Shared Flashcard Set

Details

Computer Science A110
Final Exam Review
119
Computer Science
Undergraduate 1
04/25/2011

Additional Computer Science Flashcards

 


 

Cards

Term

 

 

 

Information Technology

Definition
Term

 

 

 

Classic AI Problems: Travel

Definition

 

 

 

What's the best way to get to Pittsburgh?

Term

 

 

 

Classic AI Problems: Meetings

Definition

 

 

 

Which wine should I serve with seafood tonight?

Term

 

 

 

Classic AI Problems: Supply Chain

Definition

 

 

 

How can I get 100 PCs delivered by tomorrow?

Term

 

 

 

Classic AI problems: Medicine

Definition

 

 

What drugs might be effective against this new bug?

Term

 

 

 

Classic AI problems: E-business

Definition

 

 

 

Where can I get the best deal on a car and a loan?

Term

 

 

 

 

Classic AI Problems: Control

Definition

 

 

 

How do we stop the spread of H1N1?

Term

 

 

 

Manipulating Data

Definition

When we combine codes to make meaning: data, information, and language.

 

Produces analytical benefits such as comparison shopping, paying your bills online, etc.

Term

 

 

 

 

Bounded Rationality

Definition

Herbert Simon reveals, "most humans are only partly rational, and they are in fact irrational (emotional) with respect to their remaining actions."

 

Suggests that economic agents do not mostly apply the optimization model to make decisions, but rather employ heuristics. This is because of their inability to process all the alternatives and the cost of deliberation is high. Computers can prove essential in expanding our ability to solve complex problems.

Term

 

 

 

Von Nuemann Bottleneck

Definition

We can only process data as fast as the CPU can execute the instructions, and as fast as data can move through it.

 

Vast amounts of data can be pushed through, but only a word at a time, this word in analog is the diameter of the bottleneck. Instead of thinking of how to move things through the store, we think of the "where to find the data" aspect, like a lookup function in excel

 

Term

 

 

 

Hertz (Hz)

Definition

 

 

Measures performance within a computer - associated with speed. The CPU, monitor, refreshes rates, memory - and measures how fast your computer processes data into information per second. A Hz = one clock cycle per second.

Term

 

 

 

 

Inherent Limitation of the Computer

Definition

A system clock resides on a chip within the system and sends repeated electronic impulses that regulate the operations of the computer.

 

-The time that it takes to process an instruction.
-Time and Space: The consequence of increasing the speed of processing is that you sacrifice space. The consequence of increasing the utilization of space is that you sacrifice time
Term

 

 

 

Bytes

Definition

Concerns how much of something (such as memory or storage) there is.

 

If there is more data available in the stor, then larger problems can be solved. How much data is available in the store is also an inherent limitation of the computer.

Term

 

 

 

Access Time

Definition

Refers to the time a program or device takes to locate a single piece of information and make it available to the computer for processing.

 

Term

 

 

 

Access Time for Far Storage

Definition

(Near permanent-secondary storage, such as a hard-drive)

 

Usually measured in milliseconds.

Term

 

 

 

Access Time for Close Store

Definition

(Sometimes built directly on the processor)

 

Measured in nanoseconds, and more expensive.

 

Primary storage was measured this way until 1996 when SDRAM was measured in MHz

Term

 

 

 

System Bus

Definition

The path data moves along as it travels from the store to the processor and back again.

 

Many bits of data can be travelling down the highway at the same time (traffic) as opposed to very few.

Term

 

 

 

Bus Width

Definition
How many bits can fit on the System Bus at one Time. Architecturally, the bottleneck we have been referring to is the word length in bits of the processor. (32 bit processor, 64 bit processor)
Term

 

 

 

Machine Cycle

Definition

Execution of an instruction which involves two phases:

 

Instruction Phase and Execution Phase

Term

 

 

 

Instruction Phase

Definition
Phase  1 of the Machine Cycle

Made up of a fetch instruction and a decode instruction
Term

 

 

 

 

Execution Phase

Definition

Phase 2 of the Machine Cycle

 

Made up of an execute instruction and a store-results instruction

Term

 

 

 

Machine Cycle Time

Definition

 

 

The time that it takes for the computer to carry out one instruction - consisting of the Instruction and Execution

Term

 

 

 

The Processor

Definition

Located on a main board in your computer system, called the motherboard. The motherboard holds the processor, memory, and other essential components.

