Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
65 Cards in this Set
- Front
- Back
In RAPTOR, a variable does not have a value until a progam instruction gives it a value. (true or false)
|
True
|
|
Using a sub-chart and a call symbol to break an algorithm in to sub-processes, design the subprocesses separately, and simply call them to run when we need them is an example of:
|
Process Abstraction
|
|
What is the language used to add objects to Google Earth?
|
KML
|
|
When analyzing requirements with multiple variable inputs it is best to use a __ to ensure all possibilities have been covered:
|
Decision Table
|
|
The hardware component used to control the operation of a computer system is:
|
Central Processing Unit (CPU)
|
|
RAM has many advantages over an internal hard drive, but we don't exculsively use RAM because:
|
It is volatile and expensive
|
|
Movies are generally distributed on what type of storage?
|
Optical
|
|
What is ASCII?
|
American Standard Code for Information Interchange, standard 8-bit coding
|
|
What is the smallest dot that a monitor can display?
|
Pixel
|
|
What is the remove of some light by adding additional color?
|
Subtracive
(opposite = additive) |
|
What is a byte?
|
8 bits
|
|
What discard "extraneous" information, such as imperceptible color differences
|
lossy
|
|
What compression information but does not discard any information?
|
Lossless
|
|
In an audio file we take __ to be able to reconstruct the orginal wave.
|
samples
|
|
What is a precise, step-bystep set of instructions for solving task.
|
algorithm
|
|
What three think do you need for a valid algorithm
|
unambiguous, executable, and ordered
|
|
For any given, non- trivial (or set of related tasks,) there are __ possible algorithms for accomplishing the task.
|
many
|
|
An algorithm does not -- the underlying theory behind the instruction steps.
|
encode
|
|
Some algorithms are more -- than other algorithms
|
efficient
|
|
Computer programs that are used over many years typically must be -- over time to adapt to changes in task --.
|
modified, requirements
|
|
A variable can have its value set (or changed) in one of three ways:
|
1. By the value entered from an input statement. 2. By the value calculated from an equationin an assignment statement. 3. by a reture value from a procedure call
|
|
What is the physical, tangible components that you see when you look at your computer?
|
hardware (opposite = software)
|
|
___ software manages the hardware resources of a computer.
|
system
|
|
___ software performs user needed tasks, such as sending an email.
|
Application
|
|
software that is developed " for the masses"
|
COTS- Commercail off the Shelf
|
|
software that is developed for a limited number of users
|
Custom software
|
|
A user purchases a license to a software system but the software publisher retains the ownership of the software
|
Proprietary License
|
|
The software publisher tetains copyrights to the software, but grants ownership of the software to the user
|
Open Source license
|
|
What are the three ways uses gain use of software
|
Commerical software (pay), Shareware (downloaded for free for limited time), Freeware ( downloaded and use forever free)
|
|
guarantees that new software can still use data created from earlier versions of a software system
|
Backward compatibility
(forward compatibility- both ways) |
|
A unique entity in Access
|
primary key
|
|
What are the four categories of threats:
|
interception, modification, fabrication, and interruption
|
|
What are the four security goals?
|
confidentiality, data, integrity, authenticity, and availability
|
|
A process by which a message is transformed into another message using a mathematical function
|
Encryption
|
|
ciphertext is transformed back into plaintext
|
Decryption
|
|
When you have a public and private key.
|
Asymmetric
(same for both symmetric) |
|
A representation of an actual system
|
model
|
|
the imitation of the operation of a real-world process or system over time
|
simulation
|
|
defined using differential or
difference equations which contain variables that can change continuously over time |
continuous models
(which are discrete and dynamic) |
|
There are those models that
do not rely on time in the execution of the model |
static
|
|
Some models give the same answer given the same input every time they
are executed. |
deterministic
|
|
step where it is determined
that whatever method is utilized, software, physical, mathematical, or hardware, that that method was properly implemented, that there are no coding errors, the mathematical formulas are correct for the design, etc. |
verification
|
|
the step where an outside person determines that the model you
designed is representative of the system/problem you are studying |
Validation
|
|
Type of hardware; control the
interaction between all other components in the system |
Processors
|
|
The most prominent processor in
your computer is the |
Central Processing Unit. CPU
|
|
components are responsible for saving data long-term. The most important storage device in most computers is the
|
hard disk drive (HDD
|
|
responsible for saving data
temporarily—that is, to keep track of what the computer is doing at the moment |
Memory
|
|
The primary
memory component in a computer |
random access memory (RAM).
|
|
gives a rough idea of the highest number of
instructions it can execute per second. |
clock speed
|
|
CD and DVD drives, use light to read and write data
|
Optical storage
|
|
uses electronics to represent the two states of zero and one. Thus, it uses no
moving parts, which allows it to be more durable, reliable, and power-efficient. |
Solid state storage
|
|
Operating system; used to control
machinery, scientific instruments and industrial systems. |
Real-time operating system
|
|
Operating systems
Name the six |
•Processor management
•Memory management •Device management •Storage management •Application interface •User interface |
|
If enough processes are started, and if the operating system hasn't been carefully designed, the system can begin to use the vast majority of its available CPU cycles to swap between processes rather than run processes
|
Thrashing
|
|
-- This is fast, relatively small amounts of memory that are available
to the CPU through the fastest connections |
High-speed cache
|
|
This is the RAM that you see measured in megabytes and gigabytes
when you buy a computer. |
Main memory
|
|
This is most often some sort of rotating magnetic storage that
keeps applications and data available to be used, and serves as virtual RAM under the control of the operating system. |
Secondary memory
|
|
most common and enduring form of removable-storage
|
Magnetic storage
|
|
networked computers require data to be arranged in a particular order and format for
more efficient communication. There is a mutual understanding between the sending and receiving computers that, for example, the sender's address constitutes the first 24 bits, followed by the receiver's address in the next 24 bits, and so on |
Protocol
|
|
unique numerical address assigned to each computer that communicates on the Intern
|
IP address
|
|
search engine software
|
user interface
|
|
http.
|
Protocol
|
|
"cnn.com"
|
domain
|
|
.com, .edu, .net,
|
top-level domains
|
|
www.
|
Subdomain
|