The efficiency of a binary search.
What is logarithmic time?
The protocol that maps domain names to IP addresses.
What is DNS?
A way of reducing the size of some digital information while maintaining all of the information.
What is lossless compression?
The legal protections an author gets from having other people reproduce their work.
What is copyright?
An attempt to trick a user into giving up sensitive information like a password or SSN.
What is phishing?
The traveling salesman problem is an example of...
A problem that cannot be solved in reasonable time.
A protocol that prioritizes speed over reliable transport.
What is UDP?
The amount of bits necessary to represent numbers up to 255.
What is a byte?
A license that allows other authors to reproduce or alter a published creative work.
What is a Creative Commons license?
An unsecured access point (like a wifi router) that allows an attacker to get unauthorized access to a network.
What is a rogue access point?
The efficiency of a simple operation like adding two numbers, or getting an element out of a list.
What is constant time?
What is TCP?
The number of bits needed to encode a 4x10 pixel black and white image.
What is 40?
Information that can have only a certain finite set of values.
What is digital information?
A malicious program that records your keystrokes in order to steal information.
What is a keylogger?
Exponential and factorial time algorithms.
What algorithms cannot run in reasonable amounts of time?
A small piece of information sent over a network.
What is a packet?
26 encoded in binary.
What is 011010 in decimal?
Analog data.
Determining a user's identity several ways, like combing a password with a fingerprint scan.
What is multifactor authentication?
A problem that cannot be solved by any algorithm in general, no matter how much time is given.
The property of a network that can have connections broken and still function.
What is redundancy?
110011 in decimal.
What is 51 in binary?
A procedure for converting analog to digital information.
An encryption scheme that uses one key for encryption and a separate key for decryption.
What is public key encryption?