Which symbol is used to start a formula in Excel?
What is the function of the motherboard?
Connects all components
How is the bandwidth of a network measured?
Bitrate. Higher bitrate means higher bandwidth.
A hacker who breaks into systems for personal challenge or prestige among peers, not necessarily for malicious gain, is best called:
Grey Hat
What was the name of the robots we used?
Finch
Which formula finds the largest value in a range?
=MAX(A1:A10)
Which storage device is typically faster?
SSD
Which component allows a computer to connect to the internet?
Network Interface Card (NIC)
Which term describes someone who finds and reports security weaknesses to help organizations fix them, usually with permission?
White Hat
Which of the following is an output device of the Robot?
Buzzer
What is the formula used to find the sum of multiple cells in Microsoft Excel?
=SUM(A1:A10)
What happens to data stored in RAM when the computer is turned off?
It is deleted
What is the Internet Protocol (IP)?
A protocol that defines the structure of an Internet address and assigns a unique address to every device on the Internet
Which hacker type is most likely to exploit vulnerabilities without permission but may reveal problems publicly without causing direct harm?
Grey Hat
What is the function of the tri-color LEDs on the robot?
To emit light in different colors
What does a cell reference like A1 represent?
A specific cell at the intersection of a row and column
Which component is responsible for running programs and calculations?
CPU
Suppose we used an Internet Addressing protocol that used 4 bits to encode a single address. How many devices would be supported on the Internet?
16
A _________ hacker exploits systems illegally for personal gain or to cause harm.
Black Hat
bird.setMove('F', 10, 50)
Which Direction will the robot move
Left
Which formula is used to find the average of a range of cells?
=AVERAGE(A1:A10)
Which of the following choices lists the three main components of a computer’s hardware?
CPU, Memory, Motherboard
The amount of data (in bits) that can be sent in a fixed amount of time
What is the bitrate of a system?
A _________ hacker works with permission to find and report security weaknesses so organizations can fix them.
White Hat
Given the following algorithm steps predict the robots movement:
Repeat the following 6 times:
Turn right 60 degrees
Move forward 10 cm
Draws Hexagon