CRC can be applied to any length of binary data and will always return a code of the exact same length. This makes CRC a “hashing” algorithm, one that returns a value of consistent length in digits.
62
How does quicksort work?
Quicksort is a divide and conquer algorithm. It works by first choosing a pivot element, then par oning the list into two parts: all elements that are less than the pivot element, and all elements that are greater than or equal to the pivot element. The algorithm recursively calls itself on each of these two sub-lists.
63
What is parity?
Parity is a method of error-checking for binary data. It is used in telecommunica ons, and was used in the past to check for errors in telegraphs. It works by adding an extra bit to a group of data bits, and then checking that the total number of ones (including the extra bit) is odd or even. If it does not match, then it assumes there was an error and requests retransmission.
64
What is transmission data fault tolerance?
Transmission data fault tolerance is the ability of a network to detect and recover from errors that occur during the transmission of data. Error detec on techniques such as checksums, CRC or parity bits can be used to detect errors in the transmi ed data.
65
What is transmission data fault tolerance?
Transmission data fault tolerance is the ability of a network to detect and recover from errors that occur during the transmission of data. Error detec on techniques such as checksums, CRC or parity bits can be used to detect errors in the transmi ed data.
66
What is a checksum?
A checksum is a small fixed-length value that is computed from a block of data in order to detect errors that may occur during transmission or storage. It is used to verify the integrity of data and ensure that it has not been corrupted or modified in transit. The checksum is generated by performing a mathema cal calcula on on the data, typically using a hashing algorithm. The checksum is appended to the data itself, a er transmission the receiver performs the same calcula on on the received data and compares the computed checksum with the one that was transmi ed. If the checksums match, it is assumed that the data has been transmi ed correctly, and no errors have occurred. If the checksums do not match, then an error is detected, and the data must be retransmi ed.
67
What is storage error checking?
Storage error checking is a method to detect corrupted files in storage. It is done by storing an exact copy somewhere and then comparing it. But because some files are megabytes, or even gigabytes, in size, this would be very inefficient. Instead, since the file is one large binary number, it is placed into an algorithm. This algorithm is like a mathema cal func on—it has a numeric solu on. The checksum is the solu on to this problem; it is calculated and appended to the file when it is saved. The checksum can be calculated again when the file is opened. If the calculated checksum is different from the checksum appended to the file, the file has been corrupted.
68
What is storage error checking?
Storage error checking is a method to detect corrupted files in storage. It is done by storing an exact copy somewhere and then comparing it. But because some files are megabytes, or even gigabytes, in size, this would be very inefficient. Instead, since the file is one large binary number, it is placed into an algorithm. This algorithm is like a mathema cal func on—it has a numeric solu on. The checksum is the solu on to this problem; it is calculated and appended to the file when it is saved. The checksum can be calculated again when the file is opened. If the calculated checksum is different from the checksum appended to the file, the file has been corrupted.
69
What are non numeric data types?
Non numeric data types are data types that are used to represent non numeric or non-mathema cal values, such as text, characters, dates, mes, Boolean values, and other data that cannot be expressed as a number. Examples: String (sequence of characters that represents text), character (a single alphabe c or symbolic character, such as a le er, digit, punctua on mark, or other symbol), date and me (used to represent dates, mes, or both), ...
70
What are non numeric data types?
Non numeric data types are data types that are used to represent non numeric or non-mathema cal values, such as text, characters, dates, mes, Boolean values, and other data that cannot be expressed as a number. Examples: String (sequence of characters that represents text), character (a single alphabe c or symbolic character, such as a le er, digit, punctua on mark, or other symbol), date and me (used to represent dates, mes, or both), ...
71
What are numerical data types?
Numerical data types are used to represent numerical or mathema cal values, such as integers, floa ng-point numbers, and decimal numbers. The following numerical data types are used in the programming language Java: - byte: integer from -128 to 127 (8 bits) - int: integer from -2,147,483,648 to 2,147,483,647 (32 bits) - float (smallest value): 1.4E-45 to 1.4E-45 to 3.4E38 (32 bits), float (largest value): 3.4028235E38 (32 bits) - double (smallest value): 4.9E-324 to 49E-324 to 1.7E308 (64 bits), double(largest value): 1.7976931348623157E308(64bits)
72
What is float?
Float is a data type that can store numbers with decimal points.The reason a decimal is called a “float” is because the decimal point can float around to different places in the number. This is an important dis nc on for a computer: where is the decimal? That must be stored somewhere in the variable itself. It is something a human would take for granted, but something that has to be specified for a computer. Example: float var = 2.234f; is the Syntax to define a float variable in Java and assign the value 2.234 to this variable.
73
What is a variable?
In programming, the coder creates variables to store individual units of data. A variable is a container for informa on. It has three important defining factors: a name, a type, and a memory loca on. The name is what it will be referred to in code, just as if you wrote a label on a box. The memory loca on is where the computer can find this box in RAM. The type describe for example how many bytes in memory are used to store the value of the variable and what is the meaning of the individual bits and bytes.
74
What is a data type?
A data type determines the kind of data that can be stored in a variable, such as integers, floa ng-point numbers, strings, and boolean values. A data type defines the range of values that a variable can take, the amount of memory that must be reserved for a variable, and the meaning (encoding) of the individual bits and bytes.
75
What is a data type?
A data type determines the kind of data that can be stored in a variable, such as integers, floa ng-point numbers, strings, and boolean values. A data type defines the range of values that a variable can take, the amount of memory that must be reserved for a variable, and the meaning (encoding) of the individual bits and bytes.
76
What is data contextualiza on?
All informa on is stored in binary format in computers. If you want to store alphabe cal le ers, you can represent each le er with a specific number. To convert the stored binary numbers back into le ers, you need addi onal contextual informa on, such as the code that was used for conversion. Examples of such codes include ASCII or Unicode.
77
What is the meaning of "Everything on a computer is binary"?
A computer can only store the values 1 and 0. Therefore, all informa on must be converted into the binary numbering system. When informa on is read from memory and outpu ed to the user, it has to be converted back. For example, the le er 'A' is converted to the binary value 01000001. When this binary value is read from memory, it has to be converted back into the le er 'A'.
78
What is hexadecimal?
Hexadecimal is a base-16 numbering system used in compu ng and digital communica ons. In contrast to the familiar base-10 decimal numbering system, which uses 10 digits (0-9), the hexadecimal system uses 16 digits: 0-9 and A-F. The le ers A through F are used to represent the numbers 10 through 15, respec vely. One digit of hexadecimal (or “hex”) can represent four digits of binary. In computer applica ons, hexadecimal numbers are usually wri en in groups of two, since two digits represent eight digits in binary (a byte). You will o en see a leading zero before a hex number to represent this. Hex is o en used to view raw data in a file; it is a sort of shorthand for binary. Hexadecimal is used as a go-between for humans since: a) it has an exact 1:4 ra o of digits with binary, and b) it has more symbols, so it is easier for humans to read. Displaying data in hex takes four mes less space than in binary.
79
What is hexadecimal?
Hexadecimal is a base-16 numbering system used in compu ng and digital communica ons. In contrast to the familiar base-10 decimal numbering system, which uses 10 digits (0-9), the hexadecimal system uses 16 digits: 0-9 and A-F. The le ers A through F are used to represent the numbers 10 through 15, respec vely. One digit of hexadecimal (or “hex”) can represent four digits of binary. In computer applica ons, hexadecimal numbers are usually wri en in groups of two, since two digits represent eight digits in binary (a byte). You will o en see a leading zero before a hex number to represent this. Hex is o en used to view raw data in a file; it is a sort of shorthand for binary. Hexadecimal is used as a go-between for humans since: a) it has an exact 1:4 ra o of digits with binary, and b) it has more symbols, so it is easier for humans to read. Displaying data in hex takes four mes less space than in binary.
80
How can we convert an octal number into a binary number?
