QuestionsAnswers
QuestionsAnswers
DLBCSICS01_CF
Ques ons about the content of the course book
Heinisch, Cornelia
1. What are error checking techniques? It is possible that during data storage or transmission some of the informa on can
be corrupted. To detect this, various error checking techniques (error checking
systems) have been created. Checksums and CRC take the binary data through a
mathema cal func on that returns a specific value for that data stream. If the
sending value matches the receiving value, then the data is assumed to be
unchanged. A simple form of error checking is adding a parity bit, more complex
ones are CRC and checksum.
2. What is a byte? A byte is a unit of digital informa on that consists of eight bits.
3. Where is firmware located in the context of the Firmware is located in the BIOS chip.
course?
4. How many digits is one byte. One byte consists of 8 binary digits.
5. What is TCP/IP? TCP/IP is a protocol that allows computers to communicate with each other.
6. Ho can we convert a decimal number to a binary Keep on dividing the decimal number by 2 un l the result of the division opera on
number? is 0 while recording the remainder. The first digit of the binary number is the
remainder of the division opera on that resulted in 0. The last digit of the binary
number is the remainder of the first division opera on. The rest in reverse order is
the binary number.
7. What does conjunc ve mean? Conjunc ve refers to the noun conjunc on. A conjunc on describes an "AND"
connec on. The only way a conjunc on of two proposi ons p and q is true is when
both proposi ons are true.
8. What are specific data types of a variable? A specific data type of a variable is for example int or char.
9. How to do bubble sor ng. The rules for bubble sor ng are this: star ng at the beginning, compare the first
two values. If the first one is larger, swap the two values. If it is not, there is nothing
to do. Then compare the next two values and do the same un l you reach the end.
Once this is done, do it again for every element except the last one, since it will be
in order now. Each pass you complete will guarantee one more element is in order.
Others may happen to be in order, but the bubble sort will check them all
regardless.
10. What is a file? A file on a computer is a series of binary numbers—in fact, it could be considered
one very long binary number. A file is a unit of binary data stored on a permanent
storage device. To find out what is the meaning of the binary data addi onal
context informa on is required. A file for example has a header at the beginning
with specific binary sequences that indicate that the data are an image, a
document, an executable program, or something else.
11. Explain Von Neumann's architecture. The von Neumann architecture is a reference model for the architecture of a
computer. It consists of - a CPU, - a memory that holds both computer program
instruc ons and data, - an input system, - an output system. The CPU consist of an
ALU, a control unit and registers, which contain a fixed number of bits. These
registers can contain data or instruc ons that have been read from memory.
Besides the processor and memory, there also should be some type of input
(entering data) and output system (outpu ng data) to be able to communicate
with other devices or a human being.
12. What is a decimal? A decimal is a number that uses ten symbols, 0 through 9, to represent all possible
numbers. Human beings use the decimal numbering system to represent numbers
because human beings started coun ng using their ten fingers.
13. What is the difference between data and Data is for example a binary value like 1011 or some other symbols you don't know
informa on? the meaning. If you know that the binary number 1011 represents the house
number of a specific person it is a piece of informa on. Informa on is data with
context.
14. What is a stack? A stack is a data structure that works under a specific philosophy: Last In, First Out.
This is o en abbreviated as LIFO. Imagine you are inpu ng data into a computer
program— in this case, we will say it is a card game simulator. It will use a standard
deck of 52 cards, and they will be randomized and placed into the stack. Just like in
real life, when you are playing cards, you can only draw the card from the top of the
deck. That is the last card that was placed on top, so it is the last in, but the first
out. Once the game is started, the order cannot be changed, the next card in play is
always the one on top of the deck—or in our simula on, the stack. A stack in
computer programming allows for two basic opera ons: push and pop. Pop will
take the top piece of data from the stack, which removes it. Push will add a new
item to the top (and only the top) of the stack.
15. What is a queue? A queue is a data structure that works under a specific philosophy: First In, First
Out. This is o en abbreviated as FIFO.
16. What is CRC? CRC (Cyclic Redundancy Check) is a mathema cal algorithm that returns a code (a
kind fo checksum) of consistent length in digits. It can be applied to any length of
binary data and will always return the same code if the binary data is the same. CRC
is used for error detec on in network communica on. A block of data is processed
through a mathema cal algorithm and the result is appended to the data. A er the
data is sent, the calcula on is repeated to check the integrity.
17. Can you explain int with an example? An integer is a unit number; this means it contains no decimal component. Integers
include all the natural numbers (1,2,3, etc. ), their nega ve versions, and zero.
18. Can you explain char with an example? A char is a single character. It can be used to represent a le er, number, or symbol.
For example: 'A', '5', and '+' are all examples of chars.
19. What is a char? A char is a single character. It can be used to store le ers, numbers, punctua on
marks and other symbols.
20. Both astrophysics and business have needs for A data scien st’s job is to analyze data and provide meaningful and useful
data mining. Explain how data science applies to informa on. There are many different fields where this would be applicable.
both. Astrophysics deal with large sets of data. In business applica ons you also deal with
large sets of data. You can't analyze those data sets without data mining. For
example the data of all the customers and the products.
21. What is the octal numbering system? The octal numbering system is a base-8 numbering system. It uses the digits 0
through 7. Each digit's place value is a mul ple of 8, which is a power of 2, so it
maps nicely—one digit of octal can represent exactly three digits in binary.
22. What is firmware? Firmware is a type of so ware that is required by the hardware for essen al
func onality. It is either used for boo ng up a computer or electronic devices that
always perform the same task, such as your smart refrigerator or a child’s toy. A
single-task device does not need RAM to run different applica ons. Advanced
personal computers can perform many tasks and need the RAM and extra hard
drive storage to do so.
23. Can you describe the jump search algorithm? Jump search:For this one, we need a li le more informa on. Let’s say the book is
2,500 pages long. We calculate the square root of n, the number of pages, which
gives us 50, which we will use for the jump size, or m. Ken will first jump to page 50
and see if Josh is higher or lower, then keep jumping un l he is past Josh. Then, he
will go back to the previous jump and do a linear search (page by page) on the next
50 pages to find him. As you can see, this is definitely an improvement over a
straight linear search.
24. What are professional principles of the ACM code Those who work in the industry crea ng so ware, hardware, and other computer
of ethics? products can hold themselves to more specific standards: Professional principles
are - "quality work" (have a high standard for the quality of your process and your
finished product), - "professional conduct" (Conduct yourself professionally at all
mes: keep to your ethical standards. Strive to improve your skills and educa on), -
"professional knowledge" (Con nually be aware of—and update—your knowledge
of the company policies and procedures and follow them.) - "Review and cri cism"
(Be able to accept feedback on your work and products and be able to give honest
reviews when needed.) - "Work in your exper se" (If you are not skilled in a certain
area, do not “fake” it, but request help, training, or that someone else perform the
task.) - "Enable public awareness" (Help the public understand current technologies
and the consequences associated with them.) - "Keep security in mind" (Create
systems that are secure. Do not release systems un l thorough security tes ng has
been completed.)
25. What are general principles of ACM code of Contribu ng to society, Avoid harm, Honesty, Respect crea vity, Honor
ethics? confiden ality and privacy.
26. Why are there general principals in ACM code of Regardless of specific career or sec on of compu ng, an individual can find
ethics? guidance in the general principles of the ACM code. These principles are important
to everyone in computer industry.
27. What is ethics? Ethics is the study of moral concepts such as personal behavior, responsibility, good,
and evil. There are many ways that ethics can apply to the field of computer
science. These can be broken down into three layers of responsibility:
corporate/government, developer, and user. An example of ethics would be a
person’s (or an en ty’s) moral code: the rules that they use to determine decision
making and ac ons. There are individual differences between ethics, although in
socie es there are group ethics that apply. For instance, most countries have laws
against stealing, assault and murder. Most people would agree that these things are
generally wrong and that to have a prosperous society they should be avoided.
28. What is user ethics? User ethics is the code of conduct that a user must follow to maintain proper use of
a so ware. It is important for users to be aware of their ethical responsibili es and
to abide by them. If they do not, they may face legal ac on or other consequences.
29. What is developer ethics? A so ware developer has several ethical issues to consider as well. First, wri ng
code is similar to wri ng a novel, in that you are expected to create your own
original work and not copy others (look up copyrights for more informa on). There
are some “open source” so ware libraries which can be borrowed from freely, but
taking someone else’s code without permission is not only unethical, it is illegal. As
a developer for a company or organiza on, you work under a certain expecta on of
confiden ality. Many companies will have developers sign confiden ality
agreements as well. Even without one, it is standard prac ce to keep sensi ve
company informa on private. A company will have best prac ces and standards for
work performed—taking shortcuts and slacking off is considered unethical
behavior; programmers are being paid for their me with a certain expecta on of
performance. As an employee, you will also be expected to report coworkers who
do not uphold the company’s standards or who break laws or ethical codes.
Covering up for another’s unethical behavior is also a breach of ethics.
30. What devices can filter network traffic? A switch does basic filtering on network traffic (for example prevent broadcast
storms). Another device filtering network traffic is a router. A router analyses IP-
addresses. Some mes this func onality is called firewall.
31. What device does not filter network traffic? A hub. The hub takes a signal from one cable and splits it out over several cables. If
it was spli ng out four signals, it would be called a “four port” hub. A hub does not
do any signal processing—everything that comes in is sent out through all of the
ports.
32. What is ACM code of ethics? The ACM Code of Ethics and Professional Conduct exists to inspire compu ng
professionals to work for the greater good of society. The code of ethics was wri en
to apply to all computer professionals worldwide. Regardless of membership in
ACM, the principles in the code are useful and helpful to maintain a high standard
of ethics. The ACM Code of Ethics and Professional Conduct consists of a set of
principles that guide compu ng professionals in their professional conduct.
33. What is AI? Ar ficial Intelligence: There are many different types of machine intelligence. They
fall into two broad categories: specific and general. Specific (or narrow) ar ficial
intelligence (AI) is a system created to perform a specific task. For example, the
predic ve text that Google uses for searching is very good at predic ng what you
might want to search for, but it would not be good at finding your lost keys. General
AI is s ll a major programming challenge. A system in this category means that it is
able to examine new situa ons, learn, and perform a variety of broad tasks.
