How many bits in a byte?
What is 8 bits?
What type of variable can be used anywhere in the code? Global or Local?
What is Global?
What is metadata?
What is data about data?
Define Decryption
What is a process that reverses encryption, taking a secret message and reproducing the original plain text?
What is Mrs. Andrews' daughter's name?
Who is Gwenelle?
What is a Round-off Error?
What is an error from attempting to represent a number that is too precise (small)?
What is the difference between a For loop and a While loop?
What is for loops run infinitely unlike while loops that are more single use?
"sharing data with others so they can can analyze it" What type of data is this?
What is open data?
Does a Caesar's Cipher use letters or numbers?
What is letters?
What college team is Mrs. Andrews' fav?
What is GA Bulldogs?
What is 27 in binary?
What is 11011?
What does || mean?
What is OR?
What does API stand for?
What is an Application Program Interface?
Two examples of Multifactor Authentication
What is eye scan, fingerprints, passwords?
What day is the best?
What is the last day of the year?
What type of programming requires user interaction? Sequential or Event driven?
What is event driven?
Define 'heuristic"
What is a "good enough" solution to a problem when an actual solution is impractical or impossible?
Does correlation equal causation?
What is no?
"Software intended to damage a computing system or to take partial control over its operation."
What is this the definition of?
What is malware?
What sports did Mrs. Andrews' play in high school?
What is Soccer and Volleyball?
What is the second layer of abstraction in a color image?
What is a sampling layer?
Define a Traversal
What is the process of accessing each item in a list one at a time?
If it has two columns and the values are strings, what graph should be used?
What is a crosstab chart?
An email from PayPal arrives telling the victim that their account has been compromised and will be deactivated unless they confirm their credit card details. What could this be an example of?
What is a phishing Attack
What is your favorite class?
What is Computer Science?