The Internet
Security
Algorithms
Coding
Binary
100

What is the process of reducing the number of bits without losing information? This process is reversible.

What is Lossless Compression

100

Emily receives a mass chain of suspicious emails from a company asking her to change her password. What is this an example of?

What is Phishing

100

What is an agreed upon set of rules that generalizes the behavior of a process?

What is a Protocol

100

What type of data type is used when the outcome is either true or false?

What is Boolean

100

How many bits are in one byte?

What is 8 Bits

200

What is it called when a network can still function even if individual components fail?

What is Fault Tolerant

200

Drake wants to send private information to his friend by using a sequence that shifts the alphabet by a certain number. What is the method called?

What is Caesar Cipher

200

Jake is trying to pick the perfect gift for his mother by taking into account the price and the versatility of the potential objects. What is the method of finding the "good enough" choice given such possibilities?

What is a Heuristic Solution

200

What is a type of variable that can be used anywhere throughout the code and not just inside an onEvent()?

What is a Global Variable

200

What is the single unit of information in a computer that is usually represented by either 0 or 1?

What is a Bit?

300

What protocol error checks packets and ensures that they are properly received and ordered?

What is Transmission Control Protocol (TCP)

300

Steve enters in his credit card information by using his keyboard and he later finds out that his information was stolen. What was most likely used to steal Steve's personal card details?

What is Keylogging

300

The process of extracting shared characteristics of a software to generalize functionality

What is Procedural Abstraction

300

What control structure utilizes a Boolean conditional statement to make a decision?

What is an If Statement?

300

What type of error occurs when the number is too large for the computer to hold?

What is an Overflow Error

400

What is the name of the system that converts domain names into IP addresses?

What is the Domain Name System (DNS)
400

What method is utilized in which it asks the user to provide solid evidence for each layer of security such as knowledge, inherence, and possession?

What is Multifactor Authentication

400

What is a group of programming instructions, also called a "procedure"?

What is a Function

400

var num;

IF(MISSING STATEMENT)

DISPLAY(num+ " is odd")

What could be used in place of missing statement?

What is num % 2 == 1

400

What base ten number is represented by this binary value? 1011

What is 11

500

What is the protocol computers use to request different pages from the World Wide Web? It is the protocol that ensures proper communication.

What is Hypertext Transfer Protocol (HTTP)

500

The process of communication in which a public key is paired with a private key for decryption.

What is Public Key Encryption

500

What is the algorithm that continues to remove half of the data until the desired value is found?

What is Binary Search

500

A = TRUE

B = FALSE

What is the value of (!A || B)&& A?

What is False?

500

116 in Binary Form:

What is 1110100