What is 10012 in decimal form?
9
A philosophy of making information and knowledge open and accessible to all people. A network of networks built on open, agreed upon protocols.
Internet
Images are made up of __, which are essentially a grid of values. Each value, or ___, encodes the color at that position in the image.
Pixel
The variable isOpen is used to indicate whether or not a store is currently open. What is the most appropriate data type for isOpen?
Boolean
Programmers use this concept to hide complex details behind a simpler interface — like driving a car without knowing how the engine works.
Abstraction
What is 100111012 in decimal form?
157
A new 128 bit version of the Internet Protocol..
IPV6
The __ encoding scheme allows us to encode colors as numeric data. It defines the amount of __, __, and __ light in a pixel. Each color channel can have a value between 0 and 255.
RGB
FOR loops and WHILE loops are both examples of this programming concept — repeating a block of code until a condition is met.
Iteration
This type of error occurs when a program tries to store a number too large for its allotted bits — like trying to pour a gallon into a cup.
*gangnam style
Overflow Error
What is the max value you can represent using 4 bits
?
15 in decimal or 1111 in binary
Used to translate domain names into IP addresses.
Domain Name System (DNS)
After this type of compression, the original file can be recovered exactly — not one bit different.
Lossless Compression
Which of the following has the greatest potential for compromising a user’s personal privacy?
A group of cookies stored by the user’s Web browser
The Internet Protocol (IP) address of the user’s computer
The user’s e-mail address
The user’s public key used for encryption
A group of cookies stored by the user’s Web browser
A photo's file size, location, date, and camera settings are all examples of this — data that describes other data.
Metadata
What is twice the value of this binary number 10102?
10100 (20 in decimal)
When multiple paths exist between two points. This improves reliability and makes the internet fault tolerable. Makes the routing system scalable.
Redundancy
Throwing away some of the data to save space. We can throw away a lot of data without any noticeable difference from the original.
Lossy Compression
When a problem has tasks that depend on the result of a previous step, this model is often required — no shortcuts, no skipping ahead.
Sequential Computing
Scientists use this computational tool to model a hurricane's path or test a car crash without any real-world risk — a virtual representation of a complex system.
Simulation
Consider the following numeric values.
Which of the following lists the values in order from least to greatest?
Decimal 5, binary 1011, decimal 12, binary 1101
Allows for sending MULTIPLE packets between two computers. __ checks that all packets arrived and can be put back in the proper order. The metadata must include a destination IP address, a from IP address, the message size and the packet order number.
Transmission Control Protocol (TCP)
__ key encryption is a type of asymmetric key encryption. There’s one key that encrypts the information and there is a different key that decrypts the information.
Public Key Encryption
Like a team of chefs each prepping a different dish simultaneously, this computing model divides work so multiple parts run at once.
Parallel Computing
Projects like Folding@home, where volunteers donate their computer's idle processing power to research, are examples of this — the public participating in scientific data collection.
Citizen Science