Exam 1 - CS MC
Chapters 1-3 from Lewis and Loftus - Java, 5th edition
Terms
undefined, object
copy deck
- URL stands for
- Uniform Resource Locator, which is used to specify particular documents and information for the web browser to display
- Too often this act is mistake for programming.
- Writing code. In most cases, the act of designing the program should be far more interesting and creative than the implementation part in which the code is actually typed up.
- What happens when you use the += assignment operator on strings?
- String concatenation, biznatch.
- When an Internet Address is referenced this software translates the words to the IP address to make the computers address more machine-manageable
- Domain Name System
- Invoking or calling a method
- Programmer does this when he wants the method to execute
- This is the commenting style for single line comments
- //
- When syntax errors are caught in the compilation, this doesn't occur
- production of an executable
- A GUI application is generally made by
- Creating components, adding them to a panel, creating a frame, adding the panel to the frame's content pane.
- During this special division operation, the fractional portion of the result is truncated.
- Integer Division.
- LANs and WANs
- LANs connect many computer nodes. WANs connect many LANs.
- This person was the inventor behind Java
- James Gosling at Sun Microsystems
- A single binary digit
- Bit
- These languages may have facility for automatic report generation or interaction with a database, they are also the most recent computer languages
- Fourth generation languages
- This class provides methods for reading input of various types from various sources.
- Scanner class.
- Benefits of a shared communication line
- Easy to add computers to the network without modifying the network architecture.
- These identifier words have a special meaning in a programming language and can only be used in predefined ways
- Reserved words. These can only be used for the one purpose they are predefined to be used for in the Java Language.
- These are a subset of Java applications, which only interact with the user through simple text prompts.
- Command-line applications
- Example of Data Transfer Device
- Modem (modulator demodulator), transfers information over the telephone line
- Program termination
- When it ends
- Comments should be well written in
- complete sentences. Avoid belaboring the obvious, and try and provide insight into the original intent of the code.
- Primitive Data
- represents very fundamental data elements such as numbers and characters and symbols.
- Panels and containers can be nested to create an intricate one of these
- containment hierarchy of components.
- These are potential characters that can compose an identifier
- $,_,letters, or digits
- Memory devices which are sequential access
- Tapes that need to be fast forwarded and rewound to access various memory locations on the device(like a VHS (video) tape)
- With the flexibility of white space, there are an infinite number of coded programs that
- Execute in the exact same manner. This means you need to have an organized manner for using white space to express your program solutions in a readable manner.
- Pixel
- Picture element. They are arranged in a cartesian grid, that differs from the traditional grid in that the (0,0) position is on the top left of the window/screen.
- What types of conversions are possible in assignment conversions?
- Only widening conversions.
- Comments are ignored by the
- computer and compiler. The code runs as if the comments were never there.
- Examples of Analog Information
- Mercury thermometer, stereo amplifier.
- Function of Inheritance
- To allow class definitions to build off one another, and reuse previously made code. Derived classes can be distinct from the higher level classes.
- It is advised to consider alternative approaches at this time, as it makes it easier to modify our approach.
- Earlier on in the development process. Think about it, as you are building a house, and after you have already laid down the foundation and the structural skeleton of the house, you decide on a different design, you would have to scrap all that material and work, and restart which amounts to a lot of waste.
- A character set is sort of like an array
- In that every character is assigned a number, and that number aids in determining alphabetical (alphanumeric) ordering, for example with the String class, compareTo method
- The Protocols that govern the movement of messages on the internet
- TCP/IP or Transmission Control Protocol/Internet Protocol
- Function of Internet Protocol (IP)
- Defines how information is formatted and transferred from the source to the destination.
- This is the language that the source code is translated to in compilation
- Target language
- Are identifiers case sensitive?
- yes
- OOP makes solving problems easier because
- it allows us to map objects to real entities we are talking about, like employees, bank accounts, students, etc.
- How the speed of a disk drive is measured
- In multiples of x or 153,600 bytes of data read per second.
- Cons of a shared communication line
- Introduction of delays in communicating on the network. This means that the computers on the network have to take turns sending messages to each other.
