The Internet
Efficiency
Digital Data
Security Risks
Impacts of Computing
100

The protocol that determines how to address devices on the network.

IP (Internet Protocol)

100

An algorithm that searches a sorted list for a value in O(logn) time by repeatedly splitting the list in half.

What is a Binary Search?

100

Compressing data in a way that discards some data and makes it impossible to recover the original.

What is Lossy Compression?

100

An attack where a user is tricked into revealing private information, often via a deceptive email.

What is phishing?

100

The participation of volunteers from the public in a scientific research project.

What is citizen science?

200

The maximum amount of data that can be sent in a fixed period of time over a network connection, typically measured in bits per second.

What is Bandwidth?

200

A technique in which you find a good enough solution to a hard problem (usually one that would take an unreasonable amount of time to solve).

What is a heuristic?

200

Data about data, like descriptive information about a file or a row in a database.

What is metadata?

200

A wireless access point that provides an attacker with unauthorized access to the traffic going over the network.

What is a Rogue Access Point?

200

The idea that some communities or populations have less access to computing than others, typically due to limitations of Internet speed or computer hardware access.

What is the Digital Divide?

300

A data transport protocol that includes mechanisms for reliably transmitting packets to a destination.

What is TCP?

300

A computational model which splits a program into multiple tasks, some of which can be executed simultaneously.

What is parallel computing?

300

Values that change smoothly/continuously, rather than in discrete intervals, over time.

What is analogy data?

300

A technique for encrypting data where the same key is used to both encrypt and decrypt data.


What is symmetric encryption?


300

An license that allows people to declare how they want their creations to be shared, remixed, or used in noncommercial contexts.

What is Creative Commons?

400

A protocol used to request and receive files, such as an HTML file, for web page. 


What is HTTP?

400

A computational model which uses multiple devices to run different parts of a program.

What is a Distributed Computing?

400

Error that results when the number of bits is not enough to represent the number exactly (like using 3 digits to represent π as 3.14).

What is a roundoff error (or precision error)?

400

A written description of the function of a code segment, procedure, or program, and how it was developed.

What is documentation?

400

Information about an individual that can be used to uniquely identify them (directly or indirectly).

What is PII?

500

A protocol for sending data over a network that does not check if all packets arrived successfully.

What is UDP


500

A problem that can be solved by an algorithm for some instances, but not all of them.

What is an undecidable probelm?

500

Error that results when the number of bits is not enough to represent the number.

What is an overflow error?

500

A type of cyberattack where an attacker overwhelms a website, server, or network with malicious traffic, rendering it inaccessible to legitimate users.

What is DDoS (Distributed Denial of Service) 

500

A process of extracting information and discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.

What is Data Mining?