Term
ingredients of a computer program? |
|
Definition
data and algorithms - group of instructions for performing some task |
|
|
Term
what is the purpose of activity diagrams? |
|
Definition
depicts an algorithm
to capture the flow of an algorithm
|
|
|
Term
how to begin object oriented software development?
what is a software object? 2 facets? |
|
Definition
- find the objects
- entity with behaviors and states(attribute value)
|
|
|
Term
what is a state diagram used for? |
|
Definition
to depict an algorithm as it moves between states |
|
|
Term
what causes transitions of states? |
|
Definition
- user action
- satisfies event standards
- timed event
|
|
|
Term
what is indexing?
Advants?
disadvants? |
|
Definition
- the numbering of data
- AD - direct access, efficient use of space
- Dis - need to remember index #, fixed overal size, hard to remove add data
|
|
|
Term
a tree data structure consists of data chunks that... |
|
Definition
- each chunk is linked to zero or more chunks
- one chunk has no links to it, all other have one
- the tree has one more chunk than links
|
|
|
Term
|
Definition
- no links to it
- no links going out
- stems to two children
|
|
|
Term
how do we create faster computers? |
|
Definition
faster hardware
faster algorithms |
|
|
Term
How to create faster hardware? |
|
Definition
- miniaturization
- multiple processors(quadcore)
- different technologies(optical comps)
|
|
|
Term
how to create faster algorithms? |
|
Definition
- benchmarking - gauges how fast it takes an algorithm to execute
- speed estimated by... #of instructions, memory assignments, and data comparisons
|
|
|
Term
is a linear or binary search faster? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
set of actions put in place to prevent bad consequences |
|
|
Term
asset?
attacker?
threat?
vulnerability?
mitigation? |
|
Definition
- waht the system is trying to protect
- someone who tries to violate security
- the possibility of a successful attack
- weakness in the security system
- corrects vulnerabilities
|
|
|
Term
3 pillars of info security? |
|
Definition
integrity - uncorrupt info
confidentiality - accessed to only you
availability - accessed in timely fashion |
|
|
Term
theoretical limit of computing according to physicist? |
|
Definition
10^32 operations / second on 10^16 bits |
|
|
Term
what kinds of algorithms are infeasable? |
|
Definition
algorithms that take into account all possibilities |
|
|
Term
T or F not every problem can be solved by the computer? |
|
Definition
|
|
Term
turing test?
problem with it? |
|
Definition
- if a person cant tell that the computer is a computer then it is intelligent.
- not all humans are intelligent, some intelligent behavior isnt human behavior
|
|
|
Term
|
Definition
- reverse turing test
- computer testing for human |
|
|