Data
The Internet
Coding
Algorithms
Cybersecurity and Global Impacts
100

A way of representing information using only two options. 

What is binary?
100

An agreed-upon set of rules that specify the behavior of some system.

What is a protocol?

100

Finding and fixing problems in an algorithm or program.

What is debugging?

100

A finite set of instructions that accomplish a task

What is an algorithm

100

This is software intended to damage a computing system or to take partial control over its operation

What is malware?

200

A piece of code that you can easily call over and over again

Function (a procedure is a type of function)

200

The maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second. 

What is bandwidth?

200

A named reference to a value that can be used repeatedly throughout a program.

What is a variable?

200

A search algorithm that starts at the middle of a sorted set of numbers and removes half of the data; this process repeats until the desired value is found or all elements have been eliminated.

What is a binary search?

200

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

What is encryption?

300

a collection of commands made available to a programmer - it's the way programs communicate with other programs

What is an API? 

300

A chunk of data sent over a network.

What is a packet?

300

A data type that is either true or false.

What is a boolean value?

300

A search algorithm that checks each element of a list, in order, until the desired value is found or all elements in the list have been checked.

What is a linear search?

300

 This involves one key for both encryption and decryption.

What is symmetric key encryption?

400

a mathematical operation that returns the remainder after integer division. Example: 7 MOD 4 = 3

What is modulo?
400

A computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols.

What is the internet?

400

A process that allows a procedure to be used only knowing what it does, not how it does it.

What is procedural abstraction?

400

This provides a "good enough" solution to a problem when an actual solution is impractical or impossible

What is a Heuristic?

400

In an asymmetric encryption scheme the decryption key is kept private and never shared, so only the intended recipient has the ability to decrypt a message that has been encrypted with a public key.

What is a private key?

500

This error occurs when attempting to represent a number that is too small. 

What is a Round-off Error?

500

A group of interconnected computing devices capable of sending or receiving data

What is a computer network?

500

This manages complexity in programs by giving a collection of data a name without referencing the specific details of the representation.

What is data abstraction?

500

To repeat in order to achieve, or get closer to, a desired goal.

What is iteration?

500

Pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message

What is public key encryption?