INTRODUCTION TO COMPUTER SCIENCE - Home Teachers India

Breaking

Welcome to Home Teachers India

The Passion for Learning needs no Boundaries

Translate

Monday 5 June 2023

INTRODUCTION TO COMPUTER SCIENCE

 

INTRODUCTION TO COMPUTER SCIENCE

DLBCSICS01_CF

Quesions about the content of the course book

 April 27, 2023
These questions can be used as a supplement for exam preparation. The questions do not replace working through the course book and
 do not cover the course book content completely.

ia




  1.  What are error checking techniques? It is possible that during data storage or transmission some of the informaon can
     be corrupted. To detect this, various error checking techniques (error checking
     systems) have been created. Checksums and CRC take the binary data through a
     mathemacal funcon that returns a specific value for that data stream. If the
     sending value matches the receiving value, then the data is assumed to be
     unchanged. A simple form of error checking is adding a parity bit, more complex
     ones are CRC and checksum.
  2.  What is a byte? A byte is a unit of digital informaon that consists of eight bits.
  1.  Where is firmware located in the context of the

 course?

 

Firmware is located in the BIOS chip.

  1.  How many digits is one byte. One byte consists of 8 binary digits.
  2.  What is TCP/IP? TCP/IP is a protocol that allows computers to communicate with each other.
  1.  Ho can we convert a decimal number to a binary

 number?

 

Keep on dividing the decimal number by 2 unl the result of the division operaon

is 0 while recording the remainder. The first digit of the binary number is the

remainder of the division operaon that resulted in 0. The last digit of the binary

number is the remainder of the first division operaon. The rest in reverse order is

the binary number.

  1.  What does conjuncve mean? Conjuncve refers to the noun conjuncon. A conjuncon describes an "AND"
     connecon. The only way a conjuncon of two proposions p and q is true is when
     both proposions are true.
  2.  What are specific data types of a variable? A specific data type of a variable is for example int or char.




  1.  How to do bubble sorng. The rules for bubble sorng are this: starng at the beginning, compare the first
     two values. If the first one is larger, swap the two values. If it is not, there is nothing
     to do. Then compare the next two values and do the same unl you reach the end.
     Once this is done, do it again for every element except the last one, since it will be
     in order now. Each pass you complete will guarantee one more element is in order.
     Others may happen to be in order, but the bubble sort will check them all
     regardless.
  2.  What is a file? A file on a computer is a series of binary numbers—in fact, it could be considered
     one very long binary number. A file is a unit of binary data stored on a permanent

storage device. To find out what is the meaning of the binary data addional context informaon is required. A file for example has a header at the beginning with specific binary sequences that indicate that the data are an image, a document, an executable program, or something else.

  1.  Explain Von Neumann's architecture. The von Neumann architecture is a reference model for the architecture of a
     computer. It consists of - a CPU, - a memory that holds both computer program
     instrucons and data, - an input system, - an output system. The CPU consist of an
     ALU, a control unit and registers, which contain a fixed number of bits. These
     registers can contain data or instrucons that have been read from memory.
     Besides the processor and memory, there also should be some type of input
     (entering data) and output system (outpu ng data) to be able to communicate
     with other devices or a human being.
  2.  What is a decimal? A decimal is a number that uses ten symbols, 0 through 9, to represent all possible
     numbers. Human beings use the decimal numbering system to represent numbers

because human beings started counng using their ten fingers.



  1.  What is the difference between data and

 informaon?

 

Data is for example a binary value like 1011 or some other symbols you don't know

the meaning. If you know that the binary number 1011 represents the house

number of a specific person it is a piece of informaon. Informaon is data with

context.

  1.  What is a stack? A stack is a data structure that works under a specific philosophy: Last In, First Out.
     This is oen abbreviated as LIFO. Imagine you are inpu ng data into a computer
     program— in this case, we will say it is a card game simulator. It will use a standard
     deck of 52 cards, and they will be randomized and placed into the stack. Just like in
     real life, when you are playing cards, you can only draw the card from the top of the
     deck. That is the last card that was placed on top, so it is the last in, but the first
     out. Once the game is started, the order cannot be changed, the next card in play is
     always the one on top of the deck—or in our simulaon, the stack. A stack in
     computer programming allows for two basic operaons: push and pop. Pop will
     take the top piece of data from the stack, which removes it. Push will add a new
     item to the top (and only the top) of the stack.
  1.  What is a queue?

Remark: Queues aren't part of the course book

and therefore this queson is not relevant for the

exam.

 

A queue is a data structure that works under a specific philosophy: First In, First

Out. This is oen abbreviated as FIFO.

  1.  What is CRC? CRC (Cyclic Redundancy Check) is a mathemacal algorithm that returns a code (a
     kind fo checksum) of consistent length in digits. It can be applied to any length of
     binary data and will always return the same code if the binary data is the same. CRC
     is used for error detecon in network communicaon. A block of data is processed
     through a mathemacal algorithm and the result is appended to the data. Aer the
     data is sent, the calculaon is repeated to check the integrity.



  1.  Can you explain int with an example? An integer is a unit number; this means it contains no decimal component. Integers
     include all the natural numbers (1,2,3, etc. ), their negave versions, and zero.
  2.  Can you explain char with an example? A char is a single character. It can be used to represent a le er, number, or symbol.
     For example: 'A', '5', and '+' are all examples of chars.
  3.  What is a char? A char is a single character. It can be used to store leers, numbers, punctuaon
     marks and other symbols.
  1.  Both astrophysics and business have needs for

 data mining. Explain how data science applies to

 both.

 

A data scienst’s job is to analyze data and provide meaningful and useful

informaon. There are many different fields where this would be applicable.

Astrophysics deal with large sets of data. In business applicaons you also deal with

large sets of data. You can't analyze those data sets without data mining. For

example the data of all the customers and the products.

  1.  What is the octal numbering system? The octal numbering system is a base-8 numbering system. It uses the digits 0
     through 7. Each digit's place value is a mulple of 8, which is a power of 2, so it

maps nicely—one digit of octal can represent exactly three digits in binary.

  1.  What is firmware? Firmware is a type of soware that is required by the hardware for essenal
     funconality. It is either used for boong up a computer or electronic devices that
     always perform the same task, such as your smart refrigerator or a child’s toy. A
     single-task device does not need RAM to run different applicaons. Advanced
     personal computers can perform many tasks and need the RAM and extra hard
     drive storage to do so.



  1.  Can you describe the jump search algorithm? Jump search:For this one, we need a lile more informaon. Let’s say the book is
     2,500 pages long. We calculate the square root of n, the number of pages, which
     gives us 50, which we will use for the jump size, or m. Ken will first jump to page 50
     and see if Josh is higher or lower, then keep jumping unl he is past Josh. Then, he
     will go back to the previous jump and do a linear search (page by page) on the next
     50 pages to find him. As you can see, this is definitely an improvement over a
     straight linear search.
  1.  What are professional principles of the ACM code

 of ethics?

 

Those who work in the industry creang soware, hardware, and other computer

products can hold themselves to more specific standards: Professional principles

are - "quality work" (have a high standard for the quality of your process and your

finished product), - "professional conduct" (Conduct yourself professionally at all

mes: keep to your ethical standards. Strive to improve your skills and educaon), -

"professional knowledge" (Connually be aware of—and update—your knowledge

of the company policies and procedures and follow them.) - "Review and cricism"

(Be able to accept feedback on your work and products and be able to give honest

reviews when needed.) - "Work in your experse" (If you are not skilled in a certain

area, do not “fake” it, but request help, training, or that someone else perform the

task.) - "Enable public awareness" (Help the public understand current technologies

and the consequences associated with them.) - "Keep security in mind" (Create

systems that are secure. Do not release systems unl thorough security tesng has

been completed.)

  1.  What are general principles of ACM code of

 ethics?

 

Contribung to society, Avoid harm, Honesty, Respect creavity, Honor

confidenality and privacy.

  1.  Why are there general principals in ACM code of

 ethics?

 

Regardless of specific career or secon of compung, an individual can find

guidance in the general principles of the ACM code. These principles are important

to everyone in computer industry.



  1.  What is ethics? Ethics is the study of moral concepts such as personal behavior, responsibility, good,
     and evil. There are many ways that ethics can apply to the field of computer

science. These can be broken down into three layers of responsibility: corporate/government, developer, and user. An example of ethics would be a

person’s (or an enty’s) moral code: the rules that they use to determine decision
making and acons. There are individual differences between ethics, although in
sociees there are group ethics that apply. For instance, most countries have laws
against stealing, assault and murder. Most people would agree that these things are
generally wrong and that to have a prosperous society they should be avoided.

  1.  What is user ethics? User ethics is the code of conduct that a user must follow to maintain proper use of
     a soware. It is important for users to be aware of their ethical responsibilies and

to abide by them. If they do not, they may face legal acon or other consequences.

  1.  What is developer ethics? A soware developer has several ethical issues to consider as well. First, wring
     code is similar to wring a novel, in that you are expected to create your own

original work and not copy others (look up copyrights for more informaon). There
are some “open source” soware libraries which can be borrowed from freely, but
taking someone else’s code without permission is not only unethical, it is illegal. As
a developer for a company or organizaon, you work under a certain expectaon of
confidenality. Many companies will have developers sign confidenality agreements as well. Even without one, it is standard pracce to keep sensive
company informaon private. A company will have best pracces and standards for
work performed—taking shortcuts and slacking off is considered unethical behavior; programmers are being paid for their me with a certain expectaon of
performance. As an employee, you will also be expected to report coworkers who
do not uphold the company’s standards or who break laws or ethical codes.
Covering up for another’s unethical behavior is also a breach of ethics.



  1.  What devices can filter network traffic? A switch does basic filtering on network traffic (for example prevent broadcast
     storms). Another device filtering network traffic is a router. A router analyses IP-

addresses. Somemes this funconality is called firewall.

  1.  What device does not filter network traffic? A hub. The hub takes a signal from one cable and splits it out over several cables. If
     it was spli ng out four signals, it would be called a “four port” hub. A hub does not
     do any signal processing—everything that comes in is sent out through all of the
     ports.
  2.  What is ACM code of ethics? The ACM Code of Ethics and Professional Conduct exists to inspire compung
     professionals to work for the greater good of society. The code of ethics was wrien

to apply to all computer professionals worldwide. Regardless of membership in ACM, the principles in the code are useful and helpful to maintain a high standard
of ethics. The ACM Code of Ethics and Professional Conduct consists of a set of principles that guide compung professionals in their professional conduct.

