click below
click below
Normal Size Small Size show me how
FCS Semester Review
| Term | Definition |
|---|---|
| Examples of Peripheral devices | Input devices include keyboard, mouse, digital camera, webcam, scanner microphones, game controller Output devices include printer, monitor, speakers |
| What is the difference between RAM and a hard drive? | RAM is like temporary storage or short-term memory of a computer. Hard Drive is like the long-term or permanent memory of the computer |
| What is Digital Etiquette? | Having good manners when online, even when not legally required to do so. |
| What an Acceptable use policy might contain? | It will contain rules that should be followed when using a network or service and governs the use of network resources. |
| List possible consequences of violating copyright law | - Prison time - Paying damages - Civil lawsuits - Fines - Court issued injunctions |
| List possible academic consequences of plagiarism or copying someone else's coding work. | - no credit for your work (zero) - penalties under a Student Code of Conduct - you will not learn anything |
| Purpose of a Copyright | protects the entire creative work |
| Purpose of a Patent | protects new inventions |
| What is the purpose of "fair Use" Rules | To let someone use part of a copyrighted work |
| Trojan Horse (Malware) | harmful software disguised as a normal file |
| What are peripheral devices? | hardware that attach to a computer, either physically or wirelessly. |
| What is an application? | Programs like word processors, databases, and video games. |
| Purpose of a Trademark | Protects the name, logo, or slogan of a product |
| Public domain software | is not copyrighted by the author |
| Freeware software | Software available free of charge, may be copyrighted by author |
| Shareware Software | Software available free of charge, may be distributed for evaluation, after which a fee may be requested, copyrighted by author |
| Open Source Software | Released under copyright license where the owner grants rights to use or distribute. May be developed by many users through open collaboration. Copyrighted by author |
| Ransomware (Malware) | must pay the hacker money to access your computer data |
| Spyware (Malware) | spies on the user to steal information like passwords |
| Virus (Malware) | harmful software that spreads to other computers |
| Worm (Malware) | harmful software that copies itself and spreads through mass emails |
| What are ways you can protect yourself online? | To prevent identity theft and protect your online privacy and security |
| MS Windows: | popular, proprietary software |
| Mac OS | know for graphical user interface, proprietary software |
| Linux | Open source software, free to use, |
| Apple iOS | used on Apple smartphones, ipads and tablets, proprietary software |
| What is a file association? | A link between a file extension and the application used to handle that type of file. It insures the application is opened when the file is double clicked. |
| Why might you want to change a file association? | To ensure that the correct application is used when you try to open the file. |
| Example of Sequence of Steps | Building a shelf using directions, following a cookie recipe |
| Examples of Selection/Decision/IF Statements | Fly or drive, curly fries or regular fries |
| Examples of Repetition/loop/iteration | Eating cookies from a box, moving items from one room to another |
| What is a flow chart? | It is a way to visualize the steps in a process. |
| What is an algorithm? | A specific plan or set of instructions designed to solve a problem |
| What is a variable (container) in programming? | A named area in computer memory that holds a value. |
| Common naming Conventions (snakecase) | snake_case |
| Common naming Conventions (pascalcase) | Pascal_Case |
| Common naming Conventions (camelcase) | camel_Case |
| Examples of String: | "hello" |
| Examples of Floating Point: | 44.3, -5.5, 9.4, .05 |
| Examples of Integer: | 5, -3, 0, 899, 432, 3 |
| Examples of Boolean: | True/false, yes/no question |
| Examples of List: | ["apple", "orange", "cherry"] |
| Examples of Tuple: | ("apple", "orange", "cherry") |
| Describe the input() function | An input parameter that asks the user a question and allows the user to input a value. prompt for a user to enter a value. |
| Describe the int(input()) Function | An input parameter that asks the user a question and allows the user to input a numeric/integer value. |
| How are Python statements executed when you run the code? | Python will run your program statements in order, from top to bottom |
| What is syntax | The rules on exactly how to format code. |
| Debugging | The process of identifying "bugs" or errors in computer programs and taking action to fix them. |
| What is a breakpoint? | A line of code that will put your program into break state. |
| Purpose of a breakpoint | to stop the code so that a programmer can check the logic of the code. |
| Logic Error | An error in your code that prevents the program from functioning properly, but it will still run. |
| Syntax Error | an error caused when your code is not formatted correctly. |
| Runtime Excepetion | An error that will completely halt (stop) the program from running. |
| logical expression | Logical expression in code have only two possible answers. They can be T/F or Y/N |
| Compare and contrast a list and tuple | - Lists can be changed (mutable) - Tuple contents cannot be changed after the tyuple is initialized (immutable) |
| How long will a "While"loop continue iterating? | As long as the loop's logical expression remains True |
| How do we identify statements that belong in the body of a loop? | Indent them the same number of spaces underneath the "for" statement. |
| What is the difference between "=" and "==" in Python? | == is used as a logical expression = is used in assignment statements to (assign a value to a variable) |
| What is the difference between the output for the following two lines of code: | print("pay" + "now") - paynow print("pay" , "now") - pay now |