Octal is a base-8 numbering system (with values from 0 through 7) and binary is a base-2 numbering system (with values of 0 and 1). Each digit's place value in octal is a mul ple of 8, which is a power of 2, so the conversion between these two numbering systems is straigh orward. Specifically, one digit of octal can represent exactly three digits in binary. For example, if you have an octal number like 730524, you know that each digit represents three digits in binary. 7 is equivalent to 111 in binary, 3 is equivalent to 011 in binary, and so on. Therefore, the octal number 730524 is equivalent to 111011000101010100 in binary. If you're unsure about the correctness of your conversion between numbering systems, you can use a webpage like the following to check: h ps://www.rapidtables.com/convert/number/binaryto-octal.html.
81
What is data storage?
RAM (Random Access Memory) and hard drives are data storage devices. In RAM, data is stored temporarily while a computer is running. A hard drive stores data permanently and can therefore be used to preserve data even a er the computer is turned off.
82
What are data measures of bytes?
Data measures of bytes are units used to express the amount of digital informa on. The most common units used for data measures of bytes, listed from smallest to largest: - Bit (abbrevia on: b) - a single binary digit that can hold a value of either 0 or 1. - Byte (B) - a group of eight bits. A single byte can represent a character of text or a small amount of data. - Kilobyte (KB) - 1,000 Bytes. Used to measure small amounts of data, such as text documents or small images. - Megabyte (MB) - 1,000 Kilobytes. Used to measure larger files, such as high-resolu on images or short videos. - Gigabyte (GB) - 1,000 Megabytes. Used to measure even larger files, such as movies or large so ware programs. - Terabyte (TB) - 1,000 Gigabytes. Used to measure very large amounts of data, such as complex databases or en re
83
collec ons of high-resolu on videos. - Petabyte (PB) - 1,000 Terabytes. All photos on Facebook. The larger unit is always 1,000 mes the previous.
84
collec ons of high-resolu on videos. - Petabyte (PB) - 1,000 Terabytes. All photos on Facebook. The larger unit is always 1,000 mes the previous.
85
How can we convert a binary number into a decimal number?
Assign place values to each digit of the binary number, star ng from the rightmost digit and working le ward. The rightmost digit has a place value of 1, the next digit to the le has a place value of 2, then 4, 8, 16, and so on, with each place value doubling. 8 | 4 | 2 | 1 (place value) 1 | 0 | 0 | 1 (binary number 1011) Mul ply each digit of the binary number by its corresponding place value and add the results: 1*8+0*4+0*2+1*1 = 8+0+0+1 = 9 Therefore the binary number 1001 is 9 in decimal.
86
How can we convert a binary number into a decimal number?
Assign place values to each digit of the binary number, star ng from the rightmost digit and working le ward. The rightmost digit has a place value of 1, the next digit to the le has a place value of 2, then 4, 8, 16, and so on, with each place value doubling. 8 | 4 | 2 | 1 (place value) 1 | 0 | 0 | 1 (binary number 1011) Mul ply each digit of the binary number by its corresponding place value and add the results: 1*8+0*4+0*2+1*1 = 8+0+0+1 = 9 Therefore the binary number 1001 is 9 in decimal.
87
What is the binary numbering system?
The binary numbering system is a base-2 numbering system that uses two symbols, 0 and 1, to represent all possible numbers. Computers use the binary numbering system because early computers used switches that could be turned on or off, giving two possibili es, as in the binary numbering system.
88
What is the decimal numbering system?
Human beings have ten fingers. It is a common reason given for why we use a base 10 numbering system: decimal. Decimal uses ten symbols, 0 through 9, to represent all possible numbers. In the decimal numbering system, each digit's value is based on its posi on rela ve to the decimal point. For example, the number "123" in decimal nota on represents 1 x 10^2 + 2 x 10^1 + 3 x 10^0, or 100 + 20 + 3, which equals 123.
89
What are the eras of compu ng?
To look at the history of modern compu ng machines, we will break it down into four eras: - Behemoths: Huge machines used mostly by governments. 1940s - 1960s. - Business: Computers that are used by individuals in business. 1960s - 1980s. - Graphical: The dawn of the Graphical User Interface and digital imagery. 1980s - 2000s. - Portable: Miniaturiza on of computers; laptops, tablets, smartphones. 2000s - today.
90
What are the eras of compu ng?
To look at the history of modern compu ng machines, we will break it down into four eras: - Behemoths: Huge machines used mostly by governments. 1940s - 1960s. - Business: Computers that are used by individuals in business. 1960s - 1980s. - Graphical: The dawn of the Graphical User Interface and digital imagery. 1980s - 2000s. - Portable: Miniaturiza on of computers; laptops, tablets, smartphones. 2000s - today. - Business: Computers that are used by individuals in business. 1960s - 1980s. - Graphical: The dawn of the Graphical User Interface and digital imagery. 1980s - 2000s. - Portable: Miniaturiza on of computers; laptops, tablets, smartphones. 2000s - today.
91
What are the eras of compu ng?
To look at the history of modern compu ng machines, we will break it down into four eras: - Behemoths: Huge machines used mostly by governments. 1940s - 1960s. - Business: Computers that are used by individuals in business. 1960s - 1980s. - Graphical: The dawn of the Graphical User Interface and digital imagery. 1980s - 2000s. - Portable: Miniaturiza on of computers; laptops, tablets, smartphones. 2000s - today. - Business: Computers that are used by individuals in business. 1960s - 1980s. - Graphical: The dawn of the Graphical User Interface and digital imagery. 1980s - 2000s. - Portable: Miniaturiza on of computers; laptops, tablets, smartphones. 2000s - today.
92
What is a behemoth?
A behemoth is an enormous computer that were built with vacuum tubes and wires and took up en re rooms. The input was usually entered by flipping switches and turning dials. The output was o en given via lights or punched holes on paper. They were basically number-crunching machines that were used to perform large mathema cal computa ons, or to work with large amounts of numerical data. The U.S. Census Bureau purchased one of these huge computers, the UNIVAC, in 1951 to help with coun ng the popula on of the United States. The ENIAC (Electronic Numerical Integrator and Computer), the first general-purpose computer, which began opera on in 1946 and was programmed by a team of six female operators, should also be men oned in this context.
93
Can you tell me something about the first computers?
There’s no machine that we can point to and say “here is the first computer.” It was more of an evolu on of advanced machines into something that eventually resembles the computers we have today. In 1801, Joseph Maria Jacquard invented a loom that used punch cards made of wood to create fabric designs automa cally. Technically, this was programming—a pre-made set of instruc ons changed into a “machine language” that tells a machine what to do. However, this machine wasn’t doing any compu ng, simply weaving cloth. Later, during World War II, machines were used to encode secret messages. These machines used gears that would align with symbols to create a coded text from regular or “plaintext” messages. Breaking those codes required actual compu ng power. The Turing machine was able to take in encrypted messages, process them, and output an answer. However, his machine had no keyboard or monitor, let alone a mouse.
94
What is a language?
We can dis nguish between natural languages and programming languages. A natural language is used for communica on between humans, while a programming language is used for communica on between humans and machines. With a programming language, an algorithm can be described in such a way that a computer is able to execute the program/algorithm.
95
What is a language?
We can dis nguish between natural languages and programming languages. A natural language is used for communica on between humans, while a programming language is used for communica on between humans and machines. With a programming language, an algorithm can be described in such a way that a computer is able to execute the program/algorithm.
96
What is syntax?
Syntax is the set of rules that govern how a language is used. In programming, syntax refers to the correct usage and ordering of words and symbols in a program. If they are not in the correct order, the program will not work. Just like the words in an English sentence, programming instruc ons only make sense in the correct order; otherwise, it is just a jumble. If you took the words of this sentence and put them in a random order, it would ignore proper syntax and make li le sense. Syntax also includes rules for when certain symbols can be used, similar to English rules for where punctua on can go in a sentence.
97
What is an applica on?
An applica on (app) is a computer program that performs a specific task. For example, Microso Word is an applica on that allows users to create and edit documents. Applica ons are usually designed for a specific purpose, such as word processing or playing games.
98
What is an opera ng system?
