The Internet
There's math in computer science?
Algorithms
It's all just bits
Let's Code
100

Before conducting ecommerce on a site, one should ensure that a safe connection has been established based on the protocol such as https://. What does the 's' stand for in https?

What is secure

100
DISPLAY (20 mod 4) + 3
What is 3
100
The type of data represented with GIF, PNG, JPEG, BMP file formats.
What is images or pictures
100
The name for the base 2 number system.
What is binary
100
The type of control structure that can be used for making decisions in a program based on the value of a Boolean expression.
What is an if statement (or selection, or branching)
200

______ is the property that enables a system to continue operating properly in the event of the failure of some of its components.

What is fault tolerant

200
___ distinct numbers can be represented with 9 bits
What is 512
200

Used for algorithms which find solutions among all possible ones, but they do not guarantee that the best will be found, therefore they may be considered as approximately and not accurate algorithms

What is a heuristic

200
RGB color values mimic the human eye by representing colors using 3 values of ____ bits each.
What is 8 bits
200
The process of placing a loop inside another loop.
What is nesting
300

When the sender and receiver of a message have two different keys for encryption and decryption.

What is Asymmetric Encryption

300
HTML uses 6-digit hexadecimal notation for identifying colors on webpages so that the Red/Green/Blue values are each represented by a 2-digit Hexadecimal (16-bit) number. What is the decimal number for the Green color value in the color AC0BFF?
What is 11
300

In determining the best route to take on a recent trip, a maps application gave the user three options based on traffic patterns, road construction, and roadways. This term refers to the algorithm that determines the best route for the trip.

What is Djikstra's algorithm

300
Sarah needs the Microsoft Office suite in order to complete her school assignments so she borrows her aunt’s software CDs in order to load another copy on her new laptop. What type of infringement has Sarah committed?
What is piracy
300
The failure to create a correct condition that controls a repeat statement results in this type of programming error.
What is an infinite loop
400
An attempt to deny users access to a Web site's resources by flooding the website with requests from multiple systems.
What is a Distributed Denial of Service (DDoS) attack
400
d <- 10
e <- 20
f <- 30
e <- d
DISPLAY (e)
DISPLAY (d+e)
What is 10 20
400

When a program runs in less time than another, the program is ____.

What is efficient

400
Tiffani has a channel on a popular video sharing site and has over 100 thousand subscribers. After making her latest video and uploading to her channel, she notices that the quality of video better on her home computer than the uploaded version. This is the likely cause of Tiffani’s video quality.
What is lossy compression
400
The following code should display "even" if the positive number num is even.

IF (MISSING CONDITION)
DISPLAY ("EVEN")

Give a Boolean expression that could replace MISSING CONDITION
What is num MOD 2 == 0
500
The system used for translating a web address like www.google.com into an IP address that can be used to connect to the site's server.
What is the Domain Name System (DNS)
500
The binary number 00101101 in base-10.
What is 45
500
Assuming that forward tells a robot to move forward by 10 pixels and turn tells it to turn right by 90 degrees, this shape would be drawn by the following algorithm. forward forward turn forward turn forward forward turn forward turn
What is a rectangle
500
A computer program uses 3 bits to represent integers. When the program adds the decimal (base 10) numbers 5 and 3, the result is 0. Name the type of error that occurred.
What is an overflow error
500
i <- 0
sum <- 0
REPEAT UNTIL i = 4
sum <- sum + i
i <- i + 1
DISPLAY (sum)
What is 6
M
e
n
u