What are some examples of DNS zones?
- .com
- .org
- .net
- .edu
What is Phishinig?
A technique that attempts to trick a user into providing personal information.
What is the best way to describe how computing devices represent information?
Represents data as bits which is either a 0 or a 1.
'What is a spreadsheet?
An electronic document in which data is arranged in the rows and columns.
What is an Algorithms?
a set of rules or a method used for solving a problem.
What is it called when a machine can run a program?
Computing Device
True or False: Symmetric Key Encryption is what involves one key for both encryption and decryption.
True
True or False: Is 16 the smallest number for which an overflow error occurs?
True
What is Byte?
A unit of data that is eight binary digits long.
What are examples of Output devices of computer?
Monitors, Printers, Speakers, Headphones, etc.
True or False: Each device on the internet has a unique number called a DNS.
False
Complete the sentence: Keylogging- The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to .....
Passwords and other confidential information.
What is the term called when it can hold only one of two values: 0 or 1?
Bit
What does ASCII stand for? What does it mean?
American Standard Code for Information Interchange- The most common character encoding format for text data in computers and o the internet.
What are examples of Input devices of computer?
Keyboard, Mouse, Touch screen
Is a sequence of direct connections, a Computing System or Path?
Path
What it is called when the Information about an individual identifies, links, relates, or even describes them?
Personally Identifiable Information (PII)
What is the total number that can be represented with an 8-bit binary?
256
What is this called? 17.172.224.47
IP Address
What is an Output?
Any information delivered from a program to a device.
What is it when a group of connected computers can send or receive data?
Computing Network
Is this correct: Encryption is when a process that reverses encryption, taking a secret message and reproducing the original plain text.
No, It's Decryption
What is Lossy Compression?
An act that results in the loss of some information or minimizes the number of bits needed to represent something.
What is this an example of F= 01000110?
Binary Code
What are the differences between sequential and event-driven programming?
Sequential run in the order they are written. Event-driven run in response to the user interactions.