CSP EXAM

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/212

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

213 Terms

1
New cards
Overflow
error that results when the number of bits is not enough to hold the number, like a car's odometer "rolling over"
2
New cards
Round-off
error that results when the number of bits is not enough to represent the actual number, like 3 digits to represent π as 3.14
3
New cards
Lossy
Compressing data in a way that throws some data away and makes it almost impossible to recover the original, great compression, like JPEG images
4
New cards
Lossless
Compressing data in a way that preserves all data away and allows full recovery of the original, good compression \-- usually not as good as lossy, like PNG images
5
New cards
Metadata
data about data, like a camera storing the location, aperture, shutter speed, etc. for a digital photo
6
New cards
Sequencing
code flows line by line, one after another, like a recipe
7
New cards
Selection
a boolean condition to determine which of two algorithmic paths are taken, aka if-then
8
New cards
Iteration
using a looping control structure, like while, for, foreach, repeat, repeat-until, etc.
9
New cards
Reasonable Time
polynomial in the number of steps an algorithm takes in the worst case based on the input size
10
New cards
Not reasonable time
Usually exponential in the number of steps, like doubling every time your input grows by one
11
New cards
Heuristic
using a "rule" to guide an algorithm, like always walking toward the north star if you were stuck in a forest
12
New cards
Undecidable
A problem that is so difficult, we can't ever create an algorithm that would be able to answer yes or no for all inputs, like determining if a user's program run on some input would always stop and not run forever
13
New cards
Linear Search
Going one by one vs starting in the middle and going left/right like looking for a word in the dictionary
14
New cards
Binary Search
requires the list to be sorted in order and then cutting the list in half
15
New cards
APIs
Application Programming Interface
16
New cards
Citizen Science
Lots of people to help with a scientific project, like asking everyone around the world to count the butterflies they see one day
17
New cards
Cloud Computing
Using distributed calculations and/or storage for big data or a web application
18
New cards
Crowdsourcing
Asking lots of users online to help with something, like funding a project, or running SETI@Home to help look for extraterrestrial signals
19
New cards
Creative Commons
An alternative to copyright that allows people to declare how they want their artistic creations to be shared, remixed, used in noncommercial contexts, and how the policy should propagate with remixed versions
20
New cards
Open Access
A policy that allows people to have read access to things, e.g., libraries or online data
21
New cards
Moore's Law
The \# of transistors on a chip doubles every two years
22
New cards
Peer-to-peer Networks
A system where one user's computer connects through the Internet to another user's computer without going through an intermediary "centralized" computer to manage the connection
23
New cards
Digital Divide
The idea that some communities / populations have less access to computing than others
24
New cards
ISP
Internet Service Provider
25
New cards
How does internet communication arrive at its destination?
Speech on the Internet goes from the source to an ISP, into the cloud, out of the cloud to another ISP, and to its destination
26
New cards
How can the government control speech on the Internet?
1) It can try to control the speaker or the speaker's ISP, by criminalizing certain kinds of speech. But that won't work if the speaker isn't in the same country as the listener.
27
New cards
2)It can try to control the listener, by prohibiting possession of certain kinds of materials. In the U.S., possession of copyrighted software without an appropriate license is illegal, as is possession of other copyrighted material with the intent to profit from redistributing it.

28
New cards
3) The government can try to control the intermediaries.

29
New cards
How can Internet posters evaded being convicted for defamation/slander on the Web?
The posters could evade responsibility as long as they remained anonymous, as they easily could on the Internet.
30
New cards
What has Congress given ISPs relating to an Internet Defamation case?
Congress had given the ISPs a complete waiver of responsibility for the consequences of false and damag- ing statements, even when the ISP knew they were false.
31
New cards
Internet Protocol Hourglass
Each protocol interfaces only to those in the layers immediately above and below it, and all data is turned into IP bit packets in order to pass from an application to one of the physical media that make up the network.
32
New cards
-Email, Web, Phone

33
New cards
-SMTP, HTTP

34
New cards
-TCP, UDP

35
New cards
-IP

36
New cards
-Wire, Fiber, Radio

37
New cards
TCP
Transmission Control Protocol
38
New cards
Guarantees reliable transmission by breaking messages into packets, keeping track of which packets have been received successfully, resending any that have been lost, and specifying the order for reassembling the data on the other end.

39
New cards
UDP
User Datagram Protocol
40
New cards
provides timely but unreliable message delivery

41
New cards
HTTP
HyperText Transport Protocol
42
New cards
which is used for sending and receiving web pages

43
New cards
SMTP
Simple Mail Transport Protocol
44
New cards
used for sending email.

45
New cards
What does "End to End" mean in regards to the Internet?
"End to End," in the Internet, means that the switches making up the core of the network should be dumb—optimized to carry out their single limited function of passing packets.
46
New cards
RFC
Request for Comment
47
New cards
Standards adopted through a remarkable process of consensus- building, nonhierarchical in the extreme. Someone posts a proposal, and a cycle of comment and revision, of buy-in and objection, eventually converges on something useful, if not universally regarded as perfect.

48
New cards
Shortcut for going from binary to hexadecimal
To translate a binary numeral (like 11010111012) to hexadecimal, start by splitting it into groups of four bits, from right-to-left (like this: 11 0101 1101).
49
New cards
Then determine the value of each group and write the corresponding hex digit.

