Binary & Data
Algorithms & Programming
The Internet
Computer Systems & Impact
Cybersecurity & Privacy
100

This is the number of bits in one byte.

What is 8?

100

A specific sequence of instructions that a computer can execute to solve a problem.

What is an Algorithm?

100

A system for translating easily readable domain names (like google.com) into numerical IP addresses.

What is DNS (Domain Name System)?

100

This piece of hardware is often called the "brain" of the computer.

What is the CPU (Central Processing Unit)?

100

The term for unwanted, unsolicited email, often used in phishing attacks.

What is Spam?

200

The two possible values a Boolean data type can hold.

What is "True" or "False"?

200

A generic term for a type of programming statement that uses a Boolean condition to decide which block of code to run.

What is selection (or a conditional statement)?

200

This is the "WWW" part of a website address, a system of interconnected documents accessed via the Internet.

What is the World Wide Web?

200

The primary form of temporary, volatile computer memory.

What is RAM (Random Access Memory)?

200

A malicious program that locks your computer files and demands payment to unlock them.

What is ransomeware?

300

The decimal value of the binary number 1011.

What is 11?

300

A loop placed inside the body of another loop.

What is a nested loop?

300

A characteristic of the Internet that allows it to keep working even if parts of the network or some connections fail.

What is Fault-Tolerence?

300

A high-level description of an algorithm using natural language mixed with programming code syntax, useful for planning.

What is Pseudo code?

300

This practice uses deceptive emails or websites to trick individuals into revealing personal information like passwords or credit card numbers.

What is Phishing?

400

The name for the simplified representation of information, like using Hexadecimal to represent binary.

What is "Abstraction"?

400

The name of the process of finding and fixing errors in code.

What is Debugging?

400

The set of rules that governs how information is sent and received over the web, often appearing with an 'S' for secure.

What is HTTP/HTTPS (HyperText Transfer Protocol Secure)?

400

The beneficial or harmful effect a new piece of technology can have on society, a key topic in CSP.

What is the impact of computing?

400

A security measure that requires at least two different methods of verification to access an account.

What is multi-factor authentication (MFA) or two-factor authentication (2FA)?

500

This is the process of converting analog information (like sound or color) into digital data composed of bits.

What is digitization (or sampling/encoding)?

500

The type of search algorithm that repeatedly divides a sorted list in half to find a target value efficiently.

What is a Binary Search?

500

A standard that ensures devices from different manufacturers can all communicate effectively on the Internet.

What is an Internet protocol (or TCP/IP)?

500

An innovation that can collect data, use algorithms to process it, and have a positive effect, but could also raise privacy concerns.

What is a computing innovation?

500

The process of scrambling data so it can only be read by someone with the correct key, ensuring privacy during transmission.

What is Encryption?

M
e
n
u