DOC PREVIEW
Berkeley CS 61A - CS10 Su13 Midterm Review Session

This preview shows page 1-2-15-16-17-32-33 out of 33 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 33 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 33 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 33 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 33 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 33 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 33 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 33 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 33 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

CS10 Midterm Review SessionThings to Know● The midterm is from 7-9pm on Wednesday. ● The test will be given in 2050 VLSB● You can have two handwritten cheat sheets (8.5x11, front and back).● Clobber Policy: Your midterm score can clobber the Quest and if you do well the Final can clobber the midterm.ReadingsPre-Quest+How Moore's Law WorksFree Lunch is Over*BtB Chapters 1, 2, 4, 5, 6+Up to and including Internet LectureReadings●Big Topics:○Abstraction○Software is Eating the World○Video Games:■Games with a Purpose■Justices Split on Video Games○Programmed or Be Programmed○Moore's Law (and Free Lunch is Over)○Blown to Bits (Chapters 1-6, except 3)ReadingsMoore's Law:Number of transistors that can fit into a specific area will double every 18 - 24 months.ReadingsFree Lunch is Over:"Free lunch" refers to the fact that because processors continued to increase in speed, programmers did not have to worry about optimizing their programs.ReadingsFree Lunch is Over:Challenges for programmers:1)The slowing of single processor speed increases forces programmers to optimize their programs. 2) The move to parallel processing requires more complex code.ReadingsBBBTB Chapter 1: Main point: technology is neither good nor bad.Opportunities Vs. Risks Nuclear reactions & energy: Pros: creates electric power Cons: creates weapons of mass destructionThe Seven Koans -- what are they and why are they important?ReadingsBBBTB Chapter 1: Example: Koan6: "Nothing Goes Away"1.Data (bits) will all be kept forever, unless there are policies to get rid of it.2. The data sticks around.3. Because databases are intentionally duplicated—backed up for security, or shared while pursuing useful analyses—it is far from certain that data can ever be permanently expunged.4. The Internet consists of millions of interconnected computers; once data gets out, there is no getting it back.Readings7 Koans:1. It's All Just Bits2. Perfection is Normal3. There is want in the midst of plenty4. Processing is Power5. More of the same can be a whole new thing6. Nothing Goes Away7. Bits move faster than thoughtReadingsBBBTB Chapter 2: Privacy vs. Convenience Some examples: 1. Commuters using transponders in their cars. Convenience: quickly move through toll booths. Privacy concern: electronic records that are easy to track a unique user.2. Supermarket loyalty cards. Convenience: reduced prices. Privacy concern: tracking of purchases.3. Online shopping, e.g., Amazon. Convenience: shop in your underpants. Privacy concern: again, tracking.4. Social media. Convenience: sharing of information. Privacy concern: oversharing of information.ReadingsBBBTB Chapter 2: Privacy vs. Convenience Review paragraph:"Blundering, stupidity, curiosity, malice, and thievery are not new. The fact that sensitive data about everyone in a nation could fit on a laptop is new. The ability to search for a needle in the haystack of the Internet is new. Easily connecting “public” data sources that used to be stored in file drawers in Albuquerque and Atlanta, but are now both electronically accessible from Algeria—that is new too."ReadingsBBBTB Chapter 2: Privacy vs. Convenience Review paragraph:"Blundering, stupidity, curiosity, malice, and thievery are not new. The fact that sensitive data about everyone in a nation could fit on a laptop is new. The ability to search for a needle in the haystack of the Internet is new. Easily connecting “public” data sources that used to be stored in file drawers in Albuquerque and Atlanta, but are now both electronically accessible from Algeria—that is new too."ReadingsBBBTB Chapter 4: Search Engines Seven steps: ● Gather Information○ Spider crawling○ Anything about how frequently the spider visits the page based on how popular the site is.● Keep Copies○ Each page that is visited is downloaded and stored○ Caching○ Due to indexing, dangerous information that was once available can still be stored on someone elses hard-drive. → Hard to take back information that has once been released on the web,○ Lawrence Summers statement example on the Harvard Magazine.● Build an Index○ Same basic structure as chapters in a book○ Important because it makes finding pages much quicker● Understand the Query○ Yankees vs. Redsox example○ Ignore syntax○ Advanced queriesReadingsBBBTB Chapter 4: Search Engines Seven steps: ● Relevance of Each possible result○ Examples of how to calculate relevance■ Comparing words and their positioning between two different articles■ Longer documents have more relevance due to more word repetitions■ Larger font might be heavier● Ranking of the best relevant results○ Critical in making search useful○ One way is to put the one with the highest relevance at the top of the search results○ Google’s PageRank○ Number of references to other links related to the content on this page.○ Kinderstart examplekar○ Opinions vs. fact● Present the results○ Presenting in top-to-bottom list○ Advertisements/sponsorsReadingsBBBTB Chapter 5: What was so innovative about public key encryption (compared to previous encryption techniques) that made it have such a large impact? It allows two machines to securely exchange information without having any prior communication.Cipher is a method for transforming a message into an obscured form, together with a way of undoing the transformation to recover the message.(Review Caesar ciphers , substitution ciphers)ReadingsBBBTB Chapter 6: Digital Rights ManagementReview Sharing Goes Decentralized, CREATIVE COMMONS LICENSES, etc. What are the pros and cons of having digital rights protection?Readings●Big Topics:○Abstraction○Software is Eating the World○Video Games:■Games with a Purpose■Justices Split on Video Games○Programmed or Be Programmed○Moore's Law (and Free Lunch is Over)○Blown to Bits (Chapters 1-6, except 3)Any questions related to readings / programming now?For each of the practice problems, let's also consider the domain / range and the computational complexity.You're welcome to make helper blocks if you want to.Warm-up ProblemAdd all of the numbers that are multiples of 8 or 10 below a certain number and report the sum. ... recursively and iteratively!Practice Problem #1Determine whether a number is a prime number.Think about how to do it iteratively and recursively.Practice Problem #1Determine whether a number is a prime number.Think about how to do it


View Full Document

Berkeley CS 61A - CS10 Su13 Midterm Review Session

Download CS10 Su13 Midterm Review Session
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view CS10 Su13 Midterm Review Session and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view CS10 Su13 Midterm Review Session 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?