Savitch Java: An Introduction to Problem Solving and Programming 7th Edition, Chapters 1-6

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/99

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

100 Terms

1
New cards

What is a bit?

Binary Digit (0 or 1)

2
New cards

Bit Patterns are

used to represent information such as numbers, text characters, images, sound, and others.

3
New cards

Boolean Operations are

operations that manipulates one or more true/false value.

4
New cards

Examples of Specific Operations are

AND, OR, XOR (exclusive or), NOT

5
New cards

A Gate is

A device that computes a Boolean Operation

6
New cards

A Flip-flop is

A circuit built from gates that can store one bit.

7
New cards

Hexadecimal notation is

A shorthand notation for long bit patterns

8
New cards

A Cell is

A unit of main memory

9
New cards

A Byte =

8 bits

10
New cards

Most Significant Bit is

the bit at the left end of the conceptual row of bits in a memory cell

11
New cards

Least Significant Bit is

the bit at the right end of the conceptual row of bits in a memory cell

12
New cards

Address is

A "name" that uniquely identifies one cell in the computer's main memory

13
New cards

RAM (Random Access Memory)

Memory in which individual cells can be easily accessed in any order

14
New cards

Dynamic Memory (DRAM)

RAM composed of volatile memory

15
New cards

Kilobyte

210 bytes = 1024 bytes

16
New cards

Megabyte

220 bytes = 1,048,576 bytes

17
New cards

Gigabyte

230 bytes = 1,073,741,824 bytes

18
New cards

A gate is an example of

VLSI (Very Large Scale Integration)

19
New cards

A gate provides

the building blocks from which computers are constructed

20
New cards

A gate is often implemented as

small electronic circuits

21
New cards

Two functions of Hexadecimal notation

are to divide patterns into groups of four bits each and to represent each group by a single symbol

22
New cards

VLSI stands for

Very Large Scale Integration

23
New cards

Some devices for mass storage include

Magnetic disks, CDs, DVDs, magnetic tapes, flash drives, solid-state disks

24
New cards

Some advantages that mass storage has over main memory include

less volatility, larger storage capacities, lower costs, can be removed

25
New cards

Flash Memory

circuits that that trap electrons in tiny silicon dioxide chambers

26
New cards

A flash drive uses

flash memory

27
New cards

When erasing flash memory you are

slowly damaging the media

28
New cards

Flash memory is the mass storage of choice for

digital cameras, smartphones

29
New cards

SD Cards

provide GB's of storage

30
New cards

Each character when representing text is

assigned a unique bit pattern

31
New cards

ASCII

uses pattern of 7-bits to represent most symbols used in written English text

32
New cards

ISO

developed a number of 8 bit extensions to ASCII

33
New cards

Unicode

uses patterns of up to 21 bits to represent the symbols used in languages world wide, 16-bits for world's commonly used languages

34
New cards

Binary notation

Uses bits to represent a number in base two

35
New cards

Some limitations of computer representations of numeric values are

overflow and truncation

36
New cards

Truncation

occurs when a value cannot be represented accurately

37
New cards

Overflow

occurs when a value is too big to be represented

38
New cards

A use of MIDI

is that it is in music synthesizers and records "musical score"

39
New cards

Pixel

is short for "picture element"

40
New cards

Bit map techniques and Vector techniques both

represent images

41
New cards

Sampling techniques and MIDI

both represent sound

42
New cards

Uses of sampling techniques

high quality recording and actual audio

43
New cards

Pixels, RGB, Luminance and Chrominance

are bit map techniques

44
New cards

The binary system is based on

powers of two

45
New cards

The traditional decimal system is based on

powers of ten

46
New cards

The CPU is

the central processing unit

47
New cards

Two types of registers are

general purpose and special purpose

48
New cards

Machine instruction

an instruction encoded as a bit pattern recognizable by the CPU

49
New cards

Machine language

the set of all instructions recognized by a machine

50
New cards

RISC

Reduced Instruction Set Computing

51
New cards

CISC

Complex Instruction Set Computing

52
New cards

Data transfer is

when you copy data from one location to another

53
New cards

The function of the arithmetic/logic unit is to

use existing bit patterns to compute a new bit pattern

54
New cards

The function of the control unit is to

direct the execution of the program

55
New cards

The function of data transfer is to

copy data from one location to another

56
New cards

The function of the arithmetic/logic unit is to

use existing bit patterns to compute a new bit pattern

57
New cards

Op-code

specifies which operation should execute

58
New cards

Operand

gives more detailed information about the operation

59
New cards

Op-codes and Operands

are both parts of a machine instruction

60
New cards

RISC and CISC

are both machine Language Philosophies

61
New cards

Data Transfer, Arithmetic/Logic, Control

are all machine instruction types

62
New cards

Program execution

machine cycle and registers are 2 facets of

63
New cards

Machine Cycle

composed of fetch, decode, execute

64
New cards

Program Counter

address of next instruction

65
New cards

Instruction Register

current instruction

66
New cards

Rotate and Shift

circular shift, logical shift, arithmetic shift

67
New cards

Arithmetic

add, subtract, multiply, divide

68
New cards

Logic, Rotate and Shift, and Arithmetic are all

Arithmetic/Logic Operations

69
New cards

Algorithm

An ordered set of unambiguous, executable steps that defines a terminating process

70
New cards

Algorithm Representation

Requires well-defined primitives, a collection of primitives constitutes a programming language

71
New cards

To solve an algorithm you first need to

get a foot in the door

72
New cards

Iterative Structures

loops

73
New cards

Recursion

The execution of a procedure leads to another execution of the procedure, Multiple activations of the procedure are formed, all but one of which are waiting for other activations to complete.

74
New cards

Algorithm Efficiency

Measured as number of instructions executed.

75
New cards

Program variables or identifiers

Descriptive names for memory locations, chosen by the programmer.

76
New cards

Assembly Language Characteristics

One-to-one correspondence between machine instructions and assembly instructions, Inherently machine-dependent, Converted to machine language by a program called an assembler

77
New cards

Data Types

Integer: Whole numbers
Real (float): Numbers with fractions
Character: Symbols
Boolean: True/false

78
New cards

Procedural Units

Subprogram, subroutine, procedure, method, function

79
New cards

Object

Active program unit containing both data and procedures

80
New cards

Class

A template from which objects are constructed

81
New cards

An object is

an instance of a class

82
New cards

Instance Variable

Variable within an object, Holds information within the object

83
New cards

Method

Procedure within an object, Describes the actions that the object can perform

84
New cards

Constructor

Special method used to initialize a new object when it is first constructed

85
New cards

Encapsulation

A way of restricting access to the internal components of an object, Private, Public

86
New cards

Inheritance

Allows new classes to be defined in terms of previously defined classes

87
New cards

Polymorphism

Allows method calls to be interpreted by the object that receives the call

88
New cards

Security Problems

insecure passwords, sniffing software, attacks from within

89
New cards

Security counter measures

auditing software

90
New cards

Process

the activity of executing a program

91
New cards

Process state

current status of the activity

92
New cards

Scheduler

Adds new processes to the process table and removes completed processes from the process table

93
New cards

Dispatcher

Controls the allocation of time slices to the processes in the process table

94
New cards

Interrupt

end of a time slice

95
New cards

User Interface

Communicates with users

96
New cards

Kernel

Performs basic required functions

97
New cards

Boot loader

Program in ROM

98
New cards

Directory

A user-created bundle of files and other directories

99
New cards

Directory Path

A sequence of directories within directories

100
New cards

Encryption

the process of converting information or data into a code, especially to prevent unauthorized access.