Creative Development
What base do computers typically use for number representation?
Base-2 (Binary)
Base-16 (Hexadecimal)
Base-10 (Decimal)
Base-8 (Octal)
What method would provide the most comprehensive data about potential security vulnerabilities in a newly developed online banking application?
Executing performance testing to monitor response time under peak usage scenarios.
Implementing penetration testing by simulating cyber-attacks from external threats.
Running functional testing to verify each feature operates as intended by design specifications.
Conducting usability testing with volunteers to gather feedback on user interface design and experience.
Which of the following is a non-physical computing innovation?
Robots (Roombas, for instance)
Self-driving cars
Word Processors (Word/Pages/Google Docs)
Smartphones
What mechanism within many networking protocols ensures that messages can be understood even if some parts are received out-of-order?
Sequence numbering
Checksum verification
Address mapping
Packet timing
How does two-factor authentication (2FA) enhance security when compared to traditional password-only methods?
By requiring an additional piece of information beyond just a password to verify identity.
By tracking login locations and times to predict future login attempts accurately.
By making passwords longer and more complex for all user accounts automatically.
By encrypting passwords with a reversible algorithm stored on the user's device only.
Which practice helps to ensure data security?
Writing down passwords on sticky notes.
Regularly updating passwords.
Using the same password for all accounts.
Sharing passwords with friends.
In computer science, what is the primary purpose of an algorithm?
To increase the processing speed of the central processing unit (CPU).
To serve as the primary interface between the user and the computer system.
To store data for future retrieval and organization.
To solve problems or perform tasks systematically.

How are we doing?
Give us your feedback and let us know how we can improve
Which of these is an example of two-factor authentication (2FA)?
Inputting both a password and a code sent to your phone.
Using your fingerprint twice to unlock your device.
Changing your password every two months.
Choosing two different passwords for the same account.
Which outcome best reflects an ethical dilemma arising from the design choice to implement facial recognition technology at a retail store's self-checkout systems?
Higher accuracy in tracking customer purchases leading to personalized discounts and offers.
Decreased theft rates contributing positively to the store’s annual profit margins and losses prevention.
Improved efficiency at checkouts resulting in shorter lines and better customer satisfaction.
Increased surveillance concerns among customers about how their biometric data is used and stored.
How do users contribute to the creation of computing innovations?
By providing feedback and reporting problems
By overseeing the work of developers
By managing projects in real-time
By conducting market research