Quiz Bowl Reviewer (Overall) PDF
Document Details
Uploaded by SuppleViolet9569
Asia Pacific College
Tags
Summary
This document provides definitions and explanations for various terms and concepts in computer science, covering topics such as data structures, algorithms, memory management and computer architecture. It is suitable for students studying computer science at the secondary school level.
Full Transcript
Quiz Bowl Reviewer (Overall) Term Definition Collection of elements stored in contiguous memory Array (single section in memory is allocated) Linked List...
Quiz Bowl Reviewer (Overall) Term Definition Collection of elements stored in contiguous memory Array (single section in memory is allocated) Linked List Collection of nodes with tail and head Stack LIFO, best used for recursive functions Queue Linear data structure, FIFO Tree based structure, element with highest priority is Heap always at its root Adjacency Matrix Representation of graph using 2D array Dijkstra’s Algorithm Shortest path algorithm in a weighted graph Shortest path algorithm in a weighted graph with Bellman-Ford Algorithm negative weights Kruskal’s Algorithm find the minimum spanning tree of a graph Bubble Sort best time is O(n), space complexity is O(1) Selection Sort best time is O(n^2), space complexity is O(1) best time O log n, space complexity O(n) — for large Merge Sort dataset STABLE best time and space complexity is O log n but NOT Quick Sort STABLE Checks each element until it finds target/reaches the Linear Search end Efficient, works on sorted arrays/lists as it divides Binary Search elements into half and compare it Assigning blocks of memory to different programs Memory Allocation during execution Garbage Collection Freeing up memory that is no longer used by program External Frag: free memory is scattered, hard to allocate large blocks Fragmentation Internal Frag: allocated memory is larger than needed Quiz Bowl Reviewer (Overall) 1 Actual hardware component that store data, can be Physical Memory (RAM) volatile Abstraction of memory to give the app the impression it Virtual Memory has contiguous memory DRAM (Dynamic RAM) used as main memory used in apps that needs fast access to data like cache SRAM (Static RAM) memory Page is a fixed size block of data that the OS Swaps in and out of physical memory Paging Paging is the action of dividing virtual address space into pages Segmentation Divides memory into variable sized blocks of memory OS spends more time swapping data between RAM and Thrashing disk Process of moving data between RAM and disk, may Swapping cause thrashing if done excessively. an error when program tries to access memory outside Segmentation Fault the bounds an error when program tries to access data in an Page Fault address space but is not actually located there. Condition where program consumes memory without Memory Leak proper releasing space on the hard disk that acts as virtual memory Swap Space when physical memory is fully utilized RAM (Random access memory) Fast, allows for both reading and writing, volatile Non-volatile, stores critical info needed for system ROM (Read-only memory) startup process Cache Stores frequently accessed data Small storage locations within the CPU to temporarily Registers hold data Manages system resources and hardware Kernel communication Quiz Bowl Reviewer (Overall) 2 Outermost layer of OS that acts as an interface between Shell user and kernel Multitasking Ability of OS to run multiple tasks concurrently System Call Allows user-level apps to request services from the OS Software component that facilities OS and applications’ Driver communication Bootstrap Process Process of starting a computer and loading the OS Boot loader Program for loading the OS into memory controls access to shared resources in concurrent Semaphore program is the process of distributing network traffic or Load balancing computing tasks across multiple servers Cloud Computing delivery of computer services over the internet cloud provider manages infrastructure, scaling, and Serverless Computing resource allocation dynamically. uses quantum mechanics principle to process Quantum Computing information Edge Computing data process occurs close to source than cloud set of protocols allowing different software apps to API communicate field of AI that allow systems to learn data without Machine Learning explicit programming subset of ML, involves neural networks with many Deep Learning layers to learn images, audio, and text VR and AR space where users can interact w/ each Metaverse other records transactions accros multiple computers, Blockchain ensuring data integrity and security with no authority Digital or virtual currency that uses cryptography for Cryptocurrency secure transactions AI Machines designed to mimic human intelligence Quiz Bowl Reviewer (Overall) 3 Virtual replica of physical objects/systems for learning Digital Twin and simulation Program Counter holds memory address of next instruction Accumulator Temp. storage for results of operations Status Register Holds flags that indicate the status of the CPU Memory Address Register Holds memory address of data for fetch/store Instruction Register Holds current instruction being executed Base Register Holds the base address for memory access. register in CPU/microcontroller to control and configure Control Register the behavior of the processor/hardware component Application Layer Presentation Layer Session Layer ANG PULIS SA TULAY NADAPA Transport Layer Network Layer Data Link Layer Physical Layer project management tool to visually track and represet Gantt chart project schedules digital circuit that performs arithmetic and bitwise Arithmetic Logic Unit (ALU) operations on integer binary numbers involves splitting a large dataset into smaller, more Data Sharding manageable chunks called shards system designed to manage and organize data in a structured manner. It allows users to create, modify, and Database Management System query a database, as well as manage the security and access controls Data warehouse A Data Warehouse is a centralized repository that stores large volumes of structured data from multiple Quiz Bowl Reviewer (Overall) 4 sources. digital logic device that selects one input from multiple Multiplexer inputs and forwards it to a single output line. Encoder multiple inputs and produces a binary-coded output a systematic process for planning, creating, testing, Software Development Lifecycle deploying, and maintaining software. act of reporting unethical, illegal, or harmful activities Whistle Blowing within an organization to authorities, management, or the public. visually represents the flow of interactions between Sequence Diagram objects or components in a system uses principle of quantum mechanic to ensure the Quantum Cryptography security of transmitted data. Zero day exploitation exploit vulnerabilities unknown to developers networking technique used to allow external devices to Port forwarding access specific services or resources inside a private local network. security system designed to monitor and control Firewall incoming and outgoing network traffic based on predetermined security rules situation where two or more processes are unable to continue because each is waiting for resources held by Deadlock the others. dividing a system into smaller, manageable parts, each Modularity with a specific task, making it easier to understand and maintain. hat hacker White hack hacker: uses hacking skills for ethical purposes, such as finding and fixing security flaws Black Hat Hacker: engages in malicious activities Quiz Bowl Reviewer (Overall) 5 grey hat hacker operates in between, sometimes breaking laws but without harmful intent. arrangement of different elements (nodes, links, etc.) in a computer network. network topology Common types include bus, star, ring, mesh, and hybrid topologies White box testing involves testing with knowledge of the internal workings of the system. Black box testing focuses on testing the system's functionality without knowing its internal structure. Box Testing Gray box testing is a combination of both, where the tester has partial knowledge of the internal workings and tests both functionality and security. Verifying if the software meets business requirements Acceptance Testing and is ready for release. Testing individual components or units of code for Unit Testing correctness. Testing the interaction between integrated modules or Integration Testing systems. System Testing Testing the complete and integrated software system. unauthorized use, reproduction, or distribution of someone else's intellectual property patent — owner decides who can use the invention intellectual property theft during the protection period copyright — protects original works of authorship. Owner has the right to control reproduction, distribution and display of their work trademark — protects brands, logos, and slogans Software Piracy The illegal copying, distribution, or use of software without proper licensing or authorization. (SOFTWARE, Quiz Bowl Reviewer (Overall) 6 MEDIA) ISO 25010 A standard for software quality Refers to the use of technology to harass, threaten, or Cyberbullying manipulate others online Refers to the legal doctrine that allows limited use of Fair use copyrighted materials without permission The process of deconstructing software or hardware to Reverse Engineering understand its components or to replicate its functionality Quiz Bowl Reviewer (Overall) 7