Binary
Algorithms
Cyber Security
Internet
Functions
100

What number will be displayed as a result of this binary 0001

1

100

 Define an Algorithm

A step by step process that describes how to solve a problem in a way that always gives a correct answer.

100

What is Personally Identifiable Information?

Information about an individual that can be used to identify a specific person.

100

What is the World Wide Web?

A system of linked pages, programs, and files accessed through the internet. 

100

What is a function?

A block of code which only runs when called. Must be tabbed to be included in a function.

200

What number will be displayed as a result of this binary 0101 

5

200

What is an undecidable Problem?

A problem where no algorithm can be constructed that can provide a yes or no answer.

200

What are 3 of the most popular types of cyber attacks?

Phising, Keylogging, and Malware.

200

Define a computing network?

A group of interconnected computing devices capable of sending or receiving data.

200

Define a function call?

An expression containing the function name followed by function call operator. 

300

What number is displayed as a result of this binary sequence. 1000 1101.

141

300

What is efficiency in Algorithms? 

A measure of how many steps are needed to complete an algorithm. 

300

Define a rouge access point?

A wireless access point that gives unauthorized access to a secure network.(Can be a physical device or a virtual point.)

300

How is redundancy used in the internet when transmitting data.

Redundancy is used as their are multiple alternative paths between networks to ensure a connection even if one component fails. 

300

What is a parameter?

Special kind of variable used in a function to refer to one of the pieces of data provided as input to functions.

400

What number is displayed as a result of this binary sequence. 1011 0101.

181

400

What is reasonable time with Algorithms? 

Polynomial efficiency or lower that runs in a reasonable amount of time.
400

What is a Caesar's Cipher?

A symmetrical encryption of data that uses the same key to encrypt and decrypt. Will shift each letter of the alphabet a certain number of letters. 

400

What is the DMS system

The domain naming system.

400

Define a string?

An ordered sequence or characters. Can contain spaces and periods. 

500

What number is displayed as a result of this binary sequence. 1010 1100 1011.

2763

500

When is a Linear search better than a Binary search?

A Linear search is better when using a small list or when the list is not sorted. 

500

Define a virus?

A code that copies itself into other files and spreads across an entire system. Viruses may hide in the code of the legitimate programs. 

500

What is the difference between Transmission control protocol and User datagram protocol. 

Transmission Control protocol is slower however is much more accurate as it numbers each packets and places them in the the correct order. User Datagram protocol uses speed however is not accurate.

500

What is the difference between a Local and Global variable?

Local variables are temporary and can only be used in the function where they are defined. Global variables are permanent and can be used anywhere in your code.