An opera ng system (OS) is the first so ware loaded into the RAM during the boot process. An OS is essen al for a computer to func on (assuming a standard personal computer). Examples include Windows, Linux, and MacOS. This so ware provides three fundamental func ons for the computer: 1. Provide an interface 2. Control hardware 3. Run applica ons. An interface is required so a human being can interact with a computer. The hardware in a computer system would sit, dormant, without the OS to give it instruc ons. Applica ons need an opera ng system to run. They are a second layer of func onality.
99
What is so ware?
So ware is a set of instruc ons that tell a computer what to do. It takes the form of either an opera ng system or an applica on. The OS provides basic func onality including an interface, while applica ons (apps) are available to perform specific tasks such as word processing, games, or even controlling robots.
100
What is so ware?
So ware is a set of instruc ons that tell a computer what to do. It takes the form of either an opera ng system or an applica on. The OS provides basic func onality including an interface, while applica ons (apps) are available to perform specific tasks such as word processing, games, or even controlling robots.
101
What does an opera ng system provide to interact with the user?
An opera ng system provides an interface to interact with the user. Nowadays an opera ng system typically provides a graphical user interface (GUI): This interface uses graphical elements such as icons, menus, and windows to allow users to interact with the system. Another interface would be a touch interface (users can interact with the system by using their fingers) or a speech interface.
102
What are differences between the opera ng systems Mac and Windows?
Two of the differences are: Mac OS is designed to run exclusively on Apple hardware, while Windows can run on a variety of different hardware pla orms. Mac OS uses APFS as file system and Windows uses NTFS as file system.
103
Does an array take more space than a stack?
Typically, an array does not take up more space in memory than a stack. A stack can be implemented internally as an array or a linked list. If you want to store 100 elements in an array, and the array size is exactly 100, then a stack that is implemented with a linked list requires more space because every element is linked to the other elements using an addi onal pointer. However, if you have 100 elements, and the array size is 200, for example, then a stack (internally implemented with a linked list) may require less space.
104
Where is a linked list used?
A linked list is a flexible data structure. Each element in a linked list is linked via a pointer to the next element. A linked list hasn't got a fixed size and elements can be inserted easily in the middle of the list. For example, if you were tracking the number of people who have visited your website over me, you could use a linked list to store each visitor's IP address and mestamp.
105
Where is a linked list used?
A linked list is a flexible data structure. Each element in a linked list is linked via a pointer to the next element. A linked list hasn't got a fixed size and elements can be inserted easily in the middle of the list. For example, if you were tracking the number of people who have visited your website over me, you could use a linked list to store each visitor's IP address and mestamp.
106
What is the difference between float and double?
Float and double are data types that can store numbers with decimal points. Double is a data type that can store numbers with more precision than float. Double is a 64bit floa ng point number, while float is a 32-bit floa ng point number. The double data type can store numbers with more precision than the float data type. Smallest value of a 32 bit float is -3.4028235E38, largest value of a 32 bit float is
107
3.4028235E38, smallest value of a 64 bit double is -1.7976931348623157E308, largest value of a 64 bit double is 1.7976931348623157E308.
108
What is a DDOS?
A Distributed Denial of Service (DDoS) a ack is a cyber-a ack where mul ple systems send so many simultaneous requests for data that the server cannot answer them all and either stops working or becomes so slow that it is mostly unusable.
109
What is ASCII?
This is a binary code scheme where le ers, numbers, and symbols are represented by exactly one byte of data. ASCII stands for American Standard Code for
110
Informa on Interchange. In this code the le er A is represented as 01000001.
111
Describe the network topologies ring and mesh.
A ring network consists of computers connected together in a ring, where the signal passes around it. In this design, each computer is required to look at any data passed to it to see if it is required to pass it along. This design is not fault-tolerant and stops working if the ring is disconnected. That is why it has fallen out of use today. A mesh network connects every node (computer or device) to every other node. For each device that is connected, more cabling is required, which is extremely inefficient. However, it has the advantage of being fault-tolerant since there are mul ple paths to each node. Mesh networks are becoming interes ng in wireless networks since there is no need for cabling, and the benefit of fault tolerance is significant.
112
Describe the network topologies ring and mesh.
A ring network consists of computers connected together in a ring, where the signal passes around it. In this design, each computer is required to look at any data passed to it to see if it is required to pass it along. This design is not fault-tolerant and stops working if the ring is disconnected. That is why it has fallen out of use today. A mesh network connects every node (computer or device) to every other node. For each device that is connected, more cabling is required, which is extremely inefficient. However, it has the advantage of being fault-tolerant since there are mul ple paths to each node. Mesh networks are becoming interes ng in wireless networks since there is no need for cabling, and the benefit of fault tolerance is significant.
113
What is binary search?
Binary search is a search algorithm that searches for data in a sorted list. It works by dividing the list into two halves repeatedly. If the value you are searching for is lower than the value in the middle of the list, you go on searching in the le part of the list (dividing into two halves ...). If the value you are searching for is higher than the value in the middle of the list, you go on searching in the right part of the list (dividing into two halves ...).
114
What is a hub?
A hub is a device that takes a signal from one cable and splits it out over several cables. If it was spli ng out four signals, it would be called a “four port” hub. A hub does not do any signal processing—everything that comes in is sent out through all of the ports. Communica on is two-way: the ports can also send communica on through the uplink connec on.
115
Would the linked list work to order elements?
Yes, the linked list would work to order elements.
116
What is the difference between BIOS and Opera ng systems
The BIOS is a chip that contains instruc ons for the computer to start up. The opera ng system is so ware that runs on top of the BIOS and provides an interface for applica ons to run.
117
How can an octal number be converted into an decimal number?
The octal numbering system is a base-8 numbering system. It uses the digits 0 through 7. Each digit's place value is a mul ple of 8. Assign place values to each digit of the octal number, star ng from the rightmost digit and working le ward. The rightmost digit has a place value of 1 (8⁰), the next digit to the le has a place value of 8 (8¹), then 64 (8² = 8*8), 512 (8³ = 8*8*8), and so on. For example, the octal number 1702 in decimal nota on represents (1 × 8³) + (7 × 8²) + (0 × 8¹) + (2 × 8⁰), or (1*512) + (7*64) + (0*8) + (2*1), which equals 962. If you're unsure about the correctness of your conversion between numbering systems, you can use a webpage like the following to check: h ps://www.rapidtables.com/convert/number/octal-todecimal.html.
118
How can an octal number be converted into an decimal number?
The octal numbering system is a base-8 numbering system. It uses the digits 0 through 7. Each digit's place value is a mul ple of 8. Assign place values to each digit of the octal number, star ng from the rightmost digit and working le ward. The rightmost digit has a place value of 1 (8⁰), the next digit to the le has a place value of 8 (8¹), then 64 (8² = 8*8), 512 (8³ = 8*8*8), and so on. For example, the octal number 1702 in decimal nota on represents (1 × 8³) + (7 × 8²) + (0 × 8¹) + (2 × 8⁰), or (1*512) + (7*64) + (0*8) + (2*1), which equals 962. If you're unsure about the correctness of your conversion between numbering systems, you can use a webpage like the following to check: h ps://www.rapidtables.com/convert/number/octal-todecimal.html.
119
Please give some examples of a stack data structure.
A stack is a data structure that works under a specific philosophy: Last In, First Out.
120
This is o en abbreviated as LIFO. A stack data structure can be used to implement a Undo/Redo func onality in text editors: When you make changes to a document in a text editor, the changes are pushed onto a stack. If you want to undo a change, the editor pops the most recent change off the stack and applies the inverse opera on. To redo a change, the editor pushes the previously undone change back onto the stack. Another example would be the back/forward naviga on in web browsers: When you navigate to a new web page, the URL of the previous page is pushed onto a stack. If you click the "back" bu on, the browser pops the previous URL off the stack and navigates to that page. If you then click the "forward" bu on, the browser pops the next URL off the stack and navigates to that page.
121
How is a stack data structure represented in Java? Remark: This ques on isn't relevant in the context of the course book.
The stack data structure in Java is implemented in the class java.u l.Stack. Internally in this class an array is used the implement the stack func onality.
122
What is CSS?
CSS: This stands for Cascading Style Sheets, these are used to create layout and forma ng for web sites.
