Big Idea 1
Big Idea 2
Big Idea 3
Big Idea 4
Big Idea 5
100

Which of the following is a true statement about program documentation? 

A. Program documentation should not be changed after it is first written. 

B. Program documentation is only needed for programs in development; it is not needed after a program is completed. 

C. Program documentation is useful when programmers collaborate but not when a programmer works individually on a project.

D. Program documentation is useful during initial program development and also when modifications are made to existing programs.

D. Program documentation is useful during initial program development and also when modifications are made to existing programs

100

What is a bit?

The smallest unit of data in a computer, representing a 0 or 1.

100

What is an algorithm? Give a simple example.

A step-by-step set of instructions to solve a problem, like a recipe for baking a cake.

100

Name one input device and one output device.

Input device example: Keyboard; Output device example: Monitor.

100

What are some examples of cyber attacks?

Malware - is software intended to damage a computing system or to take partial control over its operation

Phishing - is a technique that attempts to trick a user into providing personal information

Keylogging - is the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

Rogue Access Point - is a wireless access point that gives unauthorized access to secure networks

200

Difference between analog and digital data?

Analog data: represented using an infinite scale of values within a range.

Digital Data: a discreet representation of data and represented by binary values.

200

What is metadata and some examples?

Metadata is data that describes other data.
Examples include:

  • Date and time the photo was taken

  • GPS location where the photo was taken

200

Explain the difference between a linear search and a binary search.

Linear search checks every item one by one; binary search divides a sorted list and eliminates half each time, making it faster.

200

What is fault-tolerance?

When a system can support failures and still continue to function. this is important because elements of complex systems fail at unexpected times, often in groups, and fault tolerance allows users to continue to use the network.

200

How can computing impact privacy?

Computing can collect and store personal data, which can lead to privacy concerns if misused.

300

A program designed to run blocks of code or functions in response to specified events (e.g. a mouse click) 

A. Event-driven Program 

B. Action-driven Program 

C. Response-driven Program 

D. User-driven Program

A. Event-driven program

300

Lossless vs Lossy data compression?

Lossless compression reduces file size without losing any data. The original file can be perfectly restored.
Example: ZIP files, text documents (like PDFs).

Lossy compression reduces file size by removing some data, which may lower quality but keeps the file usable.
Example: MP3 music files, JPEG images.

300

What is a function in programming, and why is it useful?

A function is a reusable block of code that performs a specific task. It helps avoid repeating code and makes programs easier to read and maintain.

300
What is bandwidth?

Maximum amount of data that can be sent in a fixed amount of time. usually measured in bits per second (bps)

300

What is crowdsourcing?

Is the practice of obtaining input or information from a large number of people via the Internet
Crowdsourcing offers new models for collaboration, such as connecting businesses or social causes with funding 

400

What is abstraction? 

A simplified representation of something more complex.

400

Why is data privacy critical when collecting information online? Describe one risk if privacy is not protected.

Data privacy protects personal info. Without it, info can be stolen or misused.

400

What is the difference between an if statement and a while loop?

An if statement runs code once if a condition is true; a while loop repeats code while a condition is true.

400

What is an IP address and how does it help devices communicate on a network?

An IP address is a unique identifier for devices on a network; it allows devices to locate and communicate with each other.

400

What is Multifactor Athentication?

A multi-step account login process that requires users to enter more information than just a password.  

500

What are the 4 types of errors and what do they do?

Syntax Error — a mistake in the code’s structure that stops the program from running.

Logic Error — a mistake in the program’s logic that causes it to give wrong or unexpected results.

Run-time Error — an error that happens while the program is running, causing it to stop.

Overflow Error — when a calculation exceeds the maximum limit a variable can store.

500

Explain how data encryption helps protect data during transmission over the internet, and name one limitation of encryption.

Encryption scrambles data so only authorized users can read it, protecting it from hackers during transfer. A limitation is that if encryption keys are stolen, the data can be decrypted by attackers.

500

Explain what an infinite loop is, why it can happen, and one way to prevent it in your code.

An infinite loop runs forever because its exit condition is never met. It can happen if the loop variable isn’t updated correctly. To prevent it, make sure the loop’s condition will eventually become false by properly updating variables inside the loop.

500

Computing device vs computing system vs computing network?

Computing system: a physical device that can run a program. ex: a phone, tablet, computer, router, or smart sensor.

Computing device: a group of computing devices working together for a common purpose.

Computer network: a group of interconnected computing devices capable of sending and receiving data.

500

Difference between Encryption & Decryption?

Encryption:
The process of converting readable data (plaintext) into a coded form (ciphertext) to protect it from unauthorized access.

Decryption:
The process of converting the coded data (ciphertext) back into readable data (plaintext) so authorized users can understand it.