1/44
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
What type of program statement is this an example of? (You want another enemy to appear when the player reaches a certain level)
conditional
When creating an image, what item below, is used to allow for easier manipulation of the picture?
layers
Which of these naming conventions is the correct one for variables?
namelist
What numbers represent a bit?
0,1
When many systems work together to bombard a particular system with fake messages, this is said to be a distributive denial of services or DDOS?
True
One way a computer system can get hacked is to overwhelm a system with so many messages that it gets overloaded and therefore, you may see a message that the site you are trying to visit is unavailable.
True
What allows computers to store and change data by using switches which can be turned on and off?
Byte
When using an AI generator, if you put in the exact description of your wanted image, it will always produce your wanted results?
False
DOS stands for:
denial of service
denial of service…….. to create a website within the Google Platform.
Sites
What makes a system be protected from being hacked?
encryption, multi-tiered authorization, DDOS
Select the problem(s) below that can occur when the internet tries to send and receive messages.
the message doesn't get delivered, part of the message doesn't get delivered, the message needs to be resent.
What are some things that are safe to share online?
general interests, bitmojis, artwork, grade level
What are some things that are NOT same to share online?
name of school, address, picture of house, date of birth
What are some of the ways that computers train to machine learn information?
recognize patterns to make decisions, practice tasks repeatedly, trial and error.
what is the number 8 represented in binary?
1000
what is the number 0 represented in binary?
0
what is the number 2 represented in binary?
10
what is the number 5 represented in binary?
101
which of these real-life scenarios would be a good use of variables.
Today’s temperature, The number of sneakers, How much money in your bank account
When a programmer wants to make their code reusable, they publish it online under an Blank license.
Open source
In the world of internet, what does PII stand for?
Personally Identifiable Information
What is the main purpose of having variables in a program?
store and manipulate data
The DMCA criminalizes circumventing copyright protection?
True
What are the drawbacks of using LLMS, Large Language Models, on the internet?
bias, privacy, interpretation
If using colors in a picture BLANK pixel format would be needed in order to generate that image?
rgb
DDOS stands for distributed denial of service
True
What program element do programmers use to help save space and time when developing a program that will repeat?
Loops
What types of societal bias's can be reflected in LLM, machine learning?
race, gender, socioeconomic
What are some outcomes of good data storytelling?
taking action after review of data presented, improved decision-making
The word pixel is derived from the words pictures and elements?
true
What type of statement is the following: If it is raining, use an umbrella; else, put your sunglasses on.
If/Else
CC-BY-SA
Attribution and Same License Needed if Used
CC-BY
Attribution Only
CC-ND
Unable to make changes
CC-BY-NC
Attribution and Not Allowed to Make Money
CC0
Free to Use
Explain your favorite learning technique
Short Answerv
What are your favorite hobbies?
Multiple Answer
What is your age?
Multiple choice
Rate how well you like school from 1 to 5
Linear Scale
What are ways to protect your device form hackers?
multi-authorization, keep operating system up to date with latest patches, create different passwords often, 2 factor authorization, unplug broken devices until repairperson fixes them
What are ways that do NOT protect your device from hackers?
backup data, print all photos and keep physical copies, research how new devices work, single authorization
What is the purpose of DRM?
copyright protection
What makes up an image?
pixels