Method of protecting data often used when making online purchases
What is encryption
A programmer needs to change the word "blue" to "red" and "red" to "blue". They will use the word "grey" since it is not used in the program.
blue -> grey
red -> blue
grey -> red
Data that is transmitted over the internet
What are packets
x = 2
repeat 4 times:
x = x * 3
What is 2 * 3 * 3 * 3 * 3
In determining the best route to take on recent trip, a maps application gave the user three options based on traffic patterns, road construction, and roadways. This term refers to the method for choosing the best alternative among the three possible routes.
What is a heuristic solution
Sarah needs the Microsoft Office suite in order to complete her school assignments so she borrows her aunt’s software CDs in order to load another copy on her new laptop. What type of infringement has Sarah committed?
What is piracy
True or false: Every problem can be solved with computing and algorithms
What is false, example: the halting problem
Sources of this include satellities, medical records, digital libraries, user facing applications
What is big data