The Internet
Data
Cybersecurity
Miscellaneous
Term 1 Concepts
100

This is responsible for converting URLs to IP addresses.

What is the Domain Name System (DNS)?

100

These languages are used for accessing data stored in databases

What are database query languages?

100

In this type of encryption, letters of the alphabet are shifted by a set number.

What is a Caesar Cipher?

100

This problem with IPv4 will be solved by IPv6

There are not enough IP addresses for all the devices that will be connected to the Internet

100

A set of instructions, often used to tell computers how to do a certain task

What is an algorithm?

200

This is the first thing that happens when a new device is connected to the Internet.

What is 'It is assigned an IP address'?

200

This term describes data about data

What is metadata?

200

The process by which a message is scrambled using a key

What is Encryption?

200

This process reduces the number of bits it takes to store a file while preserving all aspects of the file

What is lossless compression?

200

In the following code segment, this value is stored in b. 

a ← 1
b ← a 
a ← 2 


What is 1?

300

This characteristic of the Internet allows it to continue to function despite router and connection failures.

What is fault-tolerant?

300

Machine-readable information is all in this format

What is binary?

300

You should do this to make it harder for hackers to crack your encryption

What is increase the number of bits in your encryption key?

300

This protocol for sending information checks for errors and makes sure that all packets are sent

What is the Transmission Control Protocol (TCP)?

300

This process begins with taking the biggest problem and breaking it down into smaller problems that are easier to solve

What is top down design?

400

An attempt to deny users access to a Web site's resources by flooding the website with requests from multiple systems.

What is a Distributed Denial of Service (DDoS) attack?

400

The ability of computers to learn and adapt information and draw inferences by themselves as large amounts of data is processed?

What is Machine Learning?

400

This problem with symmetric encryption makes it hard to use

What is 'people have to meet up ahead of time to exchange a private key'?

400

The s in https stands for

What is secure?

400

The following expression evaluates to:

(9 ≠ 13 AND 12 < 4) OR 15 < 9

What is False?

500

These allow different devices from different manufacturers to all communicate with each other over the Internet

What are protocols?

500

This term refers to throwing out data that is not usable because it is not in a good format

What is data sanitization?

500

Public key encryption is an example of what type of encryption?

What is asymmetric encryption?

500

In this type of attack, someone spams a web server repeatedly until it crashes, causing it to spit out valuable information as it crashes.

What is a Distributed Denial of Service (DDoS) attack?

500

This initial value of number would cause the loop to be skipped

REPEAT UNTIL(number MOD 2 = 0)
{
  number ← number - 1
}

What is any even number