  1.  What is AI? Arficial Intelligence: There are many different types of machine intelligence. They
     fall into two broad categories: specific and general. Specific (or narrow) arficial
     intelligence (AI) is a system created to perform a specific task. For example, the
     predicve text that Google uses for searching is very good at predicng what you
     might want to search for, but it would not be good at finding your lost keys. General
     AI is sll a major programming challenge. A system in this category means that it is
     able to examine new situaons, learn, and perform a variety of broad tasks.
     Basically, this kind of AI seems to funcon similarly to a human being. It is
     important to understand what is meant by the term “intelligence.” Intelligence is
     more than just being able to perform a series of mathemacal algorithms;
     intelligence implies deducon and learning. An AI is able to come to conclusions
     with data it has never encountered before. Since computer systems are able to
     perform billions of calculaons per second, their power can be harnessed to
     simulate intelligence.



  1.  What is data science? Data Science is a part of computer science dealing with analyzing large amount of
     data and provide meaningful and useful informaon.
  2.  What is big bang model? The Big Bang model is a newer model oen used by startups and other small
     companies. It is best used for smaller projects. The main feature of this model is
     that coding, design, requirements, and tesng all begin simultaneously with very
     lile planning. It involves quite a bit of risk since there is lile pre-planning, but it
     also can lead to the quickest release of soware. Though there is lile planning in
     the Big Bang model, plans can be created on the fly as development connues.
     Tesng is done as soon as compiled code is available.
  3.  What is spiral model? A spiral approach to soware development intenonally goes through several
     cycles of planning, designing, development, and tesng, before final release. An

advantage of this model is that various teams can get started working earlier in the process and some teams can work simultaneously. Several prototypes of the product are developed before final release in the spiral model. More than one
round of tesng and verificaon happens, as well as mulple rounds of redesigning.
This model may take longer, but it is very thorough. The more recent “agile” model
is based on this iterave model and has become popular.

  1.  What is waterfall model? The waterfall model is a rigid model flowing downward through the different steps
     of the cycle. The idea is that aer each stage is completed, it will not be returned

to. The Requirements phase produces the requirements document, and Design the design document. Implementaon is where the programming occurs. Verificaon is tesng, and then the last step, Maintenance, includes the release or deployment.



  1.  What is a soware development life cycle? There are many methods of creang soware; most follow the standard
     development life cycle. This is called a “life cycle” because it takes place over the
     life of a soware applicaon. Aer a soware is released, maintenance and
     updates are required. These updates must go through a similar cycle to that of the
     inial development process. The soware development life cycle concept
     incorporates technology as well as management to put together planning and
     teams to meet a specific soware need.
  2.  What is a microcontroller? A microcontroller is a computer chip with a processor, RAM, input, and output built
     in. The input and output travels through specific pins on the chip. The chips can

receive and send data to USB ports and even Ethernet through these I/O pins. Microcontrollers enable the creaon of an enormous variety of different electronic
devices; they are basically an enre computer on a chip.

  1.  What is an embedded system? Embedded systems are devices that have a microprocessor and soware to
     perform a specific task. The soware is embedded in the device, hence the name.
     Examples of embedded systems include your washing machine, fire alarm system,
     and even your car's engine control unit.
  2.  What is OLAP? Online Analycal Processing (OLAP) involves a high performance data analysis
     system. It is designed to query data across mulple tables and sources and provide

a fast and detailed result. These systems are oen used for sales figures, product informaon, product comparisons or employee informaon.



  1.  What is an informaon system? An informaon system consists of the raw data itself that exists in the system.
     Soware tools can provide analysis of the data and present it in different ways for
     user interpretaon. This means that soware is part of the informaon system, and
     so are the people using it. Of course, the soware needs hardware to run on, so it
     also is part of the system. In such a system, it makes sense to assign tasks properly
     because a computer can perform many tasks more efficiently than a human, but
     not all tasks. Things like data searching are perfect jobs for computers but difficult
     for humans, especially with very large data spaces. This means that there is some
     kind of business organizaon that makes decisions about how to use the hardware,
     soware, people, and data that are available. This organizaon is also part of
     informaon systems.
  2.  What is a file system? A file system manages and stores informaon. Operang systems implement file
     systems. An example for a file system is NTFS—New Technology File System

associated with the Windows operang system.

  1.  What is BIOS? BIOS is a Basic Input Output System. The BIOS is a special kind of chip of a
     computer. Within the BIOS chip a special kind of soware (firmware) is stored
     typically in a ROM (read only memory). The firmware of a BIOS chip provides a
     starng line for a computer every me it is turned on. One of the very first things a
     BIOS chip will instruct the computer to do is detect and test hardware that is
     connected to it. It performs a POST, or power on self-test to check that the required
     hardware is there and that it is funconing properly. Then it starts loading the
     operang system.



  1.  What is internet of things? Small devices connected to the Internet have become the Internet of Things (IoT).
     There are already over a billion of these devices connected to the internet. They

include many “smart” devices. Light bulbs that can be controlled remotely are a type of smart device. Regular and self-driving vehicles are also connected to the internet. Some devices can provide feedback on their performance. A home appliance such as a smart refrigerator can tell you recipes, whether you are running
low on eggs, how much power it is using, and an opmal temperature se ng.

  1.  What is DHCP? Dynamic Host Configuraon Protocol (DHCP) is a protocol used to assign IP
     addresses and other network configuraon parameters to each device on a
     network so that the devices can communicate with each other. This eliminates the
     need for a user to manually configure these se ngs, such as an IP address, when
     connecng to a network.
  2.  What is world wide web? The World Wide Web is a special set of services that is delivered to a web browser.
     Basically, anything you can access in a web browser is part of the world wide web.
     The world wide web was created primarily to communicate formaed documents
     with pictures and hyperlinks using a simple markup language called HTML (Hyper
     Text Markup Language). Eventually, it evolved into what is used today including
     video services and websites with interacve JavaScript and connecons to
     databases of informaon.
  3.  What is an applicaon layer? The applicaon layer is the top layer of the OSI model. The applicaon layer is the
     closest to the user, yet it interacts with applicaons that request network access.
     Technically, this layer is for applicaons, not made of applicaons. It is the interface
     layer where applicaons make requests of the operang system to access the
     network.



  1.  What is OSI model? OSI is a general communicaon standard that defines seven layers that are useful
     for data transmission over networks. There is no "real" implementaon of the OSI
     model. OSI is a so called reference model. Other communicaon standards like
     TCP/IP or Ethernet refer to the OSI standard to explain which part of the OSI layers
     they implement.
  2.  What is wireless technology? Wireless technology is a method of communicaon that uses radio waves to
     transmit data without the use of wires. The term is oen used in reference to
     mobile phones, but it can also refer to other devices such as wireless computer
     mice and keyboards. Wireless technology has become increasingly popular with the
     advent of Wi-Fi networks, which allow computers and other devices to connect
     wirelessly to the Internet.
  3.  What is a star network? A star network is a network topology in which all of the nodes are connected to a
     central node. The central node is usually a hub, switch, or router. A star network
     can be implemented as an Ethernet LAN (Local Area Network) or as part of the
     Internet backbone.
  4.  What is a ring network? A ring network consists of computers connected together in a ring, where the signal
     would pass around it. In this design, each computer was required to look at any
     data passed to it to see if it was required to pass it along. This design was not fault-
     tolerant, and would stop working if the ring was disconnected; this is why it has
     fallen out of use today.
  5.  What is a ring topology? A ring topology is a network topology in which the nodes are connected in a closed
     loop. The simplest example of a ring network is a token ring network, where all the

nodes share the same transmission medium and each node can send data to any other node by passing its data to the next node in the ring. In this way, each node acts as both a transmier and receiver for every other node on the network.



  1.  What is a router? A router is a device that forwards data packets from one network to another. It
     does this by analysing IP addresses.
  2.  What is a switch? A switch is a network device. It has a connecon for an uplink and mulple ports for
     communicaon. However, it does do basic filtering on data. Computers send data

over a network in data frames with hardware addresses. Some data is sent out with
the “broadcast” address; this address means it is for all computers who can receive
it. A switch filters these out so they do not get propagated across the enre network (which can cause a flood of data known as a “broadcast storm”).

  1.  What is a hub? A hub is a network device that takes a signal from one cable and splits it out over
     several cables. If it was spli ng out four signals, it would be called a “four port”

hub. A hub does not do any signal processing—everything that comes in is sent out through all of the ports. Communicaon is two-way: the ports can also send communicaon through the uplink connecon.

  1.  What is Ethernet? Ethernet is a set of standards (defined by IEEE 802.3) used for LANs and WANs. The
     word “Ethernet” is used commonly to refer to parts of a local wired network, such
     as Ethernet cabling (Cat 5, 5e, 6, 7 and 8), and Ethernet ports, where the cables are
     connected. The standards of Ethernet include the physical layer, which gives
     specificaons for devices and signals, and the data link layer, where it defines how
     signals are organized.
  2.  What is an ethernet cable? Ethernet cable is a type of cable used to connect devices to a computer network. It

is the most common type of cabling in use today, and can be found in most homes
and offices.



  1.  What are the UTP cable categories? UTP cable categories are as follows: - Category 5 up to 100Mbps (Megabits per
     second) - Category 5e up to 1000Mbps (1Gbps) - Category 6 up to 10Gbps -
     Category 7 up to 40Gbps - Category 8 25Gbps or 40Gbps These UTP cables appear
     physically idencal. You must usually look for a label or prinng on the wire to see
     the category if you are not sure.
  2.  What is a LAN? LAN = Local Area Network, a network in a home or office. A LAN is a group of
     computers connected together via a network within a disnct geographic area.
  3.  What is UTP cable? UTP: This stands for “unshielded twisted pair cable.” The individual wires are
     twisted together in pairs without extra insulaon. UTP cables are used in homes
     and offices to build up a LAN.
  4.  What are network devices? Network devices are devices that connect are connected to a network. Important
     network devices are hubs, switches, routers. A computer itself or an embedded

system connected to a network can also be a network device.

  1.  What is the difference between wired and

 wireless networks?

 

Wired and wireless networks are two different types of computer networks. Wired

networks use cables to connect devices, while wireless networks use radio waves to

connect devices. The advantage of wired is that it is more secure than wireless, but

the disadvantage is that it requires a cable connecon.

  1.  What is a supercomputer? Supercomputer is a computer that is used in scienfic fields to analyze vast
     amounts of data. For instance, predicng the weather involves an enormous
     number of data points; a supercomputer is a good match for these kinds of
     problems. Sciensts can request me on supercomputers to do research, bringing
     them the massive power of Earth’s most amazing computers. Supercomputers use
     parallel processing, where tasks are split up between processors. One such
     supercomputer is in Germany, the SuperMUC-NG.



  1.  What is a server cluster? A server cluster is a group of idencal servers that share the workload for a certain
     task.
  2.  What is parallel processing? Parallel processing is when you take a task and break it down into sub-tasks and
     assign a separate CPU to complete it. Several CPUs are linked together in parallel to
     accomplish this.
  3.  What is a device driver? A device driver is a piece of soware that allows the operang system to
     communicate with a hardware device. It is usually wrien by the manufacturer of

the hardware. A device driver communicates with the device controller of the connected hardware device to send or receive data or commands.

