1/141
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What does meta data allow?
Organizing big pieces of data easier
What can you do to data?
Collect it, use it, and exploit it
What are examples of data?
Surveys, sensors, websites, search engines, bank accounts, shopping recipes, and historical search
What are databases?
Large collections of data, sometimes from the same source and sometimes different sources
What do databases look like?
A spreadsheet with rows and columbns of numerical and categorical data
What is the Structured Query Language (SQL)?
Language that helps computers pull info from databases
Through data collection what can we gather?
Info about facts and patterns
What can data show?
Trends and similarities between events (can determine if human viruses are similar)
What may data not show?
Correlation between variables
What would searching local disk memory do?
Provide access to data only if it is stored locally on a device
What can data be stored on?
External or web based databases or on a separate piece of software
What happens to sensitive data?
Its encrypted
How many bits is the result of the process by which a piece of data is encoded?
Fewer bits than its original file
What have algorithms been designed to?
Compress and encode data
How does data compression work?
Works by algorithm locating repeating patterns in the data and then replacing the patterns with placeholders
What is computational power?
How quickly a computer can perform an operation
Greater computational power -> quicker a system can decompress and stream videos
t's the speed and capacity of a system to perform calculations
What is lossless compression algorithm?
No info is lost between compression of the original file to decompression/extraction of the file
Can identically reconstructs the original file
What is run length encoding?
A method of encodng text that has many repeated characters
What is run length encoding considered to be?
Lossless compression format as the original file can be reconstructed after being compressed
How does run length encoding work?
Specifying the number of times a character or pixel repeats followed by the value of a character/pixel
When is it most efficient to use compression method?
When there are many repetitive pieces of data
How can you compress bbbbcccceeef?
4b4c3e1f
What is Lossy Compression Algorithm?
Compresses file sizes to be much smaller than those compressed using a lossless algorithm
What happens to the original piece of data after the Lossy Compression Algorithm?
It cannot be identically reconstructed
When is Lossy Compression Algorithm used?
When shrinking data size or transmission time is the most important factor to data compression
What are examples of picture encoding formats?
Bitmap (BMP), Portable Network Graphics (PNG), and Joint Photographic Experts (Group - JPEG or JPG)
What are BMPs and PNGs considered as?
Lossless compression
What are the benefits of data compression?
Saves storage space
Enables a faster transmission of data since data is smaller
Storing compressed data is less expensive since less storage space is needed
What is processing data?
Manipulation of data to create meaningful info
What is an example of data organization?
Spreadsheets are one of the main places that programs like to gather input
What is a common way of processing data and why?
Programs because they are capable of gathering a large amount of data as input, searching through the data to see if its usable, and then clustering the data
What does it mean to cluster data?
Organizing the data into groups that have similar content or sources
What can programs create?
Smaller subsets of info from a set of data
What are trending topics?
Ones foudn by searching algorithm that are talked about most during a period of time on a website
What are data filtering systems important tools for?
Finding info and recognizing patterns in data
What are the challenges in processing data?
Data needs to be cleaned, data may be incomplete, data may be invalid, data may need to be combined with other sources
What is easily processed data?
Numbers
What does some data need to be?
Extracted/modified
What is data cleaning (aka data sanitization)?
Modification of data that does not meet the formatting requirements for that type of data
Ex: a number that needs to be a string
What must happen to data before it is used?
It must be cleaned.
What is incomplete data?
Users may abbreviate, shorten, or provide an incorrect type of input in which would then be unsuable in the program
What is an example of invalid data?
A user gave a number data as a string
What is sequential computing?
A model in which operations are performed in order on at a time
When is parallel computing and distributed computing used?
If data sets are too large
What is parallel computing?
Breaking a program into multiple smaller sequential computing operations, some of which are performed simultaneously
What is distributed computing?
Uses multiple devices to run a program
Once a task is completed, each system submits their results and are compiled together
Donate spare computing power to help calculations
What is the con about using sequential computing?
Takes the longest because everything is completed in order
What are the pros about using parallel computing?
Parallel computing is faster than sequential because it does some tasks at the same time
What is the total time when using parallel computing?
The total time is the time for the steps that must be done in order, plus the time for the slowest task being done at the same time
What is the speed up of a parallel solution measured in?
The time it took to complete the task sequentially divided by the time it took to complete the task when done in parallel
What does the size of the set of data that is being processed determine?
How much info can be extracted from it and must be matched by a computing device with enough processing power
What is data decompression/extraction?
Restores the compressed data to its original form
Why are compression and extraction algorithms necessary when working with data?
Compression makes data easier to use because it saves storage space and is less expensive
Extraction algorithms are necessary to use when working with data because it restores the compressed data back to its original form
Explain how computation power relates to compression and extraction algorithms.