123
Mangement and understading of development stages
Development stages are the process of crea ng a so ware applica on. The development stages are: requirements analysis, design, implementa on, tes ng and maintenance. The first stage is requirements analysis where the needs of the users are iden fied and documented in a so ware requirements specifica on (SRS). This is followed by design where the SRS is analyzed to produce a high-level design document that describes how the system will work. Next comes implementa on where all of this informa on is used to create working so ware. Tes ng then follows to ensure that everything works as expected before moving on to maintenance which includes fixing bugs and adding new features.
124
Mangement and understading of development stages
Development stages are the process of crea ng a so ware applica on. The development stages are: requirements analysis, design, implementa on, tes ng and maintenance. The first stage is requirements analysis where the needs of the users are iden fied and documented in a so ware requirements specifica on (SRS). This is followed by design where the SRS is analyzed to produce a high-level design document that describes how the system will work. Next comes implementa on where all of this informa on is used to create working so ware. Tes ng then follows to ensure that everything works as expected before moving on to maintenance which includes fixing bugs and adding new features.
125
What is a datagram?
A datagram is a unit of data sent over a network. A datagram may contain one or more packets, depending on the protocol used to send it.
126
What is TCP/IP?
TCP/IP stands for Transmission Control Protocol/Internet Protocol. The transmission control protocol works at the transport layer, while the internet protocol works at the network layer of the OSI model. However, TCP has its own four-layer model of opera ng. TCP/IP is the protocol of the internet. That means that to access the internet, it must be installed on a device. Since it is also usable for LAN communica on, most computers use TCP/IP as their primary and only network protocol.
127
What is TCP/IP?
TCP/IP stands for Transmission Control Protocol/Internet Protocol. The transmission control protocol works at the transport layer, while the internet protocol works at the network layer of the OSI model. However, TCP has its own four-layer model of opera ng. TCP/IP is the protocol of the internet. That means that to access the internet, it must be installed on a device. Since it is also usable for LAN communica on, most computers use TCP/IP as their primary and only network protocol.
128
What is a device controller?
A device controller is a piece of so ware that controls the binary input and output to a device. The device controller can also signal the CPU with an interrupt. A device driver has to be designed specifically to talk with both the opera ng system that is in use and the hardware device’s controller.
129
What is a driver?
A driver is a piece of so ware that allows the opera ng system to communicate with hardware devices.
130
What does TCP mean?
Transmission Control Protocol
131
Compu ng power of supercomputers is o en measured in WHAT?
FLOPS: floa ng point opera ons per second
132
What is ALU?
The ALU is the part of a computer that performs arithme c and logic opera ons. It is responsible for performing basic arithme c calcula ons on data, such as adding and subtrac ng, but also performs logic opera ons such as AND and OR.
133
What is a computer interface?
A computer interface is the combina on of all of the methods designed for a user to interact with a computer, input and output.
134
What does GUI stand for?
Graphical User Interface (GUI) is a type of user interface that allows users to interact with electronic devices using graphics and text rather than just text. It is used in computers, smartphones, tablets, video game consoles and other devices.
135
What is a hard drive?
A hard drive is a storage device that stores data in a non-vola le manner. It is used to store the opera ng system and other programs on your computer.
136
Where is the firmware usually stored on?
The firmware is stored in the BIOS chip.
137
Which network device does not filter network traffic?
A hub.
138
Who is Von Neumann?
Von Neumann was a Hungarian-American mathema cian, physicist, inventor, computer scien st and polymath. He made major contribu ons to a number of fields, including mathema cs (founda ons of mathema cs), physics (quantum theory, solid state physics and the theory of games), compu ng (Von Neumann architecture), sta s cs (theory of games and the Monte Carlo method) and technology (cellular automata). He published over 150 papers in his life. Von Neumann was one of the most influen al mathema cians of the 20th century. He introduced the concept of cellular automata, which are self-replica ng machines. Von Neumann's mathema cal analysis of the structure of self-replica on preceded the discovery by biologists in 1953 that DNA carries gene c informa on using a code largely based on binary numbers.
139
Who is Russell Kirsch?
In the 1950s, Russell Kirsch invented the pixel. He decided that the simplest way to divide up the data in a photo or image was to demarcate it into discrete squares— that is what we have used to this day. It was a simple solu on and worked well enough that humans could recognize photographs on a computer screen.
140
Who is Russell Kirsch?
In the 1950s, Russell Kirsch invented the pixel. He decided that the simplest way to divide up the data in a photo or image was to demarcate it into discrete squares— that is what we have used to this day. It was a simple solu on and worked well enough that humans could recognize photographs on a computer screen.
141
Who created JavaScript? Remark: This ques on is not relevant in the context of the course book.
JavaScript was created by Brendan Eich in 1995. Eich is an American computer programmer and technology execu ve.
142
Where are pixels used?
Pixels are used in all types of images including fonts, icons, and graphics, along with photos.
143
When should I use JavaScript?
When you want to create a interac ve website.
144
What's the difference between a switch and a router?
A switch has a connec on for an uplink and mul ple ports for communica on. However, it does do basic filtering on data. Computers send data over a network in data frames with hardware addresses. Some data is sent out with the broadcast address; this address means it is for all computers who can receive it. A switch filters these out so they do not get propagated across the en re network (which can cause a flood of data known as a “broadcast storm”). A router is more intelligent connec on device than a switch. It examines the IP address of each packet of data sent over a network and only sends the signal through the connec on that will reach the address. A packet is similar to a frame, this is a unit of network data that is iden fied by an IP Address (instead of a hardware address). Since a router filters data, it can also block data from entering a network that does not belong there; this func on is called a firewall.
145
What process analyzes large amounts of data from different sources to produce useful informa on?
Data mining.
146
What is XOR?
XOR (exclusive OR, exclusive disjunc on) is a logic gate that indicates that only one out of two proposi ons is true. If both inputs (proposi ons) are true or both are false the output is false. If only one of the inputs (proposi ons) is true and the other false, the output is true.
147
What is XOR?
XOR (exclusive OR, exclusive disjunc on) is a logic gate that indicates that only one out of two proposi ons is true. If both inputs (proposi ons) are true or both are false the output is false. If only one of the inputs (proposi ons) is true and the other false, the output is true.
148
What is von neumann architecture
Von Neumann architecture is a basic design for computer systems that is s ll in use today. The von Neumann architecture is a reference model for the architecture of a computer. It consists of - a CPU, - a memory that holds both computer program instruc ons and data, - an input system, - an output system. The CPU consist of an ALU, a control unit and registers, which contain a fixed number of bits. These registers can contain data or instruc ons that have been read from memory. Besides the processor and memory, there also should be some type of input (entering data) and output system (outpu ng data) to be able to communicate with other devices or a human being.
149
Explain the star network topology.
In a star network topology, a central network device such as a hub, switch, or router is used to connect all the devices in the network. The central node in a star network is responsible for sending traffic to the outer nodes. This network is fault-tolerant to a point, but if the central hub, switch or router fails the network will not func on. Star networks are by far the most commonly-used type of network today.
150
Explain the star network topology.
In a star network topology, a central network device such as a hub, switch, or router is used to connect all the devices in the network. The central node in a star network is responsible for sending traffic to the outer nodes. This network is fault-tolerant to a point, but if the central hub, switch or router fails the network will not func on. Star networks are by far the most commonly-used type of network today.
151
What is UNIX? Remark: This ques on isn't relevant in the context of the course book.
UNIX is a computer opera ng system originally developed in the 1970s by AT&T Bell Labs. It was designed to be used in me-sharing and mul -user environments, and is intended to be used interac vely by mul ple users simultaneously. Today, UNIX is used on a wide range of devices, including personal computers, servers, smartphones, and other embedded systems. Some of the most popular UNIX-based opera ng systems include Linux and macOS.
152
What is UNIX? Remark: This ques on isn't relevant in the context of the course book.
UNIX is a computer opera ng system originally developed in the 1970s by AT&T Bell Labs. It was designed to be used in me-sharing and mul -user environments, and is intended to be used interac vely by mul ple users simultaneously. Today, UNIX is used on a wide range of devices, including personal computers, servers, smartphones, and other embedded systems. Some of the most popular UNIX-based opera ng systems include Linux and macOS.
