The Internet
There's math in computer science?
Algorithms
It's all just bits
Let's Code
100
Before conducting ecommerce on a site, one should ensure that a safe connection has been established based on the protocol such as https://. In this case, the hypertext transfer protocol is ______.
What is secure
100
DISPLAY (20 mod 4) + 3
What is 3
100

Assuming that forward tells a robot to move forward by 10 pixels and turn tells it to turn right by 90 degrees, this shape would be drawn by the following algorithm. forward forward turn forward turn forward forward turn forward turn

A rectangle

Undecidable problems.

100
The name for the base 2 number system.
What is binary
100
The type of control structure that can be used for making decisions in a program based on the value of a Boolean expression.
What is an if statement (or selection, or branching)
200
The Internet depends on a layered communication system of _______ that manage abstractions.
What are protocols
200
___ distinct numbers can be represented with 9 bits
What is 512
200
Bundling commands into one container for making programs easier to write and manage is _______________.
What is (procedural) abstraction
200

Describes the type of compression that would most likely be used for videos and images uploaded to a social media website.

What is lossy compression

200
The process of placing a loop inside another loop.
What is nesting
300

The Internet makes use of many possible paths between routers, increasing the redundancy of the network. Hence, it can experience failure in some of its components but still function normally.

What is fault tolerance?

300
HTML uses 6-digit hexadecimal notation for identifying colors on webpages so that the Red/Green/Blue values are each represented by a 2-digit Hexadecimal (16-bit) number. What is the decimal number for the Green color value in the color AC0BFF?
What is 11
300

The binary search algorithm makes this vital assumption about the list of data being considered.

The data is sorted.

300

A class of encryption schemes that use different keys for encryption and decryption.

What is public key cryptography / asymetric cryptography.

300
The failure to create a correct condition that controls a repeat statement results in this type of programming error.
What is an infinite loop
400
An attempt to deny users access to a Web site's resources by flooding the website with requests from multiple systems.
What is a Distributed Denial of Service (DDoS) attack
400
d <- 10
e <- 20
f <- 30
e <- d
DISPLAY (e)
DISPLAY (d+e)
What is 10 20
400

A solution that is not guaranteed to be optimal but will run in reasonable time.

What is a heuristic solution?

400

Suppose we are using sign-magnitude to represent integers using 4 bits (1 for the sign, 3 for the magnitude). How many different numbers can be represented?

15

400
The following code should display "even" if the positive number num is even.

IF (MISSING CONDITION)
DISPLAY ("EVEN")

Give a Boolean expression that could replace MISSING CONDITION
What is num MOD 2 == 0
500
The system used for translating a web address like www.google.com into an IP address that can be used to connect to the site's server.
What is the Domain Name System (DNS)
500
The binary number 00101101 in base-10.
What is 45
500

The halting problem (determining whether a computer program will halt or run forever on a specific input) is an example of these.

What is an undecidable problem?

500

A computer program uses 3 bits to represent integers. When the program adds the decimal (base 10) numbers 5 and 3, the result is 0. This is the type of error that occurred.

What is an overflow error?
500
i <- 0
sum <- 0
REPEAT UNTIL i = 4
sum <- sum + i
i <- i + 1
DISPLAY (sum)
What is 6
M
e
n
u