The Internet
There's math in computer science?
Algorithms
It's all just bits
Let's Code
100

Before conducting ecommerce on a site, one should ensure that a safe connection has been established based on the protocol such as https://. In this case, the hypertext transfer protocol is ______.

secure

100

DISPLAY (20 mod 4) + 3

3

100

The type of data represented with GIF, PNG, JPEG, BMP file formats.

Images or pictures

100

The name for the base 2 number system.

binary

100

The type of control structure that can be used for making decisions in a program based on the value of a Boolean expression.

An if statement (or selection, or branching)

200

The Internet depends on a layered communication system of _______ that manage abstractions.

protocols

200

How many distinct numbers can be represented with 9 bits?

512

200

Bundling commands into one container for making programs easier to write and manage is _______________.

(procedural) abstraction

200

RGB color values mimic the human eye by representing colors using 3 values of how many bits each?

8 bits

200

The process of placing a loop inside another loop.

Nesting

300

Websites for a college or university should have this domain extension.

.edu

300

HTML uses 6-digit hexadecimal notation for identifying colors on webpages so that the Red/Green/Blue values are each represented by a 2-digit Hexadecimal (16-bit) number. What is the decimal number for the Green color value in the color AC0BFF?

11

300

In determining the best route to take on recent trip, a maps application gave the user three options based on traffic patterns, road construction, and roadways. This term refers to the method for choosing the best alternative among the three possible routes.

A heuristic solution

300

Sarah needs the Microsoft Office suite in order to complete her school assignments so she borrows her aunt’s software CDs in order to load another copy on her new laptop. What type of infringement has Sarah committed?

Piracy

300

The failure to create a correct condition that controls a repeat statement results in what type of programming error?

An infinite loop

400

An attempt to deny users access to a Web site's resources by flooding the website with requests from multiple systems.

A Distributed Denial of Service (DDoS) attack

400

d <- 10

e <- 20

f <- 30

e <- d

DISPLAY (e)

DISPLAY (d+e)

10 20

400
The binary search algorithm makes this vital assumption about the list of data being considered.
What is the data is sorted
400

Tiffani has a channel on a popular video sharing site and has over 100 thousand subscribers. After making her latest video and uploading to her channel, she notices that the quality of video better on her home computer than the uploaded version. This is the likely cause of Tiffani’s video quality.

Lossy compression

400

The following code should display "even" if the positive number num is even.


IF (MISSING CONDITION)

DISPLAY ("EVEN")


Give a Boolean expression that could replace MISSING CONDITION

num MOD 2 == 0

500

The system used for translating a web address like www.google.com into an IP address that can be used to connect to the site's server.

The Domain Name System (DNS)

500

The binary number 00101101 in base-10.

45

500

Assuming that forward tells a robot to move forward by 10 pixels and turn tells it to turn right by 90 degrees, this shape would be drawn by the following algorithm. forward forward turn forward turn forward forward turn forward turn

A rectangle

500

A computer program uses 3 bits to represent integers. When the program adds the decimal (base 10) numbers 5 and 3, the result is 0. Name the type of error that occurred.

An overflow error

500

i <- 0

sum <- 0

REPEAT UNTIL i = 4

sum <- sum + i

i <- i + 1

DISPLAY (sum)

6

M
e
n
u