153
What is the meaning of transoceanic?
The term transoceanic refers to something that occurs across or involves mul ple oceans. It is used to describe things that span across large distances of water, typically in reference to travel, transporta on, or communica on. Transoceanic communica on cables refer to undersea communica on cables that connect con nents and countries across oceans.
154
What is the meaning of transoceanic?
The term transoceanic refers to something that occurs across or involves mul ple oceans. It is used to describe things that span across large distances of water, typically in reference to travel, transporta on, or communica on. Transoceanic communica on cables refer to undersea communica on cables that connect con nents and countries across oceans.
155
What is the second layer of the OSI model?
The second layer of the OSI model is the data link layer. It exists to provide specifica ons for devices—such as Ethernet—that determine the way signals are sent electronically over the network, as well as standards for devices; this is where the hardware (MAC) address is used. It includes local network error checking, including collisions. Collisions occur when two network devices send out a signal simultaneously, and they collide over physical media. Most networks use collision detec on. This means a er a collision is detected both devices are instructed to wait a random amount of me before sending again.
156
What is the purpose of an opera ng system?
The purpose of an opera ng system is to provide an interface, control hardware, and run applica ons.
157
What are the tasks of the presenta on layer?
The presenta on layer prepares the data for being transferred. Encoding happens here. For instance, if you are sending an email in Unicode, it will translate the symbols at this layer. Encryp on occurs at this level. In other words, a plaintext or other unencrypted message is brought through a mathema cal algorithm that created encryp on. Without knowing the encryp on key, the code is nearly unbreakable (though no code is perfect). The sending and receiving network devices share a key at the beginning of communica on that allows for the algorithm to be reversed and the message to be turned back into the original.
158
What is the physical layer?
The physical layer is the lowest layer of the OSI model. It is responsible for sending and receiving data over a network. The physical layer defines how signals are sent and received, as well as how they are converted into binary data. The physical layer includes specifica ons for cabling and connectors. It consists of hardware specifica ons.
159
What is the physical layer?
The physical layer is the lowest layer of the OSI model. It is responsible for sending and receiving data over a network. The physical layer defines how signals are sent and received, as well as how they are converted into binary data. The physical layer includes specifica ons for cabling and connectors. It consists of hardware specifica ons.
160
What is the most common programming language?
Programming languages are context- and applica on domain-specific. Therefore, this ques on cannot be answered in general. However, some of the most popular programming languages include Python, Java, C, and C++. You can find a ranking of the popularity of programming languages over me on this webpage: h ps://www. obe.com/ obe-index/
161
What is the most common programming language?
Programming languages are context- and applica on domain-specific. Therefore, this ques on cannot be answered in general. However, some of the most popular programming languages include Python, Java, C, and C++. You can find a ranking of the popularity of programming languages over me on this webpage: h ps://www. obe.com/ obe-index/
162
What is the first layer of the osi model?
The first layer of the OSI model is the Physical Layer.
163
What is the difference between h p and h ps?
Both protocols exist to transfer data for a web page. The difference between h p and h ps is that the secure version (h ps) uses encryp on to protect private data. Many sites use encryp on—you should never type in personal data on any site that is not using HTTPS (this is o en indicated on a browser by a small padlock icon).
164
What is the difference between direct and indirect proof? Remark: This ques on isn't relevant in the context of the course book.
Direct and indirect proofs are two methods used in mathema cs to prove the truth of a statement. A direct proof is a method of proving a statement by using a series of valid arguments to show that the statement is true. An indirect proof, on the other hand, is a proof method that proves a statement by assuming the opposite of the statement (nega on) and showing that it leads to a contradic on or an impossible scenario. Indirect proofs are o en used to prove statements that are difficult to prove directly, or for cases where a direct proof is not possible.
165
What is the difference between direct and indirect proof? Remark: This ques on isn't relevant in the context of the course book.
Direct and indirect proofs are two methods used in mathema cs to prove the truth of a statement. A direct proof is a method of proving a statement by using a series of valid arguments to show that the statement is true. An indirect proof, on the other hand, is a proof method that proves a statement by assuming the opposite of the statement (nega on) and showing that it leads to a contradic on or an impossible scenario. Indirect proofs are o en used to prove statements that are difficult to prove directly, or for cases where a direct proof is not possible.
166
What is the concept behind pixel images?
The concept behind pixel images is to break any image up into small squares, so that each square would then have one (and only one) color. If the squares are small enough, the human eye cannot dis nguish them individually, and so our brain will see a photographic image. An image is stored as a binary sequence of "color values". You start at the top le for the first pixel, and then go across the first row in that order un l comple ng it and then jumping down to the next row of pixels. Since the order is implicit, there is no need to number the pixels. Each pixel has a color as its basic data, so we must represent each separate color as a binary number. If we use eight bits (a byte), then there are 256 different colors we can represent uniquely. This is called 8-bit color.
167
What is seman cs?
Seman cs is the study of meaning. Computer scien sts use the term seman c to describe a type of error in so ware. It’s possible to create perfectly readable code for a computer, yet have it do something different than your inten on. When a program compiles and runs without producing any syntax errors or run me errors, but it does not produce the expected output or produces incorrect output due to a mistake in the logic of the program. For instance, suppose you write a program to calculate the average of a list of numbers, but you forget dividing the sum by the number of elements in the list. The program would compile and run without any errors, but the output would be incorrect, resul ng in a seman c error.
168
What is Python?
Python is a programming language used for web development, data analysis, ar ficial intelligence, scien fic compu ng, and more.
169
What is logic?
In computer science, logic is a fundamental branch of mathema cs that deals with the study of reasoning and argumenta on. It involves the use of symbols and rules to express and manipulate statements and arguments, with the goal of determining their validity or truth. Proposi onal logic is a specific area relevant to computer science.
170
What is Linux?
Linux is a computer opera ng system. It is a free and open source so ware opera ng system for computers, meaning that the code can be modified and redistributed freely. Linux was originally created by Linus Torvalds in 1991, and has since been developed by thousands of programmers worldwide.
171
What is HTTP?
HTTP (Hypertext Transfer Protocol) is part of the TCP/IP protocol suite—it exists specifically to transfer data for a web page. HTTP is the founda on of the World Wide Web and enables the transfer of informa on between clients and servers over the internet.
172
What is Fortran?
Fortran is a programming language. Addi onal informa on: Fortran was developed in the 1950s. It is used to write programs for scien fic and engineering applica ons. It is s ll used today, but has been largely replaced by other languages like C++ and Java.
173
What is DNS?
Domain Name System (DNS) is a service that translates domain names into IP addresses. It is used to access websites and other resources on the Internet. Every internet device requires a 32-bit IP address to transmit and receive data. Imagine if human users had to memorize and type in 32 zeroes and ones just to access a website? This would prove quite cumbersome. Fortunately, DNS is a transla on service that maps domain names to IP addresses every me you access a web page.
174
What is the difference between syntax and seman cs?
Syntax is the rules of how to write a program. Seman cs is the meaning of what you are wri ng.
175
What are data structures?
Data structures are the way in which data is stored and organized. They are used to make it easier to access and manipulate data. There are many different types of data structures, including arrays, linked lists, stacks, queues, trees and graphs.
176
What are data structures?
Data structures are the way in which data is stored and organized. They are used to make it easier to access and manipulate data. There are many different types of data structures, including arrays, linked lists, stacks, queues, trees and graphs.
177
What is data mining?
Data mining is the process of producing useful informa on from large amounts of data, o en from mul ple sources.
178
What is data contextualiza on?
What is the meaning of the binary byte 01000001? We don't know if it represents a number, a le er, or if it has to be connected with other bytes to represent a larger number. When somebody tells you that each byte contains an ASCII symbol, you know the meaning of the binary byte 01000001 is the capital le er A. We give binary data context by using codes (like the ASCII code).
179
What is a Wi-Fi access point?
A Wi-Fi access point is a device that allows wireless devices to connect to the Internet.
180
What is a terminator in a flowchart?