 

Differentiated by their instruction set, bandwidth, clock speed, and recently how many cores are on the chip die

Term

 

 

 

Moore's Law

Definition

 

 

Processing speed doubles every 24 months.

Term

 

 

 

Example of something NOT

adhering to Moore's Law

Definition

The access time of RAM or secondary storage (hard drive) is increasing only modestly ( a few percent per year). The size of storage is growing, however, because the manufacturing processes are improving.

 

The quantity of storage is growing at a rate much faster than the access time of storage

Term

 

 

 

Multiprocessing

Definition

Uses more than one processing unit.

 

A typical server might have two or four processors on the motherboard.

Term

 

 

 

Parallel Processing

Definition

Links several microprocessors to operate in parallel. 

 

This is the idea behind mainframe configurations where many processors each take a thread and go to work on the instructions. The operating system manages the input and output of these large systems and maintains order. On new commodity machines Intel and AMD have begun putting more than one core (or processor) on a single die. In effect, you have two processors (or four or more on a single chip.

Term

 

 

 

 

Super Computer

Definition

Even larger numbers of powerful processors operating together in a massively parallel processing (MPP) configuration. They have huge data stores and a vast array of processors and the ability to distribute the work from otherwise time-consuming problems.

 

Commonly used to do things such as: avoid environmental disasters, track the expansion of a flu epidemic, etc.

Term

 

 

 

Memory

Definition

 

 

The capacity of something to hold and retain data.

Term

 

 

 

The Semantic Web

Definition

 

A Web that includes documents, or portions of documents, describing explicit relationships between things and containing semantic information intended for automated processing by our machines.

Term

 

 

 

URIs: Uniform Resource Identifier

Definition

URLS, URN (Uniform Resource Name, which is a name scheme, ex: ISBN #)

 

With these identifiers. you can begin to connect to these represen­tations. In this scheme, Unicode also plays an important part in that it has the capacity to represent every symbol on earth.

Term

 

 

 

Label Everything

Definition

 

After information can be located, what is required is some way to mark up or annotate the data in a way that enables cataloging, or a common way to talk about the information. The
way this is done is to use labels.

Term

 

 

 

 

XML

Definition

 

 

Extensible Markup Language: Allows for the sharing of marked-up data in any language and was designed to allow for labeling data.

Term

 

 

 

RDF: Resource Description Framework

Definition

We need a general-purpose language for representing information on the web. Allows for the exchange for information.

 

Design is particular to databases, and specifically to relational databases. Makes a statement about data using a Triple in the following form: subject, property, value.

Term

 

 

 

RDF Schema

Definition

A standard which describes how to use RDf to describe RDf vocabularies on the Web. 

 

 The schema is metadata, or data about data, and is a model imposed upon complex reality to assist in explaining it and to describe relationships between groups of classes or resources.

Term

 

 

 

Taxonomy

Definition

 

Can describe Individuals, Classes, Attributes, Relations.

 

In our case, we can build on the RDF Schema to allow a machine to process the content of something

Term

 

 

 

OWL- Web Ontology Language

Definition

Intended to be used when the information contained in documents needs to be processed by applications, as opposed to only presented to humans.

 

Can be used to explicitly represent the meaning of terms in vocabularies and the relationships between those terms. This representation of terms and their interrelationships is called an ontology.

Term

 

 

 

One to many relationship

Definition

 

 

Parent can have many children. One query, many hits.

Term

 

 

 

Aggregation

Definition

 

 

The linking of data allows for it. (Linking spreadsheets)

Term

 

 

 

Algorithms

Definition

Processes to transform data; they accept annotated data as input and transtorm input into output.

 

This transformation is the bottleneck, limited by our funda­mental, inherent constraints of time and space (the processor and the store, or memory).

Term

 

 

 

Aggregation vs. Composition

Definition
[image]
Term

 

 

 

Example of Aggregation

Definition
[image]
Term

 

 

 

Benefits of IT

Definition

1. Analytical Benefits

2. Efficiency Benefits

3. Knowledge Benefits

Term

 

 

 

Knowledge Aquisition

Definition

A bottleneck.

 

Sharing & Reuse alleviate the problem. We need automated knowledge aquisition techniques.

