Networks
Prerelease
Ethics
Data Security
Hardware
100

The cable that needs the least amount of repeaters.

What is fibre optic?

100
This is how you concatenate two strings in Pseudocode. Like "cat" + " " +  "dog"

What is "cat" & " " & "dog"?

100

This is the legal term for a formal recognition of ownership of a created and published work. 

What is copyright?

100

Assuming a byte of 10010011 and a parity bit of 1, this is the type of parity bit.

What is odd parity bit?

100

This memory is the fastest but most expensive in the computer.

What is a register?

200

This wireless frequency can best penetrate a wall.

What is infrared?

200

This is how you would find a character in a string in Pseudocode WITHOUT a find function.

What is

FOR i <-- 1 to length(word)
   IF word[i] == term THEN
      location <-- i
ENDFOR

?

200

This is what it's called to copy someone else's work and list it as your own.

What is plagiarism?

200

These are five examples of data validation.

What are:
presence check
format check
length check
range check
type check
?

200

This is the key difference between LCD and LED displays.

What is the backlight?

300

For GEO satellites, you only need this many total satellites to provide full coverage to the whole earth.

What is three?

300

In Python, you would write this:

the_file = open('Trump is the best.txt', 'r')

But this is how it's written in Pseudocode.

What is

OPENFILE "Trump is the best.txt" FOR READ

?

300

This is a major difference between shareware and freeware.

What is a trial period?

300

This is the law that guarantees data privacy.

What are data protection laws?

300

Solid state storage uses this types of logic gates to hold values in memory.

What is NAND or NOR?

400
For bit steaming, hitting these cause the browser to send a message to the media server to start and stop the data transmission.

What is high and low water marks?

400

This is how you would write your name to a text file called "students.txt" is Pseudocode?

What is

WRITEFILE "students.txt", "Pooh"

?

400

Not developing software that destroys the environment would be acting for which of the eight principles of computer ethics.

What is the public good?

400

These are 4 methods to protecting data security.

What are:
good passwords / authentication / biometics
firewalls
anti-virus software
user access levels
good physical security
?

400

For a laser printer, the laser removes an electric charge at this location.

What is the drum?

500

This is the number of bits for the hostID for Class C in IPv4.

What is 8 bits?

500

This is how you would do a linear search of an array of integers in Pseudocode.

What is

INPUT search_term
found <-- False
FOR index <-- 1 to length(the_array) DO
   if the_array[index] == search_term THEN
      location <-- index
      found <-- True
      break
ENDFOR

500

These are 3 of the 8 principles of computer science ethics.

What are:
PUBLIC
CLIENT AND EMPLOYER
PRODUCT
JUDGEMENT
MANAGEMENT
PROFESSION
COLLEAGUES
SELF
?

500

This person has the responsibility for guaranteeing data integrity.

Who is the DBA?

500
An optical disc driver uses both these two lasers to read from a disk.

(Note: NOT blue/red)

What are tracking laser and read-write laser?