Computer Science Trivia
Computer Science 1
Computer science 2
Computer Science 3
Computer Science 4
100

                                                                       

A method of data transmission in which a message is broken up into a number of packets

                                                       


    

Packet Switching

100

A self-contained set of instructions for performing a specific task within a computer program.

Function

100

A program construct that allows for a block of code to be repeated multiple times.

Loop

100

An accepted form of payment to pay for goods or services.

                                                       


    

Digital currency

100

The software that allow users to access and display web pages on their device screens

                                                       


    

Web browser

200

A binary digit with two possible values, 0 or 1.

Bit

200

                                                                     manipulating people into breaking normal security procedures (such as giving away their password) in order to gain illegal access to computer systems

                                                       


    

Social engineering

200

A tag-based programming language designed to create websites.

HTML

200

This is a decentralised database. All the transactions of networked members are stored on this database in a crypto network.                                                        

                                   


    

Blockchain

200

Executing instructions repeatedly, either for a set number of times or depending on a condition.

iteration/repetition

300

When the result of an addition is too large for the number of bits the computer is working with.

Overflow Error

300

                                                                       

A base 16 number system which uses 16 different ‘digits’ to represent each value.

                                                       


    

Hexadecimal number system

300

The act of gaining illegal access to a computer system without the user’s permission.                                                              

                                   


    

Hacking

300

If a hacker wants to ‘crack’ your password, they can systematically try all the different combinations of letters, numbers and other symbols until eventually they find your password.

                                                       


    

Brute Force attack

300

A worldwide collection of interconnected networks                                                                        


    

Internet

400

The mode of data transmission when data can be sent in one direction only (for example, from sender to receiver). An example of this would be sending data from a computer to a printer.

                                                       


    

Simplex transmission

400

This technique permanently removes data from a file in order to reduce its size.

Lossy Compression

400

A program which is often disguised as legitimate software but with malicious instructions embedded within it.

                                                       


    

Trojan Horse

400

An attempt at preventing users from accessing part of a network, notably an internet server.

                                                       


    

Denial of service attack

400

It is a container for storing data values in programming.

Variable

500

                                                                                A method of error detection which works on the principle that when data is sent to another device, this data is sent back again to the sender.
                                   


    

Echo Check

500

                                                                       

Derived from the term 'picture element', this is the smallest element used to make up an image on a display

                                                       


    

Pixel

500


A software that gathers information by monitoring a user’s activities carried out on their computer.

                                                       


    

Spyware

500

                                                                       

Programs that encrypt data on a user’s computer and ‘hold the data hostage’.

                                                       


    

Ransomware

500

                          

Malicious code installed on a user’s computer or on an infected website. The code redirects the user’s browser to a fake website without the user’s knowledge.

                                   



    

Pharming