Boolean Operators
Cybersecurity
Programming Techniques
Some Big Data
Internet
100

The Boolean operator where every part of a statement must be true for the entire statement to be true. 

What is AND?

100

Converting data so it's illegible to hackers. 

What is encryption?

100

The structure that runs one line after another in order

What is Sequence?

100

Data compression that loses data during compression

What is Lossy? 

100

A specific set of rules. 

What is protocol?

200

The Boolean operator where any part of a statement can be true for the entire statement to be true. 

What is OR?

200

A shift cipher where each letter is shifted the same amount. 

What is a Caesar Cipher?

200

The logic structure in programming that uses IF statements to select certain values

What is Selection?

200

Additional data about the main data.

What is Metadata?

200

Units of data formatted using TCP/IP.

What are packets?

300

The Boolean operator with only one variable that has the output 1 when the input is 0 and vice versa.

What is NOT?

300

A trusted third-party file that verifies a site is legitimate. 

What is a Digital Certificate?

300

The continuous repeating of steps, achieved in programming by using loops. 

What is Iteration? 

300

When individual pixels are too large and the image begins to look blocky. 

What is pixelation?

300

A server that contains many IP addresses and their matching domain names. 

What is a Name Server?

400

When inputs 0 and 1 result in an output of 1.

What is an OR logic gate? 

400

A shared secret needed to decrypt a message. 

What is a Private key?

400

A step-by-step procedure for solving a problem or accomplishing a task

What is an algorithm?

400

An approach that gives results that are "good enough" when an exact answer is not necessary. 

What is a heuristic approach? 

400

A networking device that routes Internet traffic to the destination. 

What is a router?

500

When inputs 0 and 1 result in an output of 0.

What is an AND logic gate?

500

Where hackers flood a site with fake request making all the site's resources unavailable for legitimate users. 

What is a distributed denial-of-service (DDoS) attack? 

500

Reducing complexity by hiding details that aren't relevant to the task at hand (you don't have to know what's under the hood to drive a car). 

What is abstraction?

500

A problem that takes too long even for a computer to find the exact solution. 

What is computationally hard? 

500

Any computer that requests a service. 

What is a client?