Basically, this kind of AI seems to func on similarly to a human being. It is
important to understand what is meant by the term “intelligence.” Intelligence is
more than just being able to perform a series of mathema cal algorithms;
intelligence implies deduc on and learning. An AI is able to come to conclusions
with data it has never encountered before. Since computer systems are able to
perform billions of calcula ons per second, their power can be harnessed to
simulate intelligence.
34. What is data science? Data Science is a part of computer science dealing with analyzing large amount of
data and provide meaningful and useful informa on.
35. What is big bang model? The Big Bang model is a newer model o en used by startups and other small
companies. It is best used for smaller projects. The main feature of this model is
that coding, design, requirements, and tes ng all begin simultaneously with very
li le planning. It involves quite a bit of risk since there is li le pre-planning, but it
also can lead to the quickest release of so ware. Though there is li le planning in
the Big Bang model, plans can be created on the fly as development con nues.
Tes ng is done as soon as compiled code is available.
36. What is spiral model? A spiral approach to so ware development inten onally goes through several
cycles of planning, designing, development, and tes ng, before final release. An
advantage of this model is that various teams can get started working earlier in the
process and some teams can work simultaneously. Several prototypes of the
product are developed before final release in the spiral model. More than one
round of tes ng and verifica on happens, as well as mul ple rounds of redesigning.
This model may take longer, but it is very thorough. The more recent “agile” model
is based on this itera ve model and has become popular.
37. What is waterfall model? The waterfall model is a rigid model flowing downward through the different steps
of the cycle. The idea is that a er each stage is completed, it will not be returned
to. The Requirements phase produces the requirements document, and Design the
design document. Implementa on is where the programming occurs. Verifica on is
tes ng, and then the last step, Maintenance, includes the release or deployment.
38. What is a so ware development life cycle? There are many methods of crea ng so ware; most follow the standard
development life cycle. This is called a “life cycle” because it takes place over the
life of a so ware applica on. A er a so ware is released, maintenance and
updates are required. These updates must go through a similar cycle to that of the
ini al development process. The so ware development life cycle concept
incorporates technology as well as management to put together planning and
teams to meet a specific so ware need.
39. What is a microcontroller? A microcontroller is a computer chip with a processor, RAM, input, and output built
in. The input and output travels through specific pins on the chip. The chips can
receive and send data to USB ports and even Ethernet through these I/O pins.
Microcontrollers enable the crea on of an enormous variety of different electronic
devices; they are basically an en re computer on a chip.
40. What is an embedded system? Embedded systems are devices that have a microprocessor and so ware to
perform a specific task. The so ware is embedded in the device, hence the name.
Examples of embedded systems include your washing machine, fire alarm system,
and even your car's engine control unit.
41. What is OLAP? Online Analy cal Processing (OLAP) involves a high performance data analysis
system. It is designed to query data across mul ple tables and sources and provide
a fast and detailed result. These systems are o en used for sales figures, product
informa on, product comparisons or employee informa on.
42. What is an informa on system? An informa on system consists of the raw data itself that exists in the system.
So ware tools can provide analysis of the data and present it in different ways for
user interpreta on. This means that so ware is part of the informa on system, and
so are the people using it. Of course, the so ware needs hardware to run on, so it
also is part of the system. In such a system, it makes sense to assign tasks properly
because a computer can perform many tasks more efficiently than a human, but
not all tasks. Things like data searching are perfect jobs for computers but difficult
for humans, especially with very large data spaces. This means that there is some
kind of business organiza on that makes decisions about how to use the hardware,
so ware, people, and data that are available. This organiza on is also part of
informa on systems.
43. What is a file system? A file system manages and stores informa on. Opera ng systems implement file
systems. An example for a file system is NTFS—New Technology File System
associated with the Windows opera ng system.
44. What is BIOS? BIOS is a Basic Input Output System. The BIOS is a special kind of chip of a
computer. Within the BIOS chip a special kind of so ware (firmware) is stored
typically in a ROM (read only memory). The firmware of a BIOS chip provides a
star ng line for a computer every me it is turned on. One of the very first things a
BIOS chip will instruct the computer to do is detect and test hardware that is
connected to it. It performs a POST, or power on self-test to check that the required
hardware is there and that it is func oning properly. Then it starts loading the
opera ng system.
45. What is internet of things? Small devices connected to the Internet have become the Internet of Things (IoT).
There are already over a billion of these devices connected to the internet. They
include many “smart” devices. Light bulbs that can be controlled remotely are a
type of smart device. Regular and self-driving vehicles are also connected to the
internet. Some devices can provide feedback on their performance. A home
appliance such as a smart refrigerator can tell you recipes, whether you are running
low on eggs, how much power it is using, and an op mal temperature se ng.
46. What is DHCP? Dynamic Host Configura on Protocol (DHCP) is a protocol used to assign IP
addresses and other network configura on parameters to each device on a
network so that the devices can communicate with each other. This eliminates the
need for a user to manually configure these se ngs, such as an IP address, when
connec ng to a network.
47. What is world wide web? The World Wide Web is a special set of services that is delivered to a web browser.
Basically, anything you can access in a web browser is part of the world wide web.
The world wide web was created primarily to communicate forma ed documents
with pictures and hyperlinks using a simple markup language called HTML (Hyper
Text Markup Language). Eventually, it evolved into what is used today including
video services and websites with interac ve JavaScript and connec ons to
databases of informa on.
48. What is an applica on layer? The applica on layer is the top layer of the OSI model. The applica on layer is the
closest to the user, yet it interacts with applica ons that request network access.
Technically, this layer is for applica ons, not made of applica ons. It is the interface
layer where applica ons make requests of the opera ng system to access the
network.
49. What is OSI model? OSI is a general communica on standard that defines seven layers that are useful
for data transmission over networks. There is no "real" implementa on of the OSI
model. OSI is a so called reference model. Other communica on standards like
TCP/IP or Ethernet refer to the OSI standard to explain which part of the OSI layers
they implement.
50. What is wireless technology? Wireless technology is a method of communica on that uses radio waves to
transmit data without the use of wires. The term is o en used in reference to
mobile phones, but it can also refer to other devices such as wireless computer
mice and keyboards. Wireless technology has become increasingly popular with the
advent of Wi-Fi networks, which allow computers and other devices to connect
wirelessly to the Internet.
51. What is a star network? A star network is a network topology in which all of the nodes are connected to a
central node. The central node is usually a hub, switch, or router. A star network
can be implemented as an Ethernet LAN (Local Area Network) or as part of the
Internet backbone.
52. What is a ring network? A ring network consists of computers connected together in a ring, where the signal
would pass around it. In this design, each computer was required to look at any
data passed to it to see if it was required to pass it along. This design was not fault-
tolerant, and would stop working if the ring was disconnected; this is why it has
fallen out of use today.
53. What is a ring topology? A ring topology is a network topology in which the nodes are connected in a closed
loop. The simplest example of a ring network is a token ring network, where all the
nodes share the same transmission medium and each node can send data to any
other node by passing its data to the next node in the ring. In this way, each node
acts as both a transmi er and receiver for every other node on the network.
54. What is a router? A router is a device that forwards data packets from one network to another. It
does this by analysing IP addresses.
55. What is a switch? A switch is a network device. It has a connec on for an uplink and mul ple ports for
communica on. However, it does do basic filtering on data. Computers send data
over a network in data frames with hardware addresses. Some data is sent out with
the “broadcast” address; this address means it is for all computers who can receive
it. A switch filters these out so they do not get propagated across the en re
network (which can cause a flood of data known as a “broadcast storm”).
56. What is a hub? A hub is a network device that takes a signal from one cable and splits it out over
several cables. If it was spli ng out four signals, it would be called a “four port”
hub. A hub does not do any signal processing—everything that comes in is sent out
through all of the ports. Communica on is two-way: the ports can also send
communica on through the uplink connec on.
57. What is Ethernet? Ethernet is a set of standards (defined by IEEE 802.3) used for LANs and WANs. The
word “Ethernet” is used commonly to refer to parts of a local wired network, such
as Ethernet cabling (Cat 5, 5e, 6, 7 and 8), and Ethernet ports, where the cables are
connected. The standards of Ethernet include the physical layer, which gives
specifica ons for devices and signals, and the data link layer, where it defines how
signals are organized.
58. What is an ethernet cable? Ethernet cable is a type of cable used to connect devices to a computer network. It
is the most common type of cabling in use today, and can be found in most homes
and offices.
59. What are the UTP cable categories? UTP cable categories are as follows: - Category 5 up to 100Mbps (Megabits per
second) - Category 5e up to 1000Mbps (1Gbps) - Category 6 up to 10Gbps -
Category 7 up to 40Gbps - Category 8 25Gbps or 40Gbps These UTP cables appear
physically iden cal. You must usually look for a label or prin ng on the wire to see
the category if you are not sure.
60. What is a LAN? LAN = Local Area Network, a network in a home or office. A LAN is a group of
computers connected together via a network within a dis nct geographic area.
61. What is UTP cable? UTP: This stands for “unshielded twisted pair cable.” The individual wires are
twisted together in pairs without extra insula on. UTP cables are used in homes
and offices to build up a LAN.
62. What are network devices? Network devices are devices that connect are connected to a network. Important
network devices are hubs, switches, routers. A computer itself or an embedded
system connected to a network can also be a network device.
63. What is the difference between wired and Wired and wireless networks are two different types of computer networks. Wired
wireless networks? networks use cables to connect devices, while wireless networks use radio waves to
connect devices. The advantage of wired is that it is more secure than wireless, but
the disadvantage is that it requires a cable connec on.
64. What is a supercomputer? Supercomputer is a computer that is used in scien fic fields to analyze vast
amounts of data. For instance, predic ng the weather involves an enormous
number of data points; a supercomputer is a good match for these kinds of
problems. Scien sts can request me on supercomputers to do research, bringing
them the massive power of Earth’s most amazing computers. Supercomputers use
parallel processing, where tasks are split up between processors. One such
supercomputer is in Germany, the SuperMUC-NG.
65. What is a server cluster? A server cluster is a group of iden cal servers that share the workload for a certain
task.
66. What is parallel processing? Parallel processing is when you take a task and break it down into sub-tasks and
assign a separate CPU to complete it. Several CPUs are linked together in parallel to
accomplish this.
67. What is a device driver? A device driver is a piece of so ware that allows the opera ng system to
communicate with a hardware device. It is usually wri en by the manufacturer of
the hardware. A device driver communicates with the device controller of the
connected hardware device to send or receive data or commands.
