First Half Materials
Encryption
SQL
Webpages
Python
100

what is 9 in binary?

1001

100

Decrypt 'nombizdon' with key 10 (Caesar cypher).

'decrypted'

100

What does SQL stand for, and what is it used for.

Structured Query Language, and it is used to manage and index databases.

100

HTML is structured via a series of containers bookended by _____.

Tags

100
If x=[0,True,'False',3.5,3//1, 4], what is the data type of x[2]?

String

200

What is 2F in decimal?

47

200

What is a One-Way Hash

An algorithm that encrypts a message, but cannot be decrypted.

200

What is the standard format of a sequel command?

SELECT column1, column2... FROM table

200

What does the <head> portion of an html file contain?

Backend information, such as tab text and CSS information.

200

if x = False, what is the output of the following code?

if Not x:

    return(5)

else:

    return(4)

5

300

what is 1101 in hex?

D

300

What is a vigerene cypher?

A cypher where you put each character through a Caesar cypher, determining the key by the displacement from a letter in a key phrase.

300

What does COUNT() do?

Returns the number of occurrences rather than their discrete data. It is usually bared with GROUP BY to organize the data.

300

How many heading tags are there?

6

300

if x = [0,1,3,5,7,2,4], what is the output of max(x)-min(x))

7

400

Describe Van Neuman Architecture

There is a command line and a memory list. Commands are written (in binary) on the first four digits of each command line. Each tells it to onload, offload, or alter the data in a temporary variable R, or end the program.

400

How does block cypher work?

Convert each letter of your message to a number, then align those numbers in a matrix the same length (not height) as your key. Then use matrix multiplication with the message matrix and the key matrix. If you end with numbers greater than 26, mod 26 each number. Convert end numbers back to letters and reformat.

400

What are wildcard characters?

Command parameters that allow for greater filtering of string/varchar data.

400
What does CSS manage on a webpage?

Aesthetics (color, centering, font, etc.)

400

If you attempt to modify string S, attempting S[x]='new' will throw an error, but attempting  S=S[:x] + S[x+1:] will output the desired result. Why is that?

Strings are an immutable data type (meaning they cannot be modified), and the second method is technically constructing a new string from pieces of the old one.

500

What is elegance as it pertains of Algorithms?

Executing an Algorithm in an efficient of creative way.

500

What are the variables that go into creating RSA (Public Key Encryption) keys

p/q = random, large prime numbers

n = p X q, m = (p-1)x(q-1)

e = large number that doesn't share any factors with m

d = number between 0 and m that completes     (e x d)%m=1

Public key = (n,e) Private key = d

500
What is a general for a joined SELECT command?

SELECT table1.column1, table1.column2, table2.column1... FROM table 1 JOIN table1.columnx = table2.columny

500

The outermost 'box' of element formatting is the _____

Margins

500

Describe Binary Search and why its more efficient than Selection Sort

Take the middle element of the list. If the desired element is greater than it, discard the lower half the list and vice versa. Continue until desired element is found or entire list is discarded.

It is more efficient as it does not have to check every element in the list.