What base does the binary number system use?
Base 2
What protocol requests and sends web pages?
HTTP
What type of compression allows the original file to be perfectly restored?
Lossless compression
What type of attack uses fake messages to steal passwords or financial data?
Phishing
What is the gap between people with technology access and those without it?
Data, Ethics, and Impact
Why is binary a natural fit for computers?
Transistors are on or off
What system translates a domain name into an IP address?
DNS
What type of compression permanently removes some data?
Lossy compression
What type of encryption uses the same key to encrypt and decrypt?
Symmetric encryption
What process fixes duplicate, missing, or inconsistent data?
Data cleaning
What decimal number does binary 10110 represent?
22
Which protocol routes packets across networks?
IP
Why are JPEG and MP3 often examples of lossy compression?
They discard less noticeable data
What type of encryption uses a public key and a private key?
Asymmetric encryption
Why is data visualization useful with large datasets?
It reveals patterns
Why does one hexadecimal digit represent exactly four bits?
16 values need 4 bits
How does TCP help when packets arrive out of order?
It reassembles them
Why can round-off errors happen when computers store decimal values?
Limited bits approximate values
Why is public key encryption useful on the internet?
No shared secret key is needed
How can biased source data affect a computer program’s results?
It can create biased outputs
A student says binary is “less advanced” than decimal because it uses fewer digits. What is wrong with that thinking?
Different bases represent the same values
Why can packet switching and redundancy make the internet more fault-tolerant?
Packets can reroute around failures
A calculator program gives a slightly inaccurate decimal answer, not a completely broken result. What type of error is most likely?
Round-off error
A fake Wi-Fi hotspot is created to intercept user data. What threat is this, and what can it do?
Rogue access point; steal data
Why is Creative Commons different from traditional copyright?
It allows permitted reuse