Term

 

 

 

Automated Knowledge Aquisition Techniques

Definition

 

 

1. Linguisitic Techniques

2. Machine Learning

3. Exploring the Web Structure

4. Knowledge-Acquisition Templates

Term

 

 

 

(Automated Knowledge)

Linguistic Techniques

Definition

 

 

Ontology aquisition from text.

 

(an ontology is a formal representation of knowledge as a set of concepts within a domain)

Term

 

 

(Automated Knowledge Aquisition) 

Machine Learning

 

 

Definition

 

 

Generate ontologies from structured documents (XML documents)

Term

 

 

 

(Automated Knowledge Aquisition) 

Exploring the Web Structure 

Definition

 

 

Generate ontologies by crawling structured websites.

Term

 

 

 

(Automated Knowledge Aquisition) 

Knowledge-Aquisition templates 

Definition

 

 

 

Experts specify only part of the knowledge required.

Term

 

 

Natural Language Processing

Definition

-Requires us to focus the inference process (assertions)

-Requires common sense (a pre-req for human level competence at making sense of the world)

-Symantic Ambiguity

-Pronoun Disambiguation

Term

 

 

 

Semantic Ambiguity

Definition

 

Fred saw the plane flying over Zurich

 

Fred saw the mountains flying over Zurich

Term

 

 

 

Pronoun disambiguation

Definition

The police arrested the demonstrators because they feared violence.

 

The police arrested the demonstrators because they advocated violence.

Term

 

 

 

Tim Burners-Lee

Definition

 

 

credited for his invention of the World Wide Web

Term

 

 

 

Unicode

Definition

 

-Unique number for every character

 

-Hindi, Roman, Greek, Arabic, etc.

Term

 

 

 

 

Relationships

Definition

 

A child inherits from the parent

A child depends upon the parent

A family is composed of a parent and child

An associated parent can direct the child

A family is an aggregation of members

 

Term

 

 

 

Difference between Aggregation and Composition

Definition

Aggregation is used to represent ownership or a whole/part relationship, and composition is used to represent an even stronger form of ownership. With composition, we get coincident lifetime of part with the whole. The composite object has sole responsibility for the disposition of its parts in terms of creation and destruction. In implementation terms, the composite is responsible for memory allocation and deallocation.

Term

 

 

 

Markup Languages

Definition

 

 

XML - Labels Data

RDF - Describes Data

OWL - Relates Data

Term

 

 

Computer Forensics

Definition
Use special software to scan criminal suspects' hard disks for digital "fingerprints" - traces of deleted files containing evidence of illegal activites.
Term

 

 

 

Computer Crime

Definition

 

 

Any crime accomplished through knowledge or use of computer technology. 

Term

 

 

 

Definition
Term

 

 

Computer Security Breaches

Definition
System penetration by outsiders, theft of information, the changing of data, financial fraud, vandalism, theft of passwords, and the prevention of legitimate users from gaining access to systems. 
Term

 

 

 

Theft by Computer

Definition
Most common form of computer crime. Used to steal money, goods, information, and computer resources.
Term

 

 

 

Spoofing

Definition
Common student scam used to steal passwords. Launches a program that mimics the mainframe computer's login screen on an unattended terminal in a public lab. The program responds with an error code and stores the secret codes. 
Term

 

 

Identity Theft

Definition
Collecting personal information such as credit card numbers, driver's license numbers, SS cards, a theif can pose as someone else. 
Term

 

 

 

Social Engineering

Definition
The use of deception to get individuals to reveal sensitive information.
Term

 

 

 

Sabotage

Definition
Come from when rebellious workers put their footwear into gears. Now, use software to do destructive deeds. 
Term

 

 

Malware

Definition
The software used for sabotage - viruses, worms, and Trojan Horses - many of the programs mimic behavior of living organisms.
Term

 

 

 

Software Virus

Definition
Piece of code usually hidden in the OS of a computer or in an application. A user executes a program containing a virus, and it copies itself to an uninfected program. It can jump from computer to computer, sometimes using a computer network or disk to infect. 
Term

 

 

Macro Viruses

Definition
Attach themselves to documents that contain macros - embedded programs that automate tasks. Can be spread across computer platforms if the documents are in cross-platform applications, such as MS Office.
Term

 

 

 