Computational power relates to compression and extraction because greater computational power means less time required to decompress and extract information
Explain the difference between lossless and lossy compression algorithms.
Lossless compression algorithms means no information is lost between compression of the original file to decompression of the file
Lossy compression algorithms compress file sizes to be smaller than the files of a lossless compression algorithm and the original file cannot be completely restored
Given the message below, what explains why it wouldn't benefit from being compressed using run length encoding?
bbvvcc
The encoded message would be the same length as the original message
Why is parallel processing so beneficial?
It is beneficial because it allows multiple tasks to be completed at the same time.
It also provides greater amounts of computational power to process large sets of data
What is not an advantage to using a computer to gather and process data?
A computer can hear a dialogue, detect a sarcastic remark, and transcribe the real meaning of the remark
What is NOT an example of a common challenge when processing data?
An age input value
What are examples of data visualizations?
Bar graphs, pie charts, line graphs, scatter plots, and images
What are skewed visualizations?
Visualizations of data can be skewed based on the number of scales plotted on the axes or by leaving out data
What is bias in marketing?
Can come from the company creating the visualization or from the group of programmers who developed the algorithm to express the visualization
What does bias in marketing show?
Info that highlights the positive aspects of their goods
How do you combat bias in marketing?
Examining meta data is one way to combat bias
What are limitations to programming?
If an algorithm has a low amount of sources, this limits the quality of data collected
If a program does not have enough data to draw a conclusive result, it will only output what it can
What is bias in programming?
A programmer's bias can sometimes cause inherent bias in the programs that they write
Where can bias in programming be seen?
In the types of inputs a program accepts/recognizes
What are examples of problems for algorithms?
Decidable problem
Unsolvable problem
Undecidable problem
What is a decidable problem?
When an algorithm can be constructed to find a correct solution for all inputs
Is this number even?
What is an unsolvable problem?
One where an algorithm cannot be constructed to find a solution
What is an undecidable problem?
Problem where there isn't an algorithm that could be constructed that will always give an accurate yes/no output for every input
What is an example of an undecidable problem?
Developing a program to find a matching vaccine for the flu vaccine
What is JPEG considered as?
Lossy compression
What is cryptography?
Writing and solving codes
What was the first example of cryptography?
Hieroglyphics carved into monuments from the old kingdom in Ancient Egypt
What is modern cryptography?
Science of storing data securely
What does modern cryptography must have?
Confidentiality and Authenticity
Integrity and Ownership
What is Confidentiality and Authenticity?
Cryptography processes ensure that data is confidential to the parties who need it and can be authentically confirmed and authorized owner of the data
What is Integrity and Ownership?
Cryptography concepts also ensure that info can be controlled by the owners of the secure data and that the integrity remains as the data is viewed or used
Why does cryptography use encryption and decryption?
To store data in a way that makes it incomprehensible
What is encryption?
The process by which a message or a piece of info is changed to read/display something to hide the info's true meaning
What is plaintext turned into?
Ciphertext (encrypted message)
Encoded message will require a key in order to be decrypted
What do certificate authorities issue?
Digital certificates that validate the ownership of encryption used in secure communications
What does decryption do?
Takes the encrypted message and decodes it
What is encoding?
Designed to change the plain text to cipher text
What does decoding an algorithm require?
A cipher text
What is symmetric key encryption?
One key to both encrypt a message and decrypt a message
Same key used for both
What are the advantages of symmetric key encryption?
If a large amount of data is being encrypted (and not decrypted by a different company) a symmetric key encryption is very effective
Symmetric key encryption is highly efficient, fast, and ideal for processing large volumes of data due to its use of a single shared key for both encryption and decryption
Where is symmetric key encryption used and why?
When data is encrypted in the hard drive
Hardware storage prevents the key from being exposed in memory, provides tamper-resistance, and allows for extremely fast encryption/decryption of large data volumes
What are the disadvantages of symmetric key encryption?
Keys can exist with multiple parties
Trust issues and key insecurity
Wha is public key encryption?
Different keys used for encryption and decryption
How do you encrypt a message with public key encryption?
A public key is known to everyone
What are encryption methods?
Transposition encryption and substitution encryption
What is transposition encryption?
Takes a message and rearranges the letters
What do you need to know for transposition encryption?
The pattern by which the letters are supposed to be ordered to decode the message
What is substitution encryption?
Replaces letters in the message with new letters, characters or numbers known as cipher text
What do you need to know for substitution encryption?
Need to know how letters are assigned in order to decode the message
In the Caesar Cipher Wheel, what do the letters in the inner circle represent?
Plain text
Work out to in
What is cybersecurity?
Protecting yourself and others from attacks carried out through and by computers
What does every computer and system have?
Vulnerabilities that can allow unauthorized access to personal info