Computers
Data
Binary
Cybersecurity
The Internet
100

What type of error results in a value which is too large for the computer to process?

Overflow Error

100

What is the term for data about the data in a certain graph?

Metadata

100

What is the binary value 1010 in decimal form?

10

100

What is the technique hackers use to steal information as they pose as the official site and request you to enter your credentials?

Phishing

100

What is the maximum amount of data sent in an amount of time referred as?

Hint: Units are bits/second

Bandwidth

200

What kind of data changes smoothly over time? An example of this data could be music.

Analog

200

What is the type of graph that can use buckets to group in certain values of quantitative data?

Histogram

200

What is the decimal value 33 in binary form?

100001

200
What is software intended to damage your computer or make you lose a certain amount of control?

Malware

200

What is the unique number given to each device on the internet?

IP Address

300

What is the process of reducing a certain number of bits while preserving all aspects of the file? This type of compression does not lose any information.

Lossless Compression

300

What can a scatterplot show us?

Correlation between two variables

300

What is the binary value 1100010 plus the binary value 1100110 in decimal form?

200

300

What is a wireless access point that gives a hacker unauthorized access even into secure networks?

Rogue Access Point

300

What is the inclusion of additional routes in a system in case a singular path fails?

Redundancy

400

What type of compression reduces the amount of bits, but in the process loses some information as well?

Hint: This process is not reversible.

Lossy Compression

400

What is the ability of computers to learn and adapt information and draw inferences by themselves as large amounts of data is processed?

Machine Learning

400

What is y in binary form?

boolean x = true;

if (x==true){

var y = 5;}

else{

var y = 10;}

101

400

What is the process that reverses encryption as the user converts from the secret message to the real text?

Decryption

400

What is the protocol for sending packets which is slower but does error checking and ensures all packets are sent?

Transmission Control Protocol

500

What is the term for a group of 8 bits?

A byte

500

What is the method of extracting data from people around the world on the internet called?

Crowdsourcing

500

var x = 5;

var y = ((x*4)%6)+10;

What is y in binary form?

1100

500

What type of encryption uses two separate keys, a public key for encryption and a private key for decryption?

Public Key Encryption

500

What is the protocol for sending packets which is quicker, but doesn't check for errors or if all the packets are sent?

User Datagram Protocol

M
e
n
u