Number Systems & Data Representation
Internet Structure & Reliability
Compression, Storage, and Errors
Cybersecurity & Encryption
Data, Ethics, and Impact
100

What base does the binary number system use?

Base 2

100

What protocol requests and sends web pages?

HTTP

100

What type of compression allows the original file to be perfectly restored?

Lossless compression

100

What type of attack uses fake messages to steal passwords or financial data?

Phishing

100

What is the gap between people with technology access and those without it?

Data, Ethics, and Impact

200

Why is binary a natural fit for computers?

Transistors are on or off

200

What system translates a domain name into an IP address?

DNS

200

What type of compression permanently removes some data?

Lossy compression

200

What type of encryption uses the same key to encrypt and decrypt?

Symmetric encryption

200

What process fixes duplicate, missing, or inconsistent data?

Data cleaning

300

What decimal number does binary 10110 represent?

22

300

Which protocol routes packets across networks?

IP

300

Why are JPEG and MP3 often examples of lossy compression?

They discard less noticeable data

300

What type of encryption uses a public key and a private key?

Asymmetric encryption

300

Why is data visualization useful with large datasets?

It reveals patterns

400

Why does one hexadecimal digit represent exactly four bits?

16 values need 4 bits

400

How does TCP help when packets arrive out of order?

It reassembles them

400

Why can round-off errors happen when computers store decimal values?

Limited bits approximate values

400

Why is public key encryption useful on the internet?

No shared secret key is needed

400

How can biased source data affect a computer program’s results?

It can create biased outputs

500

A student says binary is “less advanced” than decimal because it uses fewer digits. What is wrong with that thinking?

Different bases represent the same values

500

Why can packet switching and redundancy make the internet more fault-tolerant?

Packets can reroute around failures

500

A calculator program gives a slightly inaccurate decimal answer, not a completely broken result. What type of error is most likely?

Round-off error

500

A fake Wi-Fi hotspot is created to intercept user data. What threat is this, and what can it do?

Rogue access point; steal data

500

Why is Creative Commons different from traditional copyright?

It allows permitted reuse

M
e
n
u