- Examples of uncommon IO Devices
- Bar code readers, joy sticks, microphones, virtual reality devices, scanners, plotters, goggles
- Identifier names should be
- descriptive and readable.
- The speed of the system clock is a rough measure of
- How fast the CPU executes instructions.
- This value represents the ordered value of a particular value in an enumerated type class.
- Ordinal value.
- Computer semantics are unambiguous because
- a computer cannot decipher a meaning from two possible values
- Main Memory is
- Volatile or dependent on electrical power
- What is one principle difference between the execution of an application and an applet?
- Applets don't contain main methods.
- Every computer on the internet operates one of these, which maintains a list of all computers at that organization and their unique IP addresses
- Domain server, this works sort of like a telephone directory/book, in which you give the system a name, and the book returns a number/address
- Java follows a well-defined set of these which governs the order in which operators will be evaluated in an expression.
- Precedence rules.
- This is the protocol for most documents on the web
- HTTP (HyperText Transfer Protocol)
- Inline Documentation
- Comments included within a programs code
- Base value for CD ROMs and CD Rws
- Binary
- Program Development
- The writing of a program and the fixing of errors that come up along the way to getting functional intended executable code.
- Because Java is like this, we cannot assign a value of one type to a variable of an incompatible type.
- Strongly typed.
- Sampling Rate
- The number of digital information measurements per second, or period of time.
- This is how the WWW and the Internet are different
- The Internet is a network of networks which individually are a network of computers. The Internet is essentially the hardware of the Global Information System. The Web is the software component of the GIS, which allows easy transfer of information. It is important to note that the web could exist without the Internet, just simply operating on a LAN or even a single computer displaying HTML documents.
- Binary values in electric circuits
- High volatage (+5 volts) represents a binary 1, low voltage (-5 volts) represents a binary 0
- Are stylistic naming conventions Java rules for naming identifiers?
- No, but they are used for making your code more readable for the human programmer. They are considered "good programming practice".
- Program design and coding involves
- breaking a solution down into manageable pieces. First we design separate pieces that are responsible for certain parts of the solution, then we integrate the pieces together to form a complete solution.
- Signal Degradation
- Occurs as information is passed down a wire. This occurs for both digital and analog signal, but the information loss is less severe in digital storage.
- Java's predefined colors have corresponding RGB values.
- True. The same color can be referenced in one of two ways, the Color class's predefined color, or the RGB value. The color class only has a dozen or so predefined colors, however.
- Attributes of an object
- collectively define its current state (of being). These attributes can be objects or primitives. Just as a football player might have the object attribute of sponsor brand or type of padding used, he also has primitive attributes like shoe size, jersey number, and top speed.
- Components of a GUI
- Windows, icons, pull-down menus, scroll bars, buttons
- Java was brought to market this year
- 1995
- These softwares consist of a set of tools which aid in creating, testing, and modifying a program.
- Integrated Development Environments
- This is a special type of GUI component which is used to hold and organize other GUI components
- Container
- Random Access
- The memory access mechanism which allows immediate access to various positions in memory.
- Data transfer devices
- Allow information to be sent and received between computers
- WAN stands for
- Wide Area Network
- These languages are far removed from the machine language which is ultimately executed
- High-level languages
- LAN stands for
- Local Area Network
- 0s and 1s are the identifiers used in this type of computer language
- Machine Language
- Is RAM ROM?
- No, RAM is Read Write memory.
- Each computer on a network has its own
- Network address which uniquely identifies it
- Function of Encapsulation
- To allow objects privacy over their own information. Just as Masi's house is encapsulated by the gate at her house, and can only be accessed/modified with the password, similarly, attributes of an object should have gates, which can only be opened with a password, in this case getter and setter methods.
- All high-level language code, or code above the binary machine language must be
- translated to machine code prior to execution, by the machine.
