Cyber Security
Data
Variables, Conditionals, and Functions
The Internet
Lists, Loops, and Traversals
100

What is Symmetric Key Encryption?

Symmetric Key Encryption involves one key for both encryption and decryption. 

100

Why is it important we have data visualized in graphs, tables, and etc?

Data that is visualized allows us to understand and learn from patterns from the data.

100

What is a Boolean Value?

Data that is true or false

100

Do Packets come in order?

F

100

Is Debugging helpful for programming?

Yes

200

What is KeyLogging?

KeyLogging is the use of a program to record every keystroke made by a computer user in order to gain access to passwords and PII.  

200

What is crowdsourcing?

Crowdsourcing is the practice of obtaining information from a large number of people by the internet 

200

What is a Global Variable?

Any variable that can be used in any part of the program

200

What Does DNS Stand For?

Domain Name System  

200

What is a List?

A list is a programming data structure that holds multiple items.

300

What is Phishing?

Phishing is a technique that attempts to trick a user into providing personal information.  

300

Is there potential bias in systems that are computing innovations?

True

300

What is a Conditional Statement?

Conditional Statements affect the flow of control by executing different statements based on the value of a boolean expression. 

300

Does TCP/IP check to see if packets reach the correct destination?

T

300

What is a while loop in programming?

A while loop is used to repeat a set of commands in the code while a boolean condition is true.

400

What is 2FA or Multi-factor Authentication?

Multi-factor Authentication is a system that requires at least two steps to unlock protected information. Having a extra layer of protection prevents unknown people having unknown access.

400

Why does Data need to be cleaned? List at least 3 reasons

-Data could not be finished

-Multiple tables are in one table

-Data could be invalid

400

What is a Syntax Error?

Happens when a instruction does not follow the grammar of the programming language. 

400

What does HTTP Stand For?

Hytpertext Transfer Protocol

400

What is a string in programming?

Any characters and symbols between quotation marks

500

What is Rogue Access Point?

Rogue Access Point is a wireless access point that gives unauthorized access to secure networks. 

500

Is Scalability or Parallel systems better for handling data?

Both of them have equal benefits.

500

What are the Logical Operators values?

-NOT

-AND

-OR 

500

What is a Router?

Type of computer that transports data across the network

500

What is UI in programming?

UI refers to how a user interacts with the software or app. 

M
e
n
u