A terminator symbol (oval or rectangle) is used at the beginning of a flowchart and at all the endings. A terminator symbol represents the start or end of a process or program. Terminator symbols are used to make flowcharts more readable and easier to follow, as they provide a clear indica on of where a process begins and ends.
181
What is a syntax error?
A syntax error is a mistake in the syntax of a programming language such as - missing punctua on, - wrong ordering of symbols and words, - misspelled keywords or iden fiers, - incorrect capitaliza on, - incorrect nes ng of brackets or parentheses, ... Syntax errors prevent the code from being compiled or executed properly, and typically result in an error message that indicates the loca on and nature of the syntax error.
182
What is a syntax error?
A syntax error is a mistake in the syntax of a programming language such as - missing punctua on, - wrong ordering of symbols and words, - misspelled keywords or iden fiers, - incorrect capitaliza on, - incorrect nes ng of brackets or parentheses, ... Syntax errors prevent the code from being compiled or executed properly, and typically result in an error message that indicates the loca on and nature of the syntax error.
183
What is a proposi on?
A proposi on is the idea behind a statement. For instance, saying 'It is more than 27 degrees Celsius' is a logical statement, but the proposi on behind it is that the condi ons of the environment include that the temperature is more than 27 degrees Celsius at the current moment outdoors. There can be many logical statements used to express a proposi on. For instance, if the proposi on is 'It is hot outside', you can use the logical statement 'It is more than 27 degrees outside' or 'It is not less than 28 degrees outside', among others.
184
What is an UI?
UI stands for "User Interface". It refers to the graphical or interac ve elements that allow users to interact with a so ware.
185
What is a firmware?
Firmware is a type of so ware that is required by the hardware for essen al func onality. It is programmed into a stable chip that retains the data even without electrical power (a non-vola le chip). A modern computer first runs the instruc ons on the BIOS chip for boo ng up, which includes iden fying all of the hardware a ached to the machine (hard drives, amount of RAM, graphics card, etc.). Once that is done, it finds the opera ng system (OS) on the hard drive or other long-term storage device and begins the process of copying it into RAM. That is what you are wai ng for when a computer is “boo ng” up. You stare at the logo for your computer un l this process is finished and you can interact with it. Firmware can also be used in electronic devices that always perform the same task, such as your smart refrigerator or a child’s toy. A single-task device does not need RAM to run different applica ons. Advanced personal computers can perform many tasks and need the RAM and extra hard drive storage to do so.
186
What is a discrete unit of data?
A discrete unit of data is a single, dis nct piece of informa on that can be stored, manipulated, or transmi ed by a computer or other digital device. In the context of this course book a discrete unit of data is a file.
187
What is a discrete unit of data?
A discrete unit of data is a single, dis nct piece of informa on that can be stored, manipulated, or transmi ed by a computer or other digital device. In the context of this course book a discrete unit of data is a file.
188
What happened in the Business era of computer
The Business era of computer is the period from the 1960s to the 1980s. Computers was used by individual experts in business. No graphical user interfaces was available to interact with computers.
189
What happened in 1801?
Joseph Maria Jacquard invented a loom that used punch cards made of wood to create fabric designs automa cally. Technically, this was programming—a pre-made set of instruc ons changed into a “machine language” that tells a machine what to do. However, this machine wasn’t doing any compu ng, simply weaving cloth.
190
What does TCP/IP stand for?
Transmission Control Protocol/Internet Protocol
191
What can be represented in binary?
Any type of informa on can be represented in binary. This includes numeric values, text, images, audio, and video. All of this informa on can be converted into a binary representa on.
192
What is a programming language?
Programming languages are languages that can be used by humans to give instruc ons to a computer without having to write everything in binary. Programming languages define a set of allowed words and have rules, including syntax, which dictate how to use the words and symbols of that language.
193
What is a programming language?
Programming languages are languages that can be used by humans to give instruc ons to a computer without having to write everything in binary. Programming languages define a set of allowed words and have rules, including syntax, which dictate how to use the words and symbols of that language.
194
What is a parity bit?
Parity is a method of error-checking for binary data. It works by adding an extra bit (the so-called parity bit) to a group of data bits and then checking that the total number of ones (including the extra bit) is odd or even. If an odd parity bit is used, the parity bit makes the total number of ones in the group of data odd. For example, if you have the following data 1010111, you count 5 ones. Because 5 is odd, the parity bit to add is 0. Then we have the byte 01010111. On the other hand, if you have the following data 1010101, you count 4 ones. To make the total number of ones odd, the parity bit to add has to be 1. Then we have the byte 11010101.
195
What is a parity bit?
Parity is a method of error-checking for binary data. It works by adding an extra bit (the so-called parity bit) to a group of data bits and then checking that the total number of ones (including the extra bit) is odd or even. If an odd parity bit is used, the parity bit makes the total number of ones in the group of data odd. For example, if you have the following data 1010111, you count 5 ones. Because 5 is odd, the parity bit to add is 0. Then we have the byte 01010111. On the other hand, if you have the following data 1010101, you count 4 ones. To make the total number of ones odd, the parity bit to add has to be 1. Then we have the byte 11010101.
196
What are formats in number representa on?
In compu ng, there are several different formats that are commonly used for number representa on, including decimal, binary, hexadecimal and octal.
197
What is proposi onal logic?
Proposi onal logic deals with the logical rela onships between proposi ons that are represented as simple statements or symbols. In proposi onal logic, proposi ons are considered to be either true or false, and logical connec ves such as and, or, not, implies are used to combine them into more complex proposi ons.
198
The rules for the order and usage of words and symbols in programming is called what?
syntax
199
Which is the fastest cache L1, L2 or L3?
L1 cache is the fastest, L2 cache is slower than L1 and L3 cache is slower than L2.
200
What is the memory size of the L1 cache?
The memory size of L1 cache varies depending on the architecture and design of the processor. For example, in the Intel Core i7 processor, the L1 cache has a size of 32 kilobytes (KB).
201
What is the big O nota on?
The big O nota on is used to describe the complexity of an algorithm. It is based on the data size of n elements. For instance, bubble sort takes approximately n^2 steps to be completed, so we write it as: O ( n^2 ). If you would like to sort a list of 100 elements using bubble sort you approximately need 10,000 steps to complete.
202
Conver on between numbering systems: 1: Convert the decimal number 57 to binary. 2: Convert the binary number 10110110 to decimal. 3: Convert the hexadecimal number 2C to binary.
1: The decimal number 57 is in binary 00111001. 2: The binary number 10110110 is in decimal 182. 3: The hexadecimal number 2C is in binary 00101100.
203
How many different numbers can you represent with 16 bits?
With 16 bits, you can represent 2^16 = 65,536 different numbers.
204
How many different numbers can you represent with 16 bits?
With 16 bits, you can represent 2^16 = 65,536 different numbers.
205
Which non-numerical informa on needs to be converted to binary?
Non-numerical informa on, such as text, images, audio, and video, needs to be converted to binary. For text, you can use the ASCII code, images can be represented by a sequence of pixels, etc.
206
What is the difference between microprocessor and microcontroller?
Microprocessors are the brains of a computer. They are the central processing unit (CPU) and they control all of the other components in a computer. A microprocessor is a single-chip CPU. It requires addi onal components, such as memory and input/output interfaces, to be integrated into a complete system. A microcontroller, on the other hand, is a complete compu ng system that integrates a CPU, memory, and input/output interfaces all on a single chip.
207
How can one behave ethically?
You can behave ethically for example by not stealing intellectual property, not lying about your product, and keeping user informa on private.
208
How to convert binary to octal?
Conver ng binary to octal involves grouping the binary digits into sets of three, star ng from the rightmost digit, and then conver ng each group of three binary digits into its corresponding octal digit. The binary number 110 010 111 011 001 010 can be converted into octal as follows: 010 = 2, 001 = 1, 011 = 3, 111 = 7, 010 = 2, 110 = 6. The number in octal is: 627312. If you're unsure about the correctness of your conversion between numbering systems, you can use a webpage like the following to check: h ps://www.rapidtables.com/convert/number/binary-tooctal.html.
209
How can we convert the binary number 11111111 to a decimal number?
