Internet & Data
Programming Basics
Algorithms & Logic
Cybersecurity & Ethics
Pseudocode
100

What is the smallest unit of data in computing?

What is a bit?

100

What is a variable?

What is a named storage location?

100

What kind of statement allows a program to make decisions?

What is a conditional statement?

100

The purpose of encrypting data is to do what?

What is protect data / prevent data from being readable

100

What is the output?

x ← 3  
y ← 5  
DISPLAY(x + y)

What is 8

200

What protocol is responsible for breaking data into packets and ensuring they arrive?

What is TCP

OR

What is UDP

200

A parameter and an argument are both used within functions. What is an argument?

What is the actual value / data passed to the function?

200

The statement 10 MOD 3 returns what value?

What is 1?

200

The s in HTTPS refers to what about the website

What is secure

200

What is the output?

x ← 10  
IF x > 7  
    DISPLAY("High")  
ELSE  
    DISPLAY("Low")  

What is "High"

300

What does DNS stand for

What is Domain Name System?

300

What type of control structure repeats a block of code multiple times?

What is a loop?

300

Binary search is an efficient way to search for data in a list. Binary search works by doing what to a list

What is dividing it in halves

300

An email is sent from what appears to be your bank, reporting that someone has attempted to access your account. The email recommends changing your password and has a link. This email could represent what kind of cybersecurity attack?

What is a Phishing Attack

300

What is the output?

x ← 1  
REPEAT 3 TIMES  
    x ← x * 2
DISPLAY(x)  

What is 8?

400

The internet has multiple connections to ensure devices maintain connectivity even in the event of broken connections. This is called _______

What is fault tolerant?

400
You run a program and get the following error: Index out of bounds causing the app to crash. What kind of error is this?

What is a runtime error?

400

What does it mean for an algorithm to be efficient?

What is uses less resources or runs faster

400

What is one way to prevent phishing attacks?

What is not clicking on suspicious links?

What is verify the correct email address is used?

400

What is the output?

a ← 4  
b ← 2  
IF a MOD b = 0 AND a > b  
    DISPLAY("Yes")  
ELSE  
    DISPLAY("No")  

What is "Yes"?

500

When sending information over the internet, files are broken into smaller packets. What data is included within the metadata of the packet to ensure all packets go to the correct computer and in the correct order?

What is sender IP, receiver IP, protocol used, and packet number?

500

Look at the following algorithm:

x ← 1
REPEAT UNTIL x < 0
    DISPLAY("Running")
    x ← x + 1

What, if any, error does this produce?

What is an Infinite Loop Error?

500

What boolean operation does this truth table represent

A   B   ___
T   T   F    
T   F   T    
F   T   F    
F   F   F    

What is A AND NOT B

500

What is the digital divide and how does it affect access to computing?

What is the gap between those with and without access to digital technologies, affecting education and opportunities?

500

What is the output?

x ← 0  
y ← 1  
REPEAT 4 TIMES  
    temp ← x  
    x ← y  
    y ← temp + y  
DISPLAY(x)  

What is 3?

M
e
n
u