The Internet is the world's largest computing _______.
What is network?
True or False:
More data usually makes results more accurate.
What is True?
What function adds something (text, numbers, etc.) into the console?
What is console.log()?
Name one example of a cybersecurity threat.
What is malware, keylogging, phishing, ransomware, etc?
What makes up a computing system?
What are many interconnected computing devices to accomplish a goal?
What is assigned to each device in the Internet?
What is an IP Address?
True or False:
It is possible for an algorithm to contain bias.
What is True?
What are two types of iteration statements?
What is For Loop and While Loop?
What is PII and how can attackers use it?
What is Personal Identifiable Information and hackers/attackers can use it to steal someone's identity, open up someone's accounts, etc?
What is a collaborative software?
What is a software where many people can collaborate on an document, spreadsheet, slides, etc at the same time?
The Internet contains many redundancies to make the network ______________.
(Note: the missing word is a concept)
What is Fault-Tolerant?
Which of the following is an example of analog data?
A: A recording of a concert
B: A football game
C: Video Games
What is B: a football game?
What type of operator is ">" in a boolean expression (choose the best option)?
A: Arithmetic Operator
B: Logic Operator
C: Relational Operator
What is C (Relational Operator)?
What are the pros and cons of cookies?
What is personalizing a user's experience on an application, and possible PII becoming leaked to outside sources?
What is the difference between citizen science and crowdfunding?
What is citizen science using the public to collect data for an scientific research, and crowdfunding is people across the world providing financial support for projects, research, etc?
What does the Internet consist of?
What are communication protocols, servers, computing devices, and/or routers? (only need one)
What is Metadata?
What is data about data (date, location, etc.)?
Why are parameters useful in code?
What is reducing and simplifying code, improving the code's overall functionality, and/or improves flexibility of the function including the parameter?
What can an attacker NOT do through a rogue access point?
A: Monitor the user's activity on their device
B: Manipulate the user's inputs.
C: See every activity of the user's device even before it connected to the wireless access point.
What is C (See every activity of the user's device even before it connected to the network)?
What does it mean for an infrastructure to be "smart?"
What is when it is able to make its own decisions based on the data it collects from interconnected technology (sensors, algorithms, etc), in order for something to become more efficient?
Who makes a digital certificate for a website?
What are Certificate Authorities?
Select the Answer Choices that involve Crowdsourcing.
A: Uber
B: LEGO
C: Apple Health App
What is A and B? (Uber and Lego)
Write an if statement that finds the greatest number in numList (indexing in code.org rules, not pseudocode).
var max = numList[0];
for(var i=0; i < numList.length; i++) {
if(numList[i] > max) {
max = numList[i]
}
}
Other formats may be acceptable.
Name two differences between public key encryption and symmetric encryption.
What is Public Key encryption uses two different keys while symmetric only uses one key?
Public Key Encryption is more secure than symmetric encryption.
Symmetric encryption only keeps the keys private while public Key encryption has both private and public keys.
Others answers may also be acceptable.
What is one benefit and harm of social media?
What is an easier way to communicate and connect with others, but also PII possibly becoming leaked and possible misinformation being spread?