  1.  What is an input output system? Input and output system is a system that allows the user to communicate with the
     computer hardware. Input and output systems are typically used to transfer data
     from one device to another, or from one locaon to another. The input and output
     system of a computer is made up of many different devices, including keyboards,
     mice, monitors, printers, speakers and network cards. These devices all have their
     own input/output systems that allow them to communicate with the CPU. Every
     computer needs some kind of input output system in order to receive informaon
     for processing and an output system to output the results of the processing.
  2.  What are input and output devices? Input and Output Devices are the devices that allow a user to communicate with a
     computer. Input devices include keyboards, mice, and external data sources such as

USB drives. Output devices include monitors, printers, speakers, and network cards.

  1.  What is input and output? Input and output are the communicaon between a computer and its user. Input is
     the data that a user enters into a computer, while output is the data that a
     computer sends to its user.



  1.  What is RAM? This stands for Random Access Memory and means that the memory can be read
     randomly and at any point in the data. RAM is not permanent (short-term memory)
     but a lot faster than the hard drive in terms of memory accessing speed and
     reading and wring data. Because RAM is more expensive than a hard drive, it has
     less capacity than a hard drive.
  2.  What is a processor? A processor is a device that performs calculaons and commands using data stored
     in memory. It takes that input from memory and creates unique output, the results
     of the processing. It is the "brain" of a computer.
  3.  What is a CPU cache? The CPU cache is a small memory that is placed on the CPU chip itself. It is a
     memory for data and instrucons that the processor can access very quickly. This
     allows to speed up memory access mes. There are different levels of cache: some
     processors have three levels labelled L3, L2, and L1, each smaller and with a faster
     access me. This provides a way to avoid memory bolenecks as the CPU does not
     always have to make a request of system RAM; a small amount of currently used
     data is located in the cache.
  4.  What is computer memory system? Computer memory system consists of different memories storing data and
     instrucons for the processor. A computer memory system oen comprises a long-

term (permanent) memory (hard disk) a RAM and the CPU cache(s).

  1.  What is memory? Memory is a computer storage space that holds data and instrucons for the CPU
     to access.



  1.  What is memory addressing? Each byte of memory has a unique binary address. You could think of them each as
     lile mailboxes, storing a different binary number and also having a binary address.
     That means that the number of bits used for addressing will idenfy the number of
     bytes available. For instance, the Commodore 64 had 64K of addressable memory.
     This was accomplished by using 16-bit addressing. The total number of bytes that
     can be addressed with a 16-bit address is 65,536 bytes. This was considered 64K (At
     the me, a kilobyte was referred to as both 1,024 (2 to the power of 10) and 1,000
     bytes). Each 16-bit address points to a mailbox (memory locaon) that contains
     exactly one byte (inside the box).
  2.  What is a data bus? Data bus is a data path that connects the CPU to memory and I/O devices. It is a
     collecon of wires that carry data from one device to another.
  3.  What are von Neumann registers? There are five registers specific to the Von Neumann design. These are as follows: 1.
     Program Counter (PC) contains the memory address of the next instrucon to read
     from memory.2. Memory Address Register (MAR) contains the address of the
     current instrucon in memory, or the next data transfer address.3. Memory Data
     Register (MDR) contains the contents of the memory address that the MAR is
     poinng to and contains data to be transferred.4. Accumulator (AC) this contains
     data that have been processed or are about to be processed, including arithmec
     or logic results.5. Current Instrucon register (CIR) contains the current binary
     instrucon that is being executed.



  1.  What is von neumann architecture? The von Neumann architecture is a reference model for the architecture of a
     computer. It consists of - a CPU, - a memory that holds both computer program
     instrucons and data, - an input system, - an output system. The CPU consist of an
     ALU, a control unit and registers, which contain a fixed number of bits. These
     registers can contain data or instrucons that have been read from memory.
     Besides the processor and memory, there also should be some type of input
     (entering data) and output system (outpu ng data) to be able to communicate
     with other devices or a human being.
  2.  What is a Central Processing Unit (CPU)? The Central Processing Unit (CPU) is oen referred to as the “brain” of the
     computer. It does all the processing, which includes doing calculaons and sending

instrucons to other hardware. It is a square computer chip which is inserted into a motherboard—this is a circuit board designed for computer components to connect to and communicate through. The CPU is oen referred to as the processor, which refers to its ability to process data.

  1.  What is the meaning of data messaging? The process of sending data over a network is called data messaging.
  2.  How does data messaging work? Data messaging works by breaking down the data to be send over the network into
     chunks, or segments, that are sent out separately.
  3.  What is a message? A message is a piece of informaon that is sent from one person to another. It can
     be verbal or wrien, and it can be in the form of a le er, an email, or even a text

message. Computers send binary messages to each other through networking.

  1.  What is data? Data consists of raw numbers and symbols that can be arranged into meaningful
     informaon, which is then used for specific research or analysis purposes. To a
     computer, data are numerical and the basic data storage system is the binary
     numbering system.



  1.  What is the meaning of a correct algorithm? The correctness of an algorithm is an important requirement for algorithm
     development. Any algorithm that is used must be mathemacally correct. An
     algorithm is totally correct if it receives valid input, terminates, and always returns
     the correct output. We can prove this by formal reasoning or mathemacally, for
     instance, with a proof by inducon.
  2.  What is algorithm accuracy? The accuracy of an algorithm is the degree to which it approaches the opmal
     soluon. The more accurate an algorithm, the closer it gets to the opmal soluon.

Some algorithms are required to give the opmal soluon. For instance, if we are sorng data, the algorithm cannot stop unl everything is sorted with 100 percent
accuracy. If we are searching for a specific data point, it must be found. However, if
we are tryingto find a good soluon to a complex mathemacal problem, a standard of “good enough” is applied by the programmer to the situaon.

  1.  What is quicksort? Quicksort is a sorng algorithm. Quicksort is regarded as one of the most efficient
     algorithms overall. Imagine a teacher with a stack of graded papers. The teacher
     wants to sort all of the papers by grade. The pile is split into all the grades higher
     than 55 (this number is the pivot and can be chosen by different methods) and
     those less than 55. Then the two piles are split around another pivot bringing the
     total number of piles to four. The teacher then sorts each pile separately and when
     they are done, can simply put all the piles back together in order from lowest pile
     to highest. It can be thought of as a “divide and conquer” type of method. In this
     example, the stack was split into four piles but, in reality, the data determines how
     many stacks it is split into for sorng.



  1.  What is binary inseron sort? Binary inseron sort is a sorng algorithm that uses the same method we used for
     a binary search—by spli ng the data in half repeatedly. To sort the data, it builds a

new output list and takes items from the input list. The input list are items yet to be sorted, and the output are the ones already sorted. For inserng an element from the input list in the output list the data in the output list is splied in half repeatedly unl the correct posion of the new element is found.

  1.  What is bubble sort? Bubble sort is a sorng algorithm that works by comparing two elements at a me
     and swapping them if they are out of order. It is one of the simplest sorng

algorithms, but it is also one of the slowest.

  1.  What is a binary search? Binary search is a search algorithm that searches for data in a sorted list. It works by
     dividing the list into two halves, and then repeang this process on each of the
     halves unl it reaches the desired data. The algorithm can be used to find an
     element in a sorted array, or to find an element's posion if it is known to be in the
     array.
  2.  What is jump search? Jump search is a search algorithm that uses a jump size to find the target element in
     an ordered list. The jump size is the number of elements that are skipped over

between each comparison. Let’s say the book is 2,500 pages long. We calculate the
square root of n, the number of pages, which gives us 50, which we will use for the
jump size, or m. Ken will first jump to page 50 and see if Josh is higher or lower, then keep jumping unl he is past Josh. Then, he will go back to the previous jump
and do a linear search (page by page) on the next 50 pages to find him.

  1.  What is linear search? Linear search is a searching algorithm that starts at the beginning and looks at each
     element in order.



  1.  What is a muldimensional array? A mul-dimensional array is an array that contains one or more arrays as its
     elements, where each element is also an array. In other words, it is an array of
     arrays. A two-dimensional array is the most common form of a mul-dimensional
     array, and it is oen used to represent a matrix or a table. A two-dimensional array
     is like a grid of rows and columns, where each element is idenfied by its row and
     column index.
  2.  What is an array? An array holds a fixed number of values of the same data type. Each value in the
     array can be accessed by its index, which represents its posion in the array.
  3.  What is a linked list? A linked list is a sequenal data storage structure. Each element is linked to the
     next. In other words, an element in the data structure linked list contains two
     pieces of informaon, the data and the link. The last element in the linked list
     structure does not have a pointer to the next value, instead it points to null, which
     indicates that there are no more elements. Null is oen used to end a series of
     data. The link in each list is a pointer, which is a memory locaon. It idenfies the
     part of memory that contains the next element.
  4.  What is a stack? A stack is a data structure that works under a specific philosophy: Last In, First Out.
     This is oen abbreviated as LIFO. Imagine you are inpu ng data into a computer
     program—in this case, we will say it is a card game simulator. It will use a standard
     deck of 52 cards, and they will be randomized and placed into the stack. Just like in
     real life, when you are playing cards, you can only draw the card from the top of the
     deck. That is the last card that was placed on top, so it is the last in, but the first
     out. Once the game is started, the order cannot be changed, the next card in play is
     always the one on top of your deck—or in our simulaon, your stack. A stack in
     computer programming allows for two basic operaons: push and pop. Pop will
     take the top piece of data from the stack, which removes it. Push will add a new
     item to the top (and only the top) of the stack.



  1.  What is a flowchart? Flowcharts (Flow Diagrams): To translate human instrucons into computer
     instrucons, coders have used flowcharts for many years. These charts make it easy
     to observe the structure of an algorithm and create it with a programming
     language. They use standard symbols to indicate different types of instrucons. A
     terminator symbol (oval or rectangle) is used at the beginning of a flowchart and at
     all the endings. They represent the external nodes of flowcharts. A rectangle
     represents a process, for instance, some type of data calculaon or filtering. The
     diamond is a decision—a decision has mulple pathways that can be taken. A
     parallelogram in a flow chart represents input or output, where data are sent into
     or out of the process. Finally, the arrows represent the flow from beginning to end
     of the sequence.
  1.  What is the relaon between algorithms and

 flowcharts?

 

An algorithm is a set of well-defined instrucons or rules for solving a parcular

problem or performing a parcular task. It is a step-by-step procedure that can be

followed to perform a computaon, solve a problem, or automate a task. An

algorithm can be represented in many forms. On possibility is to use a flowchart to

visualize the steps of an algorithm.

  1.  What is a driver? A driver is a piece of soware that allows the operang system to communicate
     with hardware devices.
  2.  What are the parts of an URL? A URL is composed of several components. The first part is the protocol (HTTP or
     HTTPS). The second part is the computer name (e.g. www). The third part is the
     domain name. The fourth part is the folder locaon, and the fih part is the file
     name.



