003_12-9-24_Final_Exam_Review

CSE 3 Final Exam Overview

  • Total Questions: 80

  • Midterm Material: 20 Questions

  • Post-Midterm Material: 60 Questions

  • Date: Monday, December 9

  • Time: 8am-10am

  • Test Length: Two hours

  • Location: Media Theater

Computing Before Computers

  • Augusta Ada King, Countess of Lovelace

    • Interpreter and promoter of Charles Babbage’s work.

    • Authored a plan for using the Analytical Engine for calculating Bernoulli sequences.

    • Recognized as the first computer programmer.

British Codebreaking Team (WWII)

  • 1943: Formation of a team to decipher Nazi codes.

    • Led by mathematician Alan Turing.

    • Developed Colossus, seen as the first electronic digital computer.

    • Involved in breaking the Enigma cipher.

    • Turing also prominent for the Turing Test for artificial intelligence.

Evolution of Computers

  • Early Technology: Vacuum tubes used in computers.

  • Transistor Era: Replaced vacuum tubes starting in 1956.

  • Integrated Circuits: Emerged in the mid-1960s, known as silicon chips.

Freeware and Open Source Software

  • Freeware: Free software without restrictions, can be unsophisticated or sophisticated (e.g., Firefox, VLC Media Player).

  • Open Source: Not just free software, also free source code; allows downloading, modification, and improvement.

Moore’s Law

  • Defines the increase in transistor density on integrated circuits: doubles every two years.

  • Alternative views: doubling rate may happen every 18 months for processing speed and storage.

  • Acknowledge limits of growth described, highlighting miniaturization challenges.

Bit-Related Terminology

  • Bits and Bytes: Quantification of digital information.

    • 1 Byte = 8 bits

    • 1 Kilobyte (KB) = 1,000 bytes

    • 1 Megabyte (MB) = 1,000,000 bytes

    • 1 Gigabyte (GB) = 1,000,000,000 bytes

    • 1 Terabyte (TB) = 1,000,000,000,000 bytes

    • 1 Petabyte (PB) = 1,000,000,000,000,000 bytes

Representation of Numbers in Computing

  • Utilizing two symbols (0 and 1) to represent all numbers.

  • Each number viewed in terms of positional values (powers of 2).

  • Example: 19 as 00010011 in binary.

Dvorak Keyboard

  • Developed in 1936 to enhance typing efficiency.

  • Layout designed to reduce finger movement.

  • Features letters AOEUIDHTNS on the home row.

Touch Screens

  • Types:

    • Resistive: Uses light beams emitted from the edges for touch detection.

    • Capacitive: Detects touch via skin's electromagnetic field; supports multi-touch.

  • Commonly used in smartphones, tablets, and some laptops.

US Copyright Law

  • Article I, Section 8 of the Constitution grants Congress the power to enact copyright laws.

  • Copyright Duration: 70 years + lifespan of the author or 120 years for corporate works (changed by Bono Act of 1998).

  • Patents last for 20 years from the application date.

Fair Use Exceptions

  • Duplication of copyrighted content is allowed for criticism, commentary, teaching, scholarship, or research.

  • Not absolute; courts consider the amount used and market impact.

  • Fair Use can be a defense in court but does not guarantee immunity from legal action.

Linus Torvalds and Open Source

  • Creator of Linux, an open source operating system kernel.

  • Developed Git for tracking changes in programming.

  • Major repository of open-source software: GitHub.

  • Popular Linux distributions: Ubuntu, CentOS, Fedora.

The Language of Computers

  • Natural Languages: Languages spoken by humans.

  • Programming Languages: Intermediate between machine language and natural languages.

  • Languages like C++, JavaScript, Perl, PHP are examples.

  • Machine Language: Numeric codes that represent data.

Software Development Process

  • Testing Phases:

    • Alpha Testing: Internal testing by a small group.

    • Beta Testing: External testing by volunteers.

  • New releases often come with additional features and fixes for previous bugs; may introduce new issues.

  • Patches: Minor fixes often provided for free.

Emulator Programs

  • Simulate another operating system or hardware.

  • Not all applications will run perfectly; may cause performance drops.

  • Older systems are typically easier to emulate.

