Study Guide for CSC 111 Final Exam (03 May 2016)
What’s on the test: (BOLD MEANS IMPORTANT) (Italics mean, pay attention)
- CRUCIFEM and how it would be applied to designing a website
- Algorithms and their properties
- Crowdsourcing
- logic tables - digital logic circuit
- binary to decimal - decimal to binary conversion
- Turing test
- Artificial Intelligence and its applications
- How to protect yourself online
1.CRUCIFEM- “HCI Design” (like when we made our bean counters)
C- Consistency
R- Redo (back button)
U- Usability
C- Completion
I- Internal Locus of Control- the appearance that the user is in control of going to webpage but behind the scenes, it’s the webpage that is allowing it
F- Feedback
E- Error recovery and prevention- fails gracefully or goes to error prevention/management
M- Memory Loading- it takes less conscious decisions on the user to access the site; it’s intuitive (like the “you have mail” icon)
2.Algorithms and their properties
-algorithm: a precise, systematic method for producing a specified result
-Everyone uses and invents algorithms all the time to solve problems
-The agent running the algorithm does not need to be a computer
-There are better and worse versions of many algorithms
Programs ARE Algorithms
-programs: algorithms that have been specialized to a specific set of conditions and assumptions
-usually written in a specific programming language
-usually the words program and algorithm are used interchangeably
Algorithms we have learned
-Placeholder technique
protect “good” letter sequences by replacing them with a placeholder
edit the “bad” letter sequences
restore the “good” letter sequences
-Binary to Decimal Conversion
if there is a 1, write down the place value for its position in decimal
add up those place values
-Binary Addition
add as in decimal but limit digit positions to less than two
Algorithmic Properties
An algorithm must have five properties:
1.Input specified- the data to be transformed during the computation to produce the output
2.Output specified- the data resulting from the computation (your intended result)
3.Definiteness- Specifying the sequence of operations for turning input into output
4.Effectiveness- all of the steps must be doable
5.Finiteness- algorithm must stop with either the expected output OR “no solution possible”
Algorithmic Facts
- Algorithms can be specified at different levels of detail
- Algorithms always build on functionality previously defined and known to the user
- Different algorithms can solve the same problem differently (different solutions can take different amounts of time/space)
3.Crowdsourcing
-Refers to solving a problem or achieving a goal by combining the contributions of a large, unconstrained volunteer population
-Wikipedia is perhaps the most famous of the crowdsourcing enterprises
-The goal is to build a database of all knowledge through a global effort
-So, what’s in it for the participants?
-It’s fun
-Earn points, win prizes
-Participants receive a sense of satisfaction that they are contributing to a project
-Many projects require skills that are more challenging than watching TV
4.Truth Tables (Logic Tables)
AND
(T and T is always T, F and F is always F, T and F and F and T is always F)
P
|
Q
| |
T
|
T
|
T
|
T
|
F
|
F
|
F
|
T
|
F
|
F
|
F
|
F
|
NAND (opposite AND) (N means NOT)
(T and T is always F, F and F is always T, T and F and F and T is always T)
P
|
Q
| |
T
|
T
|
F
|
T
|
F
|
T
|
F
|
T
|
T
|
F
|
F
|
T
|
OR
(T and T is always T, F and F is always F, T and F and F and T is always T)
P
|
Q
| |
T
|
T
|
T
|
T
|
F
|
T
|
F
|
T
|
T
|
F
|
F
|
F
|
NOR (opposite OR)
(T and T is always F, F and F is always T, T and F and F and T is always F)
P
|
Q
| |
T
|
T
|
F
|
T
|
F
|
F
|
F
|
T
|
F
|
F
|
F
|
T
|
5.Binary to Decimal and Decimal to Binary Conversions
Binary to Decimal (8 bits (columns) is a “byte”)-least “significance” number starting on right
128
|
64
|
32
|
16
|
8
|
4
|
2
|
1
|
1
|
0
|
0
|
1
|
1
|
0
|
1
|
0
|
128
|
0
|
0
|
16
|
8
|
0
|
2
|
0
|
Bottom row equals- 154
(154 is the decimal answer to the binary conversion of “10011010”)
*make up binary number
*Any column with a 1 gets the large number, any column with a 0 gets the 0
*FYI, usually a space in the middle btwn every 4 bits
Decimal to Binary Conversion
Decimal # we are converting is 154
128
|
64
|
32
|
16
|
8
|
4
|
2
|
1
|
1
|
0
|
0
|
1
|
1
|
0
|
1
|
0
|
26
|
10
|
2
|
0
|
*154 divides into 128 so 1 goes into first binary number (red)
*Subtract 154 from 128 and get 26
*26 can’t divide into 64, so it’s a 0, same with 32 it is also a 0
*26 CAN divide into 16, so it’s a 1 and 26-16=10, the next number
*10 CAN go into 8, so it get’s a 1, 10-8=2. 2 is the next number
*2 can not divide into 4, so it get’s a 0
*2 CAN divide into 2 so it get’s a 1, 2-2=0
*0 can not divide into 1, so it gets a 0
Binary Conversion Answer is 10011010
6.The Turing Test
-Two identical rooms (A and B) are connected to a judge who can type questions directed to either room
-A human occupies one room and a computer the other
-The judge’s goal is to decide based answers received, which room contains the computer
-If the judge cannot decide for certain, the computer can be said to be intelligent
Passing the Turing Test
-Turing’s experiment sidestepped the problem of defining thinking, and also got away from focusing on any specific ability such as performing arithmetic
-When Turing conceived the test, no algorithmic process was known for analyzing English, as word processor’s grammar checkers do today
-Computers are still a long way from being perfect
-Good enough at language tasks that we can imagine a day when computers are better than most humans
7.Artificial Intelligence
-To be intelligent, a computer has to understand a situation and reason to act on that understanding
-Actions could not be scripted (pre-programmed) or predetermined
-Systems would have to understand natural language and/or have real-world knowledge
8.How to Protect Yourself Online
-Turn off Bluetooth when not in use
-Keep your phone and other computers locked
-Do not automatically click on email attachments
-Never enter sensitive information in a pop-up
-Thinking of getting something for nothing
Think again
-Know where you’re going
-Be somewhat skeptical
-Use extreme care when visiting notorious sites
-Run “modern” software
-Install updates often
-Install anti-virus software
-Set your Wi-Fi router to security level of at least WPA2
-Password-protect your phones and computers with appropriate passwords
-Use your knowledge, be wise
-Backing up computer files is an essential safeguard
It ensures that your files will survive for a long time, even if you don’t want them to
-The Do Not Track flag should be set, and DoNotTrackMe should be installed to avoid third parties building a profile of your Web surfing behavior
-The best way to manage privacy in the Information Age is to have OECD-grade privacy laws
-Use Encryption for serious privacy/security- There are two key features to encryption: private key and public key techniques
If something really bad happens…
-Turn off your computer immediately
-Use a different computer to do a web search about what happened
-Use an external source for the OS to reboot
Thanks for the study guide. Mooo.
ReplyDeleteThanks for the study guide. Mooo.
ReplyDeleteHopefully it helps you! Moo back
ReplyDelete