  1.  What is TCP/IP error detecon? TCP/IP divides data into pieces to be sent over a network into segments or
     datagrams. These segments have a “header” at the beginning which defines the
     sending computer, the receiving computer, transmission se ngs, and also a 16-bit
     checksum to verify the data. The maximum size of this segment is 65,536 bytes.
     When each segment arrives at the desnaon computer it is checked against the
     checksum value; if the values don’t match, a retransmit request is sent to the
     source computer. Along with a checksum, TCP/IP also checks for transmission errors
     on other levels. The receiving computer must also send an acknowledgement (ACK)
     for each datagram received. This is accomplished by giving each datagram a
     sequence number in the header. The recipient machine sends an ACK for each
     sequence number—if one of the numbers is not acknowledged aer a certain
     period of me, the source computer will retransmit. At another level, TCP/IP will
     also detect broken routes over the network and re-route to new ones. This is one
     reason why TCP/IP has been used for decades on the internet: it is fault-tolerant.
     Part of the network can stop working without taking the enre network offline.
     Routers and devices that stop forwarding network traffic can be worked around by
     checking for alternate routes to the desnaon.
  2.  What is Cyclic Redundancy Check? Cyclic Redundancy Check, or CRC is a type of error-detecon in network
     communicaon. It works with a similar principle to the checksum. A block of data is
     processed through a mathemacal algorithm and a result is appended to the data.
     Aer the data is sent, a calculaon is repeated to check the integrity. The CRC can
     be applied to any length of binary data and will always return a code of the exact
     same length. This makes CRC a “hashing” algorithm, one that returns a value of
     consistent length in digits.
  3.  How does quicksort work? Quicksort is a divide and conquer algorithm. It works by first choosing a pivot
     element, then paroning the list into two parts: all elements that are less than the

pivot element, and all elements that are greater than or equal to the pivot element.
The algorithm recursively calls itself on each of these two sub-lists.



  1.  What is parity? Parity is a method of error-checking for binary data. It is used in
     telecommunicaons and was used in the past to check for errors in telegraphs. It
     works by adding an extra bit to a group of data bits, and then checking that the
     total number of ones (including the extra bit) is odd or even. If it does not match,
     then it assumes there was an error and requests retransmission.
  2.  What is transmission data fault tolerance? Transmission data fault tolerance is the ability of a network to detect and recover
     from errors that occur during the transmission of data. Error detecon techniques
     such as checksums, CRC or parity bits can be used to detect errors in the
     transmied data.
  3.  What is a checksum? A checksum is a small fixed-length value that is computed from a block of data in
     order to detect errors that may occur during transmission or storage. It is used to
     verify the integrity of data and ensure that it has not been corrupted or modified in
     transit. The checksum is generated by performing a mathemacal calculaon on
     the data, typically using a hashing algorithm. The checksum is appended to the data
     itself, aer transmission the receiver performs the same calculaon on the received
     data and compares the computed checksum with the one that was transmied. If
     the checksums match, it is assumed that the data has been transmied correctly,
     and no errors have occurred. If the checksums do not match, then an error is
     detected, and the data must be retransmied.



  1.  What is storage error checking? Storage error checking is a method to detect corrupted files in storage. It is done by
     storing an exact copy somewhere and then comparing it. But because some files
     are megabytes, or even gigabytes, in size, this would be very inefficient. Instead,
     since the file is one large binary number, it is placed into an algorithm. This
     algorithm is like a mathemacal funcon—it has a numeric soluon. The checksum
     is the soluon to this problem; it is calculated and appended to the file when it is
     saved. The checksum can be calculated again when the file is opened. If the
     calculated checksum is different from the checksum appended to the file, the file
     has been corrupted.
  2.  What are non numeric data types? Non numeric data types are data types that are used to represent non numeric or
     non-mathemacal values, such as text, characters, dates, mes, Boolean values,
     and other data that cannot be expressed as a number. Examples: String (sequence
     of characters that represents text), character (a single alphabec or symbolic
     character, such as a le er, digit, punctuaon mark, or other symbol), date and me
     (used to represent dates, mes, or both), ...
  3.  What are numerical data types? Numerical data types are used to represent numerical or mathemacal values, such
     as integers, floang-point numbers, and decimal numbers. The following numerical

data types are used in the programming language Java: - byte: integer from -128 to 127 (8 bits) - int: integer from -2,147,483,648 to 2,147,483,647 (32 bits) - float (smallest value): 1.4E-45 to 1.4E-45 to 3.4E38 (32 bits), float (largest value):

3.1E38 (32 bits) - double (smallest value): 4.9E-324 to 49E-324 to 1.7E308
(64 bits), double(largest value): 1.7976931348623157E308(64bits)



  1.  What is float? Float is a data type that can store numbers with decimal points.The reason a
     decimal is called a “float” is because the decimal point can float around to different

places in the number. This is an important disncon for a computer: where is the decimal? That must be stored somewhere in the variable itself. It is something a human would take for granted, but something that has to be specified for a computer. Example: float var = 2.234f; is the Syntax to define a float variable in Java
and assign the value 2.234 to this variable.

  1.  What is a variable? In programming, the coder creates variables to store individual units of data. A
     variable is a container for informaon. It has three important defining factors: a
     name, a type, and a memory locaon. The name is what it will be referred to in
     code, just as if you wrote a label on a box. The memory locaon is where the
     computer can find this box in RAM. The type describe for example how many bytes
     in memory are used to store the value of the variable and what is the meaning of
     the individual bits and bytes.
  2.  What is a data type? A data type determines the kind of data that can be stored in a variable, such as
     integers, floang-point numbers, strings, and boolean values. A data type defines

the range of values that a variable can take, the amount of memory that must be reserved for a variable, and the meaning (encoding) of the individual bits and bytes.

  1.  What is data contextualizaon? All informaon is stored in binary format in computers. If you want to store
     alphabecal leers, you can represent each leer with a specific number. To
     convert the stored binary numbers back into leers, you need addional contextual
     informaon, such as the code that was used for conversion. Examples of such codes
     include ASCII or Unicode.



  1.  What is the meaning of "Everything on a

 computer is binary"?

 

A computer can only store the values 1 and 0. Therefore, all informaon must be

converted into the binary numbering system. When informaon is read from

memory and outpued to the user, it has to be converted back. For example, the

leer 'A' is converted to the binary value 01000001. When this binary value is read

from memory, it has to be converted back into the leer 'A'.

  1.  What is hexadecimal? Hexadecimal is a base-16 numbering system used in compung and digital
     communicaons. In contrast to the familiar base-10 decimal numbering system,
     which uses 10 digits (0-9), the hexadecimal system uses 16 digits: 0-9 and A-F. The
     leers A through F are used to represent the numbers 10 through 15, respecvely.
     One digit of hexadecimal (or “hex”) can represent four digits of binary. In computer
     applicaons, hexadecimal numbers are usually wrien in groups of two, since two
     digits represent eight digits in binary (a byte). You will oen see a leading zero
     before a hex number to represent this. Hex is oen used to view raw data in a file;
     it is a sort of shorthand for binary. Hexadecimal is used as a go-between for humans
     since: a) it has an exact 1:4 rao of digits with binary, and b) it has more symbols, so
     it is easier for humans to read. Displaying data in hex takes four mes less space
     than in binary.
  1.  How can we convert an octal number into a

 binary number?

 

Octal is a base-8 numbering system (with values from 0 through 7) and binary is a

base-2 numbering system (with values of 0 and 1). Each digit's place value in octal is

a mulple of 8, which is a power of 2, so the conversion between these two

numbering systems is straighorward. Specifically, one digit of octal can represent

exactly three digits in binary. For example, if you have an octal number like 730524,

you know that each digit represents three digits in binary. 7 is equivalent to 111 in

binary, 3 is equivalent to 011 in binary, and so on. Therefore, the octal number

730524 is equivalent to 111011000101010100 in binary. If you're unsure about the

correctness of your conversion between numbering systems, you can use a

webpage like the following to check:

hps://www.rapidtables.com/convert/number/binary-to-octal.html.



  1.  What is data storage? RAM (Random Access Memory) and hard drives are data storage devices. In RAM,
     data is stored temporarily while a computer is running. A hard drive stores data
     permanently and can therefore be used to preserve data even aer the computer is
     turned off.
  2.  What are data measures of bytes? Data measures of bytes are units used to express the amount of digital informaon.
     The most common units used for data measures of bytes, listed from smallest to
     largest: - Bit (abbreviaon: b) - a single binary digit that can hold a value of either 0
     or 1. - Byte (B) - a group of eight bits. A single byte can represent a character of text
     or a small amount of data. - Kilobyte (KB) - 1,000 Bytes. Used to measure small
     amounts of data, such as text documents or small images. - Megabyte (MB) - 1,000
     Kilobytes. Used to measure larger files, such as high-resoluon images or short
     videos. - Gigabyte (GB) - 1,000 Megabytes. Used to measure even larger files, such
     as movies or large soware programs. - Terabyte (TB) - 1,000 Gigabytes. Used to
     measure very large amounts of data, such as complex databases or enre

collecons of high-resoluon videos. - Petabyte (PB) - 1,000 Terabytes. All photos
on Facebook. The larger unit is always 1,000 mes the previous.

  1.  How can we convert a binary number into a

 decimal number?

 

Assign place values to each digit of the binary number, starng from the rightmost

digit and working leward. The rightmost digit has a place value of 1, the next digit

to the le has a place value of 2, then 4, 8, 16, and so on, with each place value

doubling. 8 | 4 | 2 | 1 (place value) 1 | 0 | 0 | 1 (binary number 1011) Mulply

each digit of the binary number by its corresponding place value and add the

results: 1*8+0*4+0*2+1*1 = 8+0+0+1 = 9 Therefore the binary number 1001 is 9 in

decimal.

  1.  What is the binary numbering system? The binary numbering system is a base-2 numbering system that uses two symbols,
     0 and 1, to represent all possible numbers. Computers use the binary numbering

system because early computers used switches that could be turned on or off, giving two possibilies, as in the binary numbering system.



  1.  What is the decimal numbering system? Human beings have ten fingers. It is a common reason given for why we use a base
     10 numbering system: decimal. Decimal uses ten symbols, 0 through 9, to represent
     all possible numbers. In the decimal numbering system, each digit's value is based
     on its posion relave to the decimal point. For example, the number "123" in
     decimal notaon represents 1 x 10^2 + 2 x 10^1 + 3 x 10^0, or 100 + 20 + 3, which
     equals 123.
  2.  What are the eras of compung? To look at the history of modern compung machines, we will break it down into
     four eras: - Behemoths: Huge machines used mostly by governments. 1940s -
     1960s. - Business: Computers that are used by individuals in business. 1960s -
     1980s. - Graphical: The dawn of the Graphical User Interface and digital imagery.
     1980s - 2000s. - Portable: Miniaturizaon of computers; laptops, tablets,
     smartphones. 2000s - today.
  3.  What is a behemoth? A behemoth is an enormous computer that were built with vacuum tubes and wires
     and took up enre rooms. The input was usually entered by flipping switches and
     turning dials. The output was oen given via lights or punched holes on paper. They
     were basically number-crunching machines that were used to perform large
     mathemacal computaons, or to work with large amounts of numerical data. The
     U.S. Census Bureau purchased one of these huge computers, the UNIVAC, in 1951
     to help with counng the populaon of the United States. The ENIAC (Electronic
     Numerical Integrator and Computer), the first general-purpose computer, which
     began operaon in 1946 and was programmed by a team of six female operators,
     should also be menoned in this context.