- The google.com portion of an Internet Address is referred to as the
- Domain name, which indicated the organization to which the computer at that internet address is being hosted
- The portion of an Internet Address that is underlined here: http://www.google.com/mail/
- Top Level Domain, this usually defines the type of organization to which the computer or network belongs. Com is used for commercial computers, edu is used for educational computers, org is sometimes used for non-profits, and most of them are intuitive
- Storage capacity of memory is measured in
- The total number of bytes. You will see Kilobytes, Megabytes, Gigabytes, and Terabytes.
- Netbeans and eclipse are developed by
- Sun and IBM respectively
- The 8 primitive data types
- Boolean Char Byte Short Int Long Float Double
- What is a heavyweight container?
- One that is managed by the underlying OS.
- How do we apply the formatting of a NumberFormat instance?
-
.format( ); - Example of ROM
- CD-Rs
- This is similar to a compiler, except it interweaves the compiling and execution activities
- Interpreter
- Examples of syntax rules are
- Class definitions and method definitions begin and end with a curly brace. Identifiers cannot begin with a digit.
- Multiple consecutive memory locations used
- In the case when you have a large unit of memory needed to store the object in question
- This text uses Java as a means to what ends?
- Learning the underlying computer science/software development concepts. Along the way you will pick up some Java as well.
- These types of errors are distinct from compile time errors or run-time errors, in that they are the result of mistakes in articulation by the programmer
- Logical errors.
- What is the output for: System.out.print ("Zero... "); System.out.println ("Liftoff!");
- Zero... Liftoff!
- These tools are found in most IDEs
- Compiler, interpreter, debugger, documentation generator, archiving tools, tools which helps you visualize your program structure
- The difference between named constants and variables is that
- the former holds the same value throughout the duration of its existence, where as the latter can change its value over the course of its existence
- Our primary goal in programming is to
- solve problems.
- Interface
- This is the only part of a piece of software which the user interacts with, hence this essentially is the software for the user. This is part of the software the user sees.
- 4 groups of computer languages:
- Machine Language Assembly Language High-level Languages Fourth-generation Languages
- Function of the Operating System
- Provide a user interface which allows user to interact with the machine; manages computer resources such as main memory and CPU; determines when programs are allowed to run, where they are loaded into memory, and how hardware devices communicate; it generally is supposed to make the computer easy to use and make it run efficiently
- This consists of identifiers separated by dot characters, such as System.out.println()
- Name. A name consists of identifiers conjoined by the dot character.
- Components of a Network
- 2 or more computers and a cable (or wifi) connection between them by which they can exchange information
- A complete picture is stored by
- storing the color of each individual pixel.
- Base value of a number system
- Indicates how many digits we have to work with and the place value of each digit in a number.
- GUI
- Graphical User Interface
- 3 software development tools
- Editor Compiler Interpreter
- Computer Software
- Anything that is part of a computer system and is intangible.
- Function of Input Output Devices
- Allows a human being to interact with the computer
- Software that makes information sharing across a network easy
- World Wide Web
- These are sometimes called nonprinting or invisible characters because they do not have a specific symbol that represents them.
- Control Characters such as carriage return, null, and end of text marks
- Is a frame a lightweight component?
- No. It is a heavyweight.
- A binary 1 on a disk is represented by
- A microscopic pit pressed into the disc, which is read by a reflective laser.
- Controllers
- Aid in the transmission and translation of peripherals information on the computer system.
- These classes are generally used when we want a primitive to behave like a an object reference.
- Wrapper classes.
- Programming Statements
- The instructions that are carried out when the program is executed.
- These are delimited by a set of curly braces
- Class definitions and method definitions (along with a lot of other things like control structures, selection statements, repetition statements...)
- Relationship Between Main Memory, Secondary Memory, and the CPU
- Software stored in the Secondary Memory is loaded into the Main Memory, and is then executed by the CPU, until all the individual commands have been completed
- Demagnetized areas represent
- A binary 0
- This is a list of characters in a particular order which defines the valid values for the character variable.
- Character set
- Number of Significant Digits in a Float Data Type
- 7
- Deprecated
- These are elements of the programming language which have essentially evolved out of use/style, example of this is the java.awt package, and its replacement javax.swing
- ROM memory
- Cannot be altered once information has been written to it.
