The Internet
There's math in computer science?
Algorithms
It's all just bits
Let's Code
100

Before conducting ecommerce on a site, one should ensure that a safe connection has been established based on the protocol such as https://. In this case, the hypertext transfer protocol is ______.

What is secure?

100

DISPLAY (20 mod 4) + 3

What is 3?

100

The type of data represented with GIF, PNG, JPEG, BMP file formats.

What is images or pictures?

100

The name for the base 2 number system.

What is binary?

100

The type of control structure that can be used for making decisions in a program based on the value of a Boolean expression.

What is an if statement (or selection, or branching)?

200

The Internet depends on a layered communication system of _______ that manage abstractions.

What are protocols?

200

___ distinct numbers can be represented with 9 bits.

What is 512?

200

Only being concerned with the main idea and ignoring details of a function or procedure.  

What is (procedural) abstraction?

200

RGB color values mimic the human eye by representing colors using 3 values of ____ bits each.

What is 8 bits?

200

The process of placing a loop inside another loop.

What is nesting?

300

The unique address given to each computer device.

What is IP address?

300

What is the most common character encoding format for text data? Hint: It's an acronym!

What is ASCII?

300

Using an algorithm to find a "good enough" solution. Most generally used when finding the best solution takes unreasonable time. For example, finding the most optimal route for a postal office worker to take.

What is a heuristic solution?

300

A collection of public copyright licenses that enable the free distribution of an otherwise copyrighted work, used when an author wants to give people the right to share, use, and build upon a work that they have created.

What is Creative Commons?

300

The failure to create a correct condition that controls a repeat statement results in this type of programming error.

What is an infinite loop?

400

An attempt to deny users access to a Web site's resources by flooding the website with requests from multiple systems.

What is a Distributed Denial of Service (DDoS) attack?

400

d <- 10

e <- 20

f <- 30

e <- d

DISPLAY (e)

DISPLAY (d+e)

What is 10 20?

400

The binary search algorithm makes this vital assumption about the list of data being considered.

What is the data is sorted?

400

Tiffani has a channel on a popular video sharing site and has over 100 thousand subscribers. After making her latest video and uploading to her channel, she notices that the quality of video better on her home computer than the uploaded version. This is the likely cause of Tiffani’s video quality.

What is lossy compression?

400

 The following code should display "even" if the positive number num is even.


IF (MISSING CONDITION)

DISPLAY ("EVEN")


Give a Boolean expression that could replace MISSING CONDITION

What is num MOD 2 == 0?

500

The system used for translating a web address like www.google.com into an IP address that can be used to connect to the site's server.

What is the Domain Name System (DNS)?

500

The binary number 00101101 in base-10.

What is 45?

500

Assuming that forward tells a robot to move forward by 10 pixels and turn tells it to turn right by 90 degrees, this shape would be drawn by the following algorithm. forward forward turn forward turn forward forward turn forward turn.

What is a rectangle?

500

A computer program uses 3 bits to represent integers. When the program adds the decimal (base 10) numbers 5 and 3, the result is 0. Name the type of error that occurred.

What is an overflow error?

500

i <- 0

sum <- 0

REPEAT UNTIL i = 4

            sum <- sum + i

            i <- i + 1

DISPLAY (sum)

What is 6?

M
e
n
u