Worms

Definition
Use computer hosts to reproduce themselves. Complete programs capable of travelling independently over computer networks, seeking out uninfected workstations in which to reproduce. Can reproduce until the computer freezes, and resides in the memory rather than on the disc. 
Term

 

 

 

Trojan Horse

Definition
A program that performs a useful task while at the same time carrying out some secretive destructive act. Often posted on shareware websites with names that make them sound like games or utilities. 
Term

 

 

Logic Bomb

Definition
Programmed to attack in response to a particular event or sequence of events. A programmer might plant it to destroy data files if the programmer is ever listed as terminated in the company's personnel file. 
Term

 

 

 

time-bomb

Definition

 

 

A time released logic bomb

 

ex: program to destroy PC files on Michaelangelos birthday

Term

 

 

 

Spyware

Definition

Refers to a technology that collects information from computer users without their consent or knowledge. Sometimes called tracking, spybot - Gathers information and communicates this info to an outsider via the internet.

 

ex: monitor keystrokes, take screen shots, etc.

Term

 

 

 

Drive-by-downloads

Definition
Simply visiting a certain website will cause spyware to be downloaded to your computer
Term

 

 

 

Antivirus

Definition
Designed to search for viruses, notify users if they are found, and remove them from infected disks. Continuously monitor system activity. May take companies several days to develop and distribute new patches for viruses. 
Term

 

 

 

Security Patches

Definition
Software programs that plus potential security breaches in the operating system. Provided as free downloads or automatic updates to all owners of the OS. 
Term

 

 

Hacking

 

Definition
Commonly refers to unauthorized access to computer systems. 
Term

 

 

 

Cracking

Definition
Criminal hacking - distinction between hacking that most people do not recognize. 
Term

 

 

 

Webjackers

Definition
Hijack legitimate web sites and redirect users to other sites
Term

 

 

 

Denial of Service attacks

Definition
Bombard servers and web sites with so much bogus traffic that they're effectively shut down, denying service to legitimate customers and clients. 
Term

 

 

 

Computer Security

Definition
Protecting computer systems and the information they contain against unwanted access, damage, modification, or destruction. 
Term

 

 

 

2 Characteristics of Computers

 

Definition

1. Computer does exactly what it is programmed to do. Can be reprogrammed by anyone with sufficient knowledge

2. Any computer can do only what it is programmed to do - cannot protect itself

Term

 

 

 

Biometrics

Definition
Something about you, voice print, fingerprint, retinal scan, facial feature scan, to measure body characteristics and allow or deny access. 
Term

 

 

 

Passwords

Definition
The most common tools used to restrict access to computer systems. Most users choose easy to guess options - love, god, sex.
Term

 

 

 

Access-control software

Definition
Doesn't need to treat all users identically. Many systems use passwords to restrict users so they can open only files related to their work. Many times, users may be given read-only access.
Term

 

 

 

Firewalls

Definition
A program, often run on a dedicated computer, that filters information between a private network and the rest of the internet. A set of security rules, created by a network administrator, determines which packets can enter and leave the local network. 
Term

 

 

 

Encryption

Definition
Done by applying a secret numerical code, called a key, the message can be transmitted or stored as an indecipherable garble of characters. Can only be read after reconstructed with a matching key. 
Term

 

 

 

Audit-control Software

Definition
Used to monitor and record computer transactions as they happen so auditors can trace and identify suspicious computer activity after the fact. Force every user to leave a trail of electronic footprints. 
Term

 

 

Cryptography

Definition
Symmetric Secret Key sytem, the sender and the receiver of a message have the same key. Key management is an issue. A public key system is asymmetric, a different key is used to encrypt than decrypt. 
Term

 

 

 

Uninterruptable Power Supply

Definition
Can protect computers from data loss during power failures. 
Term

 

 

 

Redundant array of independent disk (RAID)

Definition
Storage technology that enables multiple hard disks to operate as a single logical unit. Can, among other things, automatically mirror data on multiple disks. 
Term

 

 

Authentication Mechanisms

Definition
System administrators implement these. They ensure only legitimate users have access to the system by asking potential users to identify themselves. 
Term

 

 

 

System Admins Responsibilities

Definition
Put policies in place to ensure that users to not choose passwords that are easy for a hacker to guess, Keep the OS up to date with the latest patches provided by the software vendor, perform backups on a regular basis.
Term

 

 

 

Active Badge

Definition

Technology that can simultaneously improve security and threaten privacy. 