  1.  Can you tell me something about the first

 computers?

 

There’s no machine that we can point to and say “here is the first computer.” It was

more of an evoluon of advanced machines into something that eventually

resembles the computers we have today. In 1801, Joseph Maria Jacquard invented

a loom that used punch cards made of wood to create fabric designs automacally.

Technically, this was programming—a pre-made set of instrucons changed into a

“machine language” that tells a machine what to do. However, this machine wasn’t

doing any compung, simply weaving cloth. Later, during World War II, machines

were used to encode secret messages. These machines used gears that would align

with symbols to create a coded text from regular or “plaintext” messages. Breaking

those codes required actual compung power. The Turing machine was able to take

in encrypted messages, process them, and output an answer. However, his machine

had no keyboard or monitor, let alone a mouse.

  1.  What is a language? We can disnguish between natural languages and programming languages. A
     natural language is used for communicaon between humans, while a

programming language is used for communicaon between humans and machines.
With a programming language, an algorithm can be described in such a way that a
computer is able to execute the program/algorithm.

  1.  What is semancs? If I very clearly describe how to make a peanut buer sandwich, but actually
     wanted a chicken salad, then I have a semancs problem. It’s possible to create
     perfectly readable code for a computer, yet have it do something different than
     your intenon. When a program compiles and runs without producing any syntax
     errors or runme errors, but it does not produce the expected output or produces
     incorrect output due to a mistake in the logic of the program. For instance, suppose
     you write a program to calculate the average of a list of numbers, but you forget
     dividing the sum by the number of elements in the list. The program would compile
     and run without any errors, but the output would be incorrect, resulng in a
     semanc error.



  1.  What is syntax? Syntax is the set of rules that govern how a language is used. In programming,
     syntax refers to the correct usage and ordering of words and symbols in a program.
     If they are not in the correct order, the program will not work. Just like the words in
     an English sentence, programming instrucons only make sense in the correct
     order; otherwise, it is just a jumble. If you took the words of this sentence and put
     them in a random order, it would ignore proper syntax and make lile sense. Syntax
     also includes rules for when certain symbols can be used, similar to English rules for
     where punctuaon can go in a sentence.
  2.  What is an applicaon? An applicaon (app) is a computer program that performs a specific task. For
     example, Microso Word is an applicaon that allows users to create and edit
     documents. Applicaons are usually designed for a specific purpose, such as word
     processing or playing games.
  3.  What is an operang system? An operang system (OS) is the first soware loaded into the RAM during the boot
     process. An OS is essenal for a computer to funcon (assuming a standard

personal computer). Examples include Windows, Linux, and MacOS. This soware
provides three fundamental funcons for the computer: 1. Provide an interface 2.
Control hardware 3. Run applicaons. An interface is required so a human being
can interact with a computer. The hardware in a computer system would sit,
dormant, without the OS to give it instrucons. Applicaons need an operang
system to run. They are a second layer of funconality.

  1.  What is soware? Soware is a set of instrucons that tell a computer what to do. It takes the form of
     either an operang system or an applicaon. The OS provides basic funconality

including an interface, while applicaons (apps) are available to perform specific tasks such as word processing, games, or even controlling robots.



  1.  What does an operang system provide to

 interact with the user?

 

An operang system provides an interface to interact with the user. Nowadays an

operang system typically provides a graphical user interface (GUI): This interface

uses graphical elements such as icons, menus, and windows to allow users to

interact with the system. Another interface would be a touch interface (users can

interact with the system by using their fingers) or a speech interface.

  1.  What is an IRQ? An IRQ stands for "Interrupt Request". A device can send status messages to the
     CPU by in interrupt request line, labeled from 00 to 15. If a hardware device, such

as a keyboard or mouse, has data to be processed by the CPU it sends a signal to the CPU by generang an IRQ. The CPU interrupts its tasks an executes a corresponding interrupt handler to perform the necessary acons. Each device in a
computer system is assigned a unique IRQ number, which is used by the device to
request an interrupt. The CPU uses this number to idenfy the source of the interrupt and determine the appropriate interrupt handler to execute.

  1.  What are differences between the operang

 systems Mac and Windows?

 

Two of the differences are: Mac OS is designed to run exclusively on Apple

hardware, while Windows can run on a variety of different hardware plaorms.

Mac OS uses APFS as file system and Windows uses NTFS as file system.

  1.  Does an array take more space than a stack? Typically, an array does not take up more space in memory than a stack. A stack can
     be implemented internally as an array or a linked list. If you want to store 100

elements in an array, and the array size is exactly 100, then a stack that is implemented with a linked list requires more space because every element is linked
to the other elements using an addional pointer. However, if you have 100
elements, and the array size is 200, for example, then a stack (internally implemented with a linked list) may require less space.



  1.  Where is a linked list used? A linked list is a flexible data structure. Each element in a linked list is linked via a
     pointer to the next element. A linked list hasn't got a fixed size and elements can be

inserted easily in the middle of the list. For example, if you were tracking the number of people who have visited your website over me, you could use a linked
list to store each visitor's IP address and mestamp.

  1.  What is the difference between float and

 double?

 

Float and double are data types that can store numbers with decimal points.

Double is a data type that can store numbers with more precision than float.

Double is a 64-bit floang point number, while float is a 32-bit floang point

number. The double data type can store numbers with more precision than the

float data type. Smallest value of a 32 bit float is -3.4028235E38, largest value of a

32 bit float is 3.4028235E38, smallest value of a 64 bit double is -

1.7976931348623157E308, largest value of a 64 bit double is

1.7976931348623157E308.

  1.  What is a DDOS? A Distributed Denial of Service (DDoS) aack is a cyber-aack where mulple
     systems send so many simultaneous requests for data that the server cannot
     answer them all and either stops working or becomes so slow that it is mostly
     unusable.
  2.  What is ASCII? This is a binary code scheme where leers, numbers, and symbols are represented
     by exactly one byte of data. ASCII stands for American Standard Code for

Informaon Interchange. In this code the leer A is represented as 01000001.



  1.  Describe the network topologies ring and mesh. A ring network consists of computers connected together in a ring, where the signal
     passes around it. In this design, each computer is required to look at any data
     passed to it to see if it is required to pass it along. This design is not fault-tolerant
     and stops working if the ring is disconnected. That is why it has fallen out of use
     today. A mesh network connects every node (computer or device) to every other
     node. For each device that is connected, more cabling is required, which is
     extremely inefficient. However, it has the advantage of being fault-tolerant since
     there are mulple paths to each node. Mesh networks are becoming interesng in
     wireless networks since there is no need for cabling, and the benefit of fault
     tolerance is significant.
  2.  What is binary search? Binary search is a search algorithm that searches for data in a sorted list. It works by
     dividing the list into two halves repeatedly. If the value you are searching for is
     lower than the value in the middle of the list, you go on searching in the le part of
     the list (dividing into two halves ...). If the value you are searching for is higher than
     the value in the middle of the list, you go on searching in the right part of the list
     (dividing into two halves ...).
  3.  What is a hub? A hub is a device that takes a signal from one cable and splits it out over several
     cables. If it was spli ng out four signals, it would be called a “four port” hub. A hub
     does not do any signal processing—everything that comes in is sent out through all
     of the ports. Communicaon is two-way: the ports can also send communicaon
     through the uplink connecon.
  4.  Would the linked list work to order elements? Yes, the linked list would work to order elements.
  1.  What is the difference between BIOS and

 Operang systems

 

The BIOS is a chip that contains instrucons for the computer to start up. The

operang system is soware that runs on top of the BIOS and provides an interface

for applicaons to run.



  1.  How can an octal number be converted into an

 decimal number?

 

The octal numbering system is a base-8 numbering system. It uses the digits 0

through 7. Each digit's place value is a mulple of 8. Assign place values to each

digit of the octal number, starng from the rightmost digit and working leward.

The rightmost digit has a place value of 1 (8⁰), the next digit to the le has a place

value of 8 (8¹), then 64 (8² = 8*8), 512 (8³ = 8*8*8), and so on. For example, the

octal number 1702 in decimal notaon represents (1 × 8³) + (7 × 8²) + (0 × 8¹) + (2 ×

8⁰), or (1*512) + (7*64) + (0*8) + (2*1), which equals 962. If you're unsure about

the correctness of your conversion between numbering systems, you can use a

webpage like the following to check:

hps://www.rapidtables.com/convert/number/octal-to-decimal.html.

  1.  Please give some examples of a stack data

 structure.

 

A stack is a data structure that works under a specific philosophy: Last In, First Out.

This is oen abbreviated as LIFO. A stack data structure can be used to implement a

Undo/Redo funconality in text editors: When you make changes to a document in

a text editor, the changes are pushed onto a stack. If you want to undo a change,

the editor pops the most recent change off the stack and applies the inverse

operaon. To redo a change, the editor pushes the previously undone change back

onto the stack. Another example would be the back/forward navigaon in web

browsers: When you navigate to a new web page, the URL of the previous page is

pushed onto a stack. If you click the "back" buon, the browser pops the previous

URL off the stack and navigates to that page. If you then click the "forward" buon,

the browser pops the next URL off the stack and navigates to that page.

  1.  How is a stack data structure represented in

 Java? Remark: This queson isn't relevant in the

 context of the course book.

 

The stack data structure in Java is implemented in the class java.ul.Stack.

Internally in this class an array is used the implement the stack funconality.

  1.  What is CSS? CSS: This stands for Cascading Style Sheets, these are used to create layout and
     forma ng for web sites.



  1.  Mangement and understading of development

 stages

 

Development stages are the process of creang a soware applicaon. The

development stages are: requirements analysis, design, implementaon, tesng

and maintenance. The first stage is requirements analysis where the needs of the

users are idenfied and documented in a soware requirements specificaon (SRS).

This is followed by design where the SRS is analyzed to produce a high-level design

document that describes how the system will work. Next comes implementaon

where all of this informaon is used to create working soware. Tesng then

follows to ensure that everything works as expected before moving on to

maintenance which includes fixing bugs and adding new features.