68. What is an input output system? Input and output system is a system that allows the user to communicate with the
computer hardware. Input and output systems are typically used to transfer data
from one device to another, or from one loca on to another. The input and output
system of a computer is made up of many different devices, including keyboards,
mice, monitors, printers, speakers and network cards. These devices all have their
own input/output systems that allow them to communicate with the CPU. Every
computer needs some kind of input output system in order to receive informa on
for processing and an output system to output the results of the processing.
69. What are input and output devices? Input and Output Devices are the devices that allow a user to communicate with a
computer. Input devices include keyboards, mice, and external data sources such as
USB drives. Output devices include monitors, printers, speakers, and network cards.
70. What is input and output? Input and output are the communica on between a computer and its user. Input is
the data that a user enters into a computer, while output is the data that a
computer sends to its user.
71. What is RAM? This stands for Random Access Memory and means that the memory can be read
randomly and at any point in the data. RAM is not permanent (short-term memory)
but a lot faster than the hard drive in terms of memory accessing speed and
reading and wri ng data. Because RAM is more expensive than a hard drive, it has
less capacity than a hard drive.
72. What is a processor? A processor is a device that performs calcula ons and commands using data stored
in memory. It takes that input from memory and creates unique output, the results
of the processing. It is the "brain" of a computer.
73. What is a CPU cache? The CPU cache is a small memory that is placed on the CPU chip itself. It is a
memory for data and instruc ons that the processor can access very quickly. This
allows to speed up memory access mes. There are different levels of cache: some
processors have three levels labelled L3, L2, and L1, each smaller and with a faster
access me. This provides a way to avoid memory bo lenecks as the CPU does not
always have to make a request of system RAM; a small amount of currently used
data is located in the cache.
74. What is computer memory system? Computer memory system consists of different memories storing data and
instruc ons for the processor. A computer memory system o en comprises a long-
term (permanent) memory (hard disk) a RAM and the CPU cache(s).
75. What is memory? Memory is a computer storage space that holds data and instruc ons for the CPU
to access.
76. What is memory addressing? Each byte of memory has a unique binary address. You could think of them each as
li le mailboxes, storing a different binary number and also having a binary address.
That means that the number of bits used for addressing will iden fy the number of
bytes available. For instance, the Commodore 64 had 64K of addressable memory.
This was accomplished by using 16-bit addressing. The total number of bytes that
can be addressed with a 16-bit address is 65,536 bytes. This was considered 64K (At
the me, a kilobyte was referred to as both 1,024 (2 to the power of 10) and 1,000
bytes). Each 16-bit address points to a mailbox (memory loca on) that contains
exactly one byte (inside the box).
77. What is a data bus? Data bus is a data path that connects the CPU to memory and I/O devices. It is a
collec on of wires that carry data from one device to another.
78. What are von Neumann registers? There are five registers specific to the Von Neumann design. These are as follows: 1.
Program Counter (PC) contains the memory address of the next instruc on to read
from memory.2. Memory Address Register (MAR) contains the address of the
current instruc on in memory, or the next data transfer address.3. Memory Data
Register (MDR) contains the contents of the memory address that the MAR is
poin ng to and contains data to be transferred.4. Accumulator (AC) this contains
data that have been processed or are about to be processed, including arithme c
or logic results.5. Current Instruc on register (CIR) contains the current binary
instruc on that is being executed.
79. What is von neumann architecture? The von Neumann architecture is a reference model for the architecture of a
computer. It consists of - a CPU, - a memory that holds both computer program
instruc ons and data, - an input system, - an output system. The CPU consist of an
ALU, a control unit and registers, which contain a fixed number of bits. These
registers can contain data or instruc ons that have been read from memory.
Besides the processor and memory, there also should be some type of input
(entering data) and output system (outpu ng data) to be able to communicate
with other devices or a human being.
80. What is a Central Processing Unit (CPU)? The Central Processing Unit (CPU) is o en referred to as the “brain” of the
computer. It does all the processing, which includes doing calcula ons and sending
instruc ons to other hardware. It is a square computer chip which is inserted into a
motherboard—this is a circuit board designed for computer components to
connect to and communicate through. The CPU is o en referred to as the
processor, which refers to its ability to process data.
81. What is the meaning of data messaging? The process of sending data over a network is called data messaging.
82. How does data messaging work? Data messaging works by breaking down the data to be send over the network into
chunks, or segments, that are sent out separately.
83. What is a message? A message is a piece of informa on that is sent from one person to another. It can
be verbal or wri en, and it can be in the form of a le er, an email, or even a text
message. Computers send binary messages to each other through networking.
84. What is data? Data consists of raw numbers and symbols that can be arranged into meaningful
informa on, which is then used for specific research or analysis purposes. To a
computer, data are numerical and the basic data storage system is the binary
numbering system.
85. What is the meaning of a correct algorithm? The correctness of an algorithm is an important requirement for algorithm
development. Any algorithm that is used must be mathema cally correct. An
algorithm is totally correct if it receives valid input, terminates, and always returns
the correct output. We can prove this by formal reasoning or mathema cally, for
instance, with a proof by induc on.
86. What is algorithm accuracy? The accuracy of an algorithm is the degree to which it approaches the op mal
solu on. The more accurate an algorithm, the closer it gets to the op mal solu on.
Some algorithms are required to give the op mal solu on. For instance, if we are
sor ng data, the algorithm cannot stop un l everything is sorted with 100 percent
accuracy. If we are searching for a specific data point, it must be found. However, if
we are tryingto find a good solu on to a complex mathema cal problem, a
standard of “good enough” is applied by the programmer to the situa on.
87. What is quicksort? Quicksort is a sor ng algorithm. Quicksort is regarded as one of the most efficient
algorithms overall. Imagine a teacher with a stack of graded papers. The teacher
wants to sort all of the papers by grade. The pile is split into all the grades higher
than 55 (this number is the pivot and can be chosen by different methods) and
those less than 55. Then the two piles are split around another pivot bringing the
total number of piles to four. The teacher then sorts each pile separately and when
they are done, can simply put all the piles back together in order from lowest pile
to highest. It can be thought of as a “divide and conquer” type of method. In this
example, the stack was split into four piles but, in reality, the data determines how
many stacks it is split into for sor ng.
88. What is binary inser on sort? Binary inser on sort is a sor ng algorithm that uses the same method we used for
a binary search—by spli ng the data in half repeatedly. To sort the data, it builds a
new output list and takes items from the input list. The input list are items yet to be
sorted, and the output are the ones already sorted. For inser ng an element from
the input list in the output list the data in the output list is spli ed in half
repeatedly un l the correct posi on of the new element is found.
89. What is bubble sort? Bubble sort is a sor ng algorithm that works by comparing two elements at a me
and swapping them if they are out of order. It is one of the simplest sor ng
algorithms, but it is also one of the slowest.
90. What is a binary search? Binary search is a search algorithm that searches for data in a sorted list. It works by
dividing the list into two halves, and then repea ng this process on each of the
halves un l it reaches the desired data. The algorithm can be used to find an
element in a sorted array, or to find an element's posi on if it is known to be in the
array.
91. What is jump search? Jump search is a search algorithm that uses a jump size to find the target element in
an ordered list. The jump size is the number of elements that are skipped over
between each comparison. Let’s say the book is 2,500 pages long. We calculate the
square root of n, the number of pages, which gives us 50, which we will use for the
jump size, or m. Ken will first jump to page 50 and see if Josh is higher or lower,
then keep jumping un l he is past Josh. Then, he will go back to the previous jump
and do a linear search (page by page) on the next 50 pages to find him.
92. What is linear search? Linear search is a searching algorithm that starts at the beginning and looks at each
element in order.
93. What is a mul dimensional array? A mul -dimensional array is an array that contains one or more arrays as its
elements, where each element is also an array. In other words, it is an array of
arrays. A two-dimensional array is the most common form of a mul -dimensional
array, and it is o en used to represent a matrix or a table. A two-dimensional array
is like a grid of rows and columns, where each element is iden fied by its row and
column index.
94. What is an array? An array holds a fixed number of values of the same data type. Each value in the
array can be accessed by its index, which represents its posi on in the array.
95. What is a linked list? A linked list is a sequen al data storage structure. Each element is linked to the
next. In other words, an element in the data structure linked list contains two
pieces of informa on, the data and the link. The last element in the linked list
structure does not have a pointer to the next value, instead it points to null, which
indicates that there are no more elements. Null is o en used to end a series of
data. The link in each list is a pointer, which is a memory loca on. It iden fies the
part of memory that contains the next element.
96. What is a stack? A stack is a data structure that works under a specific philosophy: Last In, First Out.
This is o en abbreviated as LIFO. Imagine you are inpu ng data into a computer
program—in this case, we will say it is a card game simulator. It will use a standard
deck of 52 cards, and they will be randomized and placed into the stack. Just like in
real life, when you are playing cards, you can only draw the card from the top of the
deck. That is the last card that was placed on top, so it is the last in, but the first
out. Once the game is started, the order cannot be changed, the next card in play is
always the one on top of your deck—or in our simula on, your stack. A stack in
computer programming allows for two basic opera ons: push and pop. Pop will
take the top piece of data from the stack, which removes it. Push will add a new
item to the top (and only the top) of the stack.
97. What is a flowchart? Flowcharts (Flow Diagrams): To translate human instruc ons into computer
instruc ons, coders have used flowcharts for many years. These charts make it easy
to observe the structure of an algorithm and create it with a programming
language. They use standard symbols to indicate different types of instruc ons. A
terminator symbol (oval or rectangle) is used at the beginning of a flowchart and at
all the endings. They represent the external nodes of flowcharts. A rectangle
represents a process, for instance, some type of data calcula on or filtering. The
diamond is a decision—a decision has mul ple pathways that can be taken. A
parallelogram in a flow chart represents input or output, where data are sent into
or out of the process. Finally, the arrows represent the flow from beginning to end
of the sequence.
98. What is the rela on between algorithms and An algorithm is a set of well-defined instruc ons or rules for solving a par cular
flowcharts? problem or performing a par cular task. It is a step-by-step procedure that can be
followed to perform a computa on, solve a problem, or automate a task. An
algorithm can be represented in many forms. On possibility is to use a flowchart to
visualize the steps of an algorithm.
