CS101: Introduction to Computing

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/18

flashcard set

Earn XP

Description and Tags

This set of flashcards covers fundamental concepts and definitions from the CS101 lecture notes, focusing on topics such as computer security, algorithms, databases, data types, and the implications of computer science on society.

Last updated 3:44 PM on 2/3/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

19 Terms

1
New cards

What is a Denial of Service Attack?

A denial of service attack aims to disrupt a company's business by overwhelming its systems with messages from a botnet.

2
New cards
3
New cards

What is spam in the context of email?

Spam refers to unwanted, unsolicited emails that overwhelm recipients, often used for phishing or spreading malware.

4
New cards

What is the function of a proxy server in network security?

A proxy server acts as an intermediary between a client and a server to shield the client from potential threats from the server.

5
New cards

What does antivirus software do?

Antivirus software detects and removes viruses and other malware, ensuring systems are protected against infections.

6
New cards

What is the purpose of public key encryption?

Public key encryption ensures the authenticity of a message by verifying the identity of the sender through encryption and digital signatures.

7
New cards

Define algorithm.

An algorithm is an ordered set of unambiguous, executable steps that defines a terminating process.

8
New cards

What is the difference between a program and a process?

A program is a representation of an algorithm, while a process is the activity of executing that algorithm.

9
New cards

What are the key phases in the problem-solving method according to Polya?

  1. Understand the problem. 2. Devise a plan. 3. Carry out the plan. 4. Evaluate the solution.
10
New cards

What is a relational database?

A relational database stores data in structured tables (relations) that can be linked based on shared attributes.

11
New cards

What is the significance of data mining?

Data mining discovers patterns in large data sets to provide insights for decision making across various fields.

12
New cards

What are the four main areas of computer security?

  1. Confidentiality, 2. Integrity, 3. Availability, 4. Authentication.
13
New cards

Explain the term 'intellectual property.'

Intellectual property refers to creations of the mind, such as inventions, literary and artistic works, designs, symbols, names, and images used in commerce.

14
New cards

What are the impacts of CS on health?

Positive impacts include easier access to health information, while negative impacts involve risks like computer-related injuries and social isolation.

15
New cards

What is the Turing Test?

The Turing Test is a measure of a machine's ability to exhibit intelligent behavior indistinguishable from that of a human.

16
New cards

What is the goal of user documentation?

User documentation explains how to use a software product and aims to make it accessible to the users.

17
New cards

What is meant by 'data independence' in databases?

Data independence refers to the ability to change the database schema without affecting the application programs that use those databases.

18
New cards

What distinguishes dynamic typing from static typing in programming languages?

Dynamic typing allows variable types to change at runtime, whereas static typing requires variable types to be specified at compile time.

19
New cards

What is an object in object-oriented programming?

An object is a self-contained unit that contains both data and methods that operate on the data, defined by its class.