CS Math
Data
Algorithms and Programming
Internet
Computer Innovation
100

What is the decimal number "31" represented as in binary?

11111

100

What are extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations called.

What is Big Data

100

What are functions used for?

They are used to call repetitive pieces of code multiple times because something can be represented in less lines of code.

100

What is software is used in making packets go ordered.

What is Transfer Control Protocol(TCP)

100

Why is the Digital Divide a massive problem in society?

It increases the differences between the social classes and many households without the internet are less likely to lead a successful life.

200

What is the decimal number "329" represented as in binary?

101001001

200

What is data that describes other data?

What is Metadata

200

What is the difference between a parameter and an argument?

The values in the original function are known as the parameter while the argument is something that is inputted into when the function gets called.

200

What protocol are multiplayer videogames more likely to prioritize?

What is User Datagram Protocol (UDP)

200

What kind of malware is used to see every keystroke in a computer.

What is keylogging?
300

Only 7 seconds or no point. ((921 mod 8)+3)*3)

12

300

What kind of data is the world perceived in and how is it different to data such as photos or audio recordings.

The world is a form of analog data and it is original compared to the other forms of data. Photos and audio recordings can't interpret the real world because they would need an infinite amount of bits which is impossible and they are known as digital data.

300

Which type of algorithms are the most unreasonable and why is it a bad idea to use it?

Exponential algorithms are unreasonable as it ends up taking a lot of time compared to polynomials and also takes to much processing and the number of bits needed could be more than the amount atoms in the world.

300

What protocol does the World Wide Web use to transmit messages?

What is HTTP

300

What kind of encryption is opened by a public key and can only be decrypted by a private key?


What is Asymmetric encryption

Bonus 200 points:  for why is it more effective compared to the other form of encryption.

400

What is the binary number "0.1111" in decimal fractions?

15/16

400

Why is parallel computing more effective than sequential computing?

Parallel computing is split across multiple devices which means it is faster because it is split into smaller parts.


Bonus 200 points:  Is there a limit for the speedup of Parallel computing.(Only the team that answered the question.)

400

How do heuristics work and what situation can they be used in.

Heuristics are problem solving strategies which are not perfect but work to give a better solution compared to most solutions. The biggest examples of the use of heuristics in unsolved board games such as GO and chess. The GPS operates on heuristics and tries to show us the closest route.

400

How many addresses does IPV6 have over IPV4

296

400

What is multifactor authentication and why is it better compared to single factor authentication. What are common examples of it.

Multifactor authentication is 2 or more factors for verification to gain access of something and it is effective because it isn't simple to gain access quickly. Eye scan, Fingerprint, password, and verification code are good examples.