我的csi review,里面包含了我觉得所有能考的概念。做个小参考把

bbrother_bbrothe

新手上路
注册
2004-03-10
消息
1,724
荣誉分数
8
声望点数
0
1. Hardware
Difference between Ram and Rom
RAM ? non permanent, ROM ? permanent
RAM ? memory for programs, ROM ? Boot information
RAM ? Read/Write, ROM ? Read Only


Three Parts of CPU
?Central Processing Unit (CPU) has three basic parts

•Arithmetic Logic Unit (ALU)
?executes all the arithmetic and logic instructions
•Control Unit
?decodes instructions and determines which is next to be executed
•Buses/Registers
?Buses are paths for information entering/exiting the CPU
?Registers are memory for processing information

Formatting (tracks are not recorded)
•checks for bad sectors
•records boot program in boot record
•initializes directory
•sets aside space for FATs


Input and Output Devices
vInput Devices (Get information)
?Keyboard, Mouse, Scanner
vOutput Devices (Give information)
?Screen, Printer, Speaker
2. Software
Four generations of programming languages
?1st generation
•machine language (0’s,1’s)

?2nd generation
•assembly languages (low-level symbolic languages)
•instructions coded using letters & numbers

?3rd generation
•high-level symbolic languages

?4th generation programming languages
•non-procedural languages



Differences between data and files
?Data Files
•created by the user of the computer
?My_Thesis.doc, Assign1.xls
?Program Files
•created by a programmer
?Word, Excel, Windows98


3. Operating System
Functions of Operating System
vOperating Systems
Organize files
Load/Run Programs
Communicate with Peripherals


Why windows is better than MS-DOS (Four reasons)
?Graphical user interface (GUI)
?Multitasking
?Uniformity among applications
?Object linking and embedding

4. Networking
How does information go from here to there (3hardware and software components that make up a local are network)

Cable (medium)
Network Card
Workstations
Servers
Network Operating systems
Network Protocols

What are the first 3 parts of a URL, and what is its function within the URL? (6 marks)

Part Function
Communications type (http://) Type of information to be read
Computer (www.uottawa.ca) Where on the internet it is
File Location, name, type (index.html) The exact file on the computer

TCP/IP (Transmission Control Protocol/Internet Protocol)
File transfer protocol (FTP)
Modem : Converts digital signals into analogue form
Network interface card: It specifies the data transmission rate, the size of message units, the addressing information for each message, and the network topology.
LAN (local area network)
Workstations, Servers, Lines, Network interface card, Token.
Functions of serve
?file server stores shared programs and data files on a large hard disk
?print server controls a shared printer
?communication server controls access to other networks

5. Office

Name two (2) things that can be done to a Word document, to change its overall page count without changing the content. (3 marks)

Change Font Change L/R Margins Change line spacing
Change paragraph spacing Change T/B Margins Change Font Size

In Excel, what does the following formula mean?
=SUM(shop1!a2,shop2!b3)

Add the values A2 from worksheet Shop1 to B3 from worksheet Shop 2

ROUND(number, num_digits)
?round the given number, to the desired number of digits
•=ROUND(3.14159, 1) = 3.1
•=ROUND(3.14159, 3) = 3.142
•=ROUND(3.14159, 0)= 3



Differences between PASTE/LINK/EMBED

When Excel worksheet becomes a Word table or Word text becomes text in an Excel worksheet cell, how do we paste information?


Embedding (埋入)
Choose Paste Special from the Edit menu
?select the Paste option button
?select the type of object from the list


Result: The destination program cannot edit the information
Advantage The functionality of the source program is retained

Only can change the information embed, not the source informaiton

Linking
Choose Paste Special from the Edit menu
?select the Paste Link option button
?select the type of object from the list


Advantage: When information is changed in the source, it is automatically updated in the destination since there is only one real version of the object

If u want to change, the source documents will be opened, changing the source information and linked information at the same time.

vPaste, Embed or Link?
?paste objects that you will never want to change
?embed objects that you will want to edit later
?link objects if you want several programs to share the same version of an object


Algorithm and Visual Basic

What is one difference between the data type "double" and "long" (2 marks)


Double Real Number, Long is Integer, Number of bytes stored (Double 8, Long 4), Ranges (Double 10^300, Long 2 trillion)


What are the 6 basic tasks a computer can do, which would be the basis for writing an algorithm or computer program? (6 marks)

Input/Get Information
Output/Give Information
Storage
Math
Logic
Repetition

Data Types
vSINGLE (4 bytes)
?Real numbers
•± 10^30 with 7 significant digits of accuracy
vDOUBLE (8 bytes)
?Real numbers
•± 10^300 with 15 significant digits of accuracy
vCURRENCY (8 bytes)
?Real numbers
•4 digits to the right of the decimal point
•15 digits to the left of the decimal point
vDATE (8 bytes)
?Storage of specific dates
•Jan 01, 100 to Dec 31, 9999
•vSTRING (1 byte per character)
?Up to 2 billion characters per string
•Use the * symbol to denote size
•Some numbers should be defined as strings
?Student number, SIN, telephone number










Security
vDefinitions : Viruses and Trojans
VIRUS is an autonomous program that modifies the normal operation of a computer system (normal is what it was before the insertion of the virus).
è To be effective, a virus should : 1 ? Propagate itself
2 ? Replicate itself before it reveals its presence
by its destructive effects
3 ? Be able to affect the normal operation of the
computer systemF A TROJAN virus is one that is hidden inside another program


Protection:
vThree Types of Detection :
1 - Scanning a file for known viral code
2 - Comparing the mathematical characteristics of a file with a previous, clean version (a simple comparison criteria is the length of the file in bytes)
3 - Heuristic scanning of a file which involves intelligent analysis of the code (looking for suspicious instructions such as those which modify disk partitions or the file allocation table)


SPYWARE
Through a network connection : there are currently 2 types of spyware : Passive and Active Spyware
- Passive Spyware "listens" to what the spied user does
- Active Spyware is designed to gain control of the victimized computer

Thanks to supports from Pauline,小贵儿,琳琳。
 
我这个主要是根据老师的review做的,做的比较详细,其中有老师口头说的,但是slide上没有
 
天呢! 神了 要我说什么好呢!
 
想问一下 那个JAME说 概念题是只考选择的吗? 还是ESSAY QUESTION啊?
 
最初由 great_day 发布
想问一下 那个JAME说 概念题是只考选择的吗? 还是ESSAY QUESTION啊?

应该不会像MIDTERM似的,就应该靠选择题,因为咱们SAMPLE上没有ESSAY
 
他真的很服 认识你是我路道粗!
 
顶!新一任学习委员!等开了学习子版选你作版主哈哈!
 
最初由 爱狐狸的狼 发布
顶!新一任学习委员!等开了学习子版选你作版主哈哈!

对!!!学习委员!!
 
后退
顶部