 

Used for Identifying, Finding, and Remembering

Term

 

 

Smart Weapons

Definition
Missiles that use computerized guidance systems to locate their targets. A command guidance system enables a human operator to control the missile's path while watching a missle's eye view on a TV. They are extremely accurate, and reduce the amt of time to make life or death decisions. 
Term

 

 

 

Autonomous System

Definition
Complex System that can assume almost complete responsibility for a task without human input, verification, or decision making.
Term

 

 

 

National Infrastructure Protection Center

Definition
Includes representatives of various intelligence agencies (the departments of defense, transportation, energy, and treasury) and representatives of several major corporations.
Term

 

 

 

Security Processors

Definition
Special purpose hardware that allows every message to be encrypted, even huge video streams. Will give organizations the confidence that all their messages, even those sent over wireless networks, are secure from eavesdroppers. 
Term

 

 

 

Pharming

Definition
DNS cache poisoning to redirect traffic to bogus sites (same thing as webjacking)
Term

 

 

Phishing

Definition
Deception of individuals to reveal sensitive information. (Same as social engineering)
Term

 

 

Online Outlaws: The perpetrators

Definition

1. Spammers

2. Web designers

3. Exploiters

4. Cashiers

5. Droppers

Term

 

 

 

Spammers

Definition
Responsible for sending the phishing emails to as many email addresses as possible
Term

 

 

Web designers

Definition
Responsible for creating malicious web sites that appear as legitimate as possible
Term

 

 

Exploiters

Definition
Typically amateur attackers known as script kiddies who gather victim computers (referred to as roots) that can be used to host a phishing site or spam relay. In some cases, exploiters will break into credit card databases directly
Term

 

 

 

Cashiers

Definition
Responsible for withdrawing funds from a compromised credit card or bank account and turning it into cash for the phisher
Term

 

 

 

Droppers

Definition
These members are able to receive merchandise purchased with stolen credit card information at an untraceable drop point. Goods purchased with stolen credit or bank card information are considered carders. 
Term

 

 

Piracy of Intellectual Property (IP)

Definition

-Illegal duplication of copyrighted software

-Laws difficult to enforce

-Includes arts, sciences, and industry

Term

 

 

 

Electronic Plagiarism

Definition
Using computer or internet systems to pass off someone else's work as your own
Term

 

 

Signs of Hijacked Computer

Definition

-Computer running slower

-Popup ads

-New toolbars in browser

-Homepage changes

-Unfamilar search page

-Strange software loads

-New entries in favorites

Term

 

 

 

Physical Access Restrictions

Definition

Based on :

 

-Something you have

-Something you know

-Something you do

Term

 

 

 

Shield

Definition
Specially developed machine that prevents unwanted interception
Term

 

 

 

Symmetric Key

Definition
Same key is used for encryption/decryption (must know which computers will be talking and install key on each one)
Term

 

 

 

Asymmetric key

Definition
Encyphering key is different from, but closely related to the deciphering key. The key algorithm has a public/private key property and one of the keys can be made public without loss of confidentiality. 
Term

 

 

Surge Protectors

Definition
Protect computers from data loss during power failures. 
Term

 

 

Property Laws 

Definition

-Inventions are patented

-Trade secrets are covered by contract law

-The expression of intellectual property can be copyrighted

Term

 

 

Government Responses to growing Computer Crime

Definition

-Telecommunications Act of 1996

-Digital Millenium Copyright Act of 1998

 

(Both of these laws introduced new problems by threatening rights of citizens- problems that have to be solved by courts and by future lawmakers.)

Term

 

 

 

Software Bugs

Definition

Do more damage than viruses and computer burgalurs combined. 


-It is impossible to eliminate all bugs

-Even programs that appear to be working can contain bugs

-The bigger the system, the bigger the problem

-Computer breakdowns pose a risk that doubles every year

-Hardware problems are rare when compared with software

Term

 

 

 

Layered Defenses

Definition
-Organizations will place sophisticated pattern-recognition software and special hardware on the perimeter of their networks. Special purpose hardware, called security processors, will allow every message to be encrypted. 
Supporting users have an ad free experience!