Assign place values to each digit of the binary number, star ng from the rightmost digit and working le ward. The rightmost digit has a place value of 1, the next digit to the le has a place value of 2, then 4, 8, 16, 32, 64, 128 and so on, with each place value doubling. Mul ply each digit of the binary number by its corresponding place value and add the results: 1*128+1*64+1*32+1*16+1*8+1*4+1*2+1*1 = 255 Therefore the binary number 11111111 is 255 in decimal.
210
How can we convert the binary number 11111111 to a decimal number?
Assign place values to each digit of the binary number, star ng from the rightmost digit and working le ward. The rightmost digit has a place value of 1, the next digit to the le has a place value of 2, then 4, 8, 16, 32, 64, 128 and so on, with each place value doubling. Mul ply each digit of the binary number by its corresponding place value and add the results: 1*128+1*64+1*32+1*16+1*8+1*4+1*2+1*1 = 255 Therefore the binary number 11111111 is 255 in decimal.
211
How many bytes is a mega byte?
A mega byte (1MB) is 1,000,000 bytes.
212
How can humans 'think like a computer'?
A computer needs clear and unambiguous instruc ons. If we want to solve a problem in the real world using a computer, we must be able to break down the problem into easy, step-by-step instruc ons that we can formulate in a programming language.
213
How does an algorithm work?
An algorithm is a set of rules or instruc ons for comple ng a task. This applies to human beings as well as computers. The algorithm takes input data, processes it, and produces an output based on the instruc ons provided. If you want to assemble ons to other hardware. The CPU consists of mul ple components, including the control unit, arithme c and logic unit, registers, and cache. The control unit manages the flow of data between the CPU and memory, while the arithme c and logic unit performs arithme c and logical opera ons. Registers and cache are highspeed memory units that are used to store data that is frequently accessed by the CPU.
214
How does an algorithm work?
An algorithm is a set of rules or instruc ons for comple ng a task. This applies to human beings as well as computers. The algorithm takes input data, processes it, and produces an output based on the instruc ons provided. If you want to assemble ons to other hardware. The CPU consists of mul ple components, including the control unit, arithme c and logic unit, registers, and cache. The control unit manages the flow of data between the CPU and memory, while the arithme c and logic unit performs arithme c and logical opera ons. Registers and cache are highspeed memory units that are used to store data that is frequently accessed by the CPU.
215
How does a cpu work?
The Central Processing Unit (CPU) is o en referred to as the “brain” of the computer. It does all the processing, which includes doing calcula ons and sending instruc ons to other hardware. The CPU consists of mul ple components, including the control unit, arithme c and logic unit, registers, and cache. The control unit manages the flow of data between the CPU and memory, while the arithme c and logic unit performs arithme c and logical opera ons. Registers and cache are highspeed memory units that are used to store data that is frequently accessed by the CPU.
216
How can I sort informa on alphabe cally?
You can sort informa on alphabe cally by using the ASCII value of each character. The ASCII value is a number that represents the character. For example, the le er A has an ASCII value of 65, and the le er B has an ASCII value of 66.
217
How can I sort informa on alphabe cally?
You can sort informa on alphabe cally by using the ASCII value of each character. The ASCII value is a number that represents the character. For example, the le er A has an ASCII value of 65, and the le er B has an ASCII value of 66.
218
What is a DSS?
A Decision Support System (DSS), is primarily designed to look to the future and help make informed decisions. A key of a good DSS is that the informa on is presented in an easily understandable way. These systems o en have mul ple ways to present data including in graphs and charts. DSS systems provide informa on such as: revenue predic ons, hiring needs, inventory analysis, and future sales. This system is most o en used at the middle management level and above.
219
Do I have to watch lectures only or I have to study course book as well?
You have to study book as well. The course book content is essen al to pass the exam.
220
Describe the communica on process in layers between applica on, opera ng system, BIOS and hardware.
The applica on interacts directly with the user, it makes requests to access hardware through the opera ng system. The opera ng system uses a driver to talk to the BIOS chip, which handles things like hardware adressing. The BIOS passes commands along to hardware, and then passes the results back up to the applica on.
221
Describe the communica on process in layers between applica on, opera ng system, BIOS and hardware.
The applica on interacts directly with the user, it makes requests to access hardware through the opera ng system. The opera ng system uses a driver to talk to the BIOS chip, which handles things like hardware adressing. The BIOS passes commands along to hardware, and then passes the results back up to the applica on.
222
Describe the boot process.
The boot process is the startup sequence of a computer. The term comes from the phrase “pull yourself up by your bootstraps.” When a computer first starts up (the boot process), the RAM is empty and the computer is wai ng for instruc ons on what to do. It finds those instruc ons (so ware) in a special chip called a BIOS, which stands for Basic Input Output System. These instruc ons are what the computer follows when first it starts up. They are always the same, so they are programmed into a stable chip that retains the data even without electrical power (a non-vola le chip). A modern computer first runs the instruc ons on the BIOS chip for boo ng up, which includes iden fying all of the hardware a ached to the machine (hard drives, amount of RAM, graphics card, etc.). Once that is done, it finds the opera ng system (OS) on the hard drive or other long-term storage device and begins the process of copying it into RAM. That is what you are wai ng for when a computer is “boo ng” up. You stare at the logo for your computer un l this process is finished and you can interact with it.
223
What is a firewall?
A firewall is a device that filters data from entering or leaving a network. It can also block data from entering a network that does not belong there; this func on is called a firewall.
224
What is sampling?
Sampling is the representa on of analog data by taking samples of the wave values over small me intervals. In the real world sound exist in waves. Informa on represented in waves is referred to as analog. When we store it on a computer it must be converted into digital data. Does this mean that some of the informa on is lost? Definitely. Analog waves have an infinite con nuum of values, whereas digital representa ons of waves must simulate them with sampling. Analog data are sliced into very small me samples and a digital value is assigned for that me slice. The smaller the slices, the more accurate a representa on. However, we cannot have infinitely small samples. If we cut up an audio wave into small enough slices and reassemble it, the human ear cannot tell the difference.
225
What is sampling?
Sampling is the representa on of analog data by taking samples of the wave values over small me intervals. In the real world sound exist in waves. Informa on represented in waves is referred to as analog. When we store it on a computer it must be converted into digital data. Does this mean that some of the informa on is lost? Definitely. Analog waves have an infinite con nuum of values, whereas digital representa ons of waves must simulate them with sampling. Analog data are sliced into very small me samples and a digital value is assigned for that me slice. The smaller the slices, the more accurate a representa on. However, we cannot have infinitely small samples. If we cut up an audio wave into small enough slices and reassemble it, the human ear cannot tell the difference.
226
What is an API?
Applica ons use an Applica on Programming Interface (API) that is provided by another applica on (for example the opera ng system) to use specific func onality. The opera ng system for example is responsible for accessing hardware devices. The func onality to access hardware devices is also important for other applica ons. Therefore the opera ng system provides this func onality via an API to other applica ons.
227
What is an algorithm?
An algorithm is a sequence of instruc ons that can be used to solve a problem. The most common algorithms are sor ng algorithms, which sort data into an order that is more useful for the user. Algorithms can also be used to find pa erns in data, such as finding the highest value in a list or finding all possible combina ons of numbers from 1-100.
228
What is algorithm complexity?
Algorithm complexity is the number of steps that an algorithm takes to complete its task. The less complex an algorithm is, the more efficient it tends to be. When we are evalua ng the usefulness of algorithms, one thing we ask is: which one requires more opera ons to complete its task? That algorithm is the most complex. Of course, we want to use the least complex algorithm that will take fewer calcula ons and therefore less me and energy.
229
What is a binary digit?
A binary digit is the smallest unit of data in a computer. They are represented by two symbols, 0 and 1. A byte is eight binary digits together, which can represent 256 combina ons or 0 to 255.
230
What is 802.11?
802.11 is an IEEE standard for wireless communica on, set in 1997. New, updated standards were then introduced by adding addi onal le ers a er the name. The 802.11g protocol is the oldest widely used protocol, for example.
231
What is a computer program?
A computer program is a set of instruc ons that tell the computer what to do. It is wri en in a programming language that the computer can understand.
