() < () - ANS-an Operators block and a Boolean block. The block checks if the first value is
less than the other value. If it is greater, the block returns true; if not, it returns false.
() = () - ANS-an Operators block and a Boolean block. The block checks if the first value is
equal to the other value. If the values are equal, the block returns true; if not, false. This
block is not case-sensitive.
() > () - ANS-an Operators block and a Boolean block. The block checks if the first price is
more than the alternative fee. If it is less, the block returns actual; if now not, it returns false.
() and () - ANS-an Operators block and a Boolean block. The block joins boolean blocks so
they both ought to be genuine to go back actual. If they're each real, the block returns
proper; if they're no longer all real or none authentic, it returns fake.
() mod () - ANS-finds the the rest after division of 1 wide variety with the aid of any other
() or () - ANS-an Operators block and a Boolean block. The block joins two boolean blocks
so any one of them may be genuine to go back proper — if as a minimum one of them is
authentic, the block returns authentic; if neither of them are authentic, it returns fake.
This block can be stacked interior itself — this could be used to in shape extra booleans in.
Abs () - ANS-Takes the ___________ ___________ of more than a few. The distance the
range is far from 0. It is constantly nice.
Algorithim - ANS-A fashionable manner to carry out an operation.
AND - ANS-a Boolean operator. *Both* must be true in order for it to evaluate to genuine.
Antivirus Software - ANS-Helps protect in opposition to virus attacks
APIs - ANS-Application Programming Interface
Application Layer Protocols - ANS-The maximum level of abstraction because they control
how information is interpreted and displayed to users. These protocols give which means to
the bits despatched by way of lower-stage protocols; consumer and server computer
systems should agree on what the bits imply, and application protocols (like HTTP) offer this.
Authentication - ANS-Helps to affirm that original writer of the code is what she or he claims
to be.
Binary Search - ANS-requires the listing to be looked after in order after which reducing the
listing in half
Boolean Expression - ANS-an expression that effects in a __________ value, this is, in a
price of either genuine or false .
Brute pressure - ANS-Trying all of the feasible methods to crack a code
Caesar Cipher - ANS-Also referred to as a shift cipher, is one of the most effective forms of
encryption. It is a substitution cipher wherein each letter inside the unique message (referred
to as the plaintext) is changed with a letter corresponding to a sure range of letters up or
down inside the alphabet.
Ceiling of () - ANS-Rounding up
Certificate Authorities - ANS-Used by using many websites for encryption to shield
documents and statistics this is transmitted over the Internet. They issue certificates to verify
the identification of a person or computer.
Cipher - ANS-The set of rules you're using to encode the records
Citizen Science - ANS-Lots of human beings to help with a systematic project, like asking
absolutely everyone around the sector to count the butterflies they see at some point
, Cloud Computing - ANS-Using dispensed calculations and/or storage for big records or an
internet software
Composition of Functions - ANS-An act or mechanism to mix easy capabilities to build more
complex ones.
Conditional Statement - ANS-Set of policies finished if a positive situation is met.
Creative Commons - ANS-An alternative to copyright that permits human beings to declare
how they want their creative creations to be shared, remixed, utilized in noncommercial
contexts, and the way the policy should propagate with remixed variations
Crib - ANS-Words, letters, and phrases which might be so common that it's miles hard to
form a sentence without them
Examples: e and the
Crowdsourcing - ANS-Asking plenty of users on line to assist with something, like funding a
task, or strolling SETI@Home to help look for extraterrestrial indicators
Data Type - ANS-A class of facts which tells the compiler or interpreter how the programmer
intends to use the records. Examples consist of : real, integer, waft (decimal point variety)
DDoS - ANS-Distributed Denial of Service
-Consists of sending lots of requests to a server on the same time. This can overload the
server's community bandwidth.
-Causes a temporary incapability to reach the targeted server so other users of that server
are denied carrier.
Debugging - ANS-A multi-step process that entails identifying a trouble, setting apart the
supply of the problem, after which both correcting the hassle or determining a way to work
round it. The final step of ______________ is to check the correction or workaround and
make certain it works.
Deciphering - ANS-Analyzing the code and working again from it
Default Value - ANS-What the code is set to whilst it's far began.
Diffie-Hellman-Merkle Method - ANS-A technique of mystery key agreement makes secret
key distribution tons simpler.
Digital Divide - ANS-The idea that a few groups / populations have less get entry to to
computing than others
DNS - ANS-Domain Name System
The hierarchical addressing protocol this is human-readable
Domain Name - ANS-The name of the server that hosts the facts
(bjc.Berkeley.Edu)
Encryption - ANS-Works by using converting statistics or information right into a language
that can't be understood in a single look. Usually, the facts is despatched to a person who
can decrypt it the usage of a key only they have got get entry to, retaining the information's
privateness intact.
F and F equals - ANS-F
F and T equals - ANS-F
F or F equals - ANS-F
F or T equals - ANS-T
FALSE - ANS-mentioned enter is false
Fault Tolerance - ANS-potential to paintings around issues
Firewall - ANS-Used to restrict the kinds of connections (HTTP requests, incoming mail, and
so forth.) outsiders can make to your pc.
Floor of () - ANS-Rounding down