ALGORITHMS
DIGITAL INFO
INTERNET & NETWORKING
CYBERSECURITY
IMPACTS OF COMPUTING
100

What is the name for a step-by-step process used to solve a problem?

An algorithm

100

What is the smallest unit of data in a computer called?

A bit

100

What protocol is used to load websites in your browser?

HTTP (or HTTPS for the secure version)

100

What do you call software designed to damage or gain unauthorized access to a computer?

Malware

100

What is the term for unequal access to technology across different groups?

The digital divide

200

What are the three building blocks of all algorithms?

Sequence, selection, and iteration

200

How many bits are in one byte?

8 bits

200

What does DNS stand for and what does it do?

Domain Name System. It translates human-readable domain names like google.com into IP addresses that computers use to find each other.

200

What type of attack tricks users into giving up passwords through fake emails or websites?

Phishing

200

What does it mean for software to be "open source"?

The source code is publicly available for anyone to view, use, modify, and distribute. Examples include Linux and Firefox.

300

What is the difference between a linear search and a binary search?

Linear search checks each element one by one and works on any list. 

Binary search cuts the list in half each time but requires the list to be sorted first.

300

What is the decimal value of the binary number 1010?

10. (8 + 0 + 2 + 0 = 10)

300

What is a packet and how does data travel across the internet using packets?

A packet is a small chunk of data. When you send information over the internet it gets broken into packets, each one travels independently across the network potentially taking different routes, and they get reassembled at the destination.

300

What is the difference between symmetric and public key encryption?

Symmetric encryption uses the same key to encrypt and decrypt, so both sides need to share that key secretly. Public key encryption uses two keys — a public one anyone can use to encrypt a message, and a private one only the recipient has to decrypt it.

300

What is crowdsourcing? Give an example.

Crowdsourcing means using contributions from a large group of people online to complete a task or gather data. Wikipedia is a classic example — millions of users write and edit articles collaboratively.

400

What is the difference between lossless and lossy compression, and which would you use for a medical image and why?

Lossless keeps all original data intact. Lossy permanently removes some data to save space. You would use lossless for a medical image because losing any detail could affect a diagnosis.

400

If you have 4 bits, how many unique values can you represent?

2⁴ = 16 unique values (0000 through 1111)

400

Explain what happens step by step when you type a URL into your browser and hit enter.

Your browser asks DNS to look up the IP address for that domain. DNS returns the IP. Your browser sends an HTTP request to that IP address. The server receives it and sends back the webpage data in packets. Your browser reassembles the packets and displays the page.

400

What is a DDoS attack and why is it hard to defend against?

A Distributed Denial of Service attack floods a server with so much traffic it can't respond to real users. It's hard to defend against because the traffic comes from thousands of different devices simultaneously, making it difficult to tell legitimate requests from attack traffic.

400

How can bias enter an algorithm and what are the real world consequences?

Bias enters when the training data reflects historical inequalities or underrepresents certain groups. For example a facial recognition system trained mostly on light-skinned faces performs worse on darker skin tones, which can lead to wrongful identifications with real consequences for real people.

500

Explain what it means for a problem to be "undecidable"

An undecidable problem is one where no algorithm can ever solve it for all possible inputs.

500

Why does digital data representation always involve some level of abstraction?

Computers can only store 0s and 1s, so all real-world data has to be converted into binary.

500

What is the difference between the internet and the World Wide Web? Why do people confuse them?

The internet is the physical infrastructure — cables, routers, and the protocols that connect devices globally. The World Wide Web is just one service that runs on top of it — the system of websites and links accessed through a browser. People confuse them because the web is the most visible thing they do on the internet, but the internet also includes email, video calls, online gaming, and more.

500

Explain how public key cryptography works using an analogy. Why is it more secure than sharing a single private key?

Imagine a padlock anyone can snap shut (the public key) but only you have the key to open (the private key). Someone puts their message in a box, snaps your padlock on it, and sends it. Only you can open it. It's more secure than a shared key because you never have to send your private key anywhere — it never travels over the network where it could be intercepted.

500

A company trains an AI hiring tool on 10 years of past hiring data. Explain two ways this could produce biased outcomes and what should be done about it.

First, if the company historically hired more men for technical roles, the algorithm learns to favor male applicants even if gender is not an explicit input. Second, if certain schools or zip codes were overrepresented in past hires, the algorithm disadvantages applicants from other backgrounds. To fix this, the company should audit the training data for representation, test outputs across demographic groups, and have humans review decisions the algorithm flags.

M
e
n
u