The number 155 in Binary
What is 1001101?
the practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, via the internet.
What is crowdsourcing?
The term for when you have an if statement inside another if statement.
if ____:
if ___:
What is nesting.
The position at a given place in a list.
What is the index?
The process of randomizing a list until the list is in order.
What is Bogo Sort?
a process through which additional or alternate instances of network devices are installed within network infrastructure. It is a method for ensuring network availability in case of a network device or path failure and unavailability.
What is Internet Redundancy?
The growing gap between the underprivileged members of the population who do not have access to computers or the internet; and the upper/middle-class, and young Americans living who have ample access and experience to computers and the internet.
What is the digital divide?
data that is passed into a definition/procedure at the time of its call.
What is a parameter/argument?
A loop that will run infinitely until a specific criteria is met.
What is a while loop?
The property of computation that stipulates that the order operations happens matters.
What is sequencing?
The process of splitting a message up into small packets which are sent across the network to be reassembled on the other side.
What is TCP or Transmission Control Protocol?
a type of social engineering attack often used to steal user data. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message and requires no technical manipulation.
What is a phishing attack?
Changing the data in one variable to have the same data but in another data format.
What is type casting?
When you try and access a place in a list that does not exist.
What is an out of bound exception?
The process of checking the middle value of a sorted list of items then creating a new list based on the value at that location. Repeating this process until the desired number is found or the list terminates
The method for representing positive and negative numbers in the same byte of data by using the leading digit to differentiate the sign.
What is two's compliment?
The security measure that requires some additional form of verification on top of a password in order to defend against cyber attacks.
What is Multi-Factor Authentication?
Inverts a given conditional statement or boolean value.
What is not?
It terminates the current loop and continues at the next available statement.
What is a break?
When an algorithm takes the same amount of time to execute for any given size of input.
What is constant time?
Encryption that utilizes two separate yet mathematically connected cryptographic keys. One to encode and one to decode. Public and Private Key encryption is an example.
What is Asymmetric Encryption?
a decision problem which is proved to be impossible to construct and algorithm that always leads to a correct yes or no answer.
What is an undecidable problem?
a way of connecting two conditional statements such that the result of those conditional statements now depends on both the original expressions and the way symbol/word connecting them.
What are logical operators?
Getting rid of an element in a list at a given index.
What is pop?
When multiple computers across a network are used to divide up and help compute something.
What is distributed computing?