This protocol is like your street address but on the internet.
What is internet protocol (IP).
This is the biggest decimal number that can be represented using 4-bits.
What is 15?
Cybersecurity needs to stay ahead of this law of computers, or hackers will easily be able to crack complex encryption.
What is Moore's Law?
These are used in programming to allow other people to make sense of your code. They are instructions that do not have any functionality in your program.
What are comments?
This is the solution to the following modulo math problem:
17 MOD 3 = _______?
What is 2?
This system allows for internet users to type in www.facebook.com instead of long IP address.
What is domain name system (DNS)
This number of bits can represent twice as many numbers as 8-bits can.
What is 9 bits?
This type of cyber attack is based off of flooding a single target with a large amount of requests cause it to shut down.
What is a distributed denial of service (DDoS)?
This type of statement allows your computer to make a decision based upon a certain condition.
Clicks, button presses, text changes and mouse movement are considered this for event-driven programming.
What are inputs?
This group of volunteers creates and maintains the protocols and standards for how the internet works.
What is the Internet Engineering Task Force (IETF)?
This table is used to represent English characters in both binary and decimal.
What is the American Standard Code for Information Interchange Table (ASCII)
This type of encryption uses a different key to encrypt and decrypt information.
What is asymmetric encryption? (Public Key is a form of asymmetric encryption)
You can use these as part of a function to allow that function to be used in several different occasions.
What is a parameter?
This programming feature is designed to run a particular segment of code a specific number of times.
What is a for-loop?
The internet is currently transitioning to IPv6, and updated version of the IP protocol that used 128-bit addresses instead of 32-bit. Why the increase in the number of bits?
32-bit addresses could not ensure that every internet-connected device had a unique address.
This binary number represents the binary equivalent to the red value in the RGB triple (178 , 66, 27)
What is 1011 0010?
What is 26! (26x25x24x....x3x2x1)
Determine the output to the console of the following code segment:
var a = 10;
var b = 2;
var c = 13;
a = (c - b)*4;
console.log("a");
What is a?
Receiving an email that looks legitimate, but is really a meant as a tool to steal your information is known as this type of scam.
What is phising?
This protocol ensures that every piece of information is transferred to the requesting user over the internet. (hint: the file is not sent all at once)
What is the transmission control protocol (TCP)
This is the highest intensity a single color in 24 bits/pixel can be represented in an RGB triple.
What is 255.
This type of malware encrypts a users files against their will unless a sum of money is paid in a given time.
What is ransomware?
var a = 3;
var b = 7;
var c = 10;
a = a+b
b = a+b
c = a+b
What are the values of a, b, and c?
a:10
b:17
c:27
This internet protocol ensures that all information (although maybe not complete) is sent to user as quickly as possible. It is most commonly used for with live streaming
What is UDP (user-datagram protocol).