The process of sending data between two computers.
Routing
Translating domain names into an IP address is the function of what system?
Domain Name System
________________ is the physical part of the computer, while ______________ tells the physical parts what to do.
hardware, software
It is a widely accepted security measure that should be guaranteed in every secure system. It stands for Confidentiality, Integrity, and Availability.
The CIA Triad
Code that you put inside an if statement or while loop.
Condition
Multiple paths exist between two points, which improves reliability and makes the Internet fault-tolerant
Redundancy
What makes the following command an invalid Karel command?
turnleft( );
The l should be a capital L.
The main function of the CPU is to:
a. store all data
b. display information on the screen
c. to process instructions for the computer
d. To act as temporary storage
c. to process instructions for the computer
A type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
Ransomware
The most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware.
Operating System
Units of data that are sent over the network
Packets
Which of the following is a valid Karel command?
a. move
b. move;
c. move();
c. move();
Used for long-term data storage
a. RAM
b. Cloud
c. Primary Storage
d. Thumb drive
Primary storage
The information about a particular person that exists on the Internet as a result of their online activity
Digital Footprint
An electronic device that manipulates information or data. It can store, retrieve, and process data.
Computer
A group of (2) or more computer systems linked together.
Network
A naming convention where the first letter is lowercase and each new word starts with a capital letter.
Example:
getBall();
Camelcase
A network that connects computers in the same building or room
LAN, Local Area Network
Using charts, graphs, or images to visualize complex data.
Data Visualization
Consists of the steps of defining, preparing, try, and reflect.
The Problem-Solving Process
The capacity of data transfer in a system
Bandwidth
Which control structure makes Karel repeat code?
a. if
b. else
c. for or while
d. define
c. for or while
How does Random Access Memory (RAM) differ from Read-Only Memory (ROM) in terms of volatility?
a. RAM is non-volatile; ROM is volatile
b. Both RAM and ROM are volatile
c. RAM is volatile; ROM is non-volatile
d. Both RAM and ROM are non-volatile
c. RAM is volatile; ROM is non-volatile
A law that grants the creator of an original work exclusive rights to its use, distribution, and sale.
Copyright
Not starting the y-axis at zero.
Truncated Y-Axis