Coding Basics
Binary Numbers
Cyber Safety
Miscellaneous
100

What is a variable in coding?

A variable is a storage container that holds data, like numbers or text, that can change during a program.

100

What is the smallest unit of data in a computer?

A bit


100

This type of cyberattack involves tricking someone into clicking on a fake email or link to steal their personal information.

Phishing

100

What is pseudocode?

A step-by-step description/plan of your code in English text

200

What is an "if statement," and how is it used?

An if statement checks a condition and runs a block of code only if the condition is true.

200

What digits are used in the binary number system?


0 or 1


200

This malicious software can harm your device by stealing your files or slowing it down.

malware

200

Who is the woman who helped invent the first compiler for a programming language?


Grace Hopper

300

How does a loop help make code more efficient?

A loop repeats code automatically, so you don’t have to write the same instructions multiple times.

300

 Why do computers use binary instead of decimal?

Computers use binary because they work with electrical signals, which can be ON (1) or OFF (0)

300

In this attack, hackers demand money to give back your locked files.

What is ransomware?

300

Which programming language is most widely used?

JavaScript or HTML

400

What is an algorithm?

An algorithm is a step-by-step set of instructions to solve a problem or complete a task.

400

What is one real-world example of binary in action?


Light switches (ON = 1, OFF = 0), computer processing

400

Hackers flood a website with too much traffic in this type of attack, making it impossible to use

Denial of Service (DoS) attack?

400

What is debugging?


Finding and fixing errors in code.

500

What's a Boolean?


  1. a binary variable, having two possible values called “true” and “false.”.







500

How many bits make up a byte?

8

500

In this attack, hackers secretly intercept your communication with another person or device to steal private information.

Man-in-the-Middle (MitM) attack

500

What do strings always need to have?

quotes