Creative Development
What base do computers typically use for number representation?
Base-2 (Binary)
Base-16 (Hexadecimal)
Base-10 (Decimal)
Base-8 (Octal)
What method would provide the most comprehensive data about potential security vulnerabilities in a newly developed online banking application?
Executing performance testing to monitor response time under peak usage scenarios.
Implementing penetration testing by simulating cyber-attacks from external threats.
Running functional testing to verify each feature operates as intended by design specifications.
Conducting usability testing with volunteers to gather feedback on user interface design and experience.
What is a common method to protect stored data from unauthorized access?
Compression.
Encryption.
Indexing.
Defragmentation.
If a database containing encrypted health records simultaneously implements a weaker encryption algorithm for enhanced performance, what principal risk arises from this scenario?
Increased likelihood of successful cyber attacks compromising sensitive patient information due to weaker cryptographic protection.
Enhanced interoperability with other systems, potentially translating into broader utilization of records in different contexts.
Shorter system response times, thus improving overall accessibility for healthcare providers when retrieving necessary patient data quickly.
Reduced operational costs stemming from lower computational power demands, facilitating encryption and decryption processes with less complexity.
What is an advantage of collaborative document editing tools for programmers?
They require offline work and manual file sharing
They restrict access to the document for individual work
They discourage collaboration between developers
They allow simultaneous coding on the same document
When storing different states in a video game (such as main menu, paused, playing), which data structure would provide the most efficient way of managing these states?
Enumerated Type (enum)
BinaryTree
HashMap
LinkedList
How does the introduction of autonomous vehicles primarily challenge existing societal norms?
By increasing dependence on nonrenewable energy sources
By reducing opportunities for remote work environments
By altering concepts of vehicle ownership and driving responsibilities
By diminishing the use of public transportation systems

How are we doing?
Give us your feedback and let us know how we can improve
Which of the following is a non-physical computing innovation?
Robots (Roombas, for instance)
Self-driving cars
Word Processors (Word/Pages/Google Docs)
Smartphones
Which practice helps to ensure data security?
Writing down passwords on sticky notes.
Regularly updating passwords.
Using the same password for all accounts.
Sharing passwords with friends.
In computer science, what is the primary purpose of an algorithm?
To increase the processing speed of the central processing unit (CPU).
To serve as the primary interface between the user and the computer system.
To store data for future retrieval and organization.
To solve problems or perform tasks systematically.