Big Idea 1
Big Idea 2
Big Idea 3
Misc. Terms
100

A software development technique where two programmers work side-by-side: one writes code while the other reviews it in real time.

Pair Programming

100

The process of turning raw facts and figures into visual formats like charts and graphs to help humans understand patterns.

Data Visualization

100

A step-by-step set of instructions used to solve a problem or complete a task.

Algorithm

100

A standardized way for software applications to communicate and interact with each other.

API (Application Programming Interface)

200

Bias that results from prejudice in the algorithms or the data used in computing systems, often causing unfair outcomes.

Algorithmic Bias

200

Data that provides information about other data, such as the date created or file size.

Metadata

200

A control structure that repeats a set of instructions as long as a condition is true.

Loop

200

Unequal access to computing resources and the internet based on socioeconomic, geographic, or demographic factors.

Digital Divide

300

Which of the following best explains how open-source projects benefit innovation?
A. They are always free
B. They are developed solely by professionals
C. They allow collaborative contributions and improvements
D. They are more secure by default

C. They allow collaborative contributions and improvements

300

Which of the following is an advantage of using lossless data compression?
A. Files take up less space but lose some quality
B. Original data can be perfectly reconstructed
C. It's faster than lossy compression
D. It reduces CPU usage

B. Original data can be perfectly reconstructed

300

What is the purpose of using a selection (IF/ELSE) statement in a program?
A. To organize data into lists
B. To repeat code multiple times
C. To make decisions and execute code based on conditions
D. To define new variables

C. To make decisions and execute code based on conditions

300

Which of the following best describes a heuristic in computer science?
A. A method that guarantees an optimal solution
B. A rule-based encryption system
C. A technique for reducing problem-solving time that may not always be perfect
D. A way to randomize output

C. A technique for reducing problem-solving time that may not always be perfect

400

A new facial recognition system has a higher error rate for certain demographics. What is the most responsible step a developer should take?
A. Ignore it
B. Collect more representative data
C. Increase image brightness
D. Decrease resolution

B. Collect more representative data

400

A student has a dataset with missing values in some records. What is the best approach to preserve data integrity?
A. Delete all rows
B. Ignore the missing values
C. Fill in estimated values using statistical methods
D. Fill all with zeroes

C. Fill in estimated values using statistical methods

400

Which of the following will call the function drawStar? A. drawStar
B. drawStar();
C. function drawStar;
D. function drawStar();

B. drawStar(); 

400

A process that transforms data into a fixed-size string of characters, typically used for ensuring data integrity.

Hashing

500

Which of the following is a true statement about program documentation?
A. Program documentation should not be changed after it is first written.
B. Program documentation is only needed for programs in development; it is not needed after a program is completed.
C. Program documentation is useful when programmers collaborate but not when a programmer works individually on a project.
D. Program documentation is useful during initial program development and also when modifications are made to existing programs.

D. Program documentation is useful during initial program development and also when modifications are made to existing programs.

500

An online store uses 6-bit binary sequences to identify each unique item for sale. The store plans to increase the number of items it sells and is considering using 7-bit binary sequences. Which of the following best describes the result of using 7-bit sequences instead of 6-bit sequences?
A. 2 more items can be uniquely identified.
B. 10 more items can be uniquely identified.
C. 2 times as many items can be uniquely identified.
D. 10 times as many items can be uniquely identified.

C. 2 times as many items can be uniquely identified.

500

How many times will this loop iterate?
var x=5;
while (x>=0){
    var squared=Math.pow(x, 2);
    console.log(squared);
    x=x-1;
}

6 times

500

A malicious or unauthorized Wi-Fi hotspot set up to trick users into connecting, allowing attackers to intercept or manipulate network traffic.

Rogue Access Point