1/121
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
analog
a continuous representation, analogous to the actual information it represents
digital
a discrete representation, breaking the info up into separate elements
binary
base 2, used for things like coding
Octal
a base 8 number system, uses 0-7 where each value has 8 digits
Hexadecimal
base 16 number system, uses values 0-9 and A-F for numbers in the system
Bandwidth
restricts the size of files that can be sent
Compression Ratio
the size of the compressed data divided by the size of the original data
analogous data
not stored well as it is infinite
Digital Data
finite values and can be stored easier by computers
reclocking
the process of the signal regaining its original shape to make sure no data was lost
two's complement
2^k-i, a way to represent negative numbers in binary
Number overflow
when the computer does not have enough bits to store all the data
ASCII character set
American Standard Code for Information Interchange, used 7 bits for 128 characters eightth was a bit check, now uses up to 256 characters
UNICODE Character Set
an extension of ASCII that used 16 buts per character, covered many languages
run length encoding
replacing a long series of a repeated character with a count of the repeated character
what do MP3's do to audio
discard noise not heard by humans to shrink the file
GIF
Graphics Interchange Format
Video Codec
Methods used to shrink the size of a movie
ALU
arithmetic/logic unit, used to solve basic problems like adding and subtracting
addressability
The number of bits addressable at one time in a computer, 32 bit computer, 64 bit computer
registers
places where info can be stored to pull from in multistep problems
control unit
The organizing force in the computer
Instruction Register (IR)
contains the instruction currently being executed
Program Counter (PC)
contains the address of the next instruction to be executed
CPU
Central Processing Unit, contains the ALU and Control Unit
Fetch-Execute Cycle
Fetch the instruction, decode the info, get data if needed, execute the instruction
RAM
can have its info's location changed, volatile
ROM
information's location cannot be altered, non-volatile
seek time
the time it takes for a read/write head to move to a specific data track
Latency
The time it takes for the specified sector to be in position under the read/write head
access time
The time it takes for a block to start being read; the sum of seek time and latency
transfer time
The rate at which data moves from the disk to memory
Resistive Touch screens
made of two layers, that have electrical conductive material in them and when the screen is pressed they touch sending a signal to that area of the screen
capacitive touch screens
laminent over glass and your touch sends a current to your finger and maps the signal
infrared touch screen
A screen with crisscrossing horizontal and vertical beams of infrared light
surface acoustic wave screens
use sound waves just like infrared waves to track touches
Bit-level parallelism
Bits can be processed simultaneously
instruction level parallelism
different instructions that dont overlap can be ran at the same time
Data-Level Parallelism
a single set of instructions can be run on different data sets at teh same time, SIMD = Single Instructions Multiple Data
Task-level parallelism
different processors can run the same or different instructions on the same or different data sets.
assembly languages
assign mnemonic letter codes to each machine-language instructions
machine language
instructions built into a computer that it understands
assembler
A program that translates an assembly-language program into machine code
Boolean Expression
evaluates a true/false statement
Pep/9
A virtual computer designed by Stanley Warford that has 40 machine-language instructions
pseudocode
a language that allows us to express algorithms in a clearer form
Python
programming language
print()
prints whatever is in parenthesis
input()
gets data
int()
converts string to integer number
concatenation
combining two strings together without a space
Nested structures
A structure in which one control structure is embedded within another
abstract step
An algorithmic step for which some details remain unspecified
concrete step
A step for which the details are fully specified
array
a named collection of homogenous items which individual items are accessed by their place within the collection, the collection is known as the index
computer problem-solving process
1. analysis and specification phase
2. algorithm development phase
3. implementation phase
4. maintenance phase
Count controlled loop
A loop that stops when a counter variable reaches a specified limit.
event controlled loop
A loop that terminates when something happens inside the loop body to signal that the loop should be exited
Searching Arrays
goes thru the array one at a time until it finds the value it is looking for
Sorting Array
putting the items into an order, such as numeric
sequential search
goes thru data numerically
binary search
divide and conquer
insertion sort
an already sorted array that has items being added to them that are sorted based on the setup of the array before it was inserted.
bubble sort
comparing the two adjacent valuyes and moving them accordingly to make sure that they are in ascending order. can be done in 1 array
recursive algorithms
when an algorithm uses its own name in the algorithm
information hiding
the process of hiding lower detail information when working with higher level details
abstraction
a model of a complex system that includes only the details essential to the viewer.
data abstraction
the separation of the logic behind data from what is presented
procedural abstraction
the separation of the logical view of an action from what is presented
Flow chart - oval shape
start or end of flow chart
Flow chart - parallelogram
input/output of data
flow chart - rectangle
process of flowchart
flow chart - diamond
if statement
flow chart - circle
connector to next page of flow chart
how do ranges in loops work
the range starts at 0 so if you want a range of 6 it would run 0-5
while loops
A control structure that allows a piece of code to repeated until a certain condition is false
how would you get a random number in code
import random
print(random.randint(0,1)
how is a list formatted if using Rock, Paper, and Scissors
mylist= ["Rock","Paper","Scissors"]
wireless networks
are available to send data thru infrared or radio waves to process data
data transfer rate
the speed with which data is moved from one place on a network to another, also known as bandwidth
client/server model
the request and action model of networks
file server
creates one database for all files in the network
web server
the computer that completes all the requests
P2P Model
Model that enables every computer on the network to be both client and server. Any user can make files publicly available to other users on the network.
LAN Network
Local access network, connects machines in a small area to each other
topologies
Physical layout of a network (Star, Ring and Bus and each individual known as nodes)
WAN Networks
wide-area networks, connects two or more LANs in different areas.
internet backbone
high capacity data routes owned by companies like AT&T
packet switching
The approach to network communication in which packets are individually routed to their destination, then reassembled
repeaters
used along cable lines to strengthen the signal
OSI Reference Model
Open Systems Interconnection Reference Model, used to facilitate how networks are formatted so they can all interact
TCP/IP
Transmission Control Panel/ Internet Protocol, TCP is the network protocol tha breaks messages into packets and fixes issues, IP deals with the routing of these packets
UDP
User Datagram Protocol is a less popular alternative as it is faster, however, less reliable
traceroute
a program which tracks the path of a packet
IPv4
The Internet Protocol version 4 is the dominant protocol for routing traffic on the Internet, specifying "to" and "from" addresses using a dotted decimal such as "122.45.255.0".
IPv6
newer version that uses 128 bits instead of 64
ICANN
Internet Corporation fro Assigned Names, authroiuty for giving domain names
domain names
unique names which identify Internet sites and businesses
HTTP
hypertext transfer protocol
information security
the protection and access rights to files stored electronically online