λ³Έλ¬Έ λ°”λ‘œκ°€κΈ°

University of California, Berkeley/ElectricalEngineering & ComputerSciences

(48)
Conclusion A Trip Back Through 61A What is 61A ? - A course about managing complexity : Mastering functional abstraction and data abstraction : Learning trade-offs of various programming paradigms - An introduction to programming : Learning how to write programs in Python, Scheme, and SQL : Combining multiple programming techniques in large projects : Understanding how computers interpret programming langu..
CS Theory What is CS Theory ? Up until now, we’ve talked a lot about some different tools for approaching problems, but there are still a lot of questions left unanswered - What types of problems can we solve with computing? - What’s the most efficient possible solution? - How can we integrate other disciplines into computing? - What are other ways we can perform computation? CS theory involves thinking a..
Final Review https://docs.google.com/presentation/d/1IPfE2yPhpIr80SWfBycmeN521U6b69GolGUCjmX6Wok/edit?usp=sharing Final Review Final Exam Review Michelle D’Souza Ryan Moughan Cesar Plascencia Zuniga set-up : https://scheme.cs61a.org/ demo: (define (falsey val) (begin (print val) #f)) (define-macro (if-macro cond1 expr1 else expr2) `(if ,cond1 ,expr1 ,expr2)) ___ (define-macro (add docs.google.com ( Higher - ..
Week 8 https://cs61a.org/resources.html#past-exams CS 61A Summer 2019 Resources Welcome to the CS 61A resource page! Here's a resource workflow to help guide you through the many resources on this page and in this class. Click on one of the boxes to see the available resources. cs61a.org https://cs61a.org/resources.html#advice CS 61A Summer 2019 Resources Welcome to the CS 61A resource page! Here's a r..
Computer Security Function Abstractions Data Abstractions Programming Paradigms Control Lists OOP HOFs Recursive data structure Function Recursion Growth Declarative Computer Security - Web security : Are you on the website that you think you are on and does it do what you think it does? - Network security : Who can see what you are doing online? - Systems security : Who has access to software & data on your lapt..
SQL : The Sequel Table A table stores data. It consists of a fixed number of columns, data entires stored in rows. - To make a table in SQL, use a CREATE TABLE statement - To create rows of data, UNION together SELECT statements - To create rows of data from existing table, use a SELECT statement with a FROM clause Join - Given multiple tables, we can join them together by specifying their names, separated by co..
Declarative Programming Programming Paradigms - Up until now, we’ve been focused (primarily) on imperative programming. - Imperative program contain explicit instructions to tell the computer how to accomplish something. The interpreter then executes those instructions - Now, we’ll learn about declarative programming, where we can just tell the computer what we want, instead of how we want it done. The interpreter then..
Streams Streams Lazy Evaluation in Scheme Lazy evaluation - In Python, iterators and generators allowed for lazy evaluation - Scheme doesn't have iterators. How about a list? Streams : Instead of iterators, Scheme uses streams - Stream : (linked) list whose rest is lazily evaluated : A promise to compute - cdr returns the rest of a list : For normal lists, the rest is another list : The rest of a stream..