Internet
Data Analysis
Programming
Data Security
Computing Innovations
100

The Internet is the world's largest computing _______.

What is network?

100

True or False:

More data usually makes results more accurate.

What is True

100

What function adds something (text, numbers, etc.) into the console?

What is console.log()

100

Name one example of a cybersecurity threat.

What is malware, keylogging, phishing, ransomware, etc.

100

What makes up a computing system?

What are many interconnected computing devices to accomplish a goal.
200

What is assigned to each device in the Internet?

What is an IP Address?

200

True or False:

It is possible for an algorithm to contain bias.

What is True

200

What are two types of iteration statements?

What is For Loop and While Loop

200

What is PII and how can attackers use it?

What is Personal Identifiable Information and hackers/attackers can use it to steal someone's identity, open up someone's accounts, etc.

200

What is a collaborative software?

What is a software where many people can collaborate on an document, spreadsheet, slides, etc at the same time?

300

The Internet contains many redundancies to make the network ______________.

(Note: the missing word is a concept)

What is Fault-Tolerant?

300

Which of the following is an example of analog data?

A: A recording of a concert

B: A runner's place in a race

C: Video Games

What is B: A runner's place in a race?

300

What type of operator is ">" in a boolean expression (choose the best option)?

A: Arithmetic Operator

B: Logic Operator

C: Relational Operator

What is C (Relational Operator)

300
What are the pros and cons of cookies?

What is personalizing a user's experience on an application, and possible PII becoming leaked to outside sources.

300

What is the difference between citizen science and crowdfunding?

What is citizen science using the public to collect data for an scientific research, and crowdfunding is people across the world providing financial support for projects, research, etc.

400

What does the Internet consist of?

What are communication protocols, servers, and/or routers? (only need one)

400

What is Metadata?

What is the data outside of the actual file (date, location, etc.)

400

Why are parameters useful in code?

What is reducing and simplifying code, improving the code's overall functionality, and/or improves flexibility of the function including the parameter.

400

What can an attacker NOT do through a rogue access point (multiple answers)?

A: Monitor the user's activity on their device

B: Manipulate the user's inputs.

C: Prevent the user from accessing a website.

D: See every activity of the user's device even before it connected to the network.

What is C (Prevent the user from accessing a website) and D (See every activity of the user's device even before it connected to the network).

400

What does it mean for an infrastructure to be "smart?"

What is when it is able to make its own decisions based on the data it collects from interconnected technology (sensors, algorithms, etc), in order for something to become more efficient.
500

Who makes a digital certificate for a website?

What is a Certificate Authorities

500

Select the Answer Choices that involve Crowdsourcing.

A: Uber

B: LEGO

C: Apple Health App

What is A and B? (Uber and Lego)

500

Write an if statement that finds the greatest number in numList (indexing in code.org rules, not pseudocode).

var max = numList[0];

for(var i=0; i < numList.length; i++) {

  if(numList[i] > max) {

     max = numList[i]

  }

Other formats may be acceptable.

}

500

Name two differences between public key encryption and symmetric encryption.

What is Public Key encryption uses two different keys while symmetric only uses one key. 

Public Key Encryption is more secure than symmetric encryption. 

Symmetric encryption only keeps the keys private while public Key encryption has both private and public keys. 

Others answers may also be acceptable.

500

What is one benefit and harm of social media?

What is an easier way to communicate and connect with others, but also PII possibly becoming leaked and possible misinformation being spread.