What does the abbreviation 'www' stand for?
World Wide Web
What kind of search would you use to find a number in a phone book?
Binary
What does VPN stand for?
Virtual Private Network
This company was the first to release a commerical self-driving car.
Tesla
Who is the chairperson?
Dr. Lisa B Lancor
Name one TLD besides .com, .org, and .net
.mil, .edu, .gov, .uk
What digits are in a binary system?
0, 1
This type of attack involves overwhelming a server with traffic to render it unusable.
a DDos (Distributed Denial of Service) attack
Blockchain
Who is the graduate coordinator for the department?
Dr. Hrvoje Podnar
What is the most popular web browser world wide?
Google Chrome
Write a function in any language to find the first repeating character in a string. If there are no repeating characters, return null.
def first_repeat_char(s):
seen = set()
for char in s:
if char in seen:
return char
seen.add(char)
return None
A common method used by hackers to gain unauthorized access by exploiting a user's trust.
Phishing
What is the name of the computing paradigm that mimics the way the human brain processes information and is used in advanced AI systems?
Neural networks.
Which faculty member received their Bachelor's and Master's degree from Cairo University?
Dr. Amal Abd El-Raouf
What website calls itself the "front page of the Internet"?
Write a Python function to check if a string is a palindrome.
def is_palindrome(s): return s == s[::-1]
This cybersecurity framework is used for controlling access to systems based on the roles of individual users.
Role-based access control (RBAC)
This component made its way from supercomputers to the commercial sector.
64-bit Processor
How many faculty have their Ph.D?
13
VR Tracking Sensor
Write a JavaScript function to check if a string is a palindrome.
function isPalindrome(str) {
return str === str.split(' ').reverse().join(' ');
Explain the difference between symmetric and asymmetric encryption.
symmetric encryption uses the same key for both encryption and decryption. asymmetric encryption uses a pair of public and private keys, where one key encrypts and the other decrypts.
Deep Blue
Which faculty member loves playing ping pong?
Dr. Ata Elahi