The Internet
There's math in computer science?
Algorithms
It's all just bits
Let's Code
100

This protocol uses encryption to ensure that the data sent between your browser and a website remains private and secure

HTTPS - Hypertext Transfer Protocol Secure

100

20 % 7 + 15//4 - 5 % 6

4

6   +   3   -   5

100

This was created because we ran out of IP addresses.

Ipv 6.   128 bits

Was Ipv 4 use to be 32 bits

100
The name for the base 2 number system.
What is binary
100
The type of control structure that can be used for making decisions in a program based on the value of a Boolean expression.
What is an if statement (or selection, or branching)
200
The Internet depends on a layered communication system of _______ that manage abstractions.
What are protocols
200

The World Wide Web defines how we are all connected by millions of routers.

False

200

 A type of abstraction that bundles commands into one container (chunk of code) to make programs less complex.  We can use this code over and over again anywhere in our program _______________.

What is (procedural) abstract

What is a Function

200
RGB color values mimic the human eye by representing colors using 3 values of ____ bits each.
What is 8 bits
200
The process of running multiple iterations of a set of commands
What is looping
300
According to the domain naming system (DNS) about.example.com is a ______ of example.com.
What is subdomain?
300

This additive color model, which uses light to create colors on screens, is named for the three primary colors that combine to produce any color.

What is RBG

300

In determining the best route to take on recent trip, a maps application gave the user three options based on traffic patterns, road construction, and roadways. This term refers to the method for choosing the best alternative among the three possible routes.

What is a heuristic solution

300

I created a piece of digital art.  I can use the _________________ to specify how others can use or not use my work and how.

What is Creative Commons

300
The failure to create a correct condition that controls a repeat statement results in this type of programming error.
What is an infinite loop
400

An attempt to intercept a person's Wi-Fi data while they think they are connected to a legitimate connection.

Rogue Access

400

x = 3

y = 4

x = y -3

y = x + 5

z = x - y

What is z?

-5

400
The binary search algorithm makes this vital assumption about the list of data being considered.
What is the data is sorted
400

Tiffani compressed her video and sent it to a friend but the video looked grainy. What is this called?

What is lossy compression

400

An encryption method that relies on separate keys for encrypting and decrypting

Asynchronous Keys

500
The system used for translating a web address like www.google.com into an IP address that can be used to connect to the site's server.
What is the Domain Name System (DNS)
500
The binary number 00101101 in base-10.
What is 45
500

Assuming that forward tells a robot to move forward by 10 pixels and turn tells it to turn right by 90 degrees, this shape would be drawn by the following algorithm. forward forward turn forward turn forward forward turn forward turn

What is a rectangle

500

In computer science _________ refers to the specific region of a program where a defined variable, function, or object is "visible" and accessible 

Scope

500

def drawFish(x):

     #code not shown


Write the command needed to make this code run.  Use proper Python syntax.

drawFish(5)

or

val = 10

drawFish(val)