Internet
Programming
Math
Cybersecurity
Misc
100

What is the first layer of the internet?

Application Layer
100

What type of error occurs when the code is executed but the result is not the intended output?

Semantic or logic error

100

Convert 101 from Base 2 to Base 10

5

100

What is the difference between encryption and decryption?

Encryption is the process by which a readable message is converted to an unreadable form, while decryption is the process of converting an encrypted message back to its original readable form.

100

What machine did Alan Turing crack the code for?

Enigma

200

What connects the home devices to the ISP?

Modem

200

What are the two types of procedures?

Return functions and void functions

200

How many letters can be stored with 80 bits?

10 letters.

200

What is the most common method used to launch cyberattacks?

Phishing

200

What was the first computer?

ENIAC

300

What does Wi-Fi stand for?

Wireless Fidelity

300

What does it mean for a function to be self-documenting?

What is a name that describes its function
300

What is ((18 mod 5) mod 2)?

3

300

What is a firewall?

A network security device that monitors traffic to or from your network

300

What does ASCII stand for?

American Standard Code for Information Exchange

400

What is the protocol for the link layer?

Ethernet Protocol

400

What word describes a function that repeats a section of code until a result occurs or a requirement is met?

What is iteration

400

(log base 2 (4)) ^5

32

400
What is the process of sending messages in order to gather information about the network or system by analyzing the response received?

Port scanning

400

What is the most efficient sorting algorithm for many numbers?

Merge Sort

500

Which network was funded by the US Department of Defense?

Arpanet

500

When calling a procedure named add(a, b), what are a and b? When defining the same function what are a and b?

what are arguments/actual parameters, what are formal parameters 

500

What would the code below output?

count <- 0

n <- 1

REPEAT UNTIL (n >= 10) {

n <- 1

count <- count + n

n <- n + 1

}

DISPLAY (count)

9

500

Encrypt Zebra with a shift of 2 using the Caesar Cipher.

bgdtc

500

How many characters could 24 vacuum tubes store?

3

M
e
n
u