Algorithms
The Internet
Cybersecurity
Bits
Random!!
100

It is the way that we measure efficiency.

What are steps?

100

Using multiple paths to avoid outages if one goes down.

What is redundant routing? 

100

A voice call scam designed to get personal information by pretending to be someone you are not.

What is vishing?

100

The name for the base 2 number system.

What is binary?
100

Mr. Stevens cat's name.

What is Roger?

200

An example of an unsolvable problem.

What is the halting problem?

200

This is the standardized ways for creators to grant copyright permissions to others.

What is a creative commons license?

200

A cipher in which letters are shifted all by a specific number.

What is a Caesar cipher?

200

Everything is represented at the smallest level on a computer.

What are bits or binary?

200

One of the other countries that Mr. Stevens has been to before.

What is Korea, China, Japan, Iceland, or Canada?

300
Computing that takes places over multiple computers to do the same task.

What is distributed computing?

300

The Internet depends on a layered communication system of _______ that manage abstractions.

What are protocols

300
This will eventually cause our current encryption methods to become outdated and obsolete.

What are quantum computers?

300

The type of compression used by news stations for on the ground reporting.

What is lossless compression.

300

The state that Mr. Stevens is from.

What is Indiana?

400

Breaking down large computational tasks into smaller, independent parts that can be processed simultaneously by multiple processors or cores.

What is parallel computing?

400

The system used for translating a web address like www.google.com into an IP address that can be used to connect to the site's server.

What is DNS

400

RSA Encryption which is also known as this.

What is public key encryption? 
400

How many bits it would take to represent 181 in binary

What is 8 bits?

400

The car that Mr. Stevens drives.

What is a Honda Civic?

500

The number of steps it would take to do a binary search of 34 objects.

What is 6 steps?

500

The order of the TCP/IP layers. 

Internet Transport Network Application

What is: Application Transport Internet Network?

500

Commonly with passwords as once it is created it cannot be reversed.

What is hashing?

500

10110101 in decimal.

What is 181?

500

A global infrastructure development strategy adopted by the government of China in 2013 to invest in more than 150 countries and international organizations.

What is the Belt and Road Initiative?