Digital Information
The Internet
Intro to App Design
Variables, Conditionals, and Functions
Cybersecurity and Global Impacts
100

What is the term used for Data with values that change continuously, or smoothly, over time. Some examples of analog data include music, colors of a painting, or position of a sprinter during a race.

Analog Data

100

What is a computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols.

Internet

100

What is when a program statements run in order, from top to bottom 

Sequential Programming

100

What is a named reference to a value that can be used repeatedly throughout a program

Variable

100

What involves one key for both encryption and decryption.

Symmetric Key Encryption

200

What is the process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples.

Sampling

200

What is the inclusion of extra components so that a system can continue to work even if individual components fail, for example by  having more than one path between any two connected devices in a network.

Redundancy

200

What is data that is sent to a computer for processing by a program. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text

Input

200

What is a data type that is either true or false 

Boolean

200

What is a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails 

Phishing

300

What is the term for an error caused from attempting to represent a number that is too precise. The value is rounded.

Round-off Error

300

What is differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics

Digital Divide

300

What is the inputs and outputs that allow a user to interact with a piece of software. User interfaces can include a variety of forms such as buttons, menus, images, text, and graphics.

User Interface

300

What is a named group of programming instructions. Also referred to as a “procedure”.

Function

300

What is software intended to damage a computing system or to take partial control over its operation

Malware

400

What is the process for reducing the number of bits needed to represent something in which some information is lost or thrown away. This process is not reversible

Lossy Compression

400

What is the protocol for sending data across the Internet that assigns unique numbers (IP addresses) to each connected device

Internet Protocol (IP)

400

What is associated with an action and supplies input data to a program. Can be generated when a key is pressed, a mouse is clicked, a program is started, or by any other defined action that affects the flow of execution

Event

400

What is a command that executes the code within a function

Function Call

400

What is a wireless access point that gives unauthorized access to secure networks.

Rogue Access Point

500

What is a collection of public copyright licenses that enable the free distribution of an otherwise copyrighted work, used when an author wants to give people the right to share, use, and build upon a work that they have created

Creative Commons

500

What is the system responsible for translating domain names like example.com into IP addresses

Domain Name System (DNS)

500

What is a collection of program statements. Programs run (or “execute”) one command at a time 

Program

500

What is an ordered sequence of characters.

String

500

What is a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access

Multi-factor Authentication

M
e
n
u