  1.  What is a datagram? A datagram is a unit of data sent over a network. A datagram may contain one or
     more packets, depending on the protocol used to send it.
  2.  What is TCP/IP? TCP/IP stands for Transmission Control Protocol/Internet Protocol. The transmission
     control protocol works at the transport layer, while the internet protocol works at
     the network layer of the OSI model. However, TCP has its own four-layer model of
     operang. TCP/IP is the protocol of the internet. That means that to access the
     internet, it must be installed on a device. Since it is also usable for LAN
     communicaon, most computers use TCP/IP as their primary and only network
     protocol.
  3.  What is a device controller? A device controller is a piece of soware that controls the binary input and output
     to a device. The device controller can also signal the CPU with an interrupt. A

device driver has to be designed specifically to talk with both the operang system
that is in use and the hardware device’s controller.

  1.  What is a driver? A driver is a piece of soware that allows the operang system to communicate
     with hardware devices.
  2.  What does TCP mean? Transmission Control Protocol



  1.  Compung power of supercomputers is oen

 measured in WHAT?

 

FLOPS: floang point operaons per second

  1.  What is ALU? The ALU is the part of a computer that performs arithmec and logic operaons. It
     is responsible for performing basic arithmec calculaons on data, such as adding

and subtracng, but also performs logic operaons such as AND and OR.

  1.  What is a computer interface? A computer interface is the combinaon of all of the methods designed for a user
     to interact with a computer, input and output.
  2.  What does GUI stand for? Graphical User Interface (GUI) is a type of user interface that allows users to
     interact with electronic devices using graphics and text rather than just text. It is

used in computers, smartphones, tablets, video game consoles and other devices.

  1.  What is CRT? A cathode ray tube (CRT) was a type of monitor or television that used a large tube
     to display images.
  2.  What is a hard drive? A hard drive is a storage device that stores data in a non-volale manner. It is used
     to store the operang system and other programs on your computer.
  3.  Where is the firmware usually stored on? The firmware is stored in the BIOS chip.
  1.  Which network device does not filter network

 traffic?

 

A hub.



  1.  Who is Von Neumann? Von Neumann was a Hungarian-American mathemacian, physicist, inventor,
     computer scienst and polymath. He made major contribuons to a number of
     fields, including mathemacs (foundaons of mathemacs), physics (quantum
     theory, solid state physics and the theory of games), compung (Von Neumann
     architecture), stascs (theory of games and the Monte Carlo method) and
     technology (cellular automata). He published over 150 papers in his life. Von
     Neumann was one of the most influenal mathemacians of the 20th century. He
     introduced the concept of cellular automata, which are self-replicang machines.
     Von Neumann's mathemacal analysis of the structure of self-replicaon preceded
     the discovery by biologists in 1953 that DNA carries genec informaon using a
     code largely based on binary numbers.
  2.  Who is Russell Kirsch? In the 1950s, Russell Kirsch invented the pixel. He decided that the simplest way to
     divide up the data in a photo or image was to demarcate it into discrete squares—

that is what we have used to this day. It was a simple soluon and worked well enough that humans could recognize photographs on a computer screen.

  1.  Who created JavaScript? Remark: This queson is

 not relevant in the context of the course book.

 

JavaScript was created by Brendan Eich in 1995. Eich is an American computer

programmer and technology execuve.

  1.  Where are pixels used? Pixels are used in all types of images including fonts, icons, and graphics, along with
     photos.
  2.  When should I use JavaScript? When you want to create a interacve website.



  1.  What's the difference between a switch and a

 router?

 

A switch has a connecon for an uplink and mulple ports for communicaon.

However, it does do basic filtering on data. Computers send data over a network in

data frames with hardware addresses. Some data is sent out with the broadcast

address; this address means it is for all computers who can receive it. A switch

filters these out so they do not get propagated across the enre network (which

can cause a flood of data known as a “broadcast storm”). A router is more

intelligent connecon device than a switch. It examines the IP address of each

packet of data sent over a network and only sends the signal through the

connecon that will reach the address. A packet is similar to a frame, this is a unit

of network data that is idenfied by an IP Address (instead of a hardware address).

Since a router filters data, it can also block data from entering a network that does

not belong there; this funcon is called a firewall.

  1.  What process analyzes large amounts of data

 from different sources to produce useful

 informaon?

 

Data mining.

  1.  What is XOR? XOR (exclusive OR, exclusive disjuncon) is a logic gate that indicates that only one
     out of two proposions is true. If both inputs (proposions) are true or both are
     false the output is false. If only one of the inputs (proposions) is true and the
     other false, the output is true.



  1.  What is von neumann architecture Von Neumann architecture is a basic design for computer systems that is sll in use
     today. The von Neumann architecture is a reference model for the architecture of a
     computer. It consists of - a CPU, - a memory that holds both computer program
     instrucons and data, - an input system, - an output system. The CPU consist of an
     ALU, a control unit and registers, which contain a fixed number of bits. These
     registers can contain data or instrucons that have been read from memory.
     Besides the processor and memory, there also should be some type of input
     (entering data) and output system (outpu ng data) to be able to communicate
     with other devices or a human being.
  2.  Explain the star network topology. In a star network topology, a central network device such as a hub, switch, or router
     is used to connect all the devices in the network. The central node in a star network

is responsible for sending traffic to the outer nodes. This network is fault-tolerant to a point, but if the central hub, switch or router fails the network will not funcon. Star networks are by far the most commonly-used type of network today.

  1.  What is UNIX? Remark: This queson isn't

 relevant in the context of the course book.

 

UNIX is a computer operang system originally developed in the 1970s by AT&T Bell

Labs. It was designed to be used in me-sharing and mul-user environments, and

is intended to be used interacvely by mulple users simultaneously. Today, UNIX is

used on a wide range of devices, including personal computers, servers,

smartphones, and other embedded systems. Some of the most popular UNIX-based

operang systems include Linux and macOS.

  1.  What is the meaning of transoceanic? The term transoceanic refers to something that occurs across or involves mulple
     oceans. It is used to describe things that span across large distances of water,
     typically in reference to travel, transportaon, or communicaon. Transoceanic
     communicaon cables refer to undersea communicaon cables that connect
     connents and countries across oceans.



  1.  What is the second layer of the OSI model? The second layer of the OSI model is the data link layer. It exists to provide
     specificaons for devices—such as Ethernet—that determine the way signals are
     sent electronically over the network, as well as standards for devices; this is where
     the hardware (MAC) address is used. It includes local network error checking,
     including collisions. Collisions occur when two network devices send out a signal
     simultaneously, and they collide over physical media. Most networks use collision
     detecon. This means aer a collision is detected both devices are instructed to
     wait a random amount of me before sending again.
  2.  What is the purpose of an operang system? The purpose of an operang system is to provide an interface, control hardware,
     and run applicaons.
  3.  What are the tasks of the presentaon layer? The presentaon layer prepares the data for being transferred. Encoding happens
     here. For instance, if you are sending an email in Unicode, it will translate the

symbols at this layer. Encrypon occurs at this level. In other words, a plaintext or other unencrypted message is brought through a mathemacal algorithm that created encrypon. Without knowing the encrypon key, the code is nearly unbreakable (though no code is perfect). The sending and receiving network devices share a key at the beginning of communicaon that allows for the algorithm to be reversed and the message to be turned back into the original.

  1.  What is the physical layer? The physical layer is the lowest layer of the OSI model. It is responsible for sending
     and receiving data over a network. The physical layer defines how signals are sent
     and received, as well as how they are converted into binary data. The physical layer
     includes specificaons for cabling and connectors. It consists of hardware
     specificaons.



  1.  What is the most common programming

 language?

 

Programming languages are context- and applicaon domain-specific. Therefore,

this queson cannot be answered in general. However, some of the most popular

programming languages include Python, Java, C, and C++. You can find a ranking of

the popularity of programming languages over me on this webpage:

hps://www.obe.com/obe-index/

  1.  What is the first layer of the osi model? The first layer of the OSI model is the Physical Layer.
  2.  What is the difference between hp and hps? Both protocols exist to transfer data for a web page. The difference between hp
     and hps is that the secure version (hps) uses encrypon to protect private data.

Many sites use encrypon—you should never type in personal data on any site that is not using HTTPS (this is oen indicated on a browser by a small padlock icon).

  1.  What is the difference between direct and

 indirect proof? Remark: This queson isn't

 relevant in the context of the course book.

 

Direct and indirect proofs are two methods used in mathemacs to prove the truth

of a statement. A direct proof is a method of proving a statement by using a series

of valid arguments to show that the statement is true. An indirect proof, on the

other hand, is a proof method that proves a statement by assuming the opposite of

the statement (negaon) and showing that it leads to a contradicon or an

impossible scenario. Indirect proofs are oen used to prove statements that are

difficult to prove directly, or for cases where a direct proof is not possible.



  1.  What is the concept behind pixel images? The concept behind pixel images is to break any image up into small squares, so
     that each square would then have one (and only one) color. If the squares are small
     enough, the human eye cannot disnguish them individually, and so our brain will
     see a photographic image. An image is stored as a binary sequence of "color
     values". You start at the top le for the first pixel, and then go across the first row in
     that order unl compleng it and then jumping down to the next row of pixels.
     Since the order is implicit, there is no need to number the pixels. Each pixel has a
     color as its basic data, so we must represent each separate color as a binary
     number. If we use eight bits (a byte), then there are 256 different colors we can
     represent uniquely. This is called 8-bit color.
  2.  What is semancs? Semancs is the study of meaning. Computer sciensts use the term semanc to
     describe a type of error in soware. It’s possible to create perfectly readable code
     for a computer, yet have it do something different than your intenon. When a
     program compiles and runs without producing any syntax errors or runme errors,
     but it does not produce the expected output or produces incorrect output due to a
     mistake in the logic of the program. For instance, suppose you write a program to
     calculate the average of a list of numbers, but you forget dividing the sum by the
     number of elements in the list. The program would compile and run without any
     errors, but the output would be incorrect, resulng in a semanc error.
  3.  What is Python? Python is a programming language used for web development, data analysis,
     arficial intelligence, scienfic compung, and more.
  4.  What is logic? In computer science, logic is a fundamental branch of mathemacs that deals with
     the study of reasoning and argumentaon. It involves the use of symbols and rules
     to express and manipulate statements and arguments, with the goal of determining
     their validity or truth. Proposional logic is a specific area relevant to computer
     science.



  1.  What is Linux? Linux is a computer operang system. It is a free and open source soware
     operang system for computers, meaning that the code can be modified and

redistributed freely. Linux was originally created by Linus Torvalds in 1991, and has
since been developed by thousands of programmers worldwide.

  1.  What is HTTP? HTTP (Hypertext Transfer Protocol) is part of the TCP/IP protocol suite—it exists
     specifically to transfer data for a web page. HTTP is the foundaon of the World
     Wide Web and enables the transfer of informaon between clients and servers
     over the internet.
  2.  What is Fortran? Fortran is a programming language. Addional informaon: Fortran was developed
     in the 1950s. It is used to write programs for scienfic and engineering applicaons.
     It is sll used today, but has been largely replaced by other languages like C++ and
     Java.
  3.  What is DNS? Domain Name System (DNS) is a service that translates domain names into IP
     addresses. It is used to access websites and other resources on the Internet. Every

internet device requires a 32-bit IP address to transmit and receive data. Imagine if human users had to memorize and type in 32 zeroes and ones just to access a website? This would prove quite cumbersome. Fortunately, DNS is a translaon service that maps domain names to IP addresses every me you access a web page.

