CS101 Exam Cheat-Sheet

Networking & Security

  • Proxy Server: acts as intermediary; hides client, filters content (e.g. virus-scan)
  • Auditing SW: traffic surge & pattern monitoring; early problem detection
  • Antivirus: signature-based; needs frequent updates; safe-use rules (no unknown attachments, pop-ups, idle connections)
  • Encryption:
    • Public-Key ⇒ C=E<em>pub(P)C=E<em>{pub}(P); only holder of private key decrypts • Authentication via digital signature: S=E</em>priv(M)S=E</em>{priv}(M), recipient checks with sender’s public key
  • Legal: CFAA (US), PECO 2007 (PK), ETO 2002/08, PTA 1996, etc.

Algorithms

  • Informal: ordered steps (input → process → output)
  • Formal def: ordered, unambiguous, executable, finite \rightarrow terminating process
  • Abstract vs Representation (story vs book); program = representation; process = execution
  • Primitives → Programming Languages → Pseudocode (if/else, while, def function)
  • Discovery: Polya 4-phase; strategies—work backwards, related problem, stepwise refinement (top-down); bottom-up complements
  • Iteration: loop control needs initialize | modify | test; pretest (while) vs post-test (repeat)
    • Examples: sequential search, max-in-list, factorial
  • Recursion: function calls itself (binary search); needs base case; same control triad
  • Efficiency: sequential search O(n)O(n) avg n/2n/2, binary O(log2n)O(\log_2 n); algorithm analysis (best / avg / worst)

Programming Paradigms & Languages

  • Generations: 1-machine, 2-assembly, 3-high-level (FORTRAN, COBOL)
  • Paradigms: imperative (procedural), object-oriented (class, object, method, encapsulation), functional (compose functions), declarative (logic, simulation), concurrent (thread/task)
  • Data Types: int,float,char,bool\text{int}, \text{float}, \text{char}, \text{bool}; aggregates (struct), arrays; assignment name=exprname=expr
  • Control structures: if, loop (while), pre/post test
  • Operators: + - * / %, relational < > ==, logical && || !
  • Concurrency: spawn threads; mutual exclusion via locks; shared vs exclusive

Software Engineering

  • Life-Cycle: Requirements → Design → Implementation → Testing → Maintenance (cycle)
  • Methodologies: Waterfall, Incremental/Iterative, RUP, Prototyping (evolutionary, throw-away), Agile/XP
  • Modularity: minimise coupling (control, data, global), maximise cohesion (functional > logical); info-hiding
  • Components, design-patterns (Adapter, Decorator, Factory, Shopping-Cart)
  • Quality Assurance: reviews, SQA, metrics (MTBF, coupling), CASE/IDE
  • Verification: testing scopes—glass-box (basis-path, Pareto), black-box (boundary, beta); commit/rollback, locking (shared/exclusive, wound-wait)
  • Ownership & Liability: copyright, license, patent; disclaimers; due-care defence

Data Structures & Abstract Data Types

  • List, Stack (LIFO push/pop), Queue (FIFO enqueue/dequeue)
  • Tree (root, parent, child, leaf; binary tree depth)
  • Pointer: cell storing address; enables linked structures

Databases

  • DBMS layer separates application; schemas/subschemas enable access control + data independence
  • Models: Relational (tables/relations; tuple, attribute; SELECT, PROJECT, JOIN), Object-Oriented (objects, persistence)
  • File org: sequential, indexed (index file), hashing (buckets; prime bucket count)
  • Integrity: Logging, commit point, rollback, cascading; locking (shared/excl), scheduler
  • Data Mining: class description, discrimination, clustering, association, outlier, sequential patterns; warehouses vs operational DB
  • Social impact: privacy, misuse; EPIC, PI watchdogs

Artificial Intelligence

  • Intelligent Agent: sensors → perceive; actuators → act; reflex vs knowledge vs goal vs learning
  • Turing Test: indistinguishable conversation; limitations (ELIZA etc.)
  • Perception challenges: image processing (edge, region, smoothing); language processing (syntax, semantics, context)

CS & Society

  • Impacts: + productivity, communication, e-health; – obesity, privacy loss, crime, e-waste
  • Security goals: confidentiality, integrity, availability, authentication
  • Content filtering, spam laws (CAN-SPAM, CASL), child protection, IP (copyright, patent, trade-mark, design, DB right), privacy regulations (HIPAA, COPPA)

Office & Web Tools (Quick Reference)

  • Word: Ribbon navigation; Home groups—Clipboard (Cut Ctrl+X, Copy Ctrl+C, Paste Ctrl+V), Font, Paragraph (bullets/numbering, alignment), Styles; Insert—Cover Page, Table, Pictures, Header/Footer, WordArt; References—TOC, Footnotes; Review—Track Changes
  • Excel: cell A1A1, formulas start ‘=’; common functions SUM, AVERAGE, MIN, MAX, COUNT; sort/filter; charts; lists B3:B14B3:B14
  • PowerPoint: slide layouts, themes, transitions, animations
  • Access: tables (fields/records), queries (SELECT, INSERT, UPDATE, DELETE), forms, reports
  • HTML basics: <html>,<head>,<body><html>,<head>,<body>; block vs inline; tags & attributes; Dreamweaver WYSIWYG; insert table, lists, images