CS101 Exam Cheat-Sheet Networking & Security Proxy Server: acts as intermediary; hides client, filters content (e.g. virus-scan) Auditing SW: traffic surge & pattern monitoring; early problem detection Antivirus: signature-based; needs frequent updates; safe-use rules (no unknown attachments, pop-ups, idle connections) Encryption:
• Public-Key ⇒ C = E < e m > p u b ( P ) C=E<em>{pub}(P) C = E < e m > p u b ( P ) ; only holder of private key decrypts
• Authentication via digital signature: S = E < / e m > p r i v ( M ) S=E</em>{priv}(M) S = E < / e m > p r i v ( M ) , recipient checks with sender’s public key Legal: CFAA (US), PECO 2007 (PK), ETO 2002/08, PTA 1996, etc. Algorithms Informal: ordered steps (input → process → output) Formal def: ordered, unambiguous, executable, finite → \rightarrow → terminating process Abstract vs Representation (story vs book); program = representation; process = execution Primitives → Programming Languages → Pseudocode (if/else, while, def function) Discovery: Polya 4-phase; strategies—work backwards, related problem, stepwise refinement (top-down); bottom-up complements Iteration: loop control needs initialize | modify | test; pretest (while) vs post-test (repeat)
• Examples: sequential search, max-in-list, factorial Recursion: function calls itself (binary search); needs base case; same control triad Efficiency: sequential search O ( n ) O(n) O ( n ) avg n / 2 n/2 n /2 , binary O ( log 2 n ) O(\log_2 n) O ( log 2 n ) ; algorithm analysis (best / avg / worst) Programming Paradigms & Languages Generations: 1-machine, 2-assembly, 3-high-level (FORTRAN, COBOL) Paradigms: imperative (procedural), object-oriented (class, object, method, encapsulation), functional (compose functions), declarative (logic, simulation), concurrent (thread/task) Data Types: int , float , char , bool \text{int}, \text{float}, \text{char}, \text{bool} int , float , char , bool ; aggregates (struct), arrays; assignment n a m e = e x p r name=expr nam e = e x p r Control structures: if, loop (while), pre/post test Operators: + - * / %, relational < > ==, logical && || ! Concurrency: spawn threads; mutual exclusion via locks; shared vs exclusive Software Engineering Life-Cycle: Requirements → Design → Implementation → Testing → Maintenance (cycle) Methodologies: Waterfall, Incremental/Iterative, RUP, Prototyping (evolutionary, throw-away), Agile/XP Modularity: minimise coupling (control, data, global), maximise cohesion (functional > logical); info-hiding Components, design-patterns (Adapter, Decorator, Factory, Shopping-Cart) Quality Assurance: reviews, SQA, metrics (MTBF, coupling), CASE/IDE Verification: testing scopes—glass-box (basis-path, Pareto), black-box (boundary, beta); commit/rollback, locking (shared/exclusive, wound-wait) Ownership & Liability: copyright, license, patent; disclaimers; due-care defence Data Structures & Abstract Data Types List, Stack (LIFO push/pop), Queue (FIFO enqueue/dequeue) Tree (root, parent, child, leaf; binary tree depth) Pointer: cell storing address; enables linked structures Databases DBMS layer separates application; schemas/subschemas enable access control + data independence Models: Relational (tables/relations; tuple, attribute; SELECT, PROJECT, JOIN), Object-Oriented (objects, persistence) File org: sequential, indexed (index file), hashing (buckets; prime bucket count) Integrity: Logging, commit point, rollback, cascading; locking (shared/excl), scheduler Data Mining: class description, discrimination, clustering, association, outlier, sequential patterns; warehouses vs operational DB Social impact: privacy, misuse; EPIC, PI watchdogs Artificial Intelligence Intelligent Agent: sensors → perceive; actuators → act; reflex vs knowledge vs goal vs learning Turing Test: indistinguishable conversation; limitations (ELIZA etc.) Perception challenges: image processing (edge, region, smoothing); language processing (syntax, semantics, context) CS & Society Impacts: + productivity, communication, e-health; – obesity, privacy loss, crime, e-waste Security goals: confidentiality, integrity, availability, authentication Content filtering, spam laws (CAN-SPAM, CASL), child protection, IP (copyright, patent, trade-mark, design, DB right), privacy regulations (HIPAA, COPPA) Word: Ribbon navigation; Home groups—Clipboard (Cut Ctrl+X, Copy Ctrl+C, Paste Ctrl+V), Font, Paragraph (bullets/numbering, alignment), Styles; Insert—Cover Page, Table, Pictures, Header/Footer, WordArt; References—TOC, Footnotes; Review—Track Changes Excel: cell A 1 A1 A 1 , formulas start ‘=’; common functions SUM, AVERAGE, MIN, MAX, COUNT; sort/filter; charts; lists B 3 : B 14 B3:B14 B 3 : B 14 PowerPoint: slide layouts, themes, transitions, animations Access: tables (fields/records), queries (SELECT, INSERT, UPDATE, DELETE), forms, reports HTML basics: < h t m l > , < h e a d > , < b o d y > <html>,<head>,<body> < h t m l > , < h e a d > , < b o d y > ; block vs inline; tags & attributes; Dreamweaver WYSIWYG; insert table, lists, images Knowt Play Call Kai