Digital Information
The Internet
Programming Basics
Data
Programming, Part 2
Cybersecurity
Algorithms
100

This is a way of representing information using only two options.

What is Binary?

100

This is a machine that can run a program, like a phone, router, or smart sensor.

What is a Computing Device?

100

This is the data a program receives to process.

What's an input?

100

Data about data, including a timestamp and location or IP address.

What is metadata?

100

This term refers to a single item in a list.

What is an Element?

100

This is any piece of information that can identify a specific person, like a name or social security number.

What is Personally Identifiable Information (PII)?

100

A precise, step-by-step set of instructions for solving a problem.

What is an Algorithm?

200

This type of error occurs when a number is too large to represent.

What is an Overflow Error?

200

This system translates domain names into IP addresses.

What is the Domain Name System (DNS)?

200

A named value that can be used and updated in a program.

What is a Variable?

200

This process makes data uniform for analysis, like removing typos and checking that data types are the same (ex: changing "two" to 2).

What is Cleaning Data?

200

A loop that never ends because the condition never becomes false.

What is an Infinite Loop?

200

This type of attack tricks people into giving away sensitive information by pretending to be a trustworthy source.

What is Phishing?

200

This search method checks each item in a list one by one.

What is Linear Search?

300

This is a process for converting analog data into digital data by taking measurements at regular intervals.

What is Sampling?

300

This is a chunk of data sent across a network.

What is a Packet?

300

This style of programming runs code in response to things like mouse clicks or key presses.

What is Event-Driven Programming?

300

Using the public to gather or produce data online.

What is Crowdsourcing?

300

This is the process of looping over each item in a list.

What is Traversal?

300

A tool used to protect computers from malware and viruses.

What is Computer Virus Scanning Software?

300

This occurs when an algorithm repeats steps until a condition is met.

What is Iteration?

400

This type of compression reduces file size without losing any information.

What is Lossless Compression?

400

A set of rules that define how data is transmitted across the Internet.

What is a Protocol?

400

This is a command that runs the code inside a function.

What is a Function Call?

400

This occurs when the data collected doesn’t represent the whole population.

What is Data Bias?

400

A variable used in a function definition to receive values.

What is a Parameter?

400

This process encodes a message so that only authorized parties can read it.

What is Encryption?

400

A search technique that only works on sorted lists by repeatedly dividing the list in half.

What is Binary Search?

500

A type of data that changes continuously over time, such as sound waves.

What is Analog Data?

500

This allows a network to keep working even if some parts fail.

What is Fault Tolerance?

500

Programmers often write this non-executable text to explain their code.




What is a Comment?

500

Choosing a subset of data to focus on in an analysis.

What is Data Filtering?

500

This term refers to using named procedures without knowing the details of how they work.

What is Procedural Abstraction?

500

This type of encryption uses one key for locking and a different key for unlocking data.

What is Public Key Encryption?

500

A problem for which no algorithm can provide a solution for all possible inputs.

What is an Undecidable Problem?