50
New cards
Internet
A network of independent but connected devices all over the world.
51
New cards
World Wide Web
The collection of interlinked website documents (such as HTML files) that you can view with a web browser by typing addresses like http://bjc.berkeley.edu/website/privacy.html.
52
New cards
HTML
Hypertext markup language
53
New cards
Most web pages are written with \________

54
New cards
URL
Uniform Resource Locator
55
New cards
An address for accessing specific web data located on a server

56
New cards
Server
A computer hosting data for others to access
57
New cards
Protocol
the standard for communication between browsers and servers (usually "http" or "https")
58
New cards
Sometimes not visible in browsers like Google Chrome

59
New cards
Domain Name
The name of the server that hosts the data
60
New cards
(bjc.berkeley.edu)

61
New cards
Path
the location of the data in a hierarchy of folders on the server
62
New cards
(Website/privacy.html)

63
New cards
Protocols
Standards for communication
64
New cards
IP
Internet Protocol
65
New cards
An addressing system that finds paths to distant computers

66
New cards
Specifies how a router handles a request for another IP address.

67
New cards
Redundant
There are multiple pathways among the physical connections of the Internet to create redundancy. Even if one pathway is unavailable, there is still another way to transmit a message from sender to receiver
68
New cards
Hiearchial
There are two \____________ Internet addressing systems, domain names and IP addresses. These address \______________ works much like the postal system, which locates people first by state, then city, then street, then house number, then apartment, and then finally person.
69
New cards
Fault Tolerance
ability to work around problems
70
New cards
Scalability
the ability of the net to keep working even as the size of the network and the amount of traffic over the network increase.
71
New cards
Virus
A kind of malware that tries to spread itself over the network to other computers.
72
New cards
Antivirus Software
Helps protect against virus attacks
73
New cards
Phishing
An attacker sends you an email that appears to be from some official organization (such as your bank) and tricks you into giving information to the attackers (such as your bank password).
74
New cards
DDoS
Distributed Denial of Service
75
New cards
-Consists of sending a lot of requests to a server at the same time. This can overload the server's network bandwidth.

76
New cards
-Causes a temporary inability to reach the targeted server so other users of that server are denied service.

77
New cards
Which protocols are used to keep secure HTTP connections?
Transport Layer Security (TLS) or maybe an older version called Secure Sockets Layer (SSL)
78
New cards
With these protocols, the site you are visiting sends its public key, and your browser uses it to encrypt the information you send.

79
New cards
Certificate Authorities
Used by many websites for encryption to protect files and information that is transmitted over the Internet. They issue certificates to verify the identity of a user or computer.
80
New cards
Public IP Address
The IP address that is logged by various servers/devices when you connect to them through your internet connection.
81
New cards
Private IP Address
An IP address that's reserved for internal use behind a router or other Network Address Translation (NAT) device, apart from the public.
82
New cards
IP v4
This address is big enough to support 2^32 computers. That's about four billion (4 · 109), but there are more than seven billion people on Earth, so there aren't enough IP addresses to go around. Each of the four numbers in a typical IP address today is an eight-bit byte with a value between 0 and 255
83
New cards
IP v6
The long-term solution is to increase the length of an IP address. The new IP addresses are 128 bits wide, which is enough to support 2^128 (about 1038) computers.
84
New cards
Routers
The "connection points" of the Internet.
85
New cards
Networking devices that route traffic between subnetworks on the Internet.

86
New cards
Packets
When you send a message over the Internet, your computer divides it into small chunks called \__________ that it sends individually, each on its own path. A \__________ can include any kind of data: text, numbers, lists, etc.
87
New cards
Packet Switching Network
A digital networking communications method that groups all transmitted data into suitably sized blocks, called packets, which are transmitted via a medium that may be shared by multiple simultaneous communication sessions.
88
New cards
Example : Internet

89
New cards
Hierarchy of Abstractions
Manages the complexity of the Internet by hiding the details of lower levels of the system. The highest level of abstraction includes the most general features of the Internet that have to work the same across all devices. At lowers levels of abstraction, things get more device-specific.
90
New cards
Application Layer Protocols
The highest level of abstraction because they manage how data is interpreted and displayed to users. These protocols give meaning to the bits sent by lower-level protocols; user and server computers must agree on what the bits mean, and application protocols (like HTTP) offer this.
91
New cards
Transport Layer Protocols
Manage the breakdown of a message into packets to be transmitted by lower level protocols and also the reconstruction of the message from the packets upon arrival.
92
New cards
Internet Layer Protocols
Manage the pathways that the data packets travel across networks. These protocols treat the Internet like one large network even though the physical reality on the lower level is one of many tiny subnetworks.
93
New cards
Network Interface Hardware
Also known as Link Layer
94
New cards
All Internet devices connect through a physical interface that uses a protocol to manage the connection to the local network. These local protocols are the least abstract because they deal directly with your physical hardware.

95
New cards
DNS
Domain Name System
96
New cards
The hierarchical addressing protocol that is human-readable

97
New cards
Who is in charge of the Internet?
The computers on the Internet and the connections among them don't belong to any one organization.
98
New cards
ICANN
the Internet Corporation for Assigned Names and Numbers
99
New cards
Controls the DNS hierarchy and the allocation of IP addresses.

100
New cards
For how long has the U.S. dominated the Internet and why?
The U.S. has "controlled" the Internet up until 2009. The Advanced Research Project Agency (ARPA) first developed the Internet in 1969.