The hexadecimal system has a base of what value?
Base 16
What is the decimal value of the binary number 1010?
10
This type of attack sends a fraudulent email disguised as a trusted source to trick users into revealing passwords or clicking malicious links. What is it called?
Phishing — attackers impersonate legitimate organizations (banks, schools, tech companies) to steal credentials or install malware.
Every device on the internet is assigned one of these unique numerical identifiers so data knows where to go.
IP address (Internet Protocol address) — e.g. 192.168.1.1. It works like a mailing address for your device on a network.
What is the digital divide?
The digital divide is the gap between individuals, households, businesses, and geographic areas at different socio-economic levels regarding their opportunities to access and effectively use information and communication technologies
What are the values for the base 16 numbering system? List them all
0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F
How many unique values can be represented with 4 bits?
16 (values 0–15)
This attack floods a server with so much traffic that legitimate users can't access it. What is it called?
Distributed Denial of Service. The goal is to make a service unavailable. DDoS
Give me an example of a top level domain:
.com, .org, .edu, .gov, etc
Asymmetric Encryption
One key encrypts, a different key decrypts.
What is 3F in decimal form?
63
Convert the decimal number 25 to binary.
11001
This process scrambles data so only someone with the correct key can read it.
Encryption — it protects data confidentiality in transit and at rest. Without the key, the data is unreadable ciphertext.
Symmetric Encryption
The same key is used to encrypt and decrypt (e.g., Caesar, Vigenere)
Solve to decimal form:
2316 + 1A16 = ?
6110
What is 1101 + 0110 in binary? Express your answer in binary.
10011 — 13 + 6 = 19, which is 10011 in binary
This security feature requires a second form of verification beyond a password, such as a text message code.
Multi-Factor Authentication (MFA/2FA) — even if a password is stolen, the attacker can't log in without the second factor.
What does DNS stand for, and what problem does it solve?
Domain Name System — it translates human-readable domain names (like google.com) into IP addresses, so users don't have to memorize numbers.
What is crowdsourcing?
Crowdsourcing is the process of obtaining ideas, services, content, or funds from a large, dispersed group of people—the "crowd"—rather than traditional employees or suppliers.
Convert 10110 to hexadecimal form:
1616
A pixel's color channel uses 8 bits. What is the maximum decimal value 8 bits can store?
255
What does HTTPS indicate about a website?
HTTPS means the connection is encrypted using TLS. It protects against eavesdropping and man-in-the-middle attacks, ensuring data between your browser and the server is private.
What does TCP stand for, and what is it's job?
Transmission Control Protocol — TCP guarantees delivery by requiring acknowledgment of every packet. Lost packets are resent.
Explain Sequential Programming?
Explain Parallel Programming?
1) Sequential programming refers to programs that are executed sequentially – once through, from start to finish, without other processing executing.
2) Completes multiple tasks at a time, simultaneously.