- Examples of IDEs include
- Netbeans, Eclipse
- This is the commenting style for the multiline javadoc
- /** */
- Peripherals
- Hardware components of a computer system other than the CPU and the Main Memory. It includes hard disk, monitor, and floppy disks, secondary memory and input/output devices.
- These are the three major groups of the Java 2 Platform
- Standard Edition (J2SE), Enterprise Edition (J2EE), Micro Edition (J2ME)
- Function of White Space
- To make the code more readable. The computer ignores white space in all cases, except when it is used to separate identifiers and names
- 2 popular character sets include
- ASCII and Unicode
- These are used within strings to output special characters and white spaces
- Escape sequences
- OOP helps us solve problems, which is the purpose of
- writing a program
- Casting is a form of
- unary operation
- Robust code
- Code that has as few run-time errors as possible.
- Origin of "white space"
- When you look at a printed piece of text, the white space is that which is between all the black printed text on the page.
- Alias for GUI
- Point and click interface
- Alias for the Sun Java Software Development Kit
- Java development kit, JDK, SDK
- Example of Input Output Devices
- Keyboard, Mouse, Monitor, Printer, Microphone, Speakers
- 3 types of errors in writing software
- Compile-time error Run-time error Logical error
- This computer is used to provide access to web documents from web browsers
- Web server
- Clock speed
- The rate at which the electronic pulses occur, coordinated by the System clock.
- What is the primary distinction b/w the Jpanels and the Jframes?
- The former can not be displayed on its own. It must be added to another container to be displayed. The latter can be displayed on its own.
- Manner in which Digital Computers Store Information
- All information is stored as numbers. Images, audio, text, color, and computer programs are all stored in memory as numbers.
- Is a panel a lightweight component?
- Yes.
- Before you can create any objects you must
- define a class.
- Computer Hardware
- Anything that is part of a computer system and is tangible.
- This is a unique conversion which automatically converts between primitive values and corresponding wrapper objects.
- Autoboxing and its reverse function, unboxing.
- Function of Documentation
- To make the computer code more readable by humans
- What does the following method from the scanner class do? Scanner useDelimiter (String pattern)
- Set's the scanner's delimiting pattern
- Analogy for Packets on a Single Transmission Line
- A shared conveyor belt that users of it must share. Each user puts one item on at a time, rather than his entire collection.
- 5 step process to problem solving
- 1) Understanding the problem 2) Designing a solution 3) Considering alternatives to the solution and refining the solution 4) Implementing the solution 5) Testing the solution and fixing any problems that exist
- Run-time errors are aliased with errors that
- crash the software.
- General rule for how storage capacity grows
- Storage capacity doubles every 18 months. This may change as the growth approaches physical limitations.
- Digital Information
- Breaks source information down into discrete pieces and represents each of the pieces as numbers.
- File server
- A computer in a network that has a lot of secondary memory and can hold programs and data which are used by more than one computer on the network
- Are the syntax of C and C++ and Java similar?
- yes
- Polymorphism
- used for doing things with multiple objects
- Function of Floppy Disk
- Portable secondary memory
- What does the following method from the scanner class do? Boolean hasNext()
- returns true if the scanner has another token in its input
- Doing this to data leaves it intact in memory, but an assignment statement overwrites the old data.
- Accessing/getting data.
- The Internet Protocol Address is often substituted by an
- Internet address, such as www.google.com/mail
- Various Types of Registers
- Instruction register, program counter
- This was the original Java GUI package
- java.awt, or the Abstract Windowing Toolkit
- Java Standard Class Library
- Software which accompanies the Java Programming Language which makes the following jobs easier: creating graphics, communication over a network, and interacting with databases
- Programming Language
- This is the language in which programs are written. It uses specific words and symbols to express the problem solution, which makes computers useful. It defines a set of rules that determine exactly how a programmer can combine the words and symbols of the language into programming statements, which are the instructions which are carried out when the program is executed
- What are the three ways conversion between data types can occur
- Assignment conversion Promotion Casting
- A special method which defines the commencement of a program, where all the processing begins
- Main Method
- This class is used in this package to define colors for graphical elements in Java.
