Number Systems
Encryption
Cybersecurity
TCP/Packets
Fun questions
100

Convert 11111000 from binary to decimal

248

100

What is the primary purpose of encryption?

  • A) To make data readable by everyone
  • B) To keep data secret from unauthorized users
  • C) To speed up data transmission
  • D) To store data permanently

B

100

What is a protocol? (In the context of the internet)

A set of rules for formatting and processing data

100

What is TCP?

TCP or Transmission Control Protocol is the protocol followed by all computers that splits data into Packets and sends them between devices. It ensures reliable communication between devices.

100

Who is objectively the best TA at HKIS?

Jaiman

200

Convert 252 from decimal to binary

11111100

200

What is the purpose of a digital certificate in a website?

A digital certificate is used to verify the authenticity of a website - it is used to confirm possession of encrypted keys.

200

What is the maximum number of devices that can be supported on an IP adress?

1

200

What is the contents of a packet? Describe each part of a packet.

Main data + meta data used for routing and identifying the data.

200

How many student got a 5 on the AP exam last year? Out of 15 Student

8

300

Convert 20 from decimal to hexadecimal

14

300

Which of the following statements best describes the properties of public key encryption?

  • A) It uses a single shared key for both encryption and decryption.
  • B) It relies on separate keys for encrypting and decrypting information.
  • C) It is based on problems that are easy for computers to solve.
  • D) It requires both parties to meet in person to exchange keys.

B

300

How many bits does an IPv4 address have?

32

300

What format of the data contained in packets?

A) HexaDecimal

B) ASCII

C) Binary

C) Text

C

300

How many APCSP lessons have you had so far this year?

43

400

Convert A4 from Hexadecimal to Decimal

164

400

Why is public key encryption considered secure?

  • A) Because it relies on computationally hard problems that are difficult for computers to solve without access to the private key.
  • B) Because it uses a single key that is shared between users.
  • C) Because it encrypts data in a way that can be easily decrypted by anyone.
  • D) Because it uses the blockchain to secure the connection.

A

400

Name 3 different levels of authentication and provide examples for each.

Single Factor Authentication - Password

Two Factor Authentication - Password + Email 

Multi Factor Authentication - Password + Email+ Fingerprint

400

What makes TCP Flexible and efficient?

Each packet can take different paths to reach its destination, which helps in optimizing routing and managing network congestion. This flexibility ensures that data can still be delivered even if some paths are slower or unavailable.

500

Convert C1 from Hexadecmial to Binary

11000001

500

What is the difference between a asymmetric encryption and symmetric encryption?

Symmetric encryption: A technique for encrypting data where the same key is used to both encrypt and decrypt data. Asymmetric encryption: A technique that uses different keys for encrypting versus decrypting data.

500

How many unique IP addresses can IPV4 support? (Speed doesn't matter, closest answer wins)

4,294,967,296

500

How is TCP fault tolerant?

 Since packets hold relatively smaller amounts of data, if one is lost it can be easily re-requested.