What is Symmetric Key Encryption?
Symmetric Key Encryption involves one key for both encryption and decryption.
Why is it important we have data visualized in graphs, tables, and etc?
Data that is visualized allows us to understand and learn from patterns from the data.
What is a Boolean Value?
Data that is true or false
Do Packets come in order?
F
Is Debugging helpful for programming?
Yes
What is KeyLogging?
KeyLogging is the use of a program to record every keystroke made by a computer user in order to gain access to passwords and PII.
What is crowdsourcing?
Crowdsourcing is the practice of obtaining information from a large number of people by the internet
What is a Global Variable?
Any variable that can be used in any part of the program
What Does DNS Stand For?
Domain Name System
What is a List?
A list is a programming data structure that holds multiple items.
What is Phishing?
Phishing is a technique that attempts to trick a user into providing personal information.
Is there potential bias in systems that are computing innovations?
True
What is a Conditional Statement?
Conditional Statements affect the flow of control by executing different statements based on the value of a boolean expression.
Does TCP/IP check to see if packets reach the correct destination?
T
What is a while loop in programming?
A while loop is used to repeat a set of commands in the code while a boolean condition is true.
What is 2FA or Multi-factor Authentication?
Multi-factor Authentication is a system that requires at least two steps to unlock protected information. Having a extra layer of protection prevents unknown people having unknown access.
Why does Data need to be cleaned? List at least 3 reasons
-Data could not be finished
-Multiple tables are in one table
-Data could be invalid
What is a Syntax Error?
Happens when a instruction does not follow the grammar of the programming language.
What does HTTP Stand For?
Hytpertext Transfer Protocol
What is a string in programming?
Any characters and symbols between quotation marks
What is Rogue Access Point?
Rogue Access Point is a wireless access point that gives unauthorized access to secure networks.
Is Scalability or Parallel systems better for handling data?
Both of them have equal benefits.
What are the Logical Operators values?
-NOT
-AND
-OR
What is a Router?
Type of computer that transports data across the network
What is UI in programming?
UI refers to how a user interacts with the software or app.