The Internet and Networks
Karel
What is Computing?
CyberSecurity
Vocab
100

The process of sending data between two computers.

Routing

100

Translating domain names into an IP address is the function of what system?

Domain Name System

100

________________ is the physical part of the computer, while ______________ tells the physical parts what to do. 

hardware, software

100

It is a widely accepted security measure that should be guaranteed in every secure system. It stands for Confidentiality, Integrity, and Availability.

The CIA Triad

100

Code that you put inside an if statement or while loop.

Condition

200

Multiple paths exist between two points, which improves reliability and makes the Internet fault-tolerant

Redundancy

200

What makes the following command an invalid Karel command?

turnleft( );

The l should be a capital L. 

200

The main function of the CPU is to:

a. store all data

b. display information on the screen

c. to process instructions for the computer

d. To act as temporary storage 

c. to process instructions for the computer

200

A type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.

Ransomware

200

The most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware.

Operating System

300

Units of data that are sent over the network 

Packets

300

Which of the following is a valid Karel command?

a. move

b. move;

c. move();

c. move();

300

Used for long-term data storage

a. RAM

b. Cloud

c. Primary Storage

d. Thumb drive

Primary storage

300

The information about a particular person that exists on the Internet as a result of their online activity

Digital Footprint

300

An electronic device that manipulates information or data. It can store, retrieve, and process data.



Computer

400

A group of (2) or more computer systems linked together.

Network

400

A naming convention where the first letter is lowercase and each new word starts with a capital letter.

Example:

getBall();

Camelcase

400

A network that connects computers in the same building or room

LAN, Local Area Network

400

Using charts, graphs, or images to visualize complex data.

Data Visualization

400

Consists of the steps of defining, preparing, try, and reflect. 

The Problem-Solving Process

500

The capacity of data transfer in a system

Bandwidth

500

Which control structure makes Karel repeat code?

a. if

b. else

c. for or while

d. define

c. for or while

500

How does Random Access Memory (RAM) differ from Read-Only Memory (ROM) in terms of volatility?
         a. RAM is non-volatile; ROM is volatile
         b. Both RAM and ROM are volatile
         c. RAM is volatile; ROM is non-volatile
         d. Both RAM and ROM are non-volatile

 c. RAM is volatile; ROM is non-volatile

500

A law that grants the creator of an original work exclusive rights to its use, distribution, and sale.

Copyright

500

Not starting the y-axis at zero.

Truncated Y-Axis