• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/65

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

65 Cards in this Set

  • Front
  • Back
In RAPTOR, a variable does not have a value until a progam instruction gives it a value. (true or false)
True
Using a sub-chart and a call symbol to break an algorithm in to sub-processes, design the subprocesses separately, and simply call them to run when we need them is an example of:
Process Abstraction
What is the language used to add objects to Google Earth?
KML
When analyzing requirements with multiple variable inputs it is best to use a __ to ensure all possibilities have been covered:
Decision Table
The hardware component used to control the operation of a computer system is:
Central Processing Unit (CPU)
RAM has many advantages over an internal hard drive, but we don't exculsively use RAM because:
It is volatile and expensive
Movies are generally distributed on what type of storage?
Optical
What is ASCII?
American Standard Code for Information Interchange, standard 8-bit coding
What is the smallest dot that a monitor can display?
Pixel
What is the remove of some light by adding additional color?
Subtracive
(opposite = additive)
What is a byte?
8 bits
What discard "extraneous" information, such as imperceptible color differences
lossy
What compression information but does not discard any information?
Lossless
In an audio file we take __ to be able to reconstruct the orginal wave.
samples
What is a precise, step-bystep set of instructions for solving task.
algorithm
What three think do you need for a valid algorithm
unambiguous, executable, and ordered
For any given, non- trivial (or set of related tasks,) there are __ possible algorithms for accomplishing the task.
many
An algorithm does not -- the underlying theory behind the instruction steps.
encode
Some algorithms are more -- than other algorithms
efficient
Computer programs that are used over many years typically must be -- over time to adapt to changes in task --.
modified, requirements
A variable can have its value set (or changed) in one of three ways:
1. By the value entered from an input statement. 2. By the value calculated from an equationin an assignment statement. 3. by a reture value from a procedure call
What is the physical, tangible components that you see when you look at your computer?
hardware (opposite = software)
___ software manages the hardware resources of a computer.
system
___ software performs user needed tasks, such as sending an email.
Application
software that is developed " for the masses"
COTS- Commercail off the Shelf
software that is developed for a limited number of users
Custom software
A user purchases a license to a software system but the software publisher retains the ownership of the software
Proprietary License
The software publisher tetains copyrights to the software, but grants ownership of the software to the user
Open Source license
What are the three ways uses gain use of software
Commerical software (pay), Shareware (downloaded for free for limited time), Freeware ( downloaded and use forever free)
guarantees that new software can still use data created from earlier versions of a software system
Backward compatibility
(forward compatibility- both ways)
A unique entity in Access
primary key
What are the four categories of threats:
interception, modification, fabrication, and interruption
What are the four security goals?
confidentiality, data, integrity, authenticity, and availability
A process by which a message is transformed into another message using a mathematical function
Encryption
ciphertext is transformed back into plaintext
Decryption
When you have a public and private key.
Asymmetric
(same for both symmetric)
A representation of an actual system
model
the imitation of the operation of a real-world process or system over time
simulation
defined using differential or
difference equations which contain variables that can change continuously over
time
continuous models
(which are discrete and dynamic)
There are those models that
do not rely on time in the execution of the model
static
Some models give the same answer given the same input every time they
are executed.
deterministic
step where it is determined
that whatever method is utilized, software, physical, mathematical, or
hardware, that that method was properly implemented, that there are no
coding errors, the mathematical formulas are correct for the design, etc.
verification
the step where an outside person determines that the model you
designed is representative of the system/problem you are studying
Validation
Type of hardware; control the
interaction between all other components in the system
Processors
The most prominent processor in
your computer is the
Central Processing Unit. CPU
components are responsible for saving data long-term. The most important storage device in most computers is the
hard disk drive (HDD
responsible for saving data
temporarily—that is, to keep track of what the computer is doing at the moment
Memory
The primary
memory component in a computer
random access memory (RAM).
gives a rough idea of the highest number of
instructions it can execute per second.
clock speed
CD and DVD drives, use light to read and write data
Optical storage
uses electronics to represent the two states of zero and one. Thus, it uses no
moving parts, which allows it to be more durable, reliable, and power-efficient.
Solid state storage
Operating system; used to control
machinery, scientific instruments and industrial systems.
Real-time operating system
Operating systems
Name the six
•Processor management
•Memory management
•Device management
•Storage management
•Application interface
•User interface
If enough processes are started, and if the operating system hasn't been carefully designed, the system can begin to use the vast majority of its available CPU cycles to swap between processes rather than run processes
Thrashing
-- This is fast, relatively small amounts of memory that are available
to the CPU through the fastest connections
High-speed cache
This is the RAM that you see measured in megabytes and gigabytes
when you buy a computer.
Main memory
This is most often some sort of rotating magnetic storage that
keeps applications and data available to be used, and serves as virtual RAM under the
control of the operating system.
Secondary memory
most common and enduring form of removable-storage
Magnetic storage
networked computers require data to be arranged in a particular order and format for
more efficient communication. There is a mutual understanding between the sending and receiving computers that, for example, the sender's address constitutes the first 24 bits, followed by the receiver's address in the next 24 bits, and so on
Protocol
unique numerical address assigned to each computer that communicates on the Intern
IP address
search engine software
user interface
http.
Protocol
"cnn.com"
domain
.com, .edu, .net,
top-level domains
www.
Subdomain