- Color class, java.awt package.
- A computer must be able to do what in order to carry out the instructions.
- Understand the instructions.
- Function of Main Memory
- To hold the software in memory while the CPU is processing it
- Bit permutations
- 2^N permutations for every bit. Each bit permutation represents a possible entity which can be represented by one of the 2^N combinations of 1s and 0s, where N represents the total number of bits.
- Application software
- Practical applications like Quicken, MS Office, Instant Messenger. Generally, all software besides the system software is this.
- This is the dominant approach used in commercial software development
- Object oriented programming
- In Java, colors are referred to by their
- RGB value, or the value of their three components of Red, Green, and Blue
- Function of the CPU components
- Control Unit - coordinates the processing steps; Registers - provide a small amount of storage space in the CPU itself; Arithmetic/Logic Unit - performs calculations and makes decisions
- During floating point division, the decimal value is
- retained.
- How is the NumberFormat class instantiated?
-
We learned 2 ways NumberFormat
= NumberFormat.getCurrencyInstance(); NumberFormat = NumberFormat.getPercentInstance(); - Unary operators
- Have only one operand. It is generally used for negative numbers, or negative a value of an expression. The (+) and (-) operators can be unary or binary. As unary operators they represent positive and negative numbers, and as binary operators they represent addition and subtraction.
- What package defines all the wrapper classes?
- java.lang
- Memory allocated to each memory location
- 8 bits or 1 byte
- Characteristic of von Neumann architecture
- Storing both program instructions as well as data on main memory, as well as the Fetch-Decode-Execute cycle.
- All visible elements of a Java interface are displayed in the frame's
- content pane.
- Monitor Resolution
- The number of pixels a monitor can display
- Picture Resolution
- The number of pixels in a photo.
- Every computer on the Internet has a unique
- Internet Protocol Address (IP Address)
- These are combinations of operators and operands used to perform a calculation
- expressions
- Types of white space
- Tabs, new line characters, and blanks.
- ROM stands for
- Read Only Memory
- This method is used primarily as support for migrations of legacy systems to Java, for formatting output
- printf method
- Techniques for storing and managing information
- Digital and analog
- Every color can be represented from a combination of these three colors
- Red, Green, and Blue
- Most of the information we manage in a program is represented by
- Variables.
- 3 categories of identifiers used in writing a program
- 1) Words that we make up when writing a program (names of objects and variables and classes and methods) 2) Words that another programmer chose (Java Standard library classes, code borrowed from another programmer to fulfill a function) 3) Words that are reserved for special purposes in the language (public, static, void, class, main, double, int, return, while, switch, this, true...)
- This formatting is used for most documents on the web
- HTML
- Analogy b/w human languages and computer languages
- Just as someone can communicate the same solvent driving directions in Spanish, Hindi, English, or Japanese; a computer can conduct a program solution, like a spreadsheet, in any assortment of computer languages like C, Ada, Smalltalk, or Java. The difference is the particular statements/syntax/and organization of the statements, but as long as the computer can understand (compile/run) those languages, then the spreadsheet will do the same thing.
- Program termination ends when
- The last line in the main method ends, unless you use a special command like System.exit(0)
- The mail.google.com portion of the Internet Address is referred to as the
- Subdomain, which is used to uniquely identify a network or computer within the organization which hosts the main domain name
- The wwww.google.com indicates
- we are dealing with a web server computer
- Hard Disk components
- Magnetic disks and read write heads
- These are the fundamental elements that make up a program
- Objects
- Graphics context
- these are passed into the paint method used especially in applets. Each one of these has their own coordinate system.
- An object is defined by this
- A class. Think of a class as an architectural blueprint for a house. The blueprint defines the fundamental aspects of the house, and can go into as much detail as the architect would like to. The key point is, that once the blueprint has been drawn up, several houses can be built using it, and will fit the model it has delineated.
- Legacy Systems
- These are like how the IRS supports their databased on Fortran and COBOL, despite much newer programming languages and programming paradigms. Maintaining these legacy systems is often expensive, but migrating them to newer software would often be even more expensive.
