Algorithms
Final Programming
Data
Cyber Crime
Cybersecurity
100

A finite set of instructions that accomplish a task.

What is an algorithm?

100

This is a variable in a function definition. It is used as a placeholder for values that will be passed through the function.

What is a parameter?

100

Often confused with causation, this is a relationship between two pieces of data, typically referring to the amount that one varies in relation to another.

What is correlation?

100

This is a technique that attempts to trick a user into providing personal information, which can then be used to access sensitive online resources, such as bank accounts and email.

What is phishing?

100

A process of encoding messages to keep them secret, so that only authorized parties can read it.

What is encryption?

200

This is a measure of how many steps are needed to complete an algorithm.

What is efficiency?

200

The value that is passed to the parameter when a function is called.

What is an argument?

200
This is a process that makes the data uniform without changing its meaning. For example, replacing all equivalent abbreviations, spellings, and capitalizations with the same word.

What is cleaning data?

200

The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords or other confidential information.

What is keylogging?

200

A process that reverses encryption, taking a secret message and reproducing the original plain text.

What is decryption?

300

This is a "good enough" solution to a problem when an actual solution is impractical or impossible.

What is a heuristic?

300

This allows functions/procedures to halt and send data back outside of the function.

What is a return?

300

The practice of obtaining input or information from a large number of people via the internet.

What is crowdsourcing?

300

A broad term for all software intended to damage a computing system or take partial control over its operation.

What is malware?

300

A type of encryption that requires only one key for both encryption and decryption.

What is symmetric key encryption?

400

Algorithms with a polynomial efficiency or lower (i.e.- constant, linear, square, cube, etc.) are said to run in this.

What is reasonable time?

400

A group of functions/procedures made available to the public that may be used in creating new programs.

What is a library?

400

Data that does not accurately reflect the full population or phenomenon being studied is said to suffer from this.

What is data bias?
400

A malicious program that can copy itself and gain access to a computer in an unauthorized way.

What is a computer virus?

400

A system that requires at least two steps to unlock protected information.

What is multi-factor authentication?

500

A model of computing in which programs are broken into smaller pieces, some of which are run simultaneously.

What is parallel computing?

500

These are the specifications for how functions in a library can behave and can be used.

What is API? (Application Program Interface)

500

Choosing a smaller subset of a data set for analysis. For example, eliminating/keeping only certain rows in a table.

What is data filtering?

500

A wireless access point that gives unauthorized access to secure networks.

What is a rogue access point?

500

A type of encryption that pairs a public key and a private key for encryption. 

What is public key encryption or asymmetric encryption?

M
e
n
u