What is the first layer of the internet?
What type of error occurs when the code is executed but the result is not the intended output?
Semantic or logic error
Convert 101 from Base 2 to Base 10
5
What is the difference between encryption and decryption?
Encryption is the process by which a readable message is converted to an unreadable form, while decryption is the process of converting an encrypted message back to its original readable form.
What machine did Alan Turing crack the code for?
Enigma
What connects the home devices to the ISP?
Modem
What are the two types of procedures?
Return functions and void functions
How many letters can be stored with 80 bits?
10 letters.
What is the most common method used to launch cyberattacks?
Phishing
What was the first computer?
ENIAC
What does Wi-Fi stand for?
Wireless Fidelity
What does it mean for a function to be self-documenting?
What is ((18 mod 5) mod 2)?
3
What is a firewall?
A network security device that monitors traffic to or from your network
What does ASCII stand for?
American Standard Code for Information Exchange
What is the protocol for the link layer?
Ethernet Protocol
What word describes a function that repeats a section of code until a result occurs or a requirement is met?
What is iteration
(log base 2 (4)) ^5
32
Port scanning
What is the most efficient sorting algorithm for many numbers?
Merge Sort
Which network was funded by the US Department of Defense?
Arpanet
When calling a procedure named add(a, b), what are a and b? When defining the same function what are a and b?
what are arguments/actual parameters, what are formal parameters
What would the code below output?
count <- 0
n <- 1
REPEAT UNTIL (n >= 10) {
n <- 1
count <- count + n
n <- n + 1
}
DISPLAY (count)
9
Encrypt Zebra with a shift of 2 using the Caesar Cipher.
bgdtc
How many characters could 24 vacuum tubes store?
3