99. What is a driver? A driver is a piece of so ware that allows the opera ng system to communicate
with hardware devices.
100. What are the parts of an URL? A URL is composed of several components. The first part is the protocol (HTTP or
HTTPS). The second part is the computer name (e.g. www). The third part is the
domain name. The fourth part is the folder loca on, and the fi h part is the file
name.
101. What is TCP/IP error detec on? TCP/IP divides data into pieces to be sent over a network into segments or
datagrams. These segments have a “header” at the beginning which defines the
sending computer, the receiving computer, transmission se ngs, and also a 16-bit
checksum to verify the data. The maximum size of this segment is 65,536 bytes.
When each segment arrives at the des na on computer it is checked against the
checksum value; if the values don’t match, a retransmit request is sent to the
source computer. Along with a checksum, TCP/IP also checks for transmission errors
on other levels. The receiving computer must also send an acknowledgement (ACK)
for each datagram received. This is accomplished by giving each datagram a
sequence number in the header. The recipient machine sends an ACK for each
sequence number—if one of the numbers is not acknowledged a er a certain
period of me, the source computer will retransmit. At another level, TCP/IP will
also detect broken routes over the network and re-route to new ones. This is one
reason why TCP/IP has been used for decades on the internet: it is fault-tolerant.
Part of the network can stop working without taking the en re network offline.
Routers and devices that stop forwarding network traffic can be worked around by
checking for alternate routes to the des na on.
102. What is Cyclic Redundancy Check? Cyclic Redundancy Check, or CRC is a type of error-detec on in network
communica on. It works with a similar principle to the checksum. A block of data is
processed through a mathema cal algorithm and a result is appended to the data.
A er the data is sent, a calcula on is repeated to check the integrity. The CRC can
be applied to any length of binary data and will always return a code of the exact
same length. This makes CRC a “hashing” algorithm, one that returns a value of
consistent length in digits.
103. How does quicksort work? Quicksort is a divide and conquer algorithm. It works by first choosing a pivot
element, then par oning the list into two parts: all elements that are less than the
pivot element, and all elements that are greater than or equal to the pivot element.
The algorithm recursively calls itself on each of these two sub-lists.
104. What is parity? Parity is a method of error-checking for binary data. It is used in
telecommunica ons, and was used in the past to check for errors in telegraphs. It
works by adding an extra bit to every group of eight bits, and then checking that the
total number of ones is odd or even. If it does not match, then it assumes there was
an error and requests retransmission.
105. What is transmission data fault tolerance? Transmission data fault tolerance is the ability of a network to detect and recover
from errors that occur during the transmission of data. Error detec on techniques
such as checksums, CRC or parity bits can be used to detect errors in the
transmi ed data.
106. What is a checksum? A checksum is a small fixed-length value that is computed from a block of data in
order to detect errors that may occur during transmission or storage. It is used to
verify the integrity of data and ensure that it has not been corrupted or modified in
transit. The checksum is generated by performing a mathema cal calcula on on
the data, typically using a hashing algorithm. The checksum is appended to the data
itself, a er transmission the receiver performs the same calcula on on the received
data and compares the computed checksum with the one that was transmi ed. If
the checksums match, it is assumed that the data has been transmi ed correctly,
and no errors have occurred. If the checksums do not match, then an error is
detected, and the data must be retransmi ed.
107. What is storage error checking? Storage error checking is a method to detect corrupted files in storage. It is done by
storing an exact copy somewhere and then comparing it. But because some files
are megabytes, or even gigabytes, in size, this would be very inefficient. Instead,
since the file is one large binary number, it is placed into an algorithm. This
algorithm is like a mathema cal func on—it has a numeric solu on. The checksum
is the solu on to this problem; it is calculated and appended to the file when it is
saved. The checksum can be calculated again when the file is opened. If the
calculated checksum is different from the checksum appended to the file, the file
has been corrupted.
108. What are non numeric data types? Non numeric data types are data types that are used to represent non numeric or
non-mathema cal values, such as text, characters, dates, mes, Boolean values,
and other data that cannot be expressed as a number. Examples: String (sequence
of characters that represents text), character (a single alphabe c or symbolic
character, such as a le er, digit, punctua on mark, or other symbol), date and me
(used to represent dates, mes, or both), ...
109. What are numerical data types? Numerical data types are used to represent numerical or mathema cal values, such
as integers, floa ng-point numbers, and decimal numbers. The following numerical
data types are used in the programming language Java: - byte: integer from -128 to
127 (8 bits) - int: integer from -2,147,483,648 to 2,147,483,647 (32 bits) - float
(smallest value): 1.4E-45 to 1.4E-45 to 3.4E38 (32 bits), float (largest value):
3.4028235E38 (32 bits) - double (smallest value): 4.9E-324 to 49E-324 to 1.7E308
(64 bits), double(largest value): 1.7976931348623157E308(64bits)
110. What is float? Float is a data type that can store numbers with decimal points.The reason a
decimal is called a “float” is because the decimal point can float around to different
places in the number. This is an important dis nc on for a computer: where is the
decimal? That must be stored somewhere in the variable itself. It is something a
human would take for granted, but something that has to be specified for a
computer. Example: float var = 2.234f; is the Syntax to define a float variable in Java
and assign the value 2.234 to this variable.
111. What is a variable? In programming, the coder creates variables to store individual units of data. A
variable is a container for informa on. It has three important defining factors: a
name, a type, and a memory loca on. The name is what it will be referred to in
code, just as if you wrote a label on a box. The memory loca on is where the
computer can find this box in RAM. The type describe for example how many bytes
in memory are used to store the value of the variable and what is the meaning of
the individual bits and bytes.
112. What is a data type? A data type determines the kind of data that can be stored in a variable, such as
integers, floa ng-point numbers, strings, and boolean values. A data type defines
the range of values that a variable can take, the amount of memory that must be
reserved for a variable, and the meaning (encoding) of the individual bits and bytes.
113. What is data contextualiza on? All informa on is stored in binary format in computers. If you want to store
alphabe cal le ers, you can represent each le er with a specific number. To
convert the stored binary numbers back into le ers, you need addi onal contextual
informa on, such as the code that was used for conversion. Examples of such codes
include ASCII or Unicode.
114. What is the meaning of "Everything on a A computer can only store the values 1 and 0. Therefore, all informa on must be
computer is binary"? converted into the binary numbering system. When informa on is read from
memory and outpu ed to the user, it has to be converted back. For example, the
le er 'A' is converted to the binary value 01000001. When this binary value is read
from memory, it has to be converted back into the le er 'A'.
115. What is hexadecimal? Hexadecimal is a base-16 numbering system used in compu ng and digital
communica ons. In contrast to the familiar base-10 decimal numbering system,
which uses 10 digits (0-9), the hexadecimal system uses 16 digits: 0-9 and A-F. The
le ers A through F are used to represent the numbers 10 through 15, respec vely.
One digit of hexadecimal (or “hex”) can represent four digits of binary. In computer
applica ons, hexadecimal numbers are usually wri en in groups of two, since two
digits represent eight digits in binary (a byte). You will o en see a leading zero
before a hex number to represent this. Hex is o en used to view raw data in a file;
it is a sort of shorthand for binary. Hexadecimal is used as a go-between for humans
since: a) it has an exact 1:4 ra o of digits with binary, and b) it has more symbols, so
it is easier for humans to read. Displaying data in hex takes four mes less space
than in binary.
116. How can we convert an octal number into a Octal is a base-8 numbering system (with values from 0 through 7) and binary is a
binary number? base-2 numbering system (with values of 0 and 1). Each digit's place value in octal is
a mul ple of 8, which is a power of 2, so the conversion between these two
numbering systems is straigh orward. Specifically, one digit of octal can represent
exactly three digits in binary. For example, if you have an octal number like 730524,
you know that each digit represents three digits in binary. 7 is equivalent to 111 in
binary, 3 is equivalent to 011 in binary, and so on. Therefore, the octal number
730524 is equivalent to 111011000101010100 in binary. If you're unsure about the
correctness of your conversion between numbering systems, you can use a
webpage like the following to check:
h ps://www.rapidtables.com/convert/number/binary-to-octal.html.
117. What is data storage? RAM (Random Access Memory) and hard drives are data storage devices. In RAM,
data is stored temporarily while a computer is running. A hard drive stores data
permanently and can therefore be used to preserve data even a er the computer is
turned off.
118. What are data measures of bytes? Data measures of bytes are units used to express the amount of digital informa on.
The most common units used for data measures of bytes, listed from smallest to
largest: - Bit (abbrevia on: b) - a single binary digit that can hold a value of either 0
or 1. - Byte (B) - a group of eight bits. A single byte can represent a character of text
or a small amount of data. - Kilobyte (KB) - 1,000 Bytes. Used to measure small
amounts of data, such as text documents or small images. - Megabyte (MB) - 1,000
Kilobytes. Used to measure larger files, such as high-resolu on images or short
videos. - Gigabyte (GB) - 1,000 Megabytes. Used to measure even larger files, such
as movies or large so ware programs. - Terabyte (TB) - 1,000 Gigabytes. Used to
measure very large amounts of data, such as complex databases or en re
collec ons of high-resolu on videos. - Petabyte (PB) - 1,000 Terabytes. All photos
on Facebook. The larger unit is always 1,000 mes the previous.
119. How can we convert a binary number into a Assign place values to each digit of the binary number, star ng from the rightmost
decimal number? digit and working le ward. The rightmost digit has a place value of 1, the next digit
to the le has a place value of 2, then 4, 8, 16, and so on, with each place value
doubling. 8 | 4 | 2 | 1 (place value) 1 | 0 | 0 | 1 (binary number 1011) Mul ply
each digit of the binary number by its corresponding place value and add the
results: 1*8+0*4+0*2+1*1 = 8+0+0+1 = 9 Therefore the binary number 1001 is 9 in
decimal.
120. What is the binary numbering system? The binary numbering system is a base-2 numbering system that uses two symbols,
0 and 1, to represent all possible numbers. Computers use the binary numbering
system because early computers used switches that could be turned on or off,
giving two possibili es, as in the binary numbering system.
121. What is the decimal numbering system? Human beings have ten fingers. It is a common reason given for why we use a base
10 numbering system: decimal. Decimal uses ten symbols, 0 through 9, to represent
all possible numbers. In the decimal numbering system, each digit's value is based
on its posi on rela ve to the decimal point. For example, the number "123" in
decimal nota on represents 1 x 10^2 + 2 x 10^1 + 3 x 10^0, or 100 + 20 + 3, which
equals 123.
