Word Found Meaning Innovation

Similar documents
Chapter 3. The Basics of Networking

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

CSCI Computer Networks

Lecture (02) Network Protocols and Standards

Web Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery

CSCD 433/533 Advanced Networks

Introduction to computer networking

Communicating over the Network

The Basics of Networking

PLEASE READ CAREFULLY BEFORE YOU START

4.0.1 CHAPTER INTRODUCTION

Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition

Networking interview questions

a. The song was saved using fewer bits per second than the original song.

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

DATA COMMUNICATION AND NETWORKS

Chapter 16 Networking

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Networking Applications

Chapter 11: Wide-Area Networks and the Internet

TCP/IP protocol suite

9. Wireshark I: Protocol Stack and Ethernet

Networking and Internetworking 1

IP Packet Switching. Goals of Todayʼs Lecture. Simple Network: Nodes and a Link. Connectivity Links and nodes Circuit switching Packet switching

Introduction to Networking

Network Protocols - Revision

Outline. Inter-Process Communication. IPC across machines: Problems. CSCI 4061 Introduction to Operating Systems

IP: Addressing, ARP, Routing

Schahin Rajab TCP or QUIC Which protocol is most promising for the future of the internet?

STEVEN R. BAGLEY PACKETS

Chapter 8 OSI Physical Layer

Access to the Web. Coverage. Basic Communication Technology. CMPT 165: Review

ICS 351: Networking Protocols

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Data Communication & Computer Networks MCQ S

Layered Architecture

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

Goal of Today s Lecture. EE 122: Designing IP. The Internet Hourglass. Our Story So Far (Context) Our Story So Far (Context), Con t

Lecture (03) Network Model

Networking Fundamentals Tom Brett

Business Data Communications and Networking

Chapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts

TCP/IP stack is the family of protocols that rule the current internet. While other protocols are also used in computer networks, TCP/IP is by far

Unit A - Connecting to the Network

Chapter 7. Local Area Network Communications Protocols

Lecture (03) Networking Model (TCP/IP) Networking Standard (OSI) cont.,..

Learning more about the internet will help students develop a better understanding of its endless possibilities.

Data & Computer Communication

Chapter 2 Communicating Over the Network

Computer Networks and reference models. 1. List of Problems (so far)

Network Fundamentals Chapter 2 Modified by Tony Chen 05/20/2008

A Simplified Example of TCP/IP Communication Chuck Cusack

416 Distributed Systems. Networks review; Day 1 of 2 Jan 5 + 8, 2018

networks List various types of networks and their

CPS221 Lecture: Layered Network Architecture

Networking Basics. EC512 Spring /15/2015 EC512 - Prof. Thomas Skinner 1

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Hands-On Network Security: Practical Tools & Methods

The Internet Protocol (IP)

Computer Networks Security: intro. CS Computer Systems Security

Lecture (03) (I) OSI Reference Model

ECE 158A: Lecture 7. Fall 2015

Chapter 5: Networking and the Internet

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

CS 204: Advanced Computer Networks

Local Area Networks; Ethernet

PLEASE READ CAREFULLY BEFORE YOU START

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

Reference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models

Introduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁

ECE 4450:427/527 - Computer Networks Spring 2017

4 rd class Department of Network College of IT- University of Babylon

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

ESE250: Digital Audio Basics. Week 13: April 2nd, 2013 Networking

Chapter 2 Network Models 2.1

Business Data Networks and Security 10th Edition by Panko Test Bank

INTERNET ARCHITECTURE & PROTOCOLS

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD

The Internet and the Web. recall: the Internet is a vast, international network of computers

b) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc.

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

AND WHAT MAKES A GOOD ONE?

(Refer Slide Time: 1:09)

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

ITP 140 Mobile Applications Technologies. Networks

Lecture (02) The TCP/IP Networking Model

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

Internet Architecture

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

Configuring your VLAN. Presented by Gregory Laffoon

Full file at Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

UDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data

2/29/2012. Part 1: Networking overview Part 2: Data transfer methods Part 3: Communication Channels

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁

ECE 435 Network Engineering Lecture 14

Transcription:

AP CSP Quarter 1 Study Guide Vocabulary from Unit 1 & 3 Word Found Meaning Innovation A novel or improved idea, device, product, etc, or the development 1.1 thereof Binary 1.2 A way of representing information using only two options Bit A contraction of "Binary Digit". A bit is the single unit of information in 1.2 a computer, typically represented as a 0 or 1 Bandwidth 1.3 Transmission capacity measure by bit rate Bit rate (sometimes written bitrate) the number of bits that are conveyed or 1.3 processed per unit of time. e.g. 8 bits/sec Latency 1.3 Time it takes for a bit to travel from its sender to its receiver Protocol A set of rules governing the exchange or transmission of data between 1.3 devices ASCII ASCII - American Standard Code for Information Interchange. ASCII is 1.7 the universally recognized raw text format that any computer can understand code 1.7 (v) to write code, or to write instructions for a computer IETF Internet Engineering Task Force - develops and promotes voluntary 1.8 Internet standards and protocols, in particular the standards that comprise the Internet protocol suite (TCP/IP). Internet 1.8 A group of computers and servers that are connected to each other. Net Neutrality the principle that all Internet traffic should be treated equally by 1.8 Internet Service Providers. IP Address 1.9 A number assigned to any item that is connected to the Internet IP Packets Small chunks of information that have carefully formed from larger 1.9 chunks of information Packets Small chunks of information that have been carefully formed form 1.11 larger chunks of information TCP Transmission Control Protocol provides reliable, ordered, and errorchecked 1.11 delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing DNS 1.12 The service that translates URLs to IP addresses HTTP HyperText Transfer Protocol - the protocol used for transmitting web 1.13 pages over the Internet URL An easy-to-remember address for calling a web page (like 1.13 www.code.org) Net Neutrality the principle that all Internet traffic should be treated equally by 1.14 Internet Service Providers. Algorithm 3.2 A precise sequence of instructions for processes that can be executed by a computer High Level Programming Language 3.2 A programming language with many commands and features designed to make common tasks easier to program. Any high-level functionality is encapsulated as combinations of low level commands Low Level Programming Language 3.2 A programming language that captures only the most primitive operations available to a machine. Anything that a computer can do can be represented with combinations of low level commands 1

Iterate 3.3 To repeat in order to achieve, or get closer to, a desired goal. Selection 3.3 A generic term for a type of programming statement (usually an ifstatement) that uses a Boolean condition to determine, or select, whether or not to run a certain block of statements. Sequencing 3.3 Putting commands in correct order so computers can read the commands Turtle Programming 3.4 a classic method for learning programming with commands to control movement and drawing of an on-screen robot called a "turtle". The turtle hearkens back to early implementations in which children programmed a physical robot whose dome-like shape was reminiscent of a turtle Abstraction 3.5 Pulling out specific differences to make one solution work for multiple problems Function 3.5 A piece of code that you can easily call over and over again Top Down Design 3.6 a problem-solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up API 3.7 a collection of commands made available to a programmer Documentation 3.7 a description of the behavior of a command, function, library, API, etc Hexadecimal 3.7 A base-16 number system that uses sixteen distinct symbols 0-9 and A- F to represent numbers from 0 to 15 Library 3.7 a collection of commands / functions, typically with a shared purpose Parameter 3.7 An extra piece of information passed to a function to customize it for a specific need For Loop 3.9 Loops that have a predetermined beginning, end, and increment (step interval) Loop 3.9 The action of doing something over and over again Unit 1 Digital data is represented in computers in binary because it s easier, cheaper, and more reliable to build machines and devices that only have to distinguish between binary states. Understand that Binary offers only two possible answers and a binary message only can be two possible values 8 bits = 1 byte Ways to send information Method Example Pro(s) Con(s) Electric Electric Voltage Cheap Signal Loss Light Fiber Optic Cable / Beam of light Fast, No signal loss, no degrading Expensive, hard to work with Radio Alternating Frequencies info wireless signal loss 2

Understand how to determine number of bits needed to transmit information, example: (Lesson 1:3) o To increase options in binary adding a bit will double the number of options: 1, 2, 4, 8, 16. 32, 64. In other words, you don t need to double the bits, i.e. go from 8 bits to 16 bits significantly increase choices, that raises it 256 times as many possible options. o When responding to a question with 4 choices, the most efficient method will require number of bits? (Answer) 2 bits o What is the minimum number of bits you need to encode the 26 letters of the alphabet plus a space? (Answer) 5 bits o How many unique IP addresses could be made in a fixed-length IP address system using 6 bits? (Answer) 64 users Numbering Systems o Decimal Base 10 o Binary Base 2 o Hexadecimal Base 16 Understand how to calculate number of patterns from number of items (example) o How many 3-place patterns could you make with 2 shapes 2 3 - solve (what do you have? 2 shapes, to the power of what you want to create which is 3- place patterns) Equals 8 Be able to convert Binary to Decimal and Decimal to Binary (Lesson 1:5) o Use the Flippy Do / Binary to Decimal resource on Moodle that I gave you to practice o Example: You have a coordinate grid that is 96 x 96. Assuming that you encode the x and y coordinate as separate numbers, what is the minimum number of bits that you will need to encode a coordinate in that space? Answer (14): because you need 7 bits each for the x and y coordinates ASCii (Lesson 1:7) o How to use it Example: The word Apple translated into its ASCii number (decimal_ equivalent is: (Answer): 065 112 112 108 101 Lesson 1:8 IETF defines the protocols and standards for how the Internet works and is made up of a loosely organized collection of citizens and engineers who communicate mostly by email. RFC Request for Comments Reread the article by Vint Cerf about the Internet being for everyone and the concept of Net Neutrality o The Internet is for everyone but it won t be Lesson 1:9 32 bits in an IPv4 address system allowing for ~ 4 billion IP addresses 128 bits will be in the IPv6 address system allowing for 34 followed by 37 zeros What is the purpose of a DNS system and what does it stand for? o The DNS stores and translates domain names to IP addresses o Domain Name System o The Internet s system for converting alphabetic names into numeric IP address 3

