Binary and the internet
Impact of Computing
Variables, Definitions and
Conditionals
Loops and Lists
Algorithms and concepts
100

The number 155 in Binary

What is 1001101?

100

the practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, via the internet.

What is crowdsourcing?

100

The term for when you have an if statement inside another if statement.

if ____:

    if ___:

What is nesting.

100

The position at a given place in a list.

What is the index?

100

The process of randomizing a list until the list is in order.

What is Bogo Sort?

200

a process through which additional or alternate instances of network devices are installed within network infrastructure. It is a method for ensuring network availability in case of a network device or path failure and unavailability.

What is Internet Redundancy?

200

The growing gap between the underprivileged members of the population who do not have access to computers or the internet; and the upper/middle-class, and young Americans living who have ample access and experience to computers and the internet.

What is the digital divide?

200

data that is passed into a definition/procedure at the time of its call. 

What is a parameter/argument?

200

A loop that will run infinitely until a specific criteria is met.

What is a while loop?

200

The property of computation that stipulates that the order operations happens matters.

What is sequencing?

300

The process of splitting a message up into small packets which are sent across the network to be reassembled on the other side.

What is TCP or Transmission Control Protocol?

300

a type of social engineering attack often used to steal user data. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message and requires no technical manipulation.

What is a phishing attack?

300

Changing the data in one variable to have the same data but in another data format. 

What is type casting?

300

When you try and access a place in a list that does not exist.

What is an out of bound exception?

300

The process of checking the middle value of a sorted list of items then creating a new list based on the value at that location. Repeating this process until the desired number is found or the list terminates

What is Binary search?
400

The method for representing positive and negative numbers in the same byte of data by using the leading digit to differentiate the sign.

What is two's compliment?

400

The security measure that requires some additional form of verification on top of a password in order to defend against cyber attacks.

What is Multi-Factor Authentication?

400

Inverts a given conditional statement or boolean value.

What is not?

400

It terminates the current loop and continues at the next available statement.

What is a break?

400

When an algorithm takes the same amount of time to execute for any given size of input.

What is constant time?

500

Encryption that utilizes two separate yet mathematically connected cryptographic keys. One to encode and one to decode. Public and Private Key encryption is an example.

What is Asymmetric Encryption?

500

a decision problem which is proved to be impossible to construct and algorithm that always leads to a correct yes or no answer.

What is an undecidable problem?

500

a way of connecting two conditional statements such that the result of those conditional statements now depends on both the original expressions and the way symbol/word connecting them.

What are logical operators?

500

Getting rid of an element in a list at a given index.

What is pop?

500

When multiple computers across a network are used to divide up and help compute something.

What is distributed computing?

M
e
n
u