This is the number of bits in one byte.
What is 8?
A specific sequence of instructions that a computer can execute to solve a problem.
What is an Algorithm?
A system for translating easily readable domain names (like google.com) into numerical IP addresses.
What is DNS (Domain Name System)?
This piece of hardware is often called the "brain" of the computer.
What is the CPU (Central Processing Unit)?
The term for unwanted, unsolicited email, often used in phishing attacks.
What is Spam?
The two possible values a Boolean data type can hold.
What is "True" or "False"?
A generic term for a type of programming statement that uses a Boolean condition to decide which block of code to run.
What is selection (or a conditional statement)?
This is the "WWW" part of a website address, a system of interconnected documents accessed via the Internet.
What is the World Wide Web?
The primary form of temporary, volatile computer memory.
What is RAM (Random Access Memory)?
A malicious program that locks your computer files and demands payment to unlock them.
What is ransomeware?
The decimal value of the binary number 1011.
What is 11?
A loop placed inside the body of another loop.
What is a nested loop?
A characteristic of the Internet that allows it to keep working even if parts of the network or some connections fail.
What is Fault-Tolerence?
A high-level description of an algorithm using natural language mixed with programming code syntax, useful for planning.
What is Pseudo code?
This practice uses deceptive emails or websites to trick individuals into revealing personal information like passwords or credit card numbers.
What is Phishing?
The name for the simplified representation of information, like using Hexadecimal to represent binary.
What is "Abstraction"?
The name of the process of finding and fixing errors in code.
What is Debugging?
The set of rules that governs how information is sent and received over the web, often appearing with an 'S' for secure.
What is HTTP/HTTPS (HyperText Transfer Protocol Secure)?
The beneficial or harmful effect a new piece of technology can have on society, a key topic in CSP.
What is the impact of computing?
A security measure that requires at least two different methods of verification to access an account.
What is multi-factor authentication (MFA) or two-factor authentication (2FA)?
This is the process of converting analog information (like sound or color) into digital data composed of bits.
What is digitization (or sampling/encoding)?
The type of search algorithm that repeatedly divides a sorted list in half to find a target value efficiently.
What is a Binary Search?
A standard that ensures devices from different manufacturers can all communicate effectively on the Internet.
What is an Internet protocol (or TCP/IP)?
An innovation that can collect data, use algorithms to process it, and have a positive effect, but could also raise privacy concerns.
What is a computing innovation?
The process of scrambling data so it can only be read by someone with the correct key, ensuring privacy during transmission.
What is Encryption?