Bit by Bit
The World Wide Web
Let's get Cyber
Miss you Karel
This & That
100

What is 10012 in decimal form?

9

100

A philosophy of making information and knowledge open and accessible to all people. A network of networks built on open, agreed upon protocols.

Internet

100

Images are made up of __, which are essentially a grid of values. Each value, or ___, encodes the color at that position in the image.

Pixel

100

The variable isOpen is used to indicate whether or not a store is currently open. What is the most appropriate data type for isOpen?

Boolean

100

Programmers use this concept to hide complex details behind a simpler interface — like driving a car without knowing how the engine works.

Abstraction

200

What is 100111012 in decimal form?

157

200

A new 128 bit version of the Internet Protocol..

IPV6

200

The __ encoding scheme allows us to encode colors as numeric data. It defines the amount of __, __, and __ light in a pixel. Each color channel can have a value between 0 and 255.

RGB

200

FOR loops and WHILE loops are both examples of this programming concept — repeating a block of code until a condition is met.

Iteration

200

This type of error occurs when a program tries to store a number too large for its allotted bits — like trying to pour a gallon into a cup.

*gangnam style

Overflow Error

300

What is the max value you can represent using 4 bits
?

15 in decimal or 1111 in binary

300

Used to translate domain names into IP addresses.

Domain Name System (DNS)

300

After this type of compression, the original file can be recovered exactly — not one bit different.

Lossless Compression

300

Which of the following has the greatest potential for compromising a user’s personal privacy?

  • A group of cookies stored by the user’s Web browser

  • The Internet Protocol (IP) address of the user’s computer

  • The user’s e-mail address

  • The user’s public key used for encryption

A group of cookies stored by the user’s Web browser

300

A photo's file size, location, date, and camera settings are all examples of this — data that describes other data.

Metadata

400

What is twice the value of this binary number 10102?

10100  (20 in decimal)

400

When multiple paths exist between two points. This improves reliability and makes the internet fault tolerable. Makes the routing system scalable.

Redundancy

400

Throwing away some of the data to save space. We can throw away a lot of data without any noticeable difference from the original.

Lossy Compression

400

When a problem has tasks that depend on the result of a previous step, this model is often required — no shortcuts, no skipping ahead.

Sequential Computing

400

Scientists use this computational tool to model a hurricane's path or test a car crash without any real-world risk — a virtual representation of a complex system.

Simulation

500

Consider the following numeric values.

  • Binary 1011
  • Binary 1101
  • Decimal 5
  • Decimal 12

Which of the following lists the values in order from least to greatest?

Decimal 5, binary 1011, decimal 12, binary 1101

500

Allows for sending MULTIPLE packets between two computers. __ checks that all packets arrived and can be put back in the proper order. The metadata must include a destination IP address, a from IP address, the message size and the packet order number.

Transmission Control Protocol (TCP)

500

__ key encryption is a type of asymmetric key encryption. There’s one key that encrypts the information and there is a different key that decrypts the information.

Public Key Encryption

500

Like a team of chefs each prepping a different dish simultaneously, this computing model divides work so multiple parts run at once.

Parallel Computing

500

Projects like Folding@home, where volunteers donate their computer's idle processing power to research, are examples of this — the public participating in scientific data collection.

Citizen Science