Lesson 1:10 Routers and Redundancy Network redundancy allows for multiple backups to ensure reliability during cases of high usage / failure o A router is a type of computer that forwards data across a network Routing on the Internet when a packet is travelling between two computers on the Internet is may be rerouted many times along the way The addressing information allows routers to decide how to best forward along the packet towards its destination Be able to describe the relative benefits of routing securely with a specific address rather than the broadcast style of communication Routing messages to a specific address rather than broadcasting the message reduces the number of people who can automatically see the message Addressed traffic is more secure than broadcasted, but if the router security is compromised someone other than the intended recipient could read the message. Lesson 1:11 Packets and Making a Reliable Internet TCP o Ensures messages can be reliably transmitted across the Internet o Must account for the fact that packets may not arrive at a destination computer in the intended order IP o The required structure of a packet to be sent on the Internet Packets o Are numbered so they can be reassembled at the end o Are routed on different paths from sender to receiver o The receiving computer must confirm to the sending computer that each packet was received Lesson 1:12 The Need for DNS DNS servers are connected in a distributed Hierarchy DNS servers are divided into zones, splitting up responsibilities (.org,.com,.edu) Susceptible to hacking o i.e. DNS Spoofing matching domain name with wrong IP address Computers need to periodically check the DNS for websites because IP addresses are not static; they can change Because of the DNS system we do not have to memorize IP addresses of our favorite sites The Internet is in a hierarchy Lesson 1:13 HTTP and Abstraction Internet protocols define how computers talk to one another on the Internet TCP/IP and the multiple layers of the physical Internet handle the details of sending messages HTTP (Protocol) defines how your browser (Yahoo, Google, IE ) asks a remote server for the text, images, audio and formatting info used to render a complete webpage o Considered a high-level protocol because it makes use of abstractions provided by lower level protocols Look over your Video Guide that you filled out from Moodle! 4

UNIT 3 Intro to Programming Lesson 3:2 The Need for Algorithms Definitions for algorithm, low level and high-level programming languages We created algorithms and saw the need for precise consist language when communicating Lesson 3:3 Creativity in Algorithms Used iteration to repeat in order to achieve our goal Used sequencing to put commands in a correct logical order Lesson 3:4 Programming with Simple Commands Introduced to turtle programming involving movement and drawing Learned about efficiency or minimizing wasted effort / resources trying to program with minimal steps or energy Lesson 3:5 Creating Functions Definitions of abstraction and function Once you define a function when you want to use that function you have to call it the program o Meaningful function names help people better understand programs o Function in programming are named grouping of programming instructions o Functions are reusable o They reduce the complexity of writing and maintaining programs o Help break a problem into logical chunks o Can be called as many times from different parts of a program o Can make calls to other functions written by the same programmer Lesson 3:6 Functions and Top-Down Design Definition and concept of top-down design is introduced in this lesson Top-Down Design o Helps manage complexity in a program o Leads to programs which feature multiple layers of abstraction o Relies on identifying sub-problems of a larger problem o Assists in identifying the layers of functions that will be used to solve a programming problem Lesson 3:7 & 3:8 Used APIs (Application Program Interface) or collection of commands available to a programmer for more options w/the Turtle Used a Library or collection of commands w/ a shared purpose Inserted Parameters or extra piece(s) of information to pass to our function to customize for specific purpose o i.e. moveforward(pixels) where (pixels) is a written description that indicates the value supplied needs to be the number of pixels o A Function Parameter gives input to a function and controls how the function runs Can be used to prevent the creation of duplicated code Help to generalize the solution of a specific problem 5

Lesson 3:9 Looping and Random Numbers Definition of Loops, For Loops and Iteration Function: Best when used for tasks that need to be repeated at different points in your program. When breaking down a problem, we use functions to group logical chunks of our solution. Loop: Best when used for tasks that only need to be repeated in one place in your program. 6