Variables & Programming
Safe Computing
Data
Impact
Networking
100

This type of variable can be used to represent words, characters, or phrases

string

100

An attack where a user is tricked into revealing private information, often via a deceptive email

Phishing

100

This is the unit of measurement for data

byte

100

The idea that some communities or populations have less access to computing than others, typically due to limitations of Internet speed or computer hardware access

digital divide

100

When you send a message to a friend, it is broken into these before traveling over the internet

Packet

200

This type of variable represents integers and decimals

Number

200

A type of computer malware that can make copies of itself

Computer virus

200

This type of error occurs when a number is too large to be represented

Overflow error

200

A model in which many online users combine efforts to help fund projects, generate ideas, or create goods or services (like Wikipedia)

crowdsourcing

200

These are rules that devices on the Internet agree to follow for easier and standardized communication

protocol

300

This type of variable represents if a value is true or false

Boolean

300

A method of user authentication which requires the user to present multiple pieces of evidence in multiple categories

Multifactor authentication

300

This type of error occurs when a decimal is too long to be represented

Roundoff error

300

The participation of volunteers from the public in a scientific research project (like collecting rain samples or counting butterflies)

citizen science

300

This is the protocol that assigns each device on the Internet an address

IP

400

This control structure has a branch of code run only if something happens first.

conditional or if-statement

400

A wireless access point that provides an attacker with unauthorized access to the traffic going over the network.

Rogue Access Point

400

This type of compression makes a file smaller without sacrificing quality

loseless

400

Scientific research that is open to the public to view and use

open access

400

When a network has redundant connections, it becomes this:

fault tolerant

500

This control structure repeats a code segment either a fixed number of times

for loop

500

The process of scrambling data to prevent unauthorized access.

Encryption

500

This type of data makes a file smaller, but also makes reduces the quality

lossy

500

Copyright that allows people to declare how they want their artistic creations to be shared, remixed, or used

Creative Commons

500

This computational models split a program into multiple tasks, some of which can be done at the same time

parallel processing