122. What are the eras of compu ng? To look at the history of modern compu ng machines, we will break it down into
four eras: - Behemoths: Huge machines used mostly by governments. 1940s -
1960s. - Business: Computers that are used by individuals in business. 1960s -
1980s. - Graphical: The dawn of the Graphical User Interface and digital imagery.
1980s - 2000s. - Portable: Miniaturiza on of computers; laptops, tablets,
smartphones. 2000s - today.
123. What is a behemoth? A behemoth is an enormous computer that were built with vacuum tubes and wires
and took up en re rooms. The input was usually entered by flipping switches and
turning dials. The output was o en given via lights or punched holes on paper. They
were basically number-crunching machines that were used to perform large
mathema cal computa ons, or to work with large amounts of numerical data. The
U.S. Census Bureau purchased one of these huge computers, the UNIVAC, in 1951
to help with coun ng the popula on of the United States. The ENIAC (Electronic
Numerical Integrator and Computer), the first general-purpose computer, which
began opera on in 1946 and was programmed by a team of six female operators,
should also be men oned in this context.
124. Can you tell me something about the first There’s no machine that we can point to and say “here is the first computer.” It was
computers? more of an evolu on of advanced machines into something that eventually
resembles the computers we have today. In 1801, Joseph Maria Jacquard invented
a loom that used punch cards made of wood to create fabric designs automa cally.
Technically, this was programming—a pre-made set of instruc ons changed into a
“machine language” that tells a machine what to do. However, this machine wasn’t
doing any compu ng, simply weaving cloth. Later, during World War II, machines
were used to encode secret messages. These machines used gears that would align
with symbols to create a coded text from regular or “plaintext” messages. Breaking
those codes required actual compu ng power. The Turing machine was able to take
in encrypted messages, process them, and output an answer. However, his machine
had no keyboard or monitor, let alone a mouse.
125. What is a language? We can dis nguish between natural languages and programming languages. A
natural language is used for communica on between humans, while a
programming language is used for communica on between humans and machines.
With a programming language, an algorithm can be described in such a way that a
computer is able to execute the program/algorithm.
126. What is seman cs? If I very clearly describe how to make a peanut bu er sandwich, but actually
wanted a chicken salad, then I have a seman cs problem. It’s possible to create
perfectly readable code for a computer, yet have it do something different than
your inten on. When a program compiles and runs without producing any syntax
errors or run me errors, but it does not produce the expected output or produces
incorrect output due to a mistake in the logic of the program. For instance, suppose
you write a program to calculate the average of a list of numbers, but you forget
dividing the sum by the number of elements in the list. The program would compile
and run without any errors, but the output would be incorrect, resul ng in a
seman c error.
127. What is syntax? Syntax is the set of rules that govern how a language is used. In programming,
syntax refers to the correct usage and ordering of words and symbols in a program.
If they are not in the correct order, the program will not work. Just like the words in
an English sentence, programming instruc ons only make sense in the correct
order; otherwise, it is just a jumble. If you took the words of this sentence and put
them in a random order, it would ignore proper syntax and make li le sense. Syntax
also includes rules for when certain symbols can be used, similar to English rules for
where punctua on can go in a sentence.
128. What is an applica on? An applica on (app) is a computer program that performs a specific task. For
example, Microso Word is an applica on that allows users to create and edit
documents. Applica ons are usually designed for a specific purpose, such as word
processing or playing games.
129. What is an opera ng system? An opera ng system (OS) is the first so ware loaded into the RAM during the boot
process. An OS is essen al for a computer to func on (assuming a standard
personal computer). Examples include Windows, Linux, and MacOS. This so ware
provides three fundamental func ons for the computer: 1. Provide an interface 2.
Control hardware 3. Run applica ons. An interface is required so a human being
can interact with a computer. The hardware in a computer system would sit,
dormant, without the OS to give it instruc ons. Applica ons need an opera ng
system to run. They are a second layer of func onality.
130. What is so ware? So ware is a set of instruc ons that tell a computer what to do. It takes the form of
either an opera ng system or an applica on. The OS provides basic func onality
including an interface, while applica ons (apps) are available to perform specific
tasks such as word processing, games, or even controlling robots.
131. What does an opera ng system provide to An opera ng system provides an interface to interact with the user. Nowadays an
interact with the user? opera ng system typically provides a graphical user interface (GUI): This interface
uses graphical elements such as icons, menus, and windows to allow users to
interact with the system. Another interface would be a touch interface (users can
interact with the system by using their fingers) or a speech interface.
132. What is an IRQ? An IRQ stands for "Interrupt Request". A device can send status messages to the
CPU by in interrupt request line, labeled from 00 to 15. If a hardware device, such
as a keyboard or mouse, has data to be processed by the CPU it sends a signal to
the CPU by genera ng an IRQ. The CPU interrupts its tasks an executes a
corresponding interrupt handler to perform the necessary ac ons. Each device in a
computer system is assigned a unique IRQ number, which is used by the device to
request an interrupt. The CPU uses this number to iden fy the source of the
interrupt and determine the appropriate interrupt handler to execute.
133. What are differences between the opera ng Two of the differences are: Mac OS is designed to run exclusively on Apple
systems Mac and Windows? hardware, while Windows can run on a variety of different hardware pla orms.
Mac OS uses APFS as file system and Windows uses NTFS as file system.
134. Does an array take more space than a stack? Typically, an array does not take up more space in memory than a stack. A stack can
be implemented internally as an array or a linked list. If you want to store 100
elements in an array, and the array size is exactly 100, then a stack that is
implemented with a linked list requires more space because every element is linked
to the other elements using an addi onal pointer. However, if you have 100
elements, and the array size is 200, for example, then a stack (internally
implemented with a linked list) may require less space.
135. Where is a linked list used? A linked list is a flexible data structure. Each element in a linked list is linked via a
pointer to the next element. A linked list hasn't got a fixed size and elements can be
inserted easily in the middle of the list. For example, if you were tracking the
number of people who have visited your website over me, you could use a linked
list to store each visitor's IP address and mestamp.
136. What is the difference between float and Float and double are data types that can store numbers with decimal points.
double? Double is a data type that can store numbers with more precision than float.
Double is a 64-bit floa ng point number, while float is a 32-bit floa ng point
number. The double data type can store numbers with more precision than the
float data type. Smallest value of a 32 bit float is -3.4028235E38, largest value of a
32 bit float is 3.4028235E38, smallest value of a 64 bit double is -
1.7976931348623157E308, largest value of a 64 bit double is
1.7976931348623157E308.
137. What is a DDOS? A Distributed Denial of Service (DDoS) a ack is a cyber-a ack where mul ple
systems send so many simultaneous requests for data that the server cannot
answer them all and either stops working or becomes so slow that it is mostly
unusable.
138. What is ASCII? This is a binary code scheme where le ers, numbers, and symbols are represented
by exactly one byte of data. ASCII stands for American Standard Code for
Informa on Interchange. In this code the le er A is represented as 01000001.
139. Describe the network topologies ring and mesh. A ring network consists of computers connected together in a ring, where the signal
passes around it. In this design, each computer is required to look at any data
passed to it to see if it is required to pass it along. This design is not fault-tolerant
and stops working if the ring is disconnected. That is why it has fallen out of use
today. A mesh network connects every node (computer or device) to every other
node. For each device that is connected, more cabling is required, which is
extremely inefficient. However, it has the advantage of being fault-tolerant since
there are mul ple paths to each node. Mesh networks are becoming interes ng in
wireless networks since there is no need for cabling, and the benefit of fault
tolerance is significant.
140. What is binary search? Binary search is a search algorithm that searches for data in a sorted list. It works by
dividing the list into two halves repeatedly. If the value you are searching for is
lower than the value in the middle of the list, you go on searching in the le part of
the list (dividing into two halves ...). If the value you are searching for is higher than
the value in the middle of the list, you go on searching in the right part of the list
(dividing into two halves ...).
141. What is a hub? A hub is a device that takes a signal from one cable and splits it out over several
cables. If it was spli ng out four signals, it would be called a “four port” hub. A hub
does not do any signal processing—everything that comes in is sent out through all
of the ports. Communica on is two-way: the ports can also send communica on
through the uplink connec on.
142. Would the linked list work to order elements? Yes, the linked list would work to order elements.
143. What is the difference between BIOS and The BIOS is a chip that contains instruc ons for the computer to start up. The
Opera ng systems opera ng system is so ware that runs on top of the BIOS and provides an interface
for applica ons to run.
144. How can an octal number be converted into an The octal numbering system is a base-8 numbering system. It uses the digits 0
decimal number? through 7. Each digit's place value is a mul ple of 8. Assign place values to each
digit of the octal number, star ng from the rightmost digit and working le ward.
The rightmost digit has a place value of 1 (8⁰), the next digit to the le has a place
value of 8 (8¹), then 64 (8² = 8*8), 512 (8³ = 8*8*8), and so on. For example, the
octal number 1702 in decimal nota on represents (1 × 8³) + (7 × 8²) + (0 × 8¹) + (2 ×
8⁰), or (1*512) + (7*64) + (0*8) + (2*1), which equals 962. If you're unsure about
the correctness of your conversion between numbering systems, you can use a
webpage like the following to check:
h ps://www.rapidtables.com/convert/number/octal-to-decimal.html.
145. Please give some examples of a stack data A stack is a data structure that works under a specific philosophy: Last In, First Out.
structure. This is o en abbreviated as LIFO. A stack data structure can be used to implement a
Undo/Redo func onality in text editors: When you make changes to a document in
a text editor, the changes are pushed onto a stack. If you want to undo a change,
the editor pops the most recent change off the stack and applies the inverse
opera on. To redo a change, the editor pushes the previously undone change back
onto the stack. Another example would be the back/forward naviga on in web
browsers: When you navigate to a new web page, the URL of the previous page is
pushed onto a stack. If you click the "back" bu on, the browser pops the previous
URL off the stack and navigates to that page. If you then click the "forward" bu on,
the browser pops the next URL off the stack and navigates to that page.
146. How is a stack data structure represented in The stack data structure in Java is implemented in the class java.u l.Stack.