Software Applications Overview

  • Licensing: Commercial software is copyrighted and cannot be distributed illegally.

  • Distribution Channels: Direct sales, retail stores, and websites.

  • End-User License Agreement (EULA) governs usage of software.

System Software and Device Drivers

  • Device Drivers: Programs allowing I/O devices to communicate with the computer.

  • Issues often arise with video and printer drivers.

  • New PCs generally include current hardware compatible with the latest operating system.

Database Basics

  • Database Programs: Tools for organizing information storage and retrieval.

  • Databases: Collections of related information, often organized in tables.

  • Key components: fields, records, tables, and data types (text or numeric).

SQL and Database Management

  • SQL (Structured Query Language): Standard language for programming complex database queries.

  • Users benefit from graphical interfaces for query execution without needing to learn SQL.

Special-Purpose Database Programs

  • Software specifically designed for unique storage and retrieval purposes.

  • Geographical Information Systems (GIS): Utilize maps for geographic and demographic data.

Data Compression Techniques

  • Reduces file sizes for efficient transmission and storage.

  • Types:

    • Lossy Compression: Permanently loses some information.

    • Lossless Compression: Allows complete recovery of the original data.

Graphics File Formats

  • Common Formats:

    • GIF: Supports animations, lossless compression but limited colors.

    • JPG: Various colors but uses lossy compression.

    • PNG: Lossless but larger file sizes, used for infographics.

    • WebP: New format that offers smaller sizes but compatibility issues.

Digital Audio Formats

  • Overview of audio file types:

    • WAV/AIFF: Standard formats for uncompressed audio, large file sizes.

    • MP3: Popular compressed format, significantly reduces file size.

    • WMA: Developed by Microsoft, offers better file fidelity.

    • AAC: Apple’s advanced compression, often superior to MP3.

    • FLAC: Open-source, retains full audio quality while compressing files.

Basic Network Anatomy

  • Definition: A network combines two or more linked computers.

  • Benefits: Shared resources reduce costs, increase efficiency, and facilitate collaboration.

Broadband Connection Types

  • DSL, cable, satellite: Different types of broadband connections, defined by speed and provider.

  • Fiber Optic: Offers much greater bandwidth, superseding copper cables.

Network Structure and Performance

  • Different cable types: Twisted pair, Coaxial cable, Fiber optic, each having distinct uses and costs.

  • Wireless connections: Vary in capacity and distance, suitable for dynamic environments.

Email, Instant Messaging, and Teleconferencing

  • Private Browsing: Disables history but doesn’t anonymize from networks.

  • TOR Browser: For enhanced anonymity, connecting through an anonymizing network.

  • IP Address: Represents a computer on the network but is not a direct identifier of the user.

Privacy-focused Tools

  • Duck Duck Go: Search engine that does not track user activity.

  • Virtual Private Networks (VPN): Services for anonymizing internet activity; careful when choosing providers.

Understanding Internet Addresses

  • Domain Name System (DNS): Translates IP addresses to human-readable names.

  • Recognizes top-level domains like .edu, .com, .gov, .org.

TCP/IP Protocols

  • TCP: Breaks messages into packets for transmission, routed by routers.

  • IP Addresses: Unique identifiers for host computers, moving from IPv4 to IPv6 to accommodate growing address needs.

Software Sabotage: Malware Types

  • Malware: Encompasses harmful software, including Trojans, viruses, and worms.

  • Protection Measures: Keep software updated and have robust antivirus tools.

Identity Theft Prevention

  • Use credit cards instead of debit cards for online purchases.

  • Secure transactions by checking for HTTPS in URLs.

  • Be cautious with personal information sharing.

Computer Security Measures

  • Access based on various identification types: Identity tokens, passcodes, or biometrics.

  • Multi-factor Authentication: Combining identification methods enhances security.

Password Security Practices

  • Effective passwords: Long, complex, and changed frequently. Avoid personal words.

  • Watch for keyloggers and ensure your passwords are unique to each account.

Message Encryption

  • Use encryption software to secure communication by scrambling messages, requiring a key to unscramble.

Backup and Recovery Strategies

  • Utilize uninterruptible power supplies for surge protection.

  • Establish a regular backup routine; automated systems are recommended.

robot