What is the decimal number "31" represented as in binary?
11111
What are extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations called.
What is Big Data
What are functions used for?
They are used to call repetitive pieces of code multiple times because something can be represented in less lines of code.
What is software is used in making packets go ordered.
What is Transfer Control Protocol(TCP)
Why is the Digital Divide a massive problem in society?
It increases the differences between the social classes and many households without the internet are less likely to lead a successful life.
What is the decimal number "329" represented as in binary?
101001001
What is data that describes other data?
What is Metadata
What is the difference between a parameter and an argument?
The values in the original function are known as the parameter while the argument is something that is inputted into when the function gets called.
What protocol are multiplayer videogames more likely to prioritize?
What is User Datagram Protocol (UDP)
What kind of malware is used to see every keystroke in a computer.
Only 7 seconds or no point. ((921 mod 8)+3)*3)
12
What kind of data is the world perceived in and how is it different to data such as photos or audio recordings.
The world is a form of analog data and it is original compared to the other forms of data. Photos and audio recordings can't interpret the real world because they would need an infinite amount of bits which is impossible and they are known as digital data.
Which type of algorithms are the most unreasonable and why is it a bad idea to use it?
Exponential algorithms are unreasonable as it ends up taking a lot of time compared to polynomials and also takes to much processing and the number of bits needed could be more than the amount atoms in the world.
What protocol does the World Wide Web use to transmit messages?
What is HTTP
What kind of encryption is opened by a public key and can only be decrypted by a private key?
What is Asymmetric encryption
Bonus 200 points: for why is it more effective compared to the other form of encryption.
What is the binary number "0.1111" in decimal fractions?
15/16
Why is parallel computing more effective than sequential computing?
Parallel computing is split across multiple devices which means it is faster because it is split into smaller parts.
Bonus 200 points: Is there a limit for the speedup of Parallel computing.(Only the team that answered the question.)
How do heuristics work and what situation can they be used in.
Heuristics are problem solving strategies which are not perfect but work to give a better solution compared to most solutions. The biggest examples of the use of heuristics in unsolved board games such as GO and chess. The GPS operates on heuristics and tries to show us the closest route.
How many addresses does IPV6 have over IPV4
296
What is multifactor authentication and why is it better compared to single factor authentication. What are common examples of it.
Multifactor authentication is 2 or more factors for verification to gain access of something and it is effective because it isn't simple to gain access quickly. Eye scan, Fingerprint, password, and verification code are good examples.