  1.  What is the difference between syntax and

 semancs?

 

Syntax is the rules of how to write a program. Semancs is the meaning of what you

are wring.

  1.  What are data structures? Data structures are the way in which data is stored and organized. They are used to
     make it easier to access and manipulate data. There are many different types of

data structures, including arrays, linked lists, stacks, queues, trees and graphs.



  1.  What is data mining? Data mining is the process of producing useful informaon from large amounts of
     data, oen from mulple sources.
  2.  What is data contextualizaon? What is the meaning of the binary byte 01000001? We don't know if it represents a
     number, a le er, or if it has to be connected with other bytes to represent a larger

number. When somebody tells you that each byte contains an ASCII symbol, you know the meaning of the binary byte 01000001 is the capital leer A. We give binary data context by using codes (like the ASCII code).

  1.  What is a Wi-Fi access point? A Wi-Fi access point is a device that allows wireless devices to connect to the
     Internet.
  2.  What is a terminator in a flowchart? A terminator symbol (oval or rectangle) is used at the beginning of a flowchart and
     at all the endings. A terminator symbol represents the start or end of a process or
     program. Terminator symbols are used to make flowcharts more readable and
     easier to follow, as they provide a clear indicaon of where a process begins and
     ends.
  3.  What is a syntax error? A syntax error is a mistake in the syntax of a programming language such as -
     missing punctuaon, - wrong ordering of symbols and words, - misspelled keywords

or idenfiers, - incorrect capitalizaon, - incorrect nesng of brackets or parentheses, ... Syntax errors prevent the code from being compiled or executed
properly, and typically result in an error message that indicates the locaon and
nature of the syntax error.



  1.  What is a proposion? A proposion is the idea behind a statement. For instance, saying 'It is more than
     27 degrees Celsius' is a logical statement, but the proposion behind it is that the

condions of the environment include that the temperature is more than 27 degrees Celsius at the current moment outdoors. There can be many logical statements used to express a proposion. For instance, if the proposion is 'It is hot
outside', you can use the logical statement 'It is more than 27 degrees outside' or 'It
is not less than 28 degrees outside', among others.

  1.  What is an UI? UI stands for "User Interface". It refers to the graphical or interacve elements that
     allow users to interact with a soware.
  2.  What is a firmware? Firmware is a type of soware that is required by the hardware for essenal
     funconality. It is programmed into a stable chip that retains the data even without

electrical power (a non-volale chip). A modern computer first runs the instrucons on the BIOS chip for boong up, which includes idenfying all of the hardware aached to the machine (hard drives, amount of RAM, graphics card, etc.). Once
that is done, it finds the operang system (OS) on the hard drive or other long-term
storage device and begins the process of copying it into RAM. That is what you are
waing for when a computer is “boong” up. You stare at the logo for your computer unl this process is finished and you can interact with it. Firmware can
also be used in electronic devices that always perform the same task, such as your
smart refrigerator or a child’s toy. A single-task device does not need RAM to run
different applicaons. Advanced personal computers can perform many tasks and
need the RAM and extra hard drive storage to do so.

  1.  What is a discrete unit of data? A discrete unit of data is a single, disnct piece of informaon that can be stored,
     manipulated, or transmied by a computer or other digital device. In the context of
     this course book a discrete unit of data is a file.



  1.  What happened in the Business era of computer The Business era of computer is the period from the 1960s to the 1980s. Computers
     was used by individual experts in business. No graphical user interfaces was

available to interact with computers.

  1.  What happened in 1801? Joseph Maria Jacquard invented a loom that used punch cards made of wood to
     create fabric designs automacally. Technically, this was programming—a pre-made

set of instrucons changed into a “machine language” that tells a machine what to do. However, this machine wasn’t doing any compung, simply weaving cloth.

  1.  What does TCP/IP stand for? Transmission Control Protocol/Internet Protocol
  2.  What can be represented in binary? Any type of informaon can be represented in binary. This includes numeric values,
     text, images, audio, and video. All of this informaon can be converted into a binary
     representaon.
  3.  What is a programming language? Programming languages are languages that can be used by humans to give
     instrucons to a computer without having to write everything in binary.

Programming languages define a set of allowed words and have rules, including syntax, which dictate how to use the words and symbols of that language.

  1.  What is a parity bit? Parity is a method of error-checking for binary data. It works by adding an extra bit
     (the so-called parity bit) to a group of data bits and then checking that the total
     number of ones (including the extra bit) is odd or even. If an odd parity bit is used,
     the parity bit makes the total number of ones in the group of data odd. For
     example, if you have the following data 1010111, you count 5 ones. Because 5 is
     odd, the parity bit to add is 0. Then we have the byte 01010111. On the other hand,
     if you have the following data 1010101, you count 4 ones. To make the total
     number of ones odd, the parity bit to add has to be 1. Then we have the byte
     11010101.



  1.  What are formats in number representaon? In compung, there are several different formats that are commonly used for
     number representaon, including decimal, binary, hexadecimal and octal.
  2.  What is a data bus? A data bus is a connecon that is used for data transfer between different
     components of a computer.
  3.  What is proposional logic? Proposional logic deals with the logical relaonships between proposions that
     are represented as simple statements or symbols. In proposional logic,

proposions are considered to be either true or false, and logical connecves such as and, or, not, implies are used to combine them into more complex proposions.

  1.  The rules for the order and usage of words and

 symbols in programming is called what?

 

syntax

  1.  Which is the fastest cache L1, L2 or L3? L1 cache is the fastest, L2 cache is slower than L1 and L3 cache is slower than L2.
  2.  What is the memory size of the L1 cache? The memory size of L1 cache varies depending on the architecture and design of
     the processor. For example, in the Intel Core i7 processor, the L1 cache has a size of
     32 kilobytes (KB).
  3.  What is the big O notaon? The big O notaon is used to describe the complexity of an algorithm. It is based on
     the data size of n elements. For instance, bubble sort takes approximately n^2 steps

to be completed, so we write it as: O ( n^2 ). If you would like to sort a list of 100 elements using bubble sort you approximately need 10,000 steps to complete.

  1.  Converon between numbering systems: 1:

 Convert the decimal number 57 to binary. 2:

 Convert the binary number 10110110 to decimal.

 3: Convert the hexadecimal number 2C to binary.

 

1: The decimal number 57 is in binary 00111001. 2: The binary number 10110110 is

in decimal 182. 3: The hexadecimal number 2C is in binary 00101100.



  1.  How many different numbers can you represent

 with 16 bits?

 

With 16 bits, you can represent 2^16 = 65,536 different numbers.

  1.  Which non-numerical informaon needs to be

 converted to binary?

 

Non-numerical informaon, such as text, images, audio, and video, needs to be

converted to binary. For text, you can use the ASCII code, images can be

represented by a sequence of pixels, etc.

  1.  What is the difference between microprocessor

 and microcontroller?

 

Microprocessors are the brains of a computer. They are the central processing unit

(CPU) and they control all of the other components in a computer. A

microprocessor is a single-chip CPU. It requires addional components, such as

memory and input/output interfaces, to be integrated into a complete system. A

microcontroller, on the other hand, is a complete compung system that integrates

a CPU, memory, and input/output interfaces all on a single chip.

  1.  How can one behave ethically? You can behave ethically for example by not stealing intellectual property, not lying
     about your product, and keeping user informaon private.
  2.  How to convert binary to octal? Converng binary to octal involves grouping the binary digits into sets of three,
     starng from the rightmost digit, and then converng each group of three binary
     digits into its corresponding octal digit. The binary number 110 010 111 011 001
     010 can be converted into octal as follows: 010 = 2, 001 = 1, 011 = 3, 111 = 7, 010 =
     2, 110 = 6. The number in octal is: 627312. If you're unsure about the correctness of
     your conversion between numbering systems, you can use a webpage like the
     following to check: hps://www.rapidtables.com/convert/number/binary-to-
     octal.html.



  1.  How can we convert the binary number

 11111111 to a decimal number?

 

Assign place values to each digit of the binary number, starng from the rightmost

digit and working leward. The rightmost digit has a place value of 1, the next digit

to the le has a place value of 2, then 4, 8, 16, 32, 64, 128 and so on, with each

place value doubling. Mulply each digit of the binary number by its corresponding

place value and add the results: 1*128+1*64+1*32+1*16+1*8+1*4+1*2+1*1 = 255

Therefore the binary number 11111111 is 255 in decimal.

  1.  How many bytes is a mega byte? A mega byte (1MB) is 1,000,000 bytes.
  2.  How can humans 'think like a computer'? A computer needs clear and unambiguous instrucons. If we want to solve a
     problem in the real world using a computer, we must be able to break down the
     problem into easy, step-by-step instrucons that we can formulate in a
     programming language.
  3.  How does an algorithm work? An algorithm is a set of rules or instrucons for compleng a task. This applies to
     human beings as well as computers. The algorithm takes input data, processes it,
     and produces an output based on the instrucons provided. If you want to
     assemble a cabinet, you have the individual parts as input, you follow the assembly
     instrucons (that's the algorithm), and you get the fully assembled cabinet as
     output. When a computer processes a search query, the search algorithm receives
     the search terms as input, executes the search algorithm step by step, and delivers
     the search results as output.



  1.  How does a cpu work? The Central Processing Unit (CPU) is oen referred to as the “brain” of the
     computer. It does all the processing, which includes doing calculaons and sending
     instrucons to other hardware. The CPU consists of mulple components, including
     the control unit, arithmec and logic unit, registers, and cache. The control unit
     manages the flow of data between the CPU and memory, while the arithmec and
     logic unit performs arithmec and logical operaons. Registers and cache are high-
     speed memory units that are used to store data that is frequently accessed by the
     CPU.
  2.  How can I sort informaon alphabecally? You can sort informaon alphabecally by using the ASCII value of each character.
     The ASCII value is a number that represents the character. For example, the leer A

has an ASCII value of 65, and the leer B has an ASCII value of 66.

  1.  What is the data link layer? The data link layer is the second layer of the OSI model. The data link layer provides
     specificaons for devices—such as Ethernet—that determine the way signals are
     sent electronically over the network, as well as standards for devices; this is where
     the hardware (MAC) address is used. It includes local network error checking,
     including collisions. Collisions occur when two network devices send out a signal
     simultaneously, and they collide over physical media. Most networks use collision
     detecon. This means aer a collision is detected both devices are instructed to
     wait a random amount of me before sending again.
  2.  What is a DSS? A Decision Support System (DSS), is primarily designed to look to the future and
     help make informed decisions. A key of a good DSS is that the informaon is

presented in an easily understandable way. These systems oen have mulple ways
to present data including in graphs and charts. DSS systems provide informaon such as: revenue predicons, hiring needs, inventory analysis, and future sales. This
system is most oen used at the middle management level and above.



