Freebies
Big Idea I
Big Idea II
Big Idea III
Big Idea V
100

What is 2+2

4

100

When collaborating with a group for a project, what is NOT a positive effect of collaboration

A: Ability to compare ideas     B: Diversity of ideas

C: Overabundance of ideas     D: Accountability

C - Overabundance of ideas

100

What is metadata?

Data about data.

100

Most programming languages have a depository of functions that have been created for common use. Which term best describes this depository of functions.

A- Collection       B- Encyclopedia 

C- Bank             D- Library

D- Library

100

What is the digital divide?

Where internet is not easily accessible in certain places.

200

What type of transportation vehicle travels by rail?

TRAIN CHOOOOOOO CHOOOOOOOO

200

What do program inputs do?

Provides many forms of inputs such as audio, visual, text, or tactile.

200

How many bits are in one binary byte?

A-1          B-3

C-5          D-8

D-8

200

For which of the following lists is a binary search the MOST useful?

A - Result of 100 coin flips   B - A dictionary (word list)

C - List of siblings names     D - Result of 100 dice rolls

B - A dictionary

200

How is phishing used to attack a users software?

By distributing malicious links for the user to click, providing the hacker information.

300

How many feet are in a mile?

5280

300

Which data compression is better if I want to be able to recover the data? 

A Lossless      B Zip

C Lossy         D JPEG

A-Lossless

300

Why is documentation an important part of an API or library?

A-Without documentation, it would be impossible to  tell who wrote the procedure.

B-Since most programmer didn't write the library, documentation is necessary to explain how to use the library

C- Documentation is necessary to keep track of who has used each procedure also where and how it was used.

D-Documentation allows programs to utilize other programs.

B- Since most programmer didn't write the library, documentation is necessary to explain how to use the library

300

What does malware do to a computers software?

Stealing information, Slowing down the device, and even causing it to crash.

400

What type of food is a Big Mac at mcdonalds?

BURGER

400

Answer is D

400

How much bigger is a megabyte than a kilobyte?

A - 1,000 times           B - 100,000 times 

C - 1,000,000 times    D - 1,000,000,000 times

A-1,000 times bigger.

400

How do we use an abstraction in computer modeling?

A process that decides which aspects of the real world are most important to the model's current purpose.

400

____ encryption is a method of encryption involving one key for both encryption and decryption.

Symmetric

500

Who is the best computer science teacher

Anna Andrews

500

Answer is A

500

What is it called when you process the data and make it uniform without changing the meaning of the data?

A-Data Compression      B-Cleaning Data 

C-Sampling technique    D-Abstraction

B- Cleaning Data

500

I. A name in a list of names sorted in alphabetical order

II. A movie title in a list of movies sorted by rating

III. A price in a store inventory list in decreasing price order

A-   I only        B-I and II

C-I and III       D- I,II and III

C- I and III
500

What is needed to decrypt a message when a sender uses a recipient's public key to encrypt a message?

The recipient's private key.

M
e
n
u