- The initial hype about Java was due to
- The fact that Java was the first programming language developed to be incorporated with the web. Nonetheless, Java is still a fully capable programming language outside of web applets. It is an Object Oriented Programming language.
- Before an applet can be viewed in a web browser you must
- compile the applet into bytecode (.class file)
- Main components of a computer system
- Central Processing Unit (CPU) Input/Output Devices (I/O) Main Memory Secondary Memory
- Widening and narrowing conversions are based on the
- number of bits in the source data type and the number of bits in the destination data type
- This is a name for a memory location used to hold a value of a particular data type.
- Variable.
- System clock
- Generates an electronic pulse at regular intervals, which synchronizes the events of the CPU.
- The base value in a binary system
- 2
- Control Unit Coordinates
- The information in memory and the information in the registers. It also coordinates the calculations performed by the arithmetic/logic unit on the data stored in the registers.
- Main Distinction of Software
- System software and application software
- What is a lightweight container?
- A container that is managed by the Java program itself.
- Can an enumerated type be declared within a method?
- No.
- Examples of Common I/O devices
- Monitors, printers, keyboard, mouse, speakers
- Components of CPU
- Control Unit, Registers, Arithmetic/Logic Unit
- What must we append at the end of long assignments?
- an upper or lowercase L
- A mnemonic to remind us that the programmer is responsible for the accuracy and reliability of a program.
- Garbage in, garbage out.
- Examples of promotion conversion
- When floating point division occurs between a float and an integer variable, the integer variable is first promoted to a float, and then the division carried out. Concatenation with a String and a number, first the number is promoted to a String, then the concatenation takes place.
- Components of Main Memory
- Memory location and memory address
- Examples of GUI containers include
- Frames and panels
- The methods of the Java.lang package needn't be defined in classes that
- Use it, that is because that standard package is automatically imported/included in every java class.
- A high-level language insulated programmers from needing to know the
- underlying machine language for the CPU on which they are working. And in the case of JAVA, allows CPU independent code.
- What is the javadoc?
- Tool which automatically generates external documentation about your program
- What must we append at the end of float assignments?
- an upper or lowercase F
- Class names follow this naming convention
- Title case, uppercase the first letter of each word
- Common uses of ROM devices
- Embedded into the circuit board to provide preliminary instructions needed when the computer is turned on.
- Alias for Random Access
- Direct Access
- This is a group of programming statements that is given a collective name
- Method/function
- The second evolution of computer languages arose due to the human difficulty to comprehend and think in terms of Machine language. This evolution was called
- Assembly Language. It used mnemonics of human words to replace binary digits. Problem with Assembly Language is that it can not be directly executed by a machine, it must first be translated to machine code/language.
- Applet classes must extend and import what?
- the Japplet class in the javax.swing package
- Function of the CPU
- Execute individual commands of a program
- Restrictions on identifiers
- Cannot begin with a digit, can be of any length
- These classes must be declared as public.
- Applet classes
- Network packets
- How information is broken down in a network, to allow information to travel between nodes simultaneously.
- A black and white picture can be stored with each pixel represented by
- a zero for white and a 1 for black.
- The web is based on this technology which is best exemplified by
- Hypertext and hypermedia, the best example of the original concept in action is at wikipedia.com, in which the flow of ideas is NOT linear at all, and the reader can follow whatever path of knowledge is of interest to him. Our textbook for example, is highly NOT in the spirit of the web.
- Comments should provide insight into the programmer's
- Original intent. The comments are the only section of the program, where the programmer can explain his thought process independent of the code of the program. The alternative is to create separate documentation files, like you might see in a ReadMe file or a Bug Report file.
- Can booleans be converted to other data types?
- No, and the reverse is also not true.
- Every container is managed by a
- layout manager, which determines how the components in the container are laid out.
- These languages are closest to the computers native language.
- Low-level languages
- This is the commenting style for multiline comments
- /* */
- Protocol
- A rulebook that governs how two things communicate
- Computer Architecture
- Describes how the components of a computer are put together
- Machine Language is coded to operate with
- A particular CPU. This is the most atomic level of computer instruction we have.
