Skip to content

Commit

Permalink
cb notes pt1
Browse files Browse the repository at this point in the history
  • Loading branch information
isabellehp committed Dec 22, 2023
1 parent 344416c commit c10454c
Show file tree
Hide file tree
Showing 2 changed files with 50 additions and 2 deletions.
2 changes: 1 addition & 1 deletion _notebooks/2023-12-21-Safe_Computing.ipynb
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@
"title: Safe Computing\n",
"description: College Board Big Idea 5.6 Safe Computing Student Lesson\n",
"type: hacks\n",
"courses: { compsci: {week: 15} }\n",
"courses: { compsci: {week: 16} }\n",
"---"
]
},
Expand Down
50 changes: 49 additions & 1 deletion _posts/2023-12-20-CB-MCQ.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,5 +10,53 @@ courses: { compsci: {week: 16} }

## Quiz Notes
- Citizen science: experiment/research completed with participation from general public
- **Go back to question 4 (guessed)**
- Useful factors in program development:
- Consulting potential users of the program to identify their concerns
- Writing and testing small code segments before adding them to the program
- Collaborating with other individuals when developing a large program
- Private data: data not made available to the general public
- High security protection = encryption (view safe computing lesson)
- Boolean: variable that is true or false
- Pay attention to the order of the code
- Alphanumeric character: contains both letters and numbers, sometimes symbols (&, *, etc.)
- Machine Language Instruction: lowest level of programming language that directly corresponds to the instructions executed by a computer's hardware
- Metadata: the information that describes and explains data
- **Go back to question 38 (guessed)**
- Certificate authority: a trusted entity that issues Secure Sockets Layer (SSL) certificates
- **Go back to question 41 (guessed)**
- Phishing: scam of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers

## Corrections
## Corrections
**Question 17**: Which of the following can be represented by a sequence of bits?
i. An integer
ii. An alphanumeric character
iii. A machine language instruction
- Skill 3.C: Explain how abstraction manages complexity.
- My Answer: i only
- Correct Answer: i, ii, iii
- Reason:

**Question __**:
- Skill:
- My Answer:
- Correct Answer:
- Reason:

**Question __**:
- Skill:
- My Answer:
- Correct Answer:
- Reason:

**Question __**:
- Skill:
- My Answer:
- Correct Answer:
- Reason:

**Question __**:
- Skill:
- My Answer:
- Correct Answer:
- Reason:

0 comments on commit c10454c

Please sign in to comment.