  1.  Do I have to watch lectures only or I have to

 study course book as well?

 

You have to study book as well. The course book content is essenal to pass the

exam.

  1.  Describe the communicaon process in layers

 between applicaon, operang system, BIOS and

 hardware.

 

The applicaon interacts directly with the user, it makes requests to access

hardware through the operang system. The operang system uses a driver to talk

to the BIOS chip, which handles things like hardware adressing. The BIOS passes

commands along to hardware, and then passes the results back up to the

applicaon.

  1.  Describe the boot process. The boot process is the startup sequence of a computer. The term comes from the
     phrase “pull yourself up by your bootstraps.” When a computer first starts up (the
     boot process), the RAM is empty and the computer is waing for instrucons on
     what to do. It finds those instrucons (soware) in a special chip called a BIOS,
     which stands for Basic Input Output System. These instrucons are what the
     computer follows when first it starts up. They are always the same, so they are
     programmed into a stable chip that retains the data even without electrical power
     (a non-volale chip). A modern computer first runs the instrucons on the BIOS
     chip for boong up, which includes idenfying all of the hardware aached to the
     machine (hard drives, amount of RAM, graphics card, etc.). Once that is done, it
     finds the operang system (OS) on the hard drive or other long-term storage device
     and begins the process of copying it into RAM. That is what you are waing for
     when a computer is “boong” up. You stare at the logo for your computer unl this
     process is finished and you can interact with it.
  2.  What is a firewall? A firewall is a device that filters data from entering or leaving a network. It can also
     block data from entering a network that does not belong there; this funcon is
     called a firewall.



  1.  What is sampling? Sampling is the representaon of analog data by taking samples of the wave values
     over small me intervals. In the real world sound exist in waves. Informaon

represented in waves is referred to as analog. When we store it on a computer it
must be converted into digital data. Does this mean that some of the informaon is
lost? Definitely. Analog waves have an infinite connuum of values, whereas digital
representaons of waves must simulate them with sampling. Analog data are sliced
into very small me samples and a digital value is assigned for that me slice. The
smaller the slices, the more accurate a representaon. However, we cannot have
infinitely small samples. If we cut up an audio wave into small enough slices and
reassemble it, the human ear cannot tell the difference.

  1.  What is binary? The term binary is used in the context of a numbering system. The binary
     numbering system is a base 2 numbering system consisng of only ones and zeroes.
  2.  What is an API? Applicaons use an Applicaon Programming Interface (API) that is provided by
     another applicaon (for example the operang system) to use specific funconality.

The operang system for example is responsible for accessing hardware devices. The funconality to access hardware devices is also important for other applicaons. Therefore the operang system provides this funconality via an API
to other applicaons.

  1.  What is an algorithm? An algorithm is a sequence of instrucons that can be used to solve a problem. The
     most common algorithms are sorng algorithms, which sort data into an order that
     is more useful for the user. Algorithms can also be used to find paerns in data,
     such as finding the highest value in a list or finding all possible combinaons of
     numbers from 1-100.



  1.  What is algorithm complexity? Algorithm complexity is the number of steps that an algorithm takes to complete its
     task. The less complex an algorithm is, the more efficient it tends to be. When we
     are evaluang the usefulness of algorithms, one thing we ask is: which one requires
     more operaons to complete its task? That algorithm is the most complex. Of
     course, we want to use the least complex algorithm that will take fewer calculaons
     and therefore less me and energy.
  2.  What is a binary digit? A binary digit is the smallest unit of data in a computer. They are represented by
     two symbols, 0 and 1. A byte is eight binary digits together, which can represent
     256 combinaons or 0 to 255.
  3.  What is 802.11? 802.11 is an IEEE standard for wireless communicaon, set in 1997. New, updated
     standards were then introduced by adding addional leers aer the name. The

802.11g protocol is the oldest widely used protocol, for example.

  1.  What is a computer program? A computer program is a set of instrucons that tell the computer what to do. It is
     wrien in a programming language that the computer can understand.
  2.  What is RGB? RGB is a color model in which red, green, and blue are added together in various
     ways to reproduce a broad array of colors. The name of the scheme comes from the

inials of the three addive primary colors, red, green and blue.

  1.  What is the VGA graphics system? The VGA graphics system is a computer display standard introduced by IBM in 1987.
     It was the first standard to use a digital RGB color model, instead of the analog RGB
     model used previously. The VGA supports up to 640×480 pixels with 16 colors at
     once from a palee of 262,144 colors.
  2.  What is a pixel? A pixel is a single square which is assigned a color and used to assemble a larger
     image.
  3.  What does CPU stand for? Central Processing Unit



  1.  What is a byte and how does it compare to a bit? A byte is a unit of digital informaon that consists of eight bits. A bit is a single
     binary digit, either 0 or 1.
  2.  What is a bit? A bit is the smallest unit of data in a computer. A bit can either store the value 1 or
     the value 0.
  3.  What are binary digits? Binary digits are the two symbols used in binary, 0 and 1.
  4.  What is JavaScript? JavaScript is a programming language that is used to create interacve effects on
     websites. It is also used to create programs for web browsers.
  5.  What does RAM stand for? Random Access Memory
  1.  Which consideraons do you see regarding ethics

 in computer science?

 

There are many consideraons regarding ethics in computer science. One

consideraon is that a company or government should not steal intellectual

property. Another consideraon is that a company or government should not lie

about their product—claiming that it is beer than is actually is, or promising

features that are not delivered. A third consideraon would be to maintain proper

ethics by being direct about product expectaons, specificaons, budgets, and

deadlines.

  1.  What is the difference between bubble sort and

 quick sort?

 

Both are sorng algorithms. Bubble sort has a me complexity of O(n2), while quick

sort has a me complexity of O(n*log(n)). Therefore, quick sort can order the

elements of a list on average faster than bubble sort.

  1.  What is the binary representaon of A? If we use the ASCII code the leer A is represented by 01000001.



  1.  Explain the bubble sort algorithm. The rules for bubble sorng are this: starng at the beginning, compare the first
     two values. If the first one is larger, swap the two values. If it is not, there is nothing
     to do. Then compare the next two values and do the same unl you reach the end.
     Once this is done, do it again for every element except the last one, since it will be
     in order now. Each pass you complete will guarantee one more element is in order.
     Others may happen to be in order, but the bubble sort will check them all

regardless. If there are no swaps in a pass, this indicates that the list is sll sorted.

  1.  Explain odd an even parity bits. Parity is a method of error-checking for binary data. It works by adding an extra bit
     (the so-called parity bit) to a group of data bits and then checking that the total
     number of ones is odd or even.

If an odd parity bit is used, the parity bit makes the total number of ones odd. For
example, if you have the following data 1010111, you count 5 ones. Because 5 is
odd, the parity bit that has to be added is 0. The data including the parity bit then
looks like: 01010111. On the other hand, if you have the following data 1010101,
you count 4 ones. To make the total number of ones odd, the parity bit that has to
be added is 1. The data including the parity bit then looks like: 11010101.

If an even parity bit is used, the parity bit makes the total number of ones even. For
example, if you have the following data 1010111, you count 5 ones. Because 5 is
not even, the parity bit that has to be added is 1. The data including the parity bit
then looks like: 11010111. On the other hand, if you have the following data
1010101, you count 4 ones. The total number of ones is sll even, therefore the
parity bit that has to be added is 0. The data including the parity bit then looks like:

  1.  
  1.  Does a relaonal database scale well

 horizontally? Remark: This queson isn't relevant

 in the context of the course book.

 

Whether a relaonal database scales well horizontally depends on the data stored

in it. If it is possible to break up the database into smaller pieces and distribute

them across mulple servers, with each server responsible for a subset of the data,

then a relaonal database can scale horizontally.



  1.  What is Web3? Remark: This queson isn't

 relevant in the context of the course book.

 

Web3 is an idea for a new generaon of the World Wide Web that is based on

blockchain technology and emphasizes decentralizaon, user privacy, and increased

security.

  1.  What is ALGOL? Remark: This queson isn't

 relevant in the context of the course book.

 

ALGOL ("Algorithmic Language") is the name of a family of programming languages

that were used from the late 1950s to the 1980s. All Algol variants have had a

significant influence on the further development of programming languages. For

example, languages such as C and Pascal are derived from Algol 60.

  1.  Summarize some facts about the history of

 computers.

 

It is difficult to pinpoint the exact moment when the first computer was created. It

was more of an evoluon of advanced machines into something that eventually

resembles the computers we have today. In 1801, Joseph Maria Jacquard invented

a loom that used punch cards made of wood to create fabric designs automacally.

Technically, this was programming—a pre-made set of instrucons changed into a

“machine language” that tells a machine what to do. However, this machine wasn’t

doing any compung, simply weaving cloth. Later, during World War II, machines

were used to encode secret messages. These machines used gears that would align

with symbols to create a coded text from regular or “plaintext” messages. Breaking

those codes, however, required actual compung power. The 2014 film The

Imitaon Game tells the story of Alan Turing; his Turing machine was able to take in

encrypted messages, process them, and output an answer. However, his machine

had no keyboard or monitor, let alone a mouse. To look at the history of modern

compung machines, we will break it down into four eras: - Behemoths: Huge

machines used mostly by governments. 1940s - 1960s. - Business: Computers that

are used by individuals in business. 1960s - 1980s. - Graphical: The dawn of the

Graphical User Interface and digital imagery. 1980s - 2000s. - Portable:

Miniaturizaon of computers; laptops, tablets, smartphones. 2000s - today.

  1.  What programming language should I use to

 create interacve websites?

 

You can use Python.



  1.  Why should I learn JavaScript? Because it is a programming language that is used to create interacve websites.
  1.  How does a queue data structure work?

Remark: Queues aren't part of the course book

and therefore this queson is not relevant for the

exam.

 

A queue is a data structure that stores elements in the order they are inserted. It is

called a FIFO (First In First Out) data structure. The first element added to the queue

will be the first one removed from it. A queue can be implemented using an array

or linked list.

  1.  What is base 8? Base 8 refers to a numbering system that uses the digits 0 through 7. It is also
     known as octal numbering system.
  2.  Which numbering system is base 8? The octal numbering system.
  3.  What is a BIOS chip? Within the BIOS chip a special kind of soware (firmware) is stored typically in a
     ROM (read only memory). The firmware of a BIOS chip provides a starng line for a

computer every me it is turned on. One of the very first things a BIOS chip will instruct the computer to do is detect and test hardware that is connected to it. It performs a POST, or power on self-test to check that the required hardware is there
and that it is funconing properly. Then it starts loading the operang system.

  1.  Where is firmware usually stored? Firmware is usually stored in the BIOS chip.

No comments:

Post a Comment

Thank you for Contacting Us.

Post Top Ad