Data
The Internet
Coding
Algorithms
Cybersecurity and Global Impacts
100

A way of representing information using only two options. 

What is binary?
100

An agreed-upon set of rules that specify the behavior of some system.

What is a protocol?

100

Finding and fixing problems in an algorithm or program.

What is debugging?

100

A finite set of instructions that accomplish a task

What is an algorithm

100

This is software intended to damage a computing system or to take partial control over its operation

What is malware?

200

A process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples. 

What is Sampling?

200

The maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second. 

What is bandwidth?

200

A named reference to a value that can be used repeatedly throughout a program.

What is a variable?

200

A search algorithm that starts at the middle of a sorted set of numbers and removes half of the data; this process repeats until the desired value is found or all elements have been eliminated.

What is a binary search?

200

This is information about an individual that identifies, links, relates, or describes them.

What is personally identifiable information?

300

Data with values that change continuously, or smoothly, over time. 

What are Analog Data?

300

A chunk of data sent over a network.

What is a packet?

300

A data type that is either true or false.

What is a boolean value?

300

A search algorithm that checks each element of a list, in order, until the desired value is found or all elements in the list have been checked.

What is a linear search?

300

 This involves one key for both encryption and decryption.

What is symmetric key encryption?

400

This is the American Standard Code for Information Interchange and is a character encoding standard for electronic communication.

What is ASCII?

400

A computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols.

What is the internet?

400

A process that allows a procedure to be used only knowing what it does, not how it does it.

What is procedural abstraction?

400

This provides a "good enough" solution to a problem when an actual solution is impractical or impossible

What is a Heuristic?

400

A wireless access point that gives unauthorized access to secure networks.

What is a rogue access point?

500

This error occurs when attempting to represent a number that is too small. 

What is a Round-off Error?

500

A group of interconnected computing devices capable of sending or receiving data

What is a computer network?

500

This manages complexity in programs by giving a collection of data a name without referencing the specific details of the representation.

What is data abstraction?

500

The time used to complete a task sequentially divided by the time to complete a task in parallel

What is speedup time?

500

Pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message

What is public key encryption?