232
What is a computer program?
A computer program is a set of instruc ons that tell the computer what to do. It is wri en in a programming language that the computer can understand.
233
What is RGB?
RGB is a color model in which red, green, and blue are added together in various ways to reproduce a broad array of colors. The name of the scheme comes from the ini als of the three addi ve primary colors, red, green and blue.
234
What is the VGA graphics system?
The VGA graphics system is a computer display standard introduced by IBM in 1987. It was the first standard to use a digital RGB color model, instead of the analog RGB model used previously. The VGA supports up to 640×480 pixels with 16 colors at once from a pale e of 262,144 colors.
235
What is a pixel?
A pixel is a single square which is assigned a color and used to assemble a larger image.
236
What does CPU stand for?
Central Processing Unit
237
What is a byte and how does it compare to a bit?
A byte is a unit of digital informa on that consists of eight bits. A bit is a single binary digit, either 0 or 1.
238
What is a bit?
A bit is the smallest unit of data in a computer. A bit can either store the value 1 or the value 0.
239
What are binary digits?
Binary digits are the two symbols used in binary, 0 and 1.
240
What is JavaScript?
JavaScript is a programming language that is used to create interac ve effects on websites. It is also used to create programs for web browsers.
241
What does RAM stand for?
Random Access Memory
242
What does RAM stand for?
Random Access Memory
243
Which considera ons do you see regarding ethics in computer science?
There are many considera ons regarding ethics in computer science. One considera on is that a company or government should not steal intellectual property. Another considera on is that a company or government should not lie about their product—claiming that it is be er than is actually is, or promising features that are not delivered. A third considera on would be to maintain proper ethics by being direct about product expecta ons, specifica ons, budgets, and deadlines.
244
What is the difference between bubble sort and quick sort?
Both are sor ng algorithms. Bubble sort has a me complexity of O(n2), while quick sort has a me complexity of O(n*log(n)). Therefore, quick sort can order the elements of a list on average faster than bubble sort.
245
What is the binary representa on of A?
If we use the ASCII code the le er A is represented by 01000001.
246
Explain the bubble sort algorithm.
The rules for bubble sor ng are this: star ng at the beginning, compare the first two values. If the first one is larger, swap the two values. If it is not, there is nothing to do. Then compare the next two values and do the same un l you reach the end. Once this is done, do it again for every element except the last one, since it will be in order now. Each pass you complete will guarantee one more element is in order. Others may happen to be in order, but the bubble sort will check them all regardless. If there are no swaps in a pass, this indicates that the list is s ll sorted.
247
Explain the bubble sort algorithm.
The rules for bubble sor ng are this: star ng at the beginning, compare the first two values. If the first one is larger, swap the two values. If it is not, there is nothing to do. Then compare the next two values and do the same un l you reach the end. Once this is done, do it again for every element except the last one, since it will be in order now. Each pass you complete will guarantee one more element is in order. Others may happen to be in order, but the bubble sort will check them all regardless. If there are no swaps in a pass, this indicates that the list is s ll sorted.
248
Explain odd an even parity bits.
Parity is a method of error-checking for binary data. It works by adding an extra bit (the so-called parity bit) to a group of data bits and then checking that the total number of ones is odd or even. If an odd parity bit is used, the parity bit makes the total number of ones odd. For example, if you have the following data 1010111, you count 5 ones. Because 5 is odd, the parity bit that has to be added is 0. The data including the parity bit then looks like: 01010111. On the other hand, if you have the following data 1010101, you count 4 ones. To make the total number of ones odd, the parity bit that has to be added is 1. The data including the parity bit then looks like: 11010101. If an even parity bit is used, the parity bit makes the total number of ones even. For example, if you have the following data 1010111, you count 5 ones. Because 5 is not even, the parity bit that has to be added is 1. The data including the parity bit then looks like: 11010111. On the other hand, if you have the following data 1010101, you count 4 ones. The total number of ones is s ll even, therefore the parity bit that has to be added is 0. The data including the parity bit then looks like: 01010101.
249
Does a rela onal database scale well horizontally? Remark: This ques on isn't relevant in the context of the course book.
Whether a rela onal database scales well horizontally depends on the data stored in it. If it is possible to break up the database into smaller pieces and distribute them across mul ple servers, with each server responsible for a subset of the data, then a rela onal database can scale horizontally.
250
What is Web3? Remark: This ques on isn't relevant in the context of the course book.
Web3 is an idea for a new genera on of the World Wide Web that is based on blockchain technology and emphasizes decentraliza on, user privacy, and increased security.
251
What is ALGOL? Remark: This ques on isn't relevant in the context of the course book.
ALGOL ("Algorithmic Language") is the name of a family of programming languages that were used from the late 1950s to the 1980s. All Algol variants have had a significant influence on the further development of programming languages. For example, languages such as C and Pascal are derived from Algol 60.
252
What is ALGOL? Remark: This ques on isn't relevant in the context of the course book.
ALGOL ("Algorithmic Language") is the name of a family of programming languages that were used from the late 1950s to the 1980s. All Algol variants have had a significant influence on the further development of programming languages. For example, languages such as C and Pascal are derived from Algol 60.
253
Summarize some facts about the history of computers.
It is difficult to pinpoint the exact moment when the first computer was created. It was more of an evolu on of advanced machines into something that eventually resembles the computers we have today. In 1801, Joseph Maria Jacquard invented a loom that used punch cards made of wood to create fabric designs automa cally. Technically, this was programming—a pre-made set of instruc ons changed into a “machine language” that tells a machine what to do. However, this machine wasn’t doing any compu ng, simply weaving cloth. Later, during World War II, machines were used to encode secret messages. These machines used gears that would align with symbols to create a coded text from regular or “plaintext” messages. Breaking those codes, however, required actual compu ng power. The 2014 film The Imita on Game tells the story of Alan Turing; his Turing machine was able to take in encrypted messages, process them, and output an answer. However, his machine had no keyboard or monitor, let alone a mouse. To look at the history of modern compu ng machines, we will break it down into four eras: - Behemoths: Huge machines used mostly by governments. 1940s - 1960s. - Business: Computers that are used by individuals in business. 1960s - 1980s. - Graphical: The dawn of the Graphical User Interface and digital imagery. 1980s - 2000s. - Portable: Miniaturiza on of computers; laptops, tablets, smartphones. 2000s - today.
254
What programming language should I use to create interac ve websites?
You can use Python.
255
Why should I learn JavaScript?
Because it is a programming language that is used to create interac ve websites.
256
How does a queue data structure work? Remark: Queues aren't part of the course book and therefore this ques on is not relevant for the exam.
A queue is a data structure that stores elements in the order they are inserted. It is called a FIFO (First In First Out) data structure. The first element added to the queue will be the first one removed from it. A queue can be implemented using an array or linked list.
257
What is base 8?
Base 8 refers to a numbering system that uses the digits 0 through 7. It is also known as octal numbering system.
258
Which numbering system is base 8?
The octal numbering system.
259
What is a BIOS chip?
Within the BIOS chip a special kind of so ware (firmware) is stored typically in a ROM (read only memory). The firmware of a BIOS chip provides a star ng line for a computer every me it is turned on. One of the very first things a BIOS chip will instruct the computer to do is detect and test hardware that is connected to it. It performs a POST, or power on self-test to check that the required hardware is there and that it is func oning properly. Then it starts loading the opera ng system.
260
Where is firmware usually stored?
Firmware is usually stored in the BIOS chip.
261
Which are the most important concepts for embedded systems?
An embedded system is a computer system that is designed to perform one specific task over and over again. It includes a CPU, memory, and an input/ output system. Most of these systems use a microcontroller and are embedded into small devices. Since an embedded system typically performs the same func on over and over again, the so ware can be placed on a computer chip, making it firmware. As these devices are hard to upgrade (and upgrading is not part of the regular use of the device), they must have an extremely high degree of reliability. This means that much more rigorous tes ng must be done of any so ware created to be placed on the device. Embedded systems typically have a very limited amount of RAM— programmers must be as efficient as possible to get the maximum amount of instruc ons into the smallest amount of memory.