1
Programming
2
Cryptography
3
Cybersecurity
Fundamentals
4
Random
100

8.32 is an example of this data type.

What is a floating-point number?

100

This is the text representation of the binary string 01010000 01001001 01000111 according to the ASCII format. 

What is PIG?

100

This is a type of action that has the potential to cause harm in a digital environment.

What is a threat?

100

This is a common type of loop programming structure which allows you to repeat instructions automatically.  

What is a
for loop?

125

A flaw or glitch in a system.

What is a bug?

125

An uncrackable, perfect cipher related to the Vigenère cipher.

What is a One-Time Pad?

125

This is a flaw or weakness that allows a threat agent to bypass security.

What is a vulnerability?

125

This is a common sign of a phishing attempt, where someone tries to trick you into giving up personal information.

What is an email with an urgent message asking for a password?

150

With this flow control structure, you can write code that repeats a sequence until a certain condition is met. This is also called an iteration.

What is a loop?

150

A cipher that generalizes the shift cipher using a repeated keyword.

What is the Vigenère Cipher?

150

This is the number one threat in cybersecurity.

What is phishing?

150

Name one common vulnerability found in computers or websites.

What is a weak password?

175

A value that changes depending on the data and information the specific program receives.

What is a variable?

175

This is the binary representation of the number twenty-nine (29).

What is 11101?

175

This social engineering technique involves pretending to be a person of power to get what they want.

 What is authority?

175

This is the decimal number for the binary number 1011011.

What is 91 (ninety-one)?

200

A set of instructions a program will follow to do A, then B, and then C.

What is an algorithm?

200

This English phrase is encrypted to JFKHYZRAK using the Vigenère cipher with the key DOG

What is Greek to me?

200

These are warning signs to look for in suspicious emails. (Name any three.)

What are sender email address, domain name, spelling formatting, attachment, urgency and request for sensitive information?

200

This English name is encrypted to YUYDUHVYG using the Vigenère cipher with the key SUN.

What is Gallaudet?

M
e
n
u