- The function of a GUI label
- To display text and/or image. Usually they mark other components, or display information.
- Graphical User Interface
- The user interface for most modern operating systems and applications
- The base value in a decimal system
- 10
- Open Source Software
- Software which has many developers contributing to it and which has its code freely available
- RAM is a form of
- Main Memory
- This was the first GUI web browser
- Mosaic and it came out in 1993, the people behind Mosaic, eventually went on to develop netscape.
- Adherence to syntax rules are checked when?
- During compilation.
- Information can be lost only in a narrowing conversion.
- False, it can also be lost in a widening conversion, in which an int like a long is converted to a float like a double, in which precision may be lost.
- Magnetic materials
- Are effective for storing digital information as they can be polarized to one extreme or another, but intermediate values are hard to distinguish.
- This is the code that originates from the software developers work
- Source code
- The component the CPU is constructed on
- Microprocessor
- Binary computer systems
- More convenient and inexpensive given our hardware. Other base value computer systems have also been invented.
- An alias for run-time errors is
- exceptions which can be caught and dealt with accordingly
- The types of GUI components are
- labels text fields buttons scroll bars menus
- Methods of an object
- Define the potential behaviors of that object. A car would have to have accelerate, break, air conditioning, cruise control, adjust chair, pop trunk, etc.
- Function of Transmission Control Protocol software
- Manages problems such as packets of information arriving out of order and packets getting lost, which can happen if too much information converges at the destination at once.
- Bus
- A wire on which computer information travels
- Point to point connection
- Network model in which each computer on a network is connected to every other computer on the network. If there are 5 computers on this kind of network, each computer will have to have 4 cables running from its base unit to the other 4 computers on the network.
- The type of network the internet is
- Wide Area Network
- Semantics
- Define what will happen when a programming statement is executed. Programming languages are generally unambiguous, which means there is only one way to interpret what will happen for executing a given programming statement. Human languages on the other hand, have very ambiguous semantics, which means, they can be interpreted in a dozen different ways.
- A Scanner object processes the input like this, based on the methods used to read the data and the delimiters used to separate the input values.
- One token at a time.
- Every object has
- a state and a set of behaviors. The state is the "state of being" of an object, fundamental characteristics that define it at any given point in time. The behaviors consist of activities the object might engage in. For a football player, the state might include his injury status, his bench press max, his speed in the 100 meter dash, and his behaviors might include touchdown dance, sprint, spin, dive, and tackle.
- Good documentation is important for longevity and cooperation of programmers. Why?
- When programs are initially written, the meaning of each line and its relation to the overall program is very clear to the programmer working on the program. However, once the job has been done, the programmer will likely forget that nuanced understanding he initially had when creating the software in the first place, as it has become more of an application. At these times, you need good documentation, to quickly fill in the details of the program's code. Also, over the lifetime and use of a piece of software, many developers might end up using and maintaining it, and if the code is completely illegible or unintelligible, than it will make their job a ton harder in maintaining and modifying the code, or even making sense of it, that is unless good documentation, and self-describing code is utilized.
- Analog Information
- Continuous and in direct proportion to the source of the information.
- Syntax
- Each programming language has its own unique syntax which determines how the vocabulary elements can be combined to form statements/instructions
- Examples of Operating Systems
- Windows XP, Windows Vista, Linux, Unix, OS X
- The 2 types of Java Programs and their distinction
- Application and an Applet. A Java application is a stand-alone program that can be executed on any Java Interpreter. An applet is a program intended to be used within HTML documents, and viewed with Java-ready web browsers. Applets are intended to be easily distributed over networks and viewable in web browsers, but that needn't be the case. The SDK comes with an appletviewer, which allows you to run applets similarly to how you run applications.
- Contrasted Access with Random Access
- Sequential Access
- This defines the boundaries of the problem we are trying to solve. It helps us programmers stay focused on what we are trying to accomplish, rather than falling down rabbit hole tangents or solving problems we didn't initially care to solve.
- Problem domain. If we wanted to write a program for Madden '09, the problem domain would be NFL football.