Java? Remark: This ques on isn't relevant in the Internally in this class an array is used the implement the stack func onality.
context of the course book.
147. What is CSS? CSS: This stands for Cascading Style Sheets, these are used to create layout and
forma ng for web sites.
148. Mangement and understading of development Development stages are the process of crea ng a so ware applica on. The
stages development stages are: requirements analysis, design, implementa on, tes ng
and maintenance. The first stage is requirements analysis where the needs of the
users are iden fied and documented in a so ware requirements specifica on (SRS).
This is followed by design where the SRS is analyzed to produce a high-level design
document that describes how the system will work. Next comes implementa on
where all of this informa on is used to create working so ware. Tes ng then
follows to ensure that everything works as expected before moving on to
maintenance which includes fixing bugs and adding new features.
149. What is a datagram? A datagram is a unit of data sent over a network. A datagram may contain one or
more packets, depending on the protocol used to send it.
150. What is TCP/IP? TCP/IP stands for Transmission Control Protocol/Internet Protocol. The transmission
control protocol works at the transport layer, while the internet protocol works at
the network layer of the OSI model. However, TCP has its own four-layer model of
opera ng. TCP/IP is the protocol of the internet. That means that to access the
internet, it must be installed on a device. Since it is also usable for LAN
communica on, most computers use TCP/IP as their primary and only network
protocol.
151. What is a device controller? A device controller is a piece of so ware that controls the binary input and output
to a device. The device controller can also signal the CPU with an interrupt. A
device driver has to be designed specifically to talk with both the opera ng system
that is in use and the hardware device’s controller.
152. What is a driver? A driver is a piece of so ware that allows the opera ng system to communicate
with hardware devices.
155. What is ALU? The ALU is the part of a computer that performs arithme c and logic opera ons. It
is responsible for performing basic arithme c calcula ons on data, such as adding
and subtrac ng, but also performs logic opera ons such as AND and OR.
156. What is a computer interface? A computer interface is the combina on of all of the methods designed for a user
to interact with a computer, input and output.
157. What does GUI stand for? Graphical User Interface (GUI) is a type of user interface that allows users to
interact with electronic devices using graphics and text rather than just text. It is
used in computers, smartphones, tablets, video game consoles and other devices.
158. What is CRT? A cathode ray tube (CRT) was a type of monitor or television that used a large tube
to display images.
159. What is a hard drive? A hard drive is a storage device that stores data in a non-vola le manner. It is used
to store the opera ng system and other programs on your computer.
160. Where is the firmware usually stored on? The firmware is stored in the BIOS chip.
163. Who is Russell Kirsch? In the 1950s, Russell Kirsch invented the pixel. He decided that the simplest way to
divide up the data in a photo or image was to demarcate it into discrete squares—
that is what we have used to this day. It was a simple solu on and worked well
enough that humans could recognize photographs on a computer screen.
164. Who created JavaScript? Remark: This ques on is JavaScript was created by Brendan Eich in 1995. Eich is an American computer
not relevant in the context of the course book. programmer and technology execu ve.
165. Where are pixels used? Pixels are used in all types of images including fonts, icons, and graphics, along with
photos.
166. When should I use JavaScript? When you want to create a interac ve website.
167. What's the difference between a switch and a A switch has a connec on for an uplink and mul ple ports for communica on.
router? However, it does do basic filtering on data. Computers send data over a network in
data frames with hardware addresses. Some data is sent out with the broadcast
address; this address means it is for all computers who can receive it. A switch
filters these out so they do not get propagated across the en re network (which
can cause a flood of data known as a “broadcast storm”). A router is more
intelligent connec on device than a switch. It examines the IP address of each
packet of data sent over a network and only sends the signal through the
connec on that will reach the address. A packet is similar to a frame, this is a unit
of network data that is iden fied by an IP Address (instead of a hardware address).
Since a router filters data, it can also block data from entering a network that does
not belong there; this func on is called a firewall.
169. What is XOR? XOR (exclusive OR, exclusive disjunc on) is a logic gate that indicates that only one
out of two proposi ons is true. If both inputs (proposi ons) are true or both are
false the output is false. If only one of the inputs (proposi ons) is true and the
other false, the output is false.
170. What is von neumann architecture Von Neumann architecture is a basic design for computer systems that is s ll in use
today. The von Neumann architecture is a reference model for the architecture of a
computer. It consists of - a CPU, - a memory that holds both computer program
instruc ons and data, - an input system, - an output system. The CPU consist of an
ALU, a control unit and registers, which contain a fixed number of bits. These
registers can contain data or instruc ons that have been read from memory.
Besides the processor and memory, there also should be some type of input
(entering data) and output system (outpu ng data) to be able to communicate
with other devices or a human being.
171. Explain the star network topology. In a star network topology, a central network device such as a hub, switch, or router
is used to connect all the devices in the network. The central node in a star network
is responsible for sending traffic to the outer nodes. This network is fault-tolerant to
a point, but if the central hub, switch or router fails the network will not func on.
Star networks are by far the most commonly-used type of network today.
172. What is UNIX? Remark: This ques on isn't UNIX is a computer opera ng system originally developed in the 1970s by AT&T Bell
relevant in the context of the course book. Labs. It was designed to be used in me-sharing and mul -user environments, and
is intended to be used interac vely by mul ple users simultaneously. Today, UNIX is
used on a wide range of devices, including personal computers, servers,
smartphones, and other embedded systems. Some of the most popular UNIX-based
opera ng systems include Linux and macOS.
173. What is the meaning of transoceanic? The term transoceanic refers to something that occurs across or involves mul ple
oceans. It is used to describe things that span across large distances of water,
typically in reference to travel, transporta on, or communica on. Transoceanic
communica on cables refer to undersea communica on cables that connect
con nents and countries across oceans.
174. What is the second layer of the OSI model? The second layer of the OSI model is the data link layer. It exists to provide
specifica ons for devices—such as Ethernet—that determine the way signals are
sent electronically over the network, as well as standards for devices; this is where
the hardware (MAC) address is used. It includes local network error checking,
including collisions. Collisions occur when two network devices send out a signal
simultaneously, and they collide over physical media. Most networks use collision
detec on. This means a er a collision is detected both devices are instructed to
wait a random amount of me before sending again.
175. What is the purpose of an opera ng system? The purpose of an opera ng system is to provide an interface, control hardware,
and run applica ons.
176. What are the tasks of the presenta on layer? The presenta on layer prepares the data for being transferred. Encoding happens
here. For instance, if you are sending an email in Unicode, it will translate the
symbols at this layer. Encryp on occurs at this level. In other words, a plaintext or
other unencrypted message is brought through a mathema cal algorithm that
created encryp on. Without knowing the encryp on key, the code is nearly
unbreakable (though no code is perfect). The sending and receiving network
devices share a key at the beginning of communica on that allows for the
algorithm to be reversed and the message to be turned back into the original.
177. What is the physical layer? The physical layer is the lowest layer of the OSI model. It is responsible for sending
and receiving data over a network. The physical layer defines how signals are sent
and received, as well as how they are converted into binary data. The physical layer
includes specifica ons for cabling and connectors. It consists of hardware
specifica ons.
178. What is the most common programming Programming languages are context- and applica on domain-specific. Therefore,
language? this ques on cannot be answered in general. However, some of the most popular
programming languages include Python, Java, C, and C++. You can find a ranking of
the popularity of programming languages over me on this webpage:
h ps://www. obe.com/ obe-index/
179. What is the first layer of the osi model? The first layer of the OSI model is the Physical Layer.
180. What is the difference between h p and h ps? Both protocols exist to transfer data for a web page. The difference between h p
and h ps is that the secure version (h ps) uses encryp on to protect private data.
Many sites use encryp on—you should never type in personal data on any site that
is not using HTTPS (this is o en indicated on a browser by a small padlock icon).
181. What is the difference between direct and Direct and indirect proofs are two methods used in mathema cs to prove the truth
indirect proof? Remark: This ques on isn't of a statement. A direct proof is a method of proving a statement by using a series
relevant in the context of the course book. of valid arguments to show that the statement is true. An indirect proof, on the
other hand, is a proof method that proves a statement by assuming the opposite of
the statement (nega on) and showing that it leads to a contradic on or an
impossible scenario. Indirect proofs are o en used to prove statements that are
difficult to prove directly, or for cases where a direct proof is not possible.
182. What is the concept behind pixel images? The concept behind pixel images is to break any image up into small squares, so
that each square would then have one (and only one) color. If the squares are small
enough, the human eye cannot dis nguish them individually, and so our brain will
see a photographic image. An image is stored as a binary sequence of "color
values". You start at the top le for the first pixel, and then go across the first row in
that order un l comple ng it and then jumping down to the next row of pixels.
Since the order is implicit, there is no need to number the pixels. Each pixel has a
color as its basic data, so we must represent each separate color as a binary
number. If we use eight bits (a byte), then there are 256 different colors we can
represent uniquely. This is called 8-bit color.
183. What is seman cs? Seman cs is the study of meaning. Computer scien sts use the term seman c to
describe a type of error in so ware. It’s possible to create perfectly readable code
for a computer, yet have it do something different than your inten on. When a
program compiles and runs without producing any syntax errors or run me errors,
but it does not produce the expected output or produces incorrect output due to a
mistake in the logic of the program. For instance, suppose you write a program to
calculate the average of a list of numbers, but you forget dividing the sum by the
number of elements in the list. The program would compile and run without any
errors, but the output would be incorrect, resul ng in a seman c error.
184. What is Python? Python is a programming language used for web development, data analysis,
ar ficial intelligence, scien fic compu ng, and more.
185. What is logic? In computer science, logic is a fundamental branch of mathema cs that deals with
the study of reasoning and argumenta on. It involves the use of symbols and rules
to express and manipulate statements and arguments, with the goal of determining
their validity or truth. Proposi onal logic is a specific area relevant to computer
science.
186. What is Linux? Linux is a computer opera ng system. It is a free and open source so ware
opera ng system for computers, meaning that the code can be modified and
redistributed freely. Linux was originally created by Linus Torvalds in 1991, and has
since been developed by thousands of programmers worldwide.
187. What is HTTP? HTTP (Hypertext Transfer Protocol) is part of the TCP/IP protocol suite—it exists
specifically to transfer data for a web page. HTTP is the founda on of the World
Wide Web and enables the transfer of informa on between clients and servers
over the internet.
