Binary & Data
Programming Concepts
Internet & Networks
Cybersecurity
Ethics & Society
Gomez Style Questions
100

(Question 1)These are the next three binary numbers after 1000 1101.

What are 1000 1110, 1000 1111, 1001 0000?

100

(Question 4) Starting with count = 0 and n = 1, this code runs 

REPEAT UNTIL (n ≥ 10) with n ← 1 and count ← count + n each loop. This value is displayed. 

What is 1? (n resets to 1 each iteration, so count never accumulates — displays 1)

100

(Question 7) This is how the Internet ensures reliably transmitted data. 

What is using TCP?

100

(Question 44) A cybercriminal sets up a fake Wi-Fi access point at a library to intercept bank deposits. This is the type of attack. 

What is a Rogue Access Point attack?

100

(Question 15) Certain countries have no members on the British Library's digital platform despite it being open worldwide. This concept explains why. 

What is the digital divide?

100

Definition of a Loop.

What is: Code that makes something happen over and over again

200

(Question 14) Eight-bit storage can represent 2⁸ = 256 levels. This is the maximum integer value that can be stored in eight-bit memory.

What is 255?

200

(Question 11) In the REPEAT UNTIL (x > 10) loop with x ← x * 3, starting at x = 1, this is the value displayed at the end. 

What is 27?

200

(Question 30) This describes the relationship between the Internet and the World Wide Web. 

What is: the Internet connects servers/devices, and the WWW uses the Internet to transmit/receive HTML?

200

(Question 47) An email impersonating the CEO of a company to trick an employee into wiring money is this specific type of phishing. 

What is whaling?

200

(Question 17) The DMCA is intended to do this as it relates to digital content. 

What is provide protection for intellectual property in digital format that has copyright status?

200

Definition of Variable.
Bonus: Give an example of a variable

Triple Bonus: explain how you can use the variable

Definition: What is a value that can change depending on information passed to the program.

300

(Question 9) A coffee shop register displays $0.999999 instead of $1.00. This is the reason why.

What is a rounding error (decimal numbers are stored imprecisely)?

300

(Question 23) A procedure eval(n) returns true only if n > 10 or n < -5. This single Boolean expression assigns the same result to tEquiv. 

What is tEquiv ← (n < -5) OR (n > 10)?

300

(Question 36) A program requires three independent steps: A=50ms, B=40ms, C=80ms. With two parallel processors, this is the minimum completion time. 

What is 90 msec?

300

(Question 69) These are two weaknesses of two-factor authentication (2FA). 

What are luring users to a phishing site, and sniffing session cookies?

300

(Question 64) NASA makes all its space data freely available for any scientist to analyze. This is what it is an example of (two answers). 

What are open data and citizen science?

300

Definition of Decimal, IN COMPUTER SCIENCE!!!!

What is numbers represented with base 10 digits

400

(Question 27) 16-bit memory allows 2¹⁶ = 65,536 possible combinations. This is the greatest integer that can be stored.

What is 65,535?

400

(Question 25) With a = User Input, b = 2*a, c = 40, b = b+c, e = b/2, e = e - a — this is what the Display e instruction always outputs. 

What is 20?

400

(Question 40) This is NOT a common protocol used on the Internet or World Wide Web, though TCP, HTTP, and UDP are. 

What is IETF (it is a standards body, not a protocol)?

400

(Question 12) A journalist changes all 'p' characters to 'q' and then changes all 'q' back to 'p.' This is whether the file is restored.

What is no? (original 'q' characters were also converted to 'p')

400

(Question 13) Using zip code as an input in a wait-time prediction algorithm at a Social Services kiosk is likely to cause this. 

What is computing bias?

400

HTTP stands for
Bonus: HTTPS Stands for

What is Hyper Text Transfer Protocol
What is Hyper Text Transfer Protocol Secure

500

(Question 2) Large amounts of structured or unstructured data that can be mined and examined by organizations are known by this term.

What is big data?

500

(Question 41) This code segment with i=1, j=2 loops comparing aList[j] to aList[i] and swapping, then incrementing j. This is what it fails to do correctly. 

What is sort the entire list? (only smallest element ends in position 1)

500

(Question 70) The World Wide Web can do these two things that the Internet cannot. 

What are interlink sites and interpret web pages?

500

(Question 55) Popular antivirus software uses heuristic algorithms. This is the main advantage of that approach. 

What is it looks for behavioral patterns common to a class of viruses?

500

(Question 59) This action would do the LEAST to bridge a digital divide for a school population relying on a self-certification system. 

What is making sure every student has an ID before coming to school?

500

Definition of Parrallel Computing

What is Breaking a program into smaller sequential operations using multiple processors.