What is the process of reducing the number of bits without losing information? This process is reversible.
What is Lossless Compression
Emily receives a mass chain of suspicious emails from a company asking her to change her password. What is this an example of?
What is Phishing
What is an agreed upon set of rules that generalizes the behavior of a process?
What is a Protocol
What type of data type is used when the outcome is either true or false?
What is Boolean
How many bits are in one byte?
What is 8 Bits
What is it called when a network can still function even if individual components fail?
What is Fault Tolerant
Drake wants to send private information to his friend by using a sequence that shifts the alphabet by a certain number. What is the method called?
What is Caesar Cipher
Jake is trying to pick the perfect gift for his mother by taking into account the price and the versatility of the potential objects. What is the method of finding the "good enough" choice given such possibilities?
What is a Heuristic Solution
What is a type of variable that can be used anywhere throughout the code and not just inside an onEvent()?
What is a Global Variable
What is the single unit of information in a computer that is usually represented by either 0 or 1?
What is a Bit?
What protocol error checks packets and ensures that they are properly received and ordered?
What is Transmission Control Protocol (TCP)
Steve enters in his credit card information by using his keyboard and he later finds out that his information was stolen. What was most likely used to steal Steve's personal card details?
What is Keylogging
The process of extracting shared characteristics of a software to generalize functionality
What is Procedural Abstraction
What control structure utilizes a Boolean conditional statement to make a decision?
What is an If Statement?
What type of error occurs when the number is too large for the computer to hold?
What is an Overflow Error
What is the name of the system that converts domain names into IP addresses?
What method is utilized in which it asks the user to provide solid evidence for each layer of security such as knowledge, inherence, and possession?
What is Multifactor Authentication
What is a group of programming instructions, also called a "procedure"?
What is a Function
var num;
IF(MISSING STATEMENT)
DISPLAY(num+ " is odd")
What could be used in place of missing statement?
What is num % 2 == 1
What base ten number is represented by this binary value? 1011
What is 11
What is the protocol computers use to request different pages from the World Wide Web? It is the protocol that ensures proper communication.
What is Hypertext Transfer Protocol (HTTP)
The process of communication in which a public key is paired with a private key for decryption.
What is Public Key Encryption
What is the algorithm that continues to remove half of the data until the desired value is found?
What is Binary Search
A = TRUE
B = FALSE
What is the value of (!A || B)&& A?
What is False?
116 in Binary Form:
What is 1110100