All Flashcards
What are the steps to generate a random number in Python?
- Import the
randommodule. 2. Use a function likerandom.randint(a, b)to generate a random integer between a and b, inclusive.
What are the steps to simulate rolling a six-sided die in pseudocode?
- Use
RANDOM(1, 6)to generate a random integer between 1 and 6.
What are the steps to protect against phishing attacks?
- Be suspicious of unsolicited emails. 2. Verify the sender's identity. 3. Don't click on suspicious links. 4. Use strong passwords.
What are the general steps for data analysis?
- Collect the data. 2. Clean the data. 3. Analyze the data. 4. Visualize the data. 5. Draw conclusions.
What are the steps to create a secure password?
- Use a mix of uppercase and lowercase letters. 2. Include numbers and symbols. 3. Make it at least 12 characters long. 4. Avoid common words or phrases.
What are the steps to represent an image in a computer?
- Divide the image into pixels. 2. Assign each pixel a color value (e.g., RGB). 3. Store the color values as binary data.
What are the steps to connect to the Internet?
- Ensure you have a network interface card (NIC). 2. Connect to a network (e.g., Wi-Fi or Ethernet). 3. Configure your IP address and DNS settings. 4. Test the connection.
What are the steps to declare a variable in Python?
- Choose a name for the variable. 2. Assign a value to the variable using the assignment operator (=). 3. The data type is automatically inferred.
What are the steps to write a basic HTML page?
- Start with
<!DOCTYPE html>. 2. Add the<html>tag. 3. Include<head>and<body>sections. 4. Add content within the<body>section.
What are the steps to protect your computer from malware?
- Install antivirus software. 2. Keep your software up to date. 3. Be careful when opening email attachments. 4. Avoid suspicious websites.
What are the differences between the Internet and the World Wide Web?
Internet: The global network infrastructure. | World Wide Web: A service that uses the Internet to access linked hypertext documents.
What are the differences between ASCII and Unicode?
ASCII: Represents characters using 7 or 8 bits. | Unicode: Represents characters using a variable number of bits (up to 4 bytes), supporting a wider range of characters.
What are the differences between positive and negative impacts of the Internet?
Positive: Increased access to information, global communication. | Negative: Privacy concerns, cybersecurity risks.
What are the differences between random.random() and random.randint() in Python?
random.random(): Returns a random float between 0.0 and 1.0. | random.randint(a, b): Returns a random integer between a and b (inclusive).
What are the differences between sequence and selection control structures?
Sequence: Instructions are executed in order. | Selection: Code blocks are executed based on a condition.
What are the differences between lossy and lossless data compression?
Lossy: Some data is lost during compression, reducing file size significantly. | Lossless: All data is preserved during compression, allowing for perfect reconstruction.
What are the differences between a client and a server?
Client: Requests services from a server. | Server: Provides services to clients.
What are the differences between a variable and a constant?
Variable: Its value can change during program execution. | Constant: Its value remains the same throughout program execution.
What are the differences between a compiler and an interpreter?
Compiler: Translates the entire source code into machine code before execution. | Interpreter: Translates and executes the source code line by line.
What are the differences between a firewall and antivirus software?
Firewall: Prevents unauthorized access to a network or computer. | Antivirus: Detects and removes malicious software from a computer.
How is random number generation applied in real-world scenarios?
Simulations, games, cryptography, and statistical sampling.
How is data visualization applied in real-world scenarios?
Business intelligence, scientific research, and public health monitoring.
How is cybersecurity applied in real-world scenarios?
Protecting financial transactions, securing personal data, and preventing cyber warfare.
How is the concept of variables used in a banking system?
Storing customer account balances, transaction amounts, and interest rates.
How are control structures used in traffic light systems?
To control the sequence and timing of traffic lights based on conditions (e.g., time of day, traffic volume).
How is HTML used in e-commerce websites?
To structure the content of product pages, shopping carts, and checkout forms.
How is data mining used in marketing?
To identify customer segments, predict purchasing behavior, and personalize marketing campaigns.
How is encryption used in online communication?
To protect the confidentiality of messages and data transmitted over the Internet.
How is the Internet used in education?
To provide access to online courses, research materials, and educational resources.
How is binary representation used in image processing?
Representing pixel color values for image storage, manipulation, and display.