The Internet is the world's largest computing _______.
What is network?
True or False:
More data usually makes results more accurate.
What is True
What function adds something (text, numbers, etc.) into the console?
What is console.log()
Name one example of a cybersecurity threat.
What is malware, keylogging, phishing, ransomware, etc.
What makes up a computing system?
What is assigned to each device in the Internet?
What is an IP Address?
True or False:
It is possible for an algorithm to contain bias.
What is True
What are two types of iteration statements?
What is For Loop and While Loop
What is PII and how can attackers use it?
What is Personal Identifiable Information and hackers/attackers can use it to steal someone's identity, open up someone's accounts, etc.
What is a collaborative software?
What is a software where many people can collaborate on an document, spreadsheet, slides, etc at the same time?
The Internet contains many redundancies to make the network ______________.
(Note: the missing word is a concept)
What is Fault-Tolerant?
Which of the following is an example of analog data?
A: A recording of a concert
B: A runner's place in a race
C: Video Games
What is B: A runner's place in a race?
What type of operator is ">" in a boolean expression (choose the best option)?
A: Arithmetic Operator
B: Logic Operator
C: Relational Operator
What is C (Relational Operator)
What is personalizing a user's experience on an application, and possible PII becoming leaked to outside sources.
What is the difference between citizen science and crowdfunding?
What is citizen science using the public to collect data for an scientific research, and crowdfunding is people across the world providing financial support for projects, research, etc.
What does the Internet consist of?
What are communication protocols, servers, and/or routers? (only need one)
What is Metadata?
What is the data outside of the actual file (date, location, etc.)
Why are parameters useful in code?
What is reducing and simplifying code, improving the code's overall functionality, and/or improves flexibility of the function including the parameter.
What can an attacker NOT do through a rogue access point (multiple answers)?
A: Monitor the user's activity on their device
B: Manipulate the user's inputs.
C: Prevent the user from accessing a website.
D: See every activity of the user's device even before it connected to the network.
What is C (Prevent the user from accessing a website) and D (See every activity of the user's device even before it connected to the network).
What does it mean for an infrastructure to be "smart?"
Who makes a digital certificate for a website?
What is a Certificate Authorities
Select the Answer Choices that involve Crowdsourcing.
A: Uber
B: LEGO
C: Apple Health App
What is A and B? (Uber and Lego)
Write an if statement that finds the greatest number in numList (indexing in code.org rules, not pseudocode).
var max = numList[0];
for(var i=0; i < numList.length; i++) {if(numList[i] > max) {
max = numList[i]
}
Other formats may be acceptable.
}
Name two differences between public key encryption and symmetric encryption.
What is Public Key encryption uses two different keys while symmetric only uses one key.
Public Key Encryption is more secure than symmetric encryption.
Symmetric encryption only keeps the keys private while public Key encryption has both private and public keys.
Others answers may also be acceptable.
What is one benefit and harm of social media?
What is an easier way to communicate and connect with others, but also PII possibly becoming leaked and possible misinformation being spread.