188. What is Fortran? Fortran is a programming language. Addi onal informa on: Fortran was developed
in the 1950s. It is used to write programs for scien fic and engineering applica ons.
It is s ll used today, but has been largely replaced by other languages like C++ and
Java.
189. What is DNS? Domain Name System (DNS) is a service that translates domain names into IP
addresses. It is used to access websites and other resources on the Internet. Every
internet device requires a 32-bit IP address to transmit and receive data. Imagine if
human users had to memorize and type in 32 zeroes and ones just to access a
website? This would prove quite cumbersome. Fortunately, DNS is a transla on
service that maps domain names to IP addresses every me you access a web page.
190. What is the difference between syntax and Syntax is the rules of how to write a program. Seman cs is the meaning of what you
seman cs? are wri ng.
191. What are data structures? Data structures are the way in which data is stored and organized. They are used to
make it easier to access and manipulate data. There are many different types of
data structures, including arrays, linked lists, stacks, queues, trees and graphs.
192. What is data mining? Data mining is the process of producing useful informa on from large amounts of
data, o en from mul ple sources.
193. What is data contextualiza on? What is the meaning of the binary byte 01000001? We don't know if it represents a
number, a le er, or if it has to be connected with other bytes to represent a larger
number. When somebody tells you that each byte contains an ASCII symbol, you
know the meaning of the binary byte 01000001 is the capital le er A. We give
binary data context by using codes (like the ASCII code).
194. What is a Wi-Fi access point? A Wi-Fi access point is a device that allows wireless devices to connect to the
Internet.
195. What is a terminator in a flowchart? A terminator symbol (oval or rectangle) is used at the beginning of a flowchart and
at all the endings. A terminator symbol represents the start or end of a process or
program. Terminator symbols are used to make flowcharts more readable and
easier to follow, as they provide a clear indica on of where a process begins and
ends.
196. What is a syntax error? A syntax error is a mistake in the syntax of a programming language such as -
missing punctua on, - wrong ordering of symbols and words, - misspelled keywords
or iden fiers, - incorrect capitaliza on, - incorrect nes ng of brackets or
parentheses, ... Syntax errors prevent the code from being compiled or executed
properly, and typically result in an error message that indicates the loca on and
nature of the syntax error.
197. What is a proposi on? A proposi on is the idea behind a statement. For instance, saying 'It is more than
27 degrees Celsius' is a logical statement, but the proposi on behind it is that the
condi ons of the environment include that the temperature is more than 27
degrees Celsius at the current moment outdoors. There can be many logical
statements used to express a proposi on. For instance, if the proposi on is 'It is hot
outside', you can use the logical statement 'It is more than 27 degrees outside' or 'It
is not less than 28 degrees outside', among others.
198. What is an UI? UI stands for "User Interface". It refers to the graphical or interac ve elements that
allow users to interact with a so ware.
199. What is a firmware? Firmware is a type of so ware that is required by the hardware for essen al
func onality. It is programmed into a stable chip that retains the data even without
electrical power (a non-vola le chip). A modern computer first runs the instruc ons
on the BIOS chip for boo ng up, which includes iden fying all of the hardware
a ached to the machine (hard drives, amount of RAM, graphics card, etc.). Once
that is done, it finds the opera ng system (OS) on the hard drive or other long-term
storage device and begins the process of copying it into RAM. That is what you are
wai ng for when a computer is “boo ng” up. You stare at the logo for your
computer un l this process is finished and you can interact with it. Firmware can
also be used in electronic devices that always perform the same task, such as your
smart refrigerator or a child’s toy. A single-task device does not need RAM to run
different applica ons. Advanced personal computers can perform many tasks and
need the RAM and extra hard drive storage to do so.
200. What is a discrete unit of data? A discrete unit of data is a single, dis nct piece of informa on that can be stored,
manipulated, or transmi ed by a computer or other digital device. In the context of
this course book a discrete unit of data is a file.
201. What happened in the Business era of computer The Business era of computer is the period from the 1960s to the 1980s. Computers
was used by individual experts in business. No graphical user interfaces was
available to interact with computers.
202. What happened in 1801? Joseph Maria Jacquard invented a loom that used punch cards made of wood to
create fabric designs automa cally. Technically, this was programming—a pre-made
set of instruc ons changed into a “machine language” that tells a machine what to
do. However, this machine wasn’t doing any compu ng, simply weaving cloth.
203. What does TCP/IP stand for? Transmission Control Protocol/Internet Protocol
204. What can be represented in binary? Any type of informa on can be represented in binary. This includes numeric values,
text, images, audio, and video. All of this informa on can be converted into a binary
representa on.
205. What is a programming language? Programming languages are languages that can be used by humans to give
instruc ons to a computer without having to write everything in binary.
Programming languages define a set of allowed words and have rules, including
syntax, which dictate how to use the words and symbols of that language.
206. What is a parity bit? Parity is a method of error-checking for binary data. It works by adding an extra bit
(the so-called parity bit) to every group of eight bits and then checking that the
total number of ones is odd or even. If an odd parity bit is used, the parity bit
makes the total number of ones in a byte odd. For example, if you have the
following byte 01010111, you count 5 ones. Because 5 is odd, the parity bit is 0. On
the other hand, if you have the following byte 01010101, you count 4 ones. To
make the total number of ones odd, the parity bit has to be 1.
207. What are formats in number representa on? In compu ng, there are several different formats that are commonly used for
number representa on, including decimal, binary, hexadecimal and octal.
208. What is a data bus? A data bus is a connec on that is used for data transfer between different
components of a computer.
209. What is proposi onal logic? Proposi onal logic deals with the logical rela onships between proposi ons that
are represented as simple statements or symbols. In proposi onal logic,
proposi ons are considered to be either true or false, and logical connec ves such
as and, or, not, implies are used to combine them into more complex proposi ons.
210. The rules for the order and usage of words and syntax
symbols in programming is called what?
211. Which is the fastest cache L1, L2 or L3? L1 cache is the fastest, L2 cache is slower than L1 and L3 cache is slower than L2.
212. What is the memory size of the L1 cache? The memory size of L1 cache varies depending on the architecture and design of
the processor. For example, in the Intel Core i7 processor, the L1 cache has a size of
32 kilobytes (KB).
213. What is the big O nota on? The big O nota on is used to describe the complexity of an algorithm. It is based on
the data size of n elements. For instance, bubble sort takes approximately n^2 steps
to be completed, so we write it as: O ( n^2 ). If you would like to sort a list of 100
elements using bubble sort you approximately need 10,000 steps to complete.
214. Conver on between numbering systems: 1: 1: The decimal number 57 is in binary 00111001. 2: The binary number 10110110 is
Convert the decimal number 57 to binary. 2: in decimal 182. 3: The hexadecimal number 2C is in binary 00101100.
Convert the binary number 10110110 to decimal.
3: Convert the hexadecimal number 2C to binary.
215. How many different numbers can you represent With 16 bits, you can represent 2^16 = 65,536 different numbers.
with 16 bits?
216. Which non-numerical informa on needs to be Non-numerical informa on, such as text, images, audio, and video, needs to be
converted to binary? converted to binary. For text, you can use the ASCII code, images can be
represented by a sequence of pixels, etc.
217. What is the difference between microprocessor Microprocessors are the brains of a computer. They are the central processing unit
and microcontroller? (CPU) and they control all of the other components in a computer. A
microprocessor is a single-chip CPU. It requires addi onal components, such as
memory and input/output interfaces, to be integrated into a complete system. A
microcontroller, on the other hand, is a complete compu ng system that integrates
a CPU, memory, and input/output interfaces all on a single chip.
218. How can one behave ethically? You can behave ethically for example by not stealing intellectual property, not lying
about your product, and keeping user informa on private.
219. How to convert binary to octal? Conver ng binary to octal involves grouping the binary digits into sets of three,
star ng from the rightmost digit, and then conver ng each group of three binary
digits into its corresponding octal digit. The binary number 110 010 111 011 001
010 can be converted into octal as follows: 010 = 2, 001 = 1, 011 = 3, 111 = 7, 010 =
2, 110 = 6. The number in octal is: 627312. If you're unsure about the correctness of
your conversion between numbering systems, you can use a webpage like the
following to check: h ps://www.rapidtables.com/convert/number/binary-to-
octal.html.
220. How can we convert the binary number Assign place values to each digit of the binary number, star ng from the rightmost
11111111 to a decimal number? digit and working le ward. The rightmost digit has a place value of 1, the next digit
to the le has a place value of 2, then 4, 8, 16, 32, 64, 128 and so on, with each
place value doubling. Mul ply each digit of the binary number by its corresponding
place value and add the results: 1*128+1*64+1*32+1*16+1*8+1*4+1*2+1*1 = 255
Therefore the binary number 11111111 is 255 in decimal.
221. How many bytes is a mega byte? A mega byte (1MB) is 1,000,000 bytes.
222. How can humans 'think like a computer'? A computer needs clear and unambiguous instruc ons. If we want to solve a
problem in the real world using a computer, we must be able to break down the
problem into easy, step-by-step instruc ons that we can formulate in a
programming language.
223. How does an algorithm work? An algorithm is a set of rules or instruc ons for comple ng a task. This applies to
human beings as well as computers. The algorithm takes input data, processes it,
and produces an output based on the instruc ons provided. If you want to
assemble a cabinet, you have the individual parts as input, you follow the assembly
instruc ons (that's the algorithm), and you get the fully assembled cabinet as
output. When a computer processes a search query, the search algorithm receives
the search terms as input, executes the search algorithm step by step, and delivers
the search results as output.
224. How does a cpu work? The Central Processing Unit (CPU) is o en referred to as the “brain” of the
computer. It does all the processing, which includes doing calcula ons and sending
instruc ons to other hardware. The CPU consists of mul ple components, including
the control unit, arithme c and logic unit, registers, and cache. The control unit
manages the flow of data between the CPU and memory, while the arithme c and
logic unit performs arithme c and logical opera ons. Registers and cache are high-
speed memory units that are used to store data that is frequently accessed by the
CPU.
225. How can I sort informa on alphabe cally? You can sort informa on alphabe cally by using the ASCII value of each character.
The ASCII value is a number that represents the character. For example, the le er A
has an ASCII value of 65, and the le er B has an ASCII value of 66.
226. What is the data link layer? The data link layer is the second layer of the OSI model. The data link layer provides
specifica ons for devices—such as Ethernet—that determine the way signals are
sent electronically over the network, as well as standards for devices; this is where
the hardware (MAC) address is used. It includes local network error checking,
including collisions. Collisions occur when two network devices send out a signal
simultaneously, and they collide over physical media. Most networks use collision
detec on. This means a er a collision is detected both devices are instructed to
wait a random amount of me before sending again.
227. What is a DSS? A Decision Support System (DSS), is primarily designed to look to the future and
help make informed decisions. A key of a good DSS is that the informa on is
presented in an easily understandable way. These systems o en have mul ple ways
to present data including in graphs and charts. DSS systems provide informa on
such as: revenue predic ons, hiring needs, inventory analysis, and future sales. This
system is most o en used at the middle management level and above.
228. Do I have to watch lectures only or I have to You have to study book as well. The course book content is essen al to pass the
study course book as well? exam.
229. Describe the communica on process in layers The applica on interacts directly with the user, it makes requests to access
between applica on, opera ng system, BIOS and hardware through the opera ng system. The opera ng system uses a driver to talk
hardware. to the BIOS chip, which handles things like hardware adressing. The BIOS passes
commands along to hardware, and then passes the results back up to the
applica on.
230. Describe the boot process. The boot process is the startup sequence of a computer. The term comes from the
phrase “pull yourself up by your bootstraps.” When a computer first starts up (the
boot process), the RAM is empty and the computer is wai ng for instruc ons on
what to do. It finds those instruc ons (so ware) in a special chip called a BIOS,
which stands for Basic Input Output System. These instruc ons are what the
computer follows when first it starts up. They are always the same, so they are
programmed into a stable chip that retains the data even without electrical power
(a non-vola le chip). A modern computer first runs the instruc ons on the BIOS
chip for boo ng up, which includes iden fying all of the hardware a ached to the
machine (hard drives, amount of RAM, graphics card, etc.). Once that is done, it
finds the opera ng system (OS) on the hard drive or other long-term storage device
and begins the process of copying it into RAM. That is what you are wai ng for
when a computer is “boo ng” up. You stare at the logo for your computer un l this
process is finished and you can interact with it.
231. What is a firewall? A firewall is a device that filters data from entering or leaving a network. It can also
block data from entering a network that does not belong there; this func on is
called a firewall.
232. What is sampling? Sampling is the representa on of analog data by taking samples of the wave values
over small me intervals. In the real world sound exist in waves. Informa on
represented in waves is referred to as analog. When we store it on a computer it
must be converted into digital data. Does this mean that some of the informa on is
lost? Definitely. Analog waves have an infinite con nuum of values, whereas digital
representa ons of waves must simulate them with sampling. Analog data are sliced
into very small me samples and a digital value is assigned for that me slice. The
smaller the slices, the more accurate a representa on. However, we cannot have
infinitely small samples. If we cut up an audio wave into small enough slices and
reassemble it, the human ear cannot tell the difference.
233. What is binary? The term binary is used in the context of a numbering system. The binary
numbering system is a base 2 numbering system consis ng of only ones and zeroes.
234. What is an API? Applica ons use an Applica on Programming Interface (API) that is provided by
another applica on (for example the opera ng system) to use specific func onality.
The opera ng system for example is responsible for accessing hardware devices.
The func onality to access hardware devices is also important for other
applica ons. Therefore the opera ng system provides this func onality via an API
to other applica ons.
235. What is an algorithm? An algorithm is a sequence of instruc ons that can be used to solve a problem. The
most common algorithms are sor ng algorithms, which sort data into an order that
is more useful for the user. Algorithms can also be used to find pa erns in data,
such as finding the highest value in a list or finding all possible combina ons of
numbers from 1-100.
236. What is algorithm complexity? Algorithm complexity is the number of steps that an algorithm takes to complete its
task. The less complex an algorithm is, the more efficient it tends to be. When we
are evalua ng the usefulness of algorithms, one thing we ask is: which one requires
more opera ons to complete its task? That algorithm is the most complex. Of
course, we want to use the least complex algorithm that will take fewer calcula ons
and therefore less me and energy.
237. What is a binary digit? A binary digit is the smallest unit of data in a computer. They are represented by
two symbols, 0 and 1. A byte is eight binary digits together, which can represent
256 combina ons or 0 to 255.
238. What is 802.11? 802.11 is an IEEE standard for wireless communica on, set in 1997. New, updated
standards were then introduced by adding addi onal le ers a er the name. The
802.11g protocol is the oldest widely used protocol, for example.
239. What is a computer program? A computer program is a set of instruc ons that tell the computer what to do. It is
wri en in a programming language that the computer can understand.
240. What is RGB? RGB is a color model in which red, green, and blue are added together in various
ways to reproduce a broad array of colors. The name of the scheme comes from the
ini als of the three addi ve primary colors, red, green and blue.
241. What is the VGA graphics system? The VGA graphics system is a computer display standard introduced by IBM in 1987.
It was the first standard to use a digital RGB color model, instead of the analog RGB
model used previously. The VGA supports up to 640×480 pixels with 16 colors at
once from a pale e of 262,144 colors.
242. What is a pixel? A pixel is a single square which is assigned a color and used to assemble a larger
image.
244. What is a byte and how does it compare to a bit? A byte is a unit of digital informa on that consists of eight bits. A bit is a single
binary digit, either 0 or 1.
245. What is a bit? A bit is the smallest unit of data in a computer. A bit can either store the value 1 or
the value 0.
246. What are binary digits? Binary digits are the two symbols used in binary, 0 and 1.
247. What is JavaScript? JavaScript is a programming language that is used to create interac ve effects on
websites. It is also used to create programs for web browsers.
250. What is the difference between bubble sort and Both are sor ng algorithms. Bubble sort has a me complexity of O(n2), while quick
quick sort? sort has a me complexity of O(n*log(n)). Therefore, quick sort can order the
elements of a list on average faster than bubble sort.
251. What is the binary representa on of A? If we use the ASCII code the le er A is represented by 01000001.
252. Explain the bubble sort algorithm. The rules for bubble sor ng are this: star ng at the beginning, compare the first
two values. If the first one is larger, swap the two values. If it is not, there is nothing
to do. Then compare the next two values and do the same un l you reach the end.
Once this is done, do it again for every element except the last one, since it will be
in order now. Each pass you complete will guarantee one more element is in order.
Others may happen to be in order, but the bubble sort will check them all
regardless. If there are no swaps in a pass, this indicates that the list is s ll sorted.
253. Explain odd an even parity bits. Parity is a method of error-checking for binary data. It works by adding an extra bit
(the so-called parity bit) to every group of eight bits and then checking that the
total number of ones is odd or even. If an odd parity bit is used, the parity bit
makes the total number of ones in a byte odd. For example, if you have the
following byte 01010111, you count 5 ones. Because 5 is odd, the parity bit is 0. On
the other hand, if you have the following byte 01010101, you count 4 ones. To
make the total number of ones odd, the parity bit has to be 1. If an even parity bit
is used, the parity bit makes the total number of ones in a byte even. For example,
if you have the following byte 01010111, you count 5 ones. Because 5 is not even,
the parity bit has to be 1. On the other hand, if you have the following byte
01010101, you count 4 ones. The total number of ones is s ll even, therefore the
parity bit has to be 0.
254. Does a rela onal database scale well Whether a rela onal database scales well horizontally depends on the data stored
horizontally? Remark: This ques on isn't relevant in it. If it is possible to break up the database into smaller pieces and distribute
in the context of the course book. them across mul ple servers, with each server responsible for a subset of the data,
then a rela onal database can scale horizontally.
255. What is Web3? Remark: This ques on isn't Web3 is an idea for a new genera on of the World Wide Web that is based on
relevant in the context of the course book. blockchain technology and emphasizes decentraliza on, user privacy, and increased
security.
256. What is ALGOL? Remark: This ques on isn't ALGOL ("Algorithmic Language") is the name of a family of programming languages
relevant in the context of the course book. that were used from the late 1950s to the 1980s. All Algol variants have had a
significant influence on the further development of programming languages. For
example, languages such as C and Pascal are derived from Algol 60.
257. Summarize some facts about the history of It is difficult to pinpoint the exact moment when the first computer was created. It
computers. was more of an evolu on of advanced machines into something that eventually
resembles the computers we have today. In 1801, Joseph Maria Jacquard invented
a loom that used punch cards made of wood to create fabric designs automa cally.
Technically, this was programming—a pre-made set of instruc ons changed into a
“machine language” that tells a machine what to do. However, this machine wasn’t
doing any compu ng, simply weaving cloth. Later, during World War II, machines
were used to encode secret messages. These machines used gears that would align
with symbols to create a coded text from regular or “plaintext” messages. Breaking
those codes, however, required actual compu ng power. The 2014 film The
Imita on Game tells the story of Alan Turing; his Turing machine was able to take in
encrypted messages, process them, and output an answer. However, his machine
had no keyboard or monitor, let alone a mouse. To look at the history of modern
compu ng machines, we will break it down into four eras: - Behemoths: Huge
machines used mostly by governments. 1940s - 1960s. - Business: Computers that
are used by individuals in business. 1960s - 1980s. - Graphical: The dawn of the
Graphical User Interface and digital imagery. 1980s - 2000s. - Portable:
Miniaturiza on of computers; laptops, tablets, smartphones. 2000s - today.
258. What programming language should I use to You can use Python.
create interac ve websites?
259. Why should I learn JavaScript? Because it is a programming language that is used to create interac ve websites.
260. How does a queue data structure work? A queue is a data structure that stores elements in the order they are inserted. It is
called a FIFO (First In First Out) data structure. The first element added to the queue
will be the first one removed from it. A queue can be implemented using an array
or linked list.
261. What is base 8? Base 8 refers to a numbering system that uses the digits 0 through 7. It is also
known as octal numbering system.
263. What is a BIOS chip? Within the BIOS chip a special kind of so ware (firmware) is stored typically in a
ROM (read only memory). The firmware of a BIOS chip provides a star ng line for a
computer every me it is turned on. One of the very first things a BIOS chip will
instruct the computer to do is detect and test hardware that is connected to it. It
performs a POST, or power on self-test to check that the required hardware is there
and that it is func oning properly. Then it starts loading the opera ng system.
264. Where